2021-07-23 13:41:24 +00:00
package api
import (
2021-12-09 08:36:03 +00:00
"fmt"
2021-07-23 13:41:24 +00:00
"net/http"
2022-03-24 17:34:04 +00:00
"go.step.sm/linkedca"
2022-04-11 13:25:55 +00:00
"google.golang.org/protobuf/types/known/timestamppb"
2022-03-24 17:34:04 +00:00
2022-04-11 13:25:55 +00:00
"github.com/smallstep/certificates/acme"
2022-03-30 08:22:22 +00:00
"github.com/smallstep/certificates/api/render"
2021-07-23 13:41:24 +00:00
"github.com/smallstep/certificates/authority/admin"
2022-01-07 15:59:55 +00:00
)
2021-07-23 13:41:24 +00:00
// CreateExternalAccountKeyRequest is the type for POST /admin/acme/eab requests
type CreateExternalAccountKeyRequest struct {
2021-10-08 12:29:44 +00:00
Reference string ` json:"reference" `
2021-07-23 13:41:24 +00:00
}
2021-09-16 21:09:24 +00:00
// Validate validates a new ACME EAB Key request body.
2021-08-27 10:39:37 +00:00
func ( r * CreateExternalAccountKeyRequest ) Validate ( ) error {
2021-12-09 08:36:03 +00:00
if len ( r . Reference ) > 256 { // an arbitrary, but sensible (IMO), limit
return fmt . Errorf ( "reference length %d exceeds the maximum (256)" , len ( r . Reference ) )
}
2021-08-27 10:39:37 +00:00
return nil
2021-07-23 13:41:24 +00:00
}
// GetExternalAccountKeysResponse is the type for GET /admin/acme/eab responses
type GetExternalAccountKeysResponse struct {
2022-01-24 13:03:56 +00:00
EAKs [ ] * linkedca . EABKey ` json:"eaks" `
NextCursor string ` json:"nextCursor" `
2021-07-23 13:41:24 +00:00
}
2021-10-08 12:29:44 +00:00
// requireEABEnabled is a middleware that ensures ACME EAB is enabled
// before serving requests that act on ACME EAB credentials.
2022-03-30 12:21:39 +00:00
func ( h * Handler ) requireEABEnabled ( next http . HandlerFunc ) http . HandlerFunc {
2021-10-08 12:29:44 +00:00
return func ( w http . ResponseWriter , r * http . Request ) {
2022-01-07 15:59:55 +00:00
ctx := r . Context ( )
2022-03-30 16:21:25 +00:00
prov := linkedca . ProvisionerFromContext ( ctx )
details := prov . GetDetails ( )
if details == nil {
render . Error ( w , admin . NewErrorISE ( "error getting details for provisioner '%s'" , prov . GetName ( ) ) )
2021-10-08 12:29:44 +00:00
return
}
2022-03-30 16:21:25 +00:00
acmeProvisioner := details . GetACME ( )
if acmeProvisioner == nil {
render . Error ( w , admin . NewErrorISE ( "error getting ACME details for provisioner '%s'" , prov . GetName ( ) ) )
2021-10-08 12:29:44 +00:00
return
}
2021-09-16 21:09:24 +00:00
2022-03-30 16:21:25 +00:00
if ! acmeProvisioner . RequireEab {
render . Error ( w , admin . NewError ( admin . ErrorBadRequestType , "ACME EAB not enabled for provisioner '%s'" , prov . GetName ( ) ) )
return
}
2021-09-16 21:09:24 +00:00
2022-03-31 14:12:29 +00:00
next ( w , r )
2021-09-16 21:09:24 +00:00
}
2022-01-07 15:59:55 +00:00
}
2022-02-08 12:26:30 +00:00
type acmeAdminResponderInterface interface {
GetExternalAccountKeys ( w http . ResponseWriter , r * http . Request )
CreateExternalAccountKey ( w http . ResponseWriter , r * http . Request )
DeleteExternalAccountKey ( w http . ResponseWriter , r * http . Request )
2021-09-16 21:09:24 +00:00
}
2022-02-08 12:26:30 +00:00
// ACMEAdminResponder is responsible for writing ACME admin responses
type ACMEAdminResponder struct { }
2021-07-23 13:41:24 +00:00
2022-02-08 12:26:30 +00:00
// NewACMEAdminResponder returns a new ACMEAdminResponder
func NewACMEAdminResponder ( ) * ACMEAdminResponder {
return & ACMEAdminResponder { }
2021-07-23 13:41:24 +00:00
}
2022-02-08 12:26:30 +00:00
// GetExternalAccountKeys writes the response for the EAB keys GET endpoint
func ( h * ACMEAdminResponder ) GetExternalAccountKeys ( w http . ResponseWriter , r * http . Request ) {
2022-03-30 08:22:22 +00:00
render . Error ( w , admin . NewError ( admin . ErrorNotImplementedType , "this functionality is currently only available in Certificate Manager: https://u.step.sm/cm" ) )
2021-08-27 12:10:00 +00:00
}
2022-02-08 12:26:30 +00:00
// CreateExternalAccountKey writes the response for the EAB key POST endpoint
func ( h * ACMEAdminResponder ) CreateExternalAccountKey ( w http . ResponseWriter , r * http . Request ) {
2022-03-30 08:22:22 +00:00
render . Error ( w , admin . NewError ( admin . ErrorNotImplementedType , "this functionality is currently only available in Certificate Manager: https://u.step.sm/cm" ) )
2022-02-08 12:26:30 +00:00
}
2021-08-27 14:58:04 +00:00
2022-02-08 12:26:30 +00:00
// DeleteExternalAccountKey writes the response for the EAB key DELETE endpoint
func ( h * ACMEAdminResponder ) DeleteExternalAccountKey ( w http . ResponseWriter , r * http . Request ) {
2022-03-30 08:22:22 +00:00
render . Error ( w , admin . NewError ( admin . ErrorNotImplementedType , "this functionality is currently only available in Certificate Manager: https://u.step.sm/cm" ) )
2021-07-23 13:41:24 +00:00
}
2022-04-11 13:25:55 +00:00
func eakToLinked ( k * acme . ExternalAccountKey ) * linkedca . EABKey {
if k == nil {
return nil
}
eak := & linkedca . EABKey {
Id : k . ID ,
HmacKey : k . KeyBytes ,
Provisioner : k . ProvisionerID ,
Reference : k . Reference ,
Account : k . AccountID ,
CreatedAt : timestamppb . New ( k . CreatedAt ) ,
BoundAt : timestamppb . New ( k . BoundAt ) ,
}
if k . Policy != nil {
eak . Policy = & linkedca . Policy {
X509 : & linkedca . X509Policy {
Allow : & linkedca . X509Names { } ,
Deny : & linkedca . X509Names { } ,
} ,
}
eak . Policy . X509 . Allow . Dns = k . Policy . X509 . Allowed . DNSNames
eak . Policy . X509 . Allow . Ips = k . Policy . X509 . Allowed . IPRanges
eak . Policy . X509 . Deny . Dns = k . Policy . X509 . Denied . DNSNames
eak . Policy . X509 . Deny . Ips = k . Policy . X509 . Denied . IPRanges
}
return eak
}
func linkedEAKToCertificates ( k * linkedca . EABKey ) * acme . ExternalAccountKey {
if k == nil {
return nil
}
eak := & acme . ExternalAccountKey {
ID : k . Id ,
ProvisionerID : k . Provisioner ,
Reference : k . Reference ,
AccountID : k . Account ,
KeyBytes : k . HmacKey ,
CreatedAt : k . CreatedAt . AsTime ( ) ,
BoundAt : k . BoundAt . AsTime ( ) ,
}
if k . Policy == nil {
return eak
}
eak . Policy = & acme . Policy { }
if k . Policy . X509 == nil {
return eak
}
eak . Policy . X509 = acme . X509Policy {
Allowed : acme . PolicyNames { } ,
Denied : acme . PolicyNames { } ,
}
if k . Policy . X509 . Allow != nil {
eak . Policy . X509 . Allowed . DNSNames = k . Policy . X509 . Allow . Dns
eak . Policy . X509 . Allowed . IPRanges = k . Policy . X509 . Allow . Ips
}
if k . Policy . X509 . Deny != nil {
eak . Policy . X509 . Denied . DNSNames = k . Policy . X509 . Deny . Dns
eak . Policy . X509 . Denied . IPRanges = k . Policy . X509 . Deny . Ips
}
return eak
}