You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

335 lines
11 KiB

# Copyright 2016 Splunk, Inc.
# SPDX-FileCopyrightText: 2020 2020
#
# SPDX-License-Identifier: Apache-2.0
"""
This module contains Splunk credential related interfaces.
"""
import json
import re
from . import splunk_rest_client as rest_client
from .net_utils import check_css_params
from .net_utils import is_valid_hostname
from .net_utils import is_valid_port
from .net_utils import is_valid_scheme
from splunklib import binding
from .splunkenv import get_splunkd_access_info
from .utils import retry
__all__ = [
"CredentialException",
"CredentialNotExistException",
"CredentialManager",
"get_session_key",
]
class CredentialException(Exception):
pass
class CredentialNotExistException(Exception):
pass
class CredentialManager:
"""Credential manager.
:param session_key: Splunk access token.
:type session_key: ``string``
:param app: App name of namespace.
:type app: ``string``
:param owner: (optional) Owner of namespace, default is `nobody`.
:type owner: ``string``
:param realm: (optional) Realm of credential, default is None.
:type realm: ``string``
:param scheme: (optional) The access scheme, default is None.
:type scheme: ``string``
:param host: (optional) The host name, default is None.
:type host: ``string``
:param port: (optional) The port number, default is None.
:type port: ``integer``
:param context: Other configurations for Splunk rest client.
:type context: ``dict``
Usage::
>>> from solnlib import credentials
>>> cm = credentials.CredentialManager(session_key,
'Splunk_TA_test',
realm='realm_test')
"""
# Splunk can only encrypt string with length <=255
SPLUNK_CRED_LEN_LIMIT = 255
# Splunk credential separator
SEP = "``splunk_cred_sep``"
# Splunk credential end mark
END_MARK = (
"``splunk_cred_sep``S``splunk_cred_sep``P``splunk_cred_sep``L``splunk_cred_sep``"
"U``splunk_cred_sep``N``splunk_cred_sep``K``splunk_cred_sep``"
)
def __init__(
self,
session_key,
app,
owner="nobody",
realm=None,
scheme=None,
host=None,
port=None,
**context
):
self._realm = realm
self.service = rest_client.SplunkRestClient(
session_key,
app,
owner=owner,
scheme=scheme,
host=host,
port=port,
**context
)
self._storage_passwords = self.service.storage_passwords
@retry(exceptions=[binding.HTTPError])
def get_password(self, user):
"""Get password.
:param user: User name.
:type user: ``string``
:returns: Clear user password.
:rtype: ``string``
:raises CredentialNotExistException: If password for 'realm:user'
doesn't exist.
Usage::
>>> from solnlib import credentials
>>> cm = credentials.CredentialManager(session_key,
'Splunk_TA_test',
realm='realm_test')
>>> cm.get_password('testuser2')
"""
all_passwords = self._get_all_passwords()
for password in all_passwords:
if password["username"] == user and password["realm"] == self._realm:
return password["clear_password"]
raise CredentialNotExistException(
"Failed to get password of realm={}, user={}.".format(self._realm, user)
)
@retry(exceptions=[binding.HTTPError])
def set_password(self, user, password):
"""Set password.
:param user: User name.
:type user: ``string``
:param password: User password.
:type password: ``string``
Usage::
>>> from solnlib import credentials
>>> cm = credentials.CredentialManager(session_key,
'Splunk_TA_test',
realm='realm_test')
>>> cm.set_password('testuser1', 'password1')
"""
length = 0
index = 1
while length < len(password):
curr_str = password[length : length + self.SPLUNK_CRED_LEN_LIMIT]
partial_user = self.SEP.join([user, str(index)])
self._update_password(partial_user, curr_str)
length += self.SPLUNK_CRED_LEN_LIMIT
index += 1
# Append another stanza to mark the end of the password
partial_user = self.SEP.join([user, str(index)])
self._update_password(partial_user, self.END_MARK)
@retry(exceptions=[binding.HTTPError])
def _update_password(self, user, password):
"""Update password.
:param user: User name.
:type user: ``string``
:param password: User password.
:type password: ``string``
Usage::
>>> from solnlib import credentials
>>> cm = credentials.CredentialManager(session_key,
'Splunk_TA_test',
realm='realm_test')
>>> cm._update_password('testuser1', 'password1')
"""
try:
self._storage_passwords.create(password, user, self._realm)
except binding.HTTPError as ex:
if ex.status == 409:
all_passwords = self._get_all_passwords_in_realm()
for pwd_stanza in all_passwords:
if pwd_stanza.realm == self._realm and pwd_stanza.username == user:
pwd_stanza.update(password=password)
return
raise ValueError(
"Can not get the password object for realm: %s user: %s"
% (self._realm, user)
)
else:
raise ex
@retry(exceptions=[binding.HTTPError])
def delete_password(self, user):
"""Delete password.
:param user: User name.
:type user: ``string``
:raises CredentialNotExistException: If password of realm:user
doesn't exist.
Usage::
>>> from solnlib import credentials
>>> cm = credentials.CredentialManager(session_key,
'Splunk_TA_test',
realm='realm_test')
>>> cm.delete_password('testuser1')
"""
all_passwords = self._get_all_passwords_in_realm()
deleted = False
ent_pattern = re.compile(r"({}{}\d+)".format(user.replace("\\", "\\\\"), self.SEP))
for password in list(all_passwords):
match = (user == password.username) or ent_pattern.match(password.username)
if match and password.realm == self._realm:
password.delete()
deleted = True
if not deleted:
raise CredentialNotExistException(
"Failed to delete password of realm={}, user={}".format(self._realm, user)
)
def _get_all_passwords_in_realm(self):
if self._realm:
all_passwords = self._storage_passwords.list(
count=-1, search="realm={}".format(self._realm)
)
else:
all_passwords = self._storage_passwords.list(count=-1, search="")
return all_passwords
@retry(exceptions=[binding.HTTPError])
def _get_all_passwords(self):
all_passwords = self._storage_passwords.list(count=-1)
results = {}
ptn = re.compile(r"(.+){cred_sep}(\d+)".format(cred_sep=self.SEP))
for password in all_passwords:
match = ptn.match(password.name)
if match:
actual_name = match.group(1) + ":"
index = int(match.group(2))
if actual_name in results:
exist_stanza = results[actual_name]
else:
exist_stanza = {}
exist_stanza["name"] = actual_name
exist_stanza["realm"] = password.realm
exist_stanza["username"] = password.username.split(self.SEP)[0]
exist_stanza["clears"] = {}
results[actual_name] = exist_stanza
exist_stanza["clears"][index] = password.clear_password
# Backward compatibility
# To deal with the password with only one stanza which is generated by the old version.
for password in all_passwords:
match = ptn.match(password.name)
if (not match) and (password.name not in results):
results[password.name] = {
"name": password.name,
"realm": password.realm,
"username": password.username,
"clear_password": password.clear_password,
}
# Merge password by index
for name, values in list(results.items()):
field_clear = values.get("clears")
if field_clear:
clear_password = ""
for index in sorted(field_clear.keys()):
if field_clear[index] != self.END_MARK:
clear_password += field_clear[index]
else:
break
values["clear_password"] = clear_password
del values["clears"]
return list(results.values())
@retry(exceptions=[binding.HTTPError])
@check_css_params(scheme=is_valid_scheme, host=is_valid_hostname, port=is_valid_port)
def get_session_key(username, password, scheme=None, host=None, port=None, **context):
"""Get splunkd access token.
:param username: The Splunk account username, which is used to
authenticate the Splunk instance.
:type username: ``string``
:param password: The Splunk account password.
:type password: ``string``
:param scheme: (optional) The access scheme, default is None.
:type scheme: ``string``
:param host: (optional) The host name, default is None.
:type host: ``string``
:param port: (optional) The port number, default is None.
:type port: ``integer``
:returns: Splunk session key.
:rtype: ``string``
:param context: Other configurations for Splunk rest client.
:type context: ``dict``
:raises CredentialException: If username/password are Invalid.
Usage::
>>> credentials.get_session_key('user', 'password')
"""
if any([scheme is None, host is None, port is None]):
scheme, host, port = get_splunkd_access_info()
uri = "{scheme}://{host}:{port}/{endpoint}".format(
scheme=scheme, host=host, port=port, endpoint="services/auth/login"
)
_rest_client = rest_client.SplunkRestClient(
None, "-", "nobody", scheme, host, port, **context
)
try:
response = _rest_client.http.post(
uri, username=username, password=password, output_mode="json"
)
except binding.HTTPError as e:
if e.status != 401:
raise
raise CredentialException("Invalid username/password.")
return json.loads(response.body.read())["sessionKey"]