mirror of
https://github.com/fleetdm/fleet
synced 2026-05-17 05:58:40 +00:00
There are still some TODOs particularly within Gitops test code which will be worked on in a followup PR # Checklist for submitter If some of the following don't apply, delete the relevant line. - [x] Changes file added for user-visible changes in `changes/`, `orbit/changes/` or `ee/fleetd-chrome/changes`. See [Changes files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/guides/committing-changes.md#changes-files) for more information. - [x] Input data is properly validated, `SELECT *` is avoided, SQL injection is prevented (using placeholders for values in statements) - [x] If paths of existing endpoints are modified without backwards compatibility, checked the frontend/CLI for any necessary changes ## Testing - [x] Added/updated automated tests - [x] Where appropriate, [automated tests simulate multiple hosts and test for host isolation](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/reference/patterns-backend.md#unit-testing) (updates to one hosts's records do not affect another) - [ ] QA'd all new/changed functionality manually For unreleased bug fixes in a release candidate, one of: - [x] Confirmed that the fix is not expected to adversely impact load test results - [x] Alerted the release DRI if additional load testing is needed ## Database migrations - [x] Checked table schema to confirm autoupdate - [x] Checked schema for all modified table for columns that will auto-update timestamps during migration. - [x] Confirmed that updating the timestamps is acceptable, and will not cause unwanted side effects. - [x] Ensured the correct collation is explicitly set for character columns (`COLLATE utf8mb4_unicode_ci`). ## New Fleet configuration settings - [ ] Setting(s) is/are explicitly excluded from GitOps If you didn't check the box above, follow this checklist for GitOps-enabled settings: - [ ] Verified that the setting is exported via `fleetctl generate-gitops` - [x] Verified the setting is documented in a separate PR to [the GitOps documentation](https://github.com/fleetdm/fleet/blob/main/docs/Configuration/yaml-files.md#L485) - [x] Verified that the setting is cleared on the server if it is not supplied in a YAML file (or that it is documented as being optional) - [x] Verified that any relevant UI is disabled when GitOps mode is enabled --------- Co-authored-by: Gabriel Hernandez <ghernandez345@gmail.com> Co-authored-by: Magnus Jensen <magnus@fleetdm.com> Co-authored-by: Sarah Gillespie <73313222+gillespi314@users.noreply.github.com>
135 lines
4.1 KiB
Go
135 lines
4.1 KiB
Go
package hydrant
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/fleetdm/fleet/v4/pkg/fleethttp"
|
|
"github.com/fleetdm/fleet/v4/server/contexts/ctxerr"
|
|
"github.com/fleetdm/fleet/v4/server/fleet"
|
|
kitlog "github.com/go-kit/log"
|
|
)
|
|
|
|
// defaultTimeout is the timeout for requests.
|
|
const defaultTimeout = 20 * time.Second
|
|
|
|
type Service struct {
|
|
logger kitlog.Logger
|
|
timeout time.Duration
|
|
client *http.Client
|
|
}
|
|
|
|
// Compile-time check for HydrantService interface
|
|
var _ fleet.HydrantService = (*Service)(nil)
|
|
|
|
func NewService(opts ...Opt) fleet.HydrantService {
|
|
s := &Service{}
|
|
s.populateOpts(opts)
|
|
s.client = fleethttp.NewClient(fleethttp.WithTimeout(s.timeout))
|
|
return s
|
|
}
|
|
|
|
// Opt is the type for Hydrant integration options.
|
|
type Opt func(*Service)
|
|
|
|
// WithTimeout sets the timeout to use for the HTTP client.
|
|
func WithTimeout(t time.Duration) Opt {
|
|
return func(s *Service) {
|
|
s.timeout = t
|
|
}
|
|
}
|
|
|
|
// WithLogger sets the logger to use for the service.
|
|
func WithLogger(logger kitlog.Logger) Opt {
|
|
return func(s *Service) {
|
|
s.logger = logger
|
|
}
|
|
}
|
|
|
|
func (s *Service) populateOpts(opts []Opt) {
|
|
for _, opt := range opts {
|
|
opt(s)
|
|
}
|
|
if s.timeout <= 0 {
|
|
s.timeout = defaultTimeout
|
|
}
|
|
if s.logger == nil {
|
|
s.logger = kitlog.NewLogfmtLogger(kitlog.NewSyncWriter(os.Stdout))
|
|
}
|
|
}
|
|
|
|
func (s *Service) ValidateHydrantURL(ctx context.Context, hydrantCA fleet.HydrantCA) error {
|
|
reqURL := hydrantCA.URL + "/cacerts"
|
|
req, err := http.NewRequestWithContext(ctx, "GET", reqURL, nil)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "creating Hydrant CA request")
|
|
}
|
|
resp, err := s.client.Do(req)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "sending Hydrant CA request")
|
|
}
|
|
defer resp.Body.Close()
|
|
if resp.StatusCode != http.StatusOK {
|
|
return ctxerr.Errorf(ctx, "unexpected Hydrant CA status code: %d", resp.StatusCode)
|
|
}
|
|
contentType := resp.Header.Get("Content-Type")
|
|
if !strings.HasPrefix(contentType, "application/pkcs7-mime") {
|
|
return ctxerr.Errorf(ctx, "unexpected Hydrant CA content type: %s", contentType)
|
|
}
|
|
// For now we are just verifying that there is a body of the reportedly correct format. We could
|
|
// possibly do more. A better implementation would be similar to Digicert's which validates the
|
|
// credentials in addition to the URL but I don't see a way to do that with Hydrant's API.
|
|
caCerts, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return ctxerr.Wrap(ctx, err, "reading Hydrant CA response body")
|
|
}
|
|
if len(caCerts) == 0 {
|
|
return ctxerr.Errorf(ctx, "no CA certificates found in Hydrant CA /cacerts response. URL may be incorrect")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (s *Service) GetCertificate(ctx context.Context, hydrantCA fleet.HydrantCA, csr string) (*fleet.HydrantCertificate, error) {
|
|
reqURL, err := url.Parse(hydrantCA.URL + "/simpleenroll")
|
|
if err != nil {
|
|
return nil, ctxerr.Wrap(ctx, err, "parsing Hydrant CA URL")
|
|
}
|
|
apiCredential := hydrantCA.ClientID + ":" + hydrantCA.ClientSecret
|
|
encodedCredential := base64.StdEncoding.EncodeToString([]byte(apiCredential))
|
|
|
|
hydrantRequest, err := http.NewRequestWithContext(ctx, "POST", reqURL.String(), strings.NewReader(csr))
|
|
if err != nil {
|
|
return nil, ctxerr.Wrap(ctx, err, "creating Hydrant CA request")
|
|
}
|
|
hydrantRequest.Header.Set("Content-Type", "application/pkcs10")
|
|
hydrantRequest.Header.Set("Accept", "application/pkcs7-mime")
|
|
hydrantRequest.Header.Set("Authorization", "Basic "+encodedCredential)
|
|
resp, err := s.client.Do(hydrantRequest)
|
|
if err != nil {
|
|
return nil, ctxerr.Wrap(ctx, err, "sending Hydrant CA request")
|
|
}
|
|
defer resp.Body.Close()
|
|
bytes, err := io.ReadAll(resp.Body)
|
|
if err != nil {
|
|
return nil, ctxerr.Wrap(ctx, err, "reading Hydrant CA response body")
|
|
}
|
|
if resp.StatusCode != http.StatusOK {
|
|
bytesToLog := bytes
|
|
// Limit logged data in case we get a huge response(a certificate perhaps?)
|
|
if len(bytes) > 1000 {
|
|
bytesToLog = bytes[:1000]
|
|
}
|
|
s.logger.Log("msg", "unexpected Hydrant CA status code", "status_code", resp.StatusCode, "response_body", string(bytesToLog))
|
|
return nil, ctxerr.Errorf(ctx, "unexpected Hydrant CA status code: %d", resp.StatusCode)
|
|
}
|
|
|
|
return &fleet.HydrantCertificate{
|
|
Certificate: bytes,
|
|
}, nil
|
|
}
|