You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
335 lines
11 KiB
335 lines
11 KiB
# Copyright 2016 Splunk, Inc.
|
|
# SPDX-FileCopyrightText: 2020 2020
|
|
#
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
|
|
"""
|
|
This module contains Splunk credential related interfaces.
|
|
"""
|
|
|
|
import json
|
|
import re
|
|
|
|
from . import splunk_rest_client as rest_client
|
|
from .net_utils import check_css_params
|
|
from .net_utils import is_valid_hostname
|
|
from .net_utils import is_valid_port
|
|
from .net_utils import is_valid_scheme
|
|
from splunklib import binding
|
|
from .splunkenv import get_splunkd_access_info
|
|
from .utils import retry
|
|
|
|
__all__ = [
|
|
"CredentialException",
|
|
"CredentialNotExistException",
|
|
"CredentialManager",
|
|
"get_session_key",
|
|
]
|
|
|
|
|
|
class CredentialException(Exception):
|
|
pass
|
|
|
|
|
|
class CredentialNotExistException(Exception):
|
|
pass
|
|
|
|
|
|
class CredentialManager:
|
|
"""Credential manager.
|
|
|
|
:param session_key: Splunk access token.
|
|
:type session_key: ``string``
|
|
:param app: App name of namespace.
|
|
:type app: ``string``
|
|
:param owner: (optional) Owner of namespace, default is `nobody`.
|
|
:type owner: ``string``
|
|
:param realm: (optional) Realm of credential, default is None.
|
|
:type realm: ``string``
|
|
:param scheme: (optional) The access scheme, default is None.
|
|
:type scheme: ``string``
|
|
:param host: (optional) The host name, default is None.
|
|
:type host: ``string``
|
|
:param port: (optional) The port number, default is None.
|
|
:type port: ``integer``
|
|
:param context: Other configurations for Splunk rest client.
|
|
:type context: ``dict``
|
|
|
|
Usage::
|
|
|
|
>>> from solnlib import credentials
|
|
>>> cm = credentials.CredentialManager(session_key,
|
|
'Splunk_TA_test',
|
|
realm='realm_test')
|
|
"""
|
|
|
|
# Splunk can only encrypt string with length <=255
|
|
SPLUNK_CRED_LEN_LIMIT = 255
|
|
|
|
# Splunk credential separator
|
|
SEP = "``splunk_cred_sep``"
|
|
|
|
# Splunk credential end mark
|
|
END_MARK = (
|
|
"``splunk_cred_sep``S``splunk_cred_sep``P``splunk_cred_sep``L``splunk_cred_sep``"
|
|
"U``splunk_cred_sep``N``splunk_cred_sep``K``splunk_cred_sep``"
|
|
)
|
|
|
|
def __init__(
|
|
self,
|
|
session_key,
|
|
app,
|
|
owner="nobody",
|
|
realm=None,
|
|
scheme=None,
|
|
host=None,
|
|
port=None,
|
|
**context
|
|
):
|
|
self._realm = realm
|
|
self.service = rest_client.SplunkRestClient(
|
|
session_key,
|
|
app,
|
|
owner=owner,
|
|
scheme=scheme,
|
|
host=host,
|
|
port=port,
|
|
**context
|
|
)
|
|
self._storage_passwords = self.service.storage_passwords
|
|
|
|
@retry(exceptions=[binding.HTTPError])
|
|
def get_password(self, user):
|
|
"""Get password.
|
|
|
|
:param user: User name.
|
|
:type user: ``string``
|
|
:returns: Clear user password.
|
|
:rtype: ``string``
|
|
|
|
:raises CredentialNotExistException: If password for 'realm:user'
|
|
doesn't exist.
|
|
|
|
Usage::
|
|
|
|
>>> from solnlib import credentials
|
|
>>> cm = credentials.CredentialManager(session_key,
|
|
'Splunk_TA_test',
|
|
realm='realm_test')
|
|
>>> cm.get_password('testuser2')
|
|
"""
|
|
|
|
all_passwords = self._get_all_passwords()
|
|
for password in all_passwords:
|
|
if password["username"] == user and password["realm"] == self._realm:
|
|
return password["clear_password"]
|
|
|
|
raise CredentialNotExistException(
|
|
"Failed to get password of realm={}, user={}.".format(self._realm, user)
|
|
)
|
|
|
|
@retry(exceptions=[binding.HTTPError])
|
|
def set_password(self, user, password):
|
|
"""Set password.
|
|
|
|
:param user: User name.
|
|
:type user: ``string``
|
|
:param password: User password.
|
|
:type password: ``string``
|
|
|
|
Usage::
|
|
|
|
>>> from solnlib import credentials
|
|
>>> cm = credentials.CredentialManager(session_key,
|
|
'Splunk_TA_test',
|
|
realm='realm_test')
|
|
>>> cm.set_password('testuser1', 'password1')
|
|
"""
|
|
length = 0
|
|
index = 1
|
|
while length < len(password):
|
|
curr_str = password[length : length + self.SPLUNK_CRED_LEN_LIMIT]
|
|
partial_user = self.SEP.join([user, str(index)])
|
|
self._update_password(partial_user, curr_str)
|
|
length += self.SPLUNK_CRED_LEN_LIMIT
|
|
index += 1
|
|
|
|
# Append another stanza to mark the end of the password
|
|
partial_user = self.SEP.join([user, str(index)])
|
|
self._update_password(partial_user, self.END_MARK)
|
|
|
|
@retry(exceptions=[binding.HTTPError])
|
|
def _update_password(self, user, password):
|
|
"""Update password.
|
|
|
|
:param user: User name.
|
|
:type user: ``string``
|
|
:param password: User password.
|
|
:type password: ``string``
|
|
|
|
Usage::
|
|
|
|
>>> from solnlib import credentials
|
|
>>> cm = credentials.CredentialManager(session_key,
|
|
'Splunk_TA_test',
|
|
realm='realm_test')
|
|
>>> cm._update_password('testuser1', 'password1')
|
|
"""
|
|
try:
|
|
self._storage_passwords.create(password, user, self._realm)
|
|
except binding.HTTPError as ex:
|
|
if ex.status == 409:
|
|
all_passwords = self._get_all_passwords_in_realm()
|
|
for pwd_stanza in all_passwords:
|
|
if pwd_stanza.realm == self._realm and pwd_stanza.username == user:
|
|
pwd_stanza.update(password=password)
|
|
return
|
|
raise ValueError(
|
|
"Can not get the password object for realm: %s user: %s"
|
|
% (self._realm, user)
|
|
)
|
|
else:
|
|
raise ex
|
|
|
|
@retry(exceptions=[binding.HTTPError])
|
|
def delete_password(self, user):
|
|
"""Delete password.
|
|
|
|
:param user: User name.
|
|
:type user: ``string``
|
|
|
|
:raises CredentialNotExistException: If password of realm:user
|
|
doesn't exist.
|
|
|
|
Usage::
|
|
|
|
>>> from solnlib import credentials
|
|
>>> cm = credentials.CredentialManager(session_key,
|
|
'Splunk_TA_test',
|
|
realm='realm_test')
|
|
>>> cm.delete_password('testuser1')
|
|
"""
|
|
all_passwords = self._get_all_passwords_in_realm()
|
|
deleted = False
|
|
ent_pattern = re.compile(r"({}{}\d+)".format(user.replace("\\", "\\\\"), self.SEP))
|
|
for password in list(all_passwords):
|
|
match = (user == password.username) or ent_pattern.match(password.username)
|
|
if match and password.realm == self._realm:
|
|
password.delete()
|
|
deleted = True
|
|
|
|
if not deleted:
|
|
raise CredentialNotExistException(
|
|
"Failed to delete password of realm={}, user={}".format(self._realm, user)
|
|
)
|
|
|
|
def _get_all_passwords_in_realm(self):
|
|
if self._realm:
|
|
all_passwords = self._storage_passwords.list(
|
|
count=-1, search="realm={}".format(self._realm)
|
|
)
|
|
else:
|
|
all_passwords = self._storage_passwords.list(count=-1, search="")
|
|
return all_passwords
|
|
|
|
@retry(exceptions=[binding.HTTPError])
|
|
def _get_all_passwords(self):
|
|
all_passwords = self._storage_passwords.list(count=-1)
|
|
|
|
results = {}
|
|
ptn = re.compile(r"(.+){cred_sep}(\d+)".format(cred_sep=self.SEP))
|
|
for password in all_passwords:
|
|
match = ptn.match(password.name)
|
|
if match:
|
|
actual_name = match.group(1) + ":"
|
|
index = int(match.group(2))
|
|
if actual_name in results:
|
|
exist_stanza = results[actual_name]
|
|
else:
|
|
exist_stanza = {}
|
|
exist_stanza["name"] = actual_name
|
|
exist_stanza["realm"] = password.realm
|
|
exist_stanza["username"] = password.username.split(self.SEP)[0]
|
|
exist_stanza["clears"] = {}
|
|
results[actual_name] = exist_stanza
|
|
|
|
exist_stanza["clears"][index] = password.clear_password
|
|
|
|
# Backward compatibility
|
|
# To deal with the password with only one stanza which is generated by the old version.
|
|
for password in all_passwords:
|
|
match = ptn.match(password.name)
|
|
if (not match) and (password.name not in results):
|
|
results[password.name] = {
|
|
"name": password.name,
|
|
"realm": password.realm,
|
|
"username": password.username,
|
|
"clear_password": password.clear_password,
|
|
}
|
|
|
|
# Merge password by index
|
|
for name, values in list(results.items()):
|
|
field_clear = values.get("clears")
|
|
if field_clear:
|
|
clear_password = ""
|
|
for index in sorted(field_clear.keys()):
|
|
if field_clear[index] != self.END_MARK:
|
|
clear_password += field_clear[index]
|
|
else:
|
|
break
|
|
values["clear_password"] = clear_password
|
|
|
|
del values["clears"]
|
|
|
|
return list(results.values())
|
|
|
|
|
|
@retry(exceptions=[binding.HTTPError])
|
|
@check_css_params(scheme=is_valid_scheme, host=is_valid_hostname, port=is_valid_port)
|
|
def get_session_key(username, password, scheme=None, host=None, port=None, **context):
|
|
"""Get splunkd access token.
|
|
|
|
:param username: The Splunk account username, which is used to
|
|
authenticate the Splunk instance.
|
|
:type username: ``string``
|
|
:param password: The Splunk account password.
|
|
:type password: ``string``
|
|
:param scheme: (optional) The access scheme, default is None.
|
|
:type scheme: ``string``
|
|
:param host: (optional) The host name, default is None.
|
|
:type host: ``string``
|
|
:param port: (optional) The port number, default is None.
|
|
:type port: ``integer``
|
|
:returns: Splunk session key.
|
|
:rtype: ``string``
|
|
:param context: Other configurations for Splunk rest client.
|
|
:type context: ``dict``
|
|
|
|
:raises CredentialException: If username/password are Invalid.
|
|
|
|
Usage::
|
|
|
|
>>> credentials.get_session_key('user', 'password')
|
|
"""
|
|
|
|
if any([scheme is None, host is None, port is None]):
|
|
scheme, host, port = get_splunkd_access_info()
|
|
|
|
uri = "{scheme}://{host}:{port}/{endpoint}".format(
|
|
scheme=scheme, host=host, port=port, endpoint="services/auth/login"
|
|
)
|
|
_rest_client = rest_client.SplunkRestClient(
|
|
None, "-", "nobody", scheme, host, port, **context
|
|
)
|
|
try:
|
|
response = _rest_client.http.post(
|
|
uri, username=username, password=password, output_mode="json"
|
|
)
|
|
except binding.HTTPError as e:
|
|
if e.status != 401:
|
|
raise
|
|
|
|
raise CredentialException("Invalid username/password.")
|
|
|
|
return json.loads(response.body.read())["sessionKey"]
|