smallstep-certificates/ca/adminClient.go

1235 lines
35 KiB
Go
Raw Normal View History

2021-05-03 19:48:20 +00:00
package ca
import (
2021-05-12 07:03:40 +00:00
"bytes"
"crypto/x509"
2021-05-12 07:03:40 +00:00
"encoding/json"
2022-03-30 12:21:39 +00:00
"fmt"
2021-05-18 04:07:25 +00:00
"io"
2021-05-03 19:48:20 +00:00
"net/http"
"net/url"
"path"
2021-05-18 23:50:54 +00:00
"strconv"
"time"
2021-05-03 19:48:20 +00:00
"github.com/pkg/errors"
"google.golang.org/protobuf/encoding/protojson"
"go.step.sm/cli-utils/token"
"go.step.sm/cli-utils/token/provision"
"go.step.sm/crypto/jose"
"go.step.sm/crypto/randutil"
"go.step.sm/linkedca"
adminAPI "github.com/smallstep/certificates/authority/admin/api"
"github.com/smallstep/certificates/authority/provisioner"
"github.com/smallstep/certificates/errs"
2021-05-03 19:48:20 +00:00
)
2022-04-08 01:14:43 +00:00
const (
adminURLPrefix = "admin"
adminIssuer = "step-admin-client/1.0"
)
2021-05-26 04:13:01 +00:00
2021-05-20 23:02:20 +00:00
// AdminClient implements an HTTP client for the CA server.
type AdminClient struct {
client *uaClient
endpoint *url.URL
retryFunc RetryFunc
opts []ClientOption
x5cJWK *jose.JSONWebKey
x5cCertFile string
x5cCertStrs []string
x5cCert *x509.Certificate
x5cSubject string
2021-05-03 19:48:20 +00:00
}
var ErrAdminAPINotImplemented = errors.New("admin API not implemented")
var ErrAdminAPINotAuthorized = errors.New("admin API not authorized")
2022-02-08 12:26:30 +00:00
// AdminClientError is the client side representation of an
// AdminError returned by the CA.
type AdminClientError struct {
Type string `json:"type"`
Detail string `json:"detail"`
Message string `json:"message"`
}
// Error returns the AdminClientError message as the error message
func (e *AdminClientError) Error() string {
return e.Message
}
2021-05-20 23:02:20 +00:00
// NewAdminClient creates a new AdminClient with the given endpoint and options.
func NewAdminClient(endpoint string, opts ...ClientOption) (*AdminClient, error) {
2021-05-03 19:48:20 +00:00
u, err := parseEndpoint(endpoint)
if err != nil {
return nil, err
}
// Retrieve transport from options.
o := new(clientOptions)
if err := o.apply(opts); err != nil {
return nil, err
}
tr, err := o.getTransport(endpoint)
if err != nil {
return nil, err
}
2021-05-20 23:02:20 +00:00
return &AdminClient{
client: newClient(tr),
endpoint: u,
retryFunc: o.retryFunc,
opts: opts,
x5cJWK: o.x5cJWK,
x5cCertFile: o.x5cCertFile,
x5cCertStrs: o.x5cCertStrs,
x5cCert: o.x5cCert,
x5cSubject: o.x5cSubject,
2021-05-03 19:48:20 +00:00
}, nil
}
2022-04-08 01:14:43 +00:00
func (c *AdminClient) generateAdminToken(aud *url.URL) (string, error) {
// A random jwt id will be used to identify duplicated tokens
jwtID, err := randutil.Hex(64) // 256 bits
if err != nil {
return "", err
}
// Drop any query string parameter from the token audience
aud = &url.URL{
Scheme: aud.Scheme,
Host: aud.Host,
Path: aud.Path,
}
now := time.Now()
tokOptions := []token.Options{
token.WithJWTID(jwtID),
token.WithKid(c.x5cJWK.KeyID),
2022-04-08 01:14:43 +00:00
token.WithIssuer(adminIssuer),
token.WithAudience(aud.String()),
token.WithValidity(now, now.Add(token.DefaultValidity)),
token.WithX5CCerts(c.x5cCertStrs),
}
tok, err := provision.New(c.x5cSubject, tokOptions...)
if err != nil {
return "", err
}
return tok.SignedString(c.x5cJWK.Algorithm, c.x5cJWK.Key)
}
2021-05-20 23:02:20 +00:00
func (c *AdminClient) retryOnError(r *http.Response) bool {
2021-05-03 19:48:20 +00:00
if c.retryFunc != nil {
if c.retryFunc(r.StatusCode) {
o := new(clientOptions)
if err := o.apply(c.opts); err != nil {
return false
}
tr, err := o.getTransport(c.endpoint.String())
if err != nil {
return false
}
r.Body.Close()
c.client.SetTransport(tr)
return true
}
}
return false
}
// IsEnabled checks if the admin API is enabled.
func (c *AdminClient) IsEnabled() error {
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "admins")})
resp, err := c.client.Get(u.String())
if err != nil {
return clientError(err)
}
defer resp.Body.Close()
if resp.StatusCode < http.StatusBadRequest {
return nil
}
switch resp.StatusCode {
case http.StatusNotFound, http.StatusNotImplemented:
return ErrAdminAPINotImplemented
case http.StatusUnauthorized:
return ErrAdminAPINotAuthorized
default:
return errors.Errorf("unexpected status code when performing is-enabled check for Admin API: %d", resp.StatusCode)
}
}
2021-05-20 23:02:20 +00:00
// GetAdmin performs the GET /admin/admin/{id} request to the CA.
2021-05-26 04:13:01 +00:00
func (c *AdminClient) GetAdmin(id string) (*linkedca.Admin, error) {
2021-05-03 19:48:20 +00:00
var retried bool
2021-05-26 04:13:01 +00:00
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "admins", id)})
2021-05-03 19:48:20 +00:00
retry:
resp, err := c.client.Get(u.String())
if err != nil {
return nil, clientError(err)
2021-05-03 19:48:20 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-03 19:48:20 +00:00
}
2021-05-26 04:13:01 +00:00
var adm = new(linkedca.Admin)
if err := readProtoJSON(resp.Body, adm); err != nil {
2021-05-03 19:48:20 +00:00
return nil, errors.Wrapf(err, "error reading %s", u)
}
return adm, nil
}
2021-05-26 21:55:31 +00:00
// AdminOption is the type of options passed to the Admin method.
2021-05-18 23:50:54 +00:00
type AdminOption func(o *adminOptions) error
type adminOptions struct {
cursor string
limit int
}
func (o *adminOptions) apply(opts []AdminOption) (err error) {
for _, fn := range opts {
if err = fn(o); err != nil {
return
}
}
return
}
func (o *adminOptions) rawQuery() string {
v := url.Values{}
if o.cursor != "" {
2021-05-18 23:50:54 +00:00
v.Set("cursor", o.cursor)
}
if o.limit > 0 {
v.Set("limit", strconv.Itoa(o.limit))
}
return v.Encode()
}
// WithAdminCursor will request the admins starting with the given cursor.
func WithAdminCursor(cursor string) AdminOption {
return func(o *adminOptions) error {
o.cursor = cursor
return nil
}
}
// WithAdminLimit will request the given number of admins.
func WithAdminLimit(limit int) AdminOption {
return func(o *adminOptions) error {
o.limit = limit
return nil
}
}
2021-05-26 21:55:31 +00:00
// GetAdminsPaginate returns a page from the the GET /admin/admins request to the CA.
func (c *AdminClient) GetAdminsPaginate(opts ...AdminOption) (*adminAPI.GetAdminsResponse, error) {
2021-05-18 23:50:54 +00:00
var retried bool
o := new(adminOptions)
if err := o.apply(opts); err != nil {
return nil, err
}
u := c.endpoint.ResolveReference(&url.URL{
2021-05-20 20:01:58 +00:00
Path: "/admin/admins",
2021-05-18 23:50:54 +00:00
RawQuery: o.rawQuery(),
})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("GET", u.String(), http.NoBody)
if err != nil {
return nil, errors.Wrapf(err, "create GET %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-18 23:50:54 +00:00
retry:
resp, err := c.client.Do(req)
2021-05-18 23:50:54 +00:00
if err != nil {
return nil, clientError(err)
2021-05-18 23:50:54 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-18 23:50:54 +00:00
}
var body = new(adminAPI.GetAdminsResponse)
2021-05-18 23:50:54 +00:00
if err := readJSON(resp.Body, body); err != nil {
return nil, errors.Wrapf(err, "error reading %s", u)
}
return body, nil
}
2021-05-26 21:55:31 +00:00
// GetAdmins returns all admins from the GET /admin/admins request to the CA.
2023-05-10 06:47:28 +00:00
func (c *AdminClient) GetAdmins(...AdminOption) ([]*linkedca.Admin, error) {
2021-05-26 21:55:31 +00:00
var (
cursor = ""
admins = []*linkedca.Admin{}
)
for {
resp, err := c.GetAdminsPaginate(WithAdminCursor(cursor), WithAdminLimit(100))
if err != nil {
return nil, err
}
admins = append(admins, resp.Admins...)
if resp.NextCursor == "" {
return admins, nil
}
cursor = resp.NextCursor
}
}
2021-05-20 23:02:20 +00:00
// CreateAdmin performs the POST /admin/admins request to the CA.
func (c *AdminClient) CreateAdmin(createAdminRequest *adminAPI.CreateAdminRequest) (*linkedca.Admin, error) {
2021-05-12 07:03:40 +00:00
var retried bool
body, err := json.Marshal(createAdminRequest)
2021-05-12 07:03:40 +00:00
if err != nil {
return nil, errs.Wrap(http.StatusInternalServerError, err, "error marshaling request")
}
2021-05-20 23:02:20 +00:00
u := c.endpoint.ResolveReference(&url.URL{Path: "/admin/admins"})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("POST", u.String(), bytes.NewReader(body))
if err != nil {
return nil, errors.Wrapf(err, "create GET %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-12 07:03:40 +00:00
retry:
resp, err := c.client.Do(req)
2021-05-12 07:03:40 +00:00
if err != nil {
return nil, clientError(err)
2021-05-12 07:03:40 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-12 07:03:40 +00:00
}
2021-05-26 04:13:01 +00:00
var adm = new(linkedca.Admin)
if err := readProtoJSON(resp.Body, adm); err != nil {
2021-05-12 07:03:40 +00:00
return nil, errors.Wrapf(err, "error reading %s", u)
}
return adm, nil
}
2021-05-20 23:02:20 +00:00
// RemoveAdmin performs the DELETE /admin/admins/{id} request to the CA.
func (c *AdminClient) RemoveAdmin(id string) error {
2021-05-12 07:03:40 +00:00
var retried bool
2021-05-26 04:13:01 +00:00
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "admins", id)})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("DELETE", u.String(), http.NoBody)
2021-05-12 07:03:40 +00:00
if err != nil {
return errors.Wrapf(err, "create DELETE %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-12 07:03:40 +00:00
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2021-05-12 07:03:40 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return readAdminError(resp.Body)
2021-05-12 07:03:40 +00:00
}
return nil
}
2021-05-20 23:02:20 +00:00
// UpdateAdmin performs the PUT /admin/admins/{id} request to the CA.
func (c *AdminClient) UpdateAdmin(id string, uar *adminAPI.UpdateAdminRequest) (*linkedca.Admin, error) {
2021-05-12 07:03:40 +00:00
var retried bool
body, err := json.Marshal(uar)
if err != nil {
return nil, errs.Wrap(http.StatusInternalServerError, err, "error marshaling request")
}
2021-05-26 04:13:01 +00:00
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "admins", id)})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
2021-05-18 04:07:25 +00:00
req, err := http.NewRequest("PATCH", u.String(), bytes.NewReader(body))
2021-05-12 07:03:40 +00:00
if err != nil {
return nil, errors.Wrapf(err, "create PATCH %s request failed", u)
2021-05-12 07:03:40 +00:00
}
req.Header.Add("Authorization", tok)
2021-05-12 07:03:40 +00:00
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2021-05-12 07:03:40 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-12 07:03:40 +00:00
}
2021-05-26 04:13:01 +00:00
var adm = new(linkedca.Admin)
if err := readProtoJSON(resp.Body, adm); err != nil {
2021-05-12 07:03:40 +00:00
return nil, errors.Wrapf(err, "error reading %s", u)
}
return adm, nil
}
// GetProvisioner performs the GET /admin/provisioners/{name} request to the CA.
func (c *AdminClient) GetProvisioner(opts ...ProvisionerOption) (*linkedca.Provisioner, error) {
2021-05-18 04:07:25 +00:00
var retried bool
o := new(ProvisionerOptions)
if err := o.Apply(opts); err != nil {
return nil, err
}
var u *url.URL
switch {
2022-05-18 16:43:32 +00:00
case o.ID != "":
u = c.endpoint.ResolveReference(&url.URL{
Path: "/admin/provisioners/id",
RawQuery: o.rawQuery(),
})
2022-05-18 16:43:32 +00:00
case o.Name != "":
u = c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", o.Name)})
default:
return nil, errors.New("must set either name or id in method options")
}
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("GET", u.String(), http.NoBody)
if err != nil {
return nil, errors.Wrapf(err, "create GET %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-18 04:07:25 +00:00
retry:
resp, err := c.client.Do(req)
2021-05-18 04:07:25 +00:00
if err != nil {
return nil, clientError(err)
2021-05-18 04:07:25 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-18 04:07:25 +00:00
}
2021-05-26 04:13:01 +00:00
var prov = new(linkedca.Provisioner)
if err := readProtoJSON(resp.Body, prov); err != nil {
2021-05-18 04:07:25 +00:00
return nil, errors.Wrapf(err, "error reading %s", u)
}
return prov, nil
}
2021-05-26 21:55:31 +00:00
// GetProvisionersPaginate performs the GET /admin/provisioners request to the CA.
func (c *AdminClient) GetProvisionersPaginate(opts ...ProvisionerOption) (*adminAPI.GetProvisionersResponse, error) {
2021-05-11 22:25:37 +00:00
var retried bool
o := new(ProvisionerOptions)
if err := o.Apply(opts); err != nil {
2021-05-26 21:55:31 +00:00
return nil, err
}
u := c.endpoint.ResolveReference(&url.URL{
Path: "/admin/provisioners",
RawQuery: o.rawQuery(),
})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("GET", u.String(), http.NoBody)
if err != nil {
return nil, errors.Wrapf(err, "create GET %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-11 22:25:37 +00:00
retry:
resp, err := c.client.Do(req)
2021-05-11 22:25:37 +00:00
if err != nil {
return nil, clientError(err)
2021-05-11 22:25:37 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-11 22:25:37 +00:00
}
var body = new(adminAPI.GetProvisionersResponse)
2021-05-26 21:55:31 +00:00
if err := readJSON(resp.Body, body); err != nil {
2021-05-11 22:25:37 +00:00
return nil, errors.Wrapf(err, "error reading %s", u)
}
2021-05-26 21:55:31 +00:00
return body, nil
}
// GetProvisioners returns all admins from the GET /admin/admins request to the CA.
2023-05-10 06:47:28 +00:00
func (c *AdminClient) GetProvisioners(...AdminOption) (provisioner.List, error) {
2021-05-26 21:55:31 +00:00
var (
cursor = ""
provs = provisioner.List{}
)
for {
resp, err := c.GetProvisionersPaginate(WithProvisionerCursor(cursor), WithProvisionerLimit(100))
if err != nil {
return nil, err
}
provs = append(provs, resp.Provisioners...)
if resp.NextCursor == "" {
return provs, nil
}
cursor = resp.NextCursor
}
2021-05-11 22:25:37 +00:00
}
2021-05-18 04:07:25 +00:00
2021-05-20 23:02:20 +00:00
// RemoveProvisioner performs the DELETE /admin/provisioners/{name} request to the CA.
func (c *AdminClient) RemoveProvisioner(opts ...ProvisionerOption) error {
var (
u *url.URL
retried bool
)
o := new(ProvisionerOptions)
if err := o.Apply(opts); err != nil {
return err
}
switch {
2022-05-18 16:43:32 +00:00
case o.ID != "":
u = c.endpoint.ResolveReference(&url.URL{
Path: path.Join(adminURLPrefix, "provisioners/id"),
RawQuery: o.rawQuery(),
})
2022-05-18 16:43:32 +00:00
case o.Name != "":
u = c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", o.Name)})
default:
return errors.New("must set either name or id in method options")
}
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("DELETE", u.String(), http.NoBody)
2021-05-18 04:07:25 +00:00
if err != nil {
return errors.Wrapf(err, "create DELETE %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-18 04:07:25 +00:00
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2021-05-18 04:07:25 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return readAdminError(resp.Body)
2021-05-18 04:07:25 +00:00
}
return nil
}
2021-05-20 23:02:20 +00:00
// CreateProvisioner performs the POST /admin/provisioners request to the CA.
2021-05-26 04:13:01 +00:00
func (c *AdminClient) CreateProvisioner(prov *linkedca.Provisioner) (*linkedca.Provisioner, error) {
2021-05-18 04:07:25 +00:00
var retried bool
body, err := protojson.Marshal(prov)
2021-05-18 04:07:25 +00:00
if err != nil {
return nil, errs.Wrap(http.StatusInternalServerError, err, "error marshaling request")
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners")})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("POST", u.String(), bytes.NewReader(body))
if err != nil {
return nil, errors.Wrapf(err, "create POST %s request failed", u)
}
req.Header.Add("Authorization", tok)
2021-05-18 04:07:25 +00:00
retry:
resp, err := c.client.Do(req)
2021-05-18 04:07:25 +00:00
if err != nil {
return nil, clientError(err)
2021-05-18 04:07:25 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
2021-05-20 23:02:20 +00:00
return nil, readAdminError(resp.Body)
2021-05-18 04:07:25 +00:00
}
2021-05-26 04:13:01 +00:00
var nuProv = new(linkedca.Provisioner)
if err := readProtoJSON(resp.Body, nuProv); err != nil {
2021-05-18 04:07:25 +00:00
return nil, errors.Wrapf(err, "error reading %s", u)
}
2021-05-21 20:31:41 +00:00
return nuProv, nil
2021-05-18 04:07:25 +00:00
}
// UpdateProvisioner performs the PUT /admin/provisioners/{name} request to the CA.
func (c *AdminClient) UpdateProvisioner(name string, prov *linkedca.Provisioner) error {
2021-05-18 04:07:25 +00:00
var retried bool
body, err := protojson.Marshal(prov)
2021-05-18 04:07:25 +00:00
if err != nil {
return errs.Wrap(http.StatusInternalServerError, err, "error marshaling request")
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", name)})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return errors.Wrapf(err, "error generating admin token")
2021-05-18 04:07:25 +00:00
}
req, err := http.NewRequest("PUT", u.String(), bytes.NewReader(body))
if err != nil {
return errors.Wrapf(err, "create PUT %s request failed", u)
2021-05-18 04:07:25 +00:00
}
req.Header.Add("Authorization", tok)
2021-05-18 04:07:25 +00:00
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2021-05-18 04:07:25 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return readAdminError(resp.Body)
2021-05-18 04:07:25 +00:00
}
return nil
2021-05-18 04:07:25 +00:00
}
// GetExternalAccountKeysPaginate returns a page from the GET /admin/acme/eab request to the CA.
2021-10-11 21:34:23 +00:00
func (c *AdminClient) GetExternalAccountKeysPaginate(provisionerName, reference string, opts ...AdminOption) (*adminAPI.GetExternalAccountKeysResponse, error) {
2021-07-23 13:16:11 +00:00
var retried bool
o := new(adminOptions)
if err := o.apply(opts); err != nil {
return nil, err
}
p := path.Join(adminURLPrefix, "acme/eab", provisionerName)
if reference != "" {
p = path.Join(p, "/", reference)
}
2021-07-23 13:16:11 +00:00
u := c.endpoint.ResolveReference(&url.URL{
Path: p,
2021-07-23 13:16:11 +00:00
RawQuery: o.rawQuery(),
})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
2021-07-23 13:16:11 +00:00
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
2021-12-06 12:01:23 +00:00
req, err := http.NewRequest("GET", u.String(), http.NoBody)
2021-07-23 13:16:11 +00:00
if err != nil {
return nil, errors.Wrapf(err, "create GET %s request failed", u)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2021-07-23 13:16:11 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
2021-08-27 14:58:04 +00:00
var body = new(adminAPI.GetExternalAccountKeysResponse)
if err := readJSON(resp.Body, body); err != nil {
return nil, errors.Wrapf(err, "error reading %s", u)
}
return body, nil
2021-07-23 13:16:11 +00:00
}
// CreateExternalAccountKey performs the POST /admin/acme/eab request to the CA.
func (c *AdminClient) CreateExternalAccountKey(provisionerName string, eakRequest *adminAPI.CreateExternalAccountKeyRequest) (*linkedca.EABKey, error) {
var retried bool
body, err := json.Marshal(eakRequest)
if err != nil {
return nil, errs.Wrap(http.StatusInternalServerError, err, "error marshaling request")
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "acme/eab/", provisionerName)})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, errors.Wrapf(err, "error generating admin token")
}
req, err := http.NewRequest("POST", u.String(), bytes.NewReader(body))
if err != nil {
return nil, errors.Wrapf(err, "create POST %s request failed", u)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var eabKey = new(linkedca.EABKey)
if err := readProtoJSON(resp.Body, eabKey); err != nil {
return nil, errors.Wrapf(err, "error reading %s", u)
}
return eabKey, nil
}
// RemoveExternalAccountKey performs the DELETE /admin/acme/eab/{prov}/{key_id} request to the CA.
2021-10-11 21:34:23 +00:00
func (c *AdminClient) RemoveExternalAccountKey(provisionerName, keyID string) error {
2021-08-27 12:10:00 +00:00
var retried bool
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "acme/eab", provisionerName, "/", keyID)})
2022-04-08 01:14:43 +00:00
tok, err := c.generateAdminToken(u)
2021-08-27 12:10:00 +00:00
if err != nil {
return errors.Wrapf(err, "error generating admin token")
}
2021-12-06 12:01:23 +00:00
req, err := http.NewRequest("DELETE", u.String(), http.NoBody)
2021-08-27 12:10:00 +00:00
if err != nil {
return errors.Wrapf(err, "create DELETE %s request failed", u)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2021-08-27 12:10:00 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return readAdminError(resp.Body)
}
return nil
}
2022-03-30 12:21:39 +00:00
func (c *AdminClient) GetAuthorityPolicy() (*linkedca.Policy, error) {
var retried bool
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-03-30 12:21:39 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodGet, u.String(), http.NoBody)
if err != nil {
return nil, fmt.Errorf("creating GET %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-03-30 12:21:39 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) CreateAuthorityPolicy(p *linkedca.Policy) (*linkedca.Policy, error) {
var retried bool
body, err := protojson.Marshal(p)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-03-30 12:21:39 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodPost, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating POST %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-03-30 12:21:39 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) UpdateAuthorityPolicy(p *linkedca.Policy) (*linkedca.Policy, error) {
var retried bool
body, err := protojson.Marshal(p)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-03-30 12:21:39 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodPut, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating PUT %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-03-30 12:21:39 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) RemoveAuthorityPolicy() error {
var retried bool
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-03-30 12:21:39 +00:00
if err != nil {
return fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodDelete, u.String(), http.NoBody)
if err != nil {
return fmt.Errorf("creating DELETE %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2022-03-30 12:21:39 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return readAdminError(resp.Body)
}
return nil
}
2022-04-07 12:11:53 +00:00
func (c *AdminClient) GetProvisionerPolicy(provisionerName string) (*linkedca.Policy, error) {
var retried bool
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodGet, u.String(), http.NoBody)
if err != nil {
return nil, fmt.Errorf("creating GET %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) CreateProvisionerPolicy(provisionerName string, p *linkedca.Policy) (*linkedca.Policy, error) {
var retried bool
body, err := protojson.Marshal(p)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodPost, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating POST %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) UpdateProvisionerPolicy(provisionerName string, p *linkedca.Policy) (*linkedca.Policy, error) {
var retried bool
body, err := protojson.Marshal(p)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodPut, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating PUT %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) RemoveProvisionerPolicy(provisionerName string) error {
var retried bool
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "policy")})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodDelete, u.String(), http.NoBody)
if err != nil {
return fmt.Errorf("creating DELETE %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return readAdminError(resp.Body)
}
return nil
}
func (c *AdminClient) GetACMEPolicy(provisionerName, reference, keyID string) (*linkedca.Policy, error) {
var retried bool
var urlPath string
switch {
case keyID != "":
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "key", keyID)
default:
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "reference", reference)
}
u := c.endpoint.ResolveReference(&url.URL{Path: urlPath})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodGet, u.String(), http.NoBody)
if err != nil {
return nil, fmt.Errorf("creating GET %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) CreateACMEPolicy(provisionerName, reference, keyID string, p *linkedca.Policy) (*linkedca.Policy, error) {
var retried bool
body, err := protojson.Marshal(p)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
var urlPath string
switch {
case keyID != "":
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "key", keyID)
default:
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "reference", reference)
}
u := c.endpoint.ResolveReference(&url.URL{Path: urlPath})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodPost, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating POST %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) UpdateACMEPolicy(provisionerName, reference, keyID string, p *linkedca.Policy) (*linkedca.Policy, error) {
var retried bool
body, err := protojson.Marshal(p)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
var urlPath string
switch {
case keyID != "":
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "key", keyID)
default:
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "reference", reference)
}
u := c.endpoint.ResolveReference(&url.URL{Path: urlPath})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodPut, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating PUT %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var policy = new(linkedca.Policy)
if err := readProtoJSON(resp.Body, policy); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return policy, nil
}
func (c *AdminClient) RemoveACMEPolicy(provisionerName, reference, keyID string) error {
var retried bool
var urlPath string
switch {
case keyID != "":
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "key", keyID)
default:
urlPath = path.Join(adminURLPrefix, "acme", "policy", provisionerName, "reference", reference)
}
u := c.endpoint.ResolveReference(&url.URL{Path: urlPath})
2022-04-18 19:59:06 +00:00
tok, err := c.generateAdminToken(u)
2022-04-07 12:11:53 +00:00
if err != nil {
return fmt.Errorf("error generating admin token: %w", err)
}
req, err := http.NewRequest(http.MethodDelete, u.String(), http.NoBody)
if err != nil {
return fmt.Errorf("creating DELETE %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
retry:
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2022-04-07 12:11:53 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return readAdminError(resp.Body)
}
return nil
}
2022-09-30 00:16:26 +00:00
func (c *AdminClient) CreateProvisionerWebhook(provisionerName string, wh *linkedca.Webhook) (*linkedca.Webhook, error) {
var retried bool
body, err := protojson.Marshal(wh)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "webhooks")})
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
retry:
req, err := http.NewRequest(http.MethodPost, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating POST %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-09-30 00:16:26 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var webhook = new(linkedca.Webhook)
if err := readProtoJSON(resp.Body, webhook); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return webhook, nil
}
func (c *AdminClient) UpdateProvisionerWebhook(provisionerName string, wh *linkedca.Webhook) (*linkedca.Webhook, error) {
var retried bool
body, err := protojson.Marshal(wh)
if err != nil {
return nil, fmt.Errorf("error marshaling request: %w", err)
}
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "webhooks", wh.Name)})
tok, err := c.generateAdminToken(u)
if err != nil {
return nil, fmt.Errorf("error generating admin token: %w", err)
}
retry:
req, err := http.NewRequest(http.MethodPut, u.String(), bytes.NewReader(body))
if err != nil {
return nil, fmt.Errorf("creating PUT %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
resp, err := c.client.Do(req)
if err != nil {
return nil, clientError(err)
2022-09-30 00:16:26 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return nil, readAdminError(resp.Body)
}
var webhook = new(linkedca.Webhook)
if err := readProtoJSON(resp.Body, webhook); err != nil {
return nil, fmt.Errorf("error reading %s: %w", u, err)
}
return webhook, nil
}
func (c *AdminClient) DeleteProvisionerWebhook(provisionerName, webhookName string) error {
var retried bool
u := c.endpoint.ResolveReference(&url.URL{Path: path.Join(adminURLPrefix, "provisioners", provisionerName, "webhooks", webhookName)})
tok, err := c.generateAdminToken(u)
if err != nil {
return fmt.Errorf("error generating admin token: %w", err)
}
retry:
req, err := http.NewRequest(http.MethodDelete, u.String(), http.NoBody)
if err != nil {
return fmt.Errorf("creating DELETE %s request failed: %w", u, err)
}
req.Header.Add("Authorization", tok)
resp, err := c.client.Do(req)
if err != nil {
return clientError(err)
2022-09-30 00:16:26 +00:00
}
if resp.StatusCode >= 400 {
if !retried && c.retryOnError(resp) {
retried = true
goto retry
}
return readAdminError(resp.Body)
}
return nil
}
2021-05-20 23:02:20 +00:00
func readAdminError(r io.ReadCloser) error {
2021-07-23 13:16:11 +00:00
// TODO: not all errors can be read (i.e. 404); seems to be a bigger issue
2021-05-18 04:07:25 +00:00
defer r.Close()
2022-02-08 12:26:30 +00:00
adminErr := new(AdminClientError)
if err := json.NewDecoder(r).Decode(adminErr); err != nil {
2021-05-18 04:07:25 +00:00
return err
}
2022-02-08 12:26:30 +00:00
return adminErr
2021-05-18 04:07:25 +00:00
}