converging on proper rotation

This commit is contained in:
Jimmy Zelinskie 2016-03-28 19:00:00 -04:00 committed by Jimmy Zelinskie
parent aaf9e83278
commit f406942984
4 changed files with 101 additions and 67 deletions

View file

@ -872,6 +872,7 @@ class TorrentInfo(BaseModel):
class ServiceKeyApprovalType(Enum): class ServiceKeyApprovalType(Enum):
SUPERUSER = 'Super User API' SUPERUSER = 'Super User API'
KEY_ROTATION = 'Key Rotation'
_ServiceKeyApproverProxy = Proxy() _ServiceKeyApproverProxy = Proxy()
class ServiceKeyApproval(BaseModel): class ServiceKeyApproval(BaseModel):

View file

@ -6,26 +6,27 @@ from data.model import ServiceKeyDoesNotExist, ServiceKeyAlreadyApproved, db_tra
from data.model.notification import create_notification from data.model.notification import create_notification
# TODO ACTION_LOGS for keys
UNAPPROVED_TTL = timedelta(seconds=app.config['UNAPPROVED_SERVICE_KEY_TTL_SEC']) UNAPPROVED_TTL = timedelta(seconds=app.config['UNAPPROVED_SERVICE_KEY_TTL_SEC'])
def _gc_expired(service): def _expired_keys_clause(service):
expired_keys = ((ServiceKey.service == service) & return ((ServiceKey.service == service) &
(ServiceKey.expiration_date <= datetime.utcnow())) (ServiceKey.expiration_date <= datetime.utcnow()))
stale_unapproved_keys = ((ServiceKey.service >> service) &
def _stale_unapproved_keys_clause(service):
return ((ServiceKey.service >> service) &
(ServiceKey.approval >> None) & (ServiceKey.approval >> None) &
(ServiceKey.created_date + UNAPPROVED_TTL) >= datetime.utcnow()) (ServiceKey.created_date + UNAPPROVED_TTL) >= datetime.utcnow())
ServiceKey.delete().where(expired_keys | stale_unapproved_keys).execute()
def _gc_expired(service):
# TODO ACTION_LOGS for keys ServiceKey.delete().where(_expired_keys_clause(service) |
_stale_unapproved_keys_clause(service)).execute()
def create_service_key(name, kid, service, jwk, metadata, expiration_date): def create_service_key(name, kid, service, jwk, metadata, expiration_date):
_gc_expired(service)
sk = ServiceKey.create(name=name, kid=kid, service=service, jwk=jwk, metadata=metadata, sk = ServiceKey.create(name=name, kid=kid, service=service, jwk=jwk, metadata=metadata,
expiration_date=expiration_date) expiration_date=expiration_date)
@ -43,10 +44,24 @@ def create_service_key(name, kid, service, jwk, metadata, expiration_date):
'expiration_date': expiration_date, 'expiration_date': expiration_date,
}) })
def update_service_key(name, kid, metadata, expiration_date):
_gc_expired(service) _gc_expired(service)
def replace_service_key(kid, jwk, metadata, expiration_date):
try:
with db_transaction():
key = db_for_update(ServiceKey.select().where(ServiceKey.kid == kid)).get()
metadata = key.metadata.update(metadata)
ServiceKey.create(name=key.name, kid=kid, service=key.service, jwk=jwk,
metadata=metadata, expiration_date=expiration_date, approval=key.approval)
key.delete_instance()
except ServiceKey.DoesNotExist:
raise ServiceKeyDoesNotExist
_gc_expired(key.service)
def update_service_key(name, kid, metadata, expiration_date):
try: try:
with db_transaction(): with db_transaction():
key = db_for_update(ServiceKey.select().where(ServiceKey.kid == kid)).get() key = db_for_update(ServiceKey.select().where(ServiceKey.kid == kid)).get()
@ -57,37 +72,18 @@ def update_service_key(name, kid, metadata, expiration_date):
except ServiceKey.DoesNotExist: except ServiceKey.DoesNotExist:
raise ServiceKeyDoesNotExist raise ServiceKeyDoesNotExist
_gc_expired(key.service)
def get_service_keys(approved_only, kid=None, service=None):
_gc_expired(service)
query = ServiceKey.select()
if approved_only:
query = query.where(~(ServiceKey.approval >> None))
if service is not None:
query = query.where(ServiceKey.service == service)
if kid is not None:
query.where(ServiceKey.kid == kid)
return query
def get_service_key(kid):
return get_service_keys(False, kid=kid).get()
def delete_service_key(service, kid): def delete_service_key(service, kid):
_gc_expired(service)
try: try:
ServiceKey.delete().where(ServiceKey.service == service, ServiceKey.delete().where(ServiceKey.service == service,
ServiceKey.kid == kid).execute() ServiceKey.kid == kid).execute()
except ServiceKey.DoesNotExist: except ServiceKey.DoesNotExist:
raise ServiceKeyDoesNotExist() raise ServiceKeyDoesNotExist()
_gc_expired(service)
def approve_service_key(kid, approver, approval_type): def approve_service_key(kid, approver, approval_type):
try: try:
@ -101,3 +97,32 @@ def approve_service_key(kid, approver, approval_type):
key.save() key.save()
except ServiceKey.DoesNotExist: except ServiceKey.DoesNotExist:
raise ServiceKeyDoesNotExist raise ServiceKeyDoesNotExist
def _get_service_keys_query(kid=None, service=None, approved_only=False):
query = ServiceKey.select()
if approved_only:
query = query.where(~(ServiceKey.approval >> None))
if service is not None:
query = query.where(ServiceKey.service == service)
query = query.where(~(_expired_keys_clause(service)) &
~(_stale_unapproved_keys_clause(service)))
if kid is not None:
query.where(ServiceKey.kid == kid)
return query
def get_keys():
return list(_get_service_keys_query())
def get_service_keys(service):
return list(_get_service_keys_query(service=service, approved_only=True))
def get_service_key(kid):
return _get_service_keys_query(kid=kid).get()

View file

@ -514,7 +514,7 @@ class SuperUserServiceKeyManagement(ApiResource):
@require_scope(scopes.SUPERUSER) @require_scope(scopes.SUPERUSER)
def get(self): def get(self):
if SuperUserPermission().can(): if SuperUserPermission().can():
return jsonify(list(model.service_keys.get_service_keys(False))) return jsonify(model.service_keys.get_keys())
abort(403) abort(403)
@verify_not_prod @verify_not_prod
@ -538,7 +538,7 @@ class SuperUserServiceKeyManagement(ApiResource):
metadata.update({ metadata.update({
'created_by': 'Quay SuperUser Panel', 'created_by': 'Quay SuperUser Panel',
'creator': user.username, 'creator': user.username,
'superuser ip': request.remote_addr, 'ip': request.remote_addr,
}) })
private_key = RSA.generate(2048) private_key = RSA.generate(2048)
@ -551,7 +551,8 @@ class SuperUserServiceKeyManagement(ApiResource):
metadata, expiration_date) metadata, expiration_date)
model.service_keys.approve_service_key(kid, user, ServiceKeyApprovalType.SUPERUSER) model.service_keys.approve_service_key(kid, user, ServiceKeyApprovalType.SUPERUSER)
return jsonify({'private_key': private_key.exportKey('PEM')}) return jsonify({'public_key': private_key.publickey().exportKey('PEM'),
'private_key': private_key.exportKey('PEM')})
abort(403) abort(403)
@ -559,7 +560,7 @@ class SuperUserServiceKeyManagement(ApiResource):
@resource('/v1/superuser/keys/<kid>') @resource('/v1/superuser/keys/<kid>')
@path_param('kid', 'The unique identifier for a service key') @path_param('kid', 'The unique identifier for a service key')
@show_if(features.SUPER_USERS) @show_if(features.SUPER_USERS)
class SuperUserServiceKeyManagement(ApiResource): class SuperUserServiceKeyUpdater(ApiResource):
""" Resource for managing service keys. """ """ Resource for managing service keys. """
schemas = { schemas = {
'PutServiceKey': { 'PutServiceKey': {

View file

@ -1,3 +1,5 @@
import json
from datetime import datetime from datetime import datetime
import jwt import jwt
@ -46,20 +48,16 @@ def _validate_jwt(encoded_jwt, jwk, service):
abort(400) abort(400)
def _signer_jwk(encoded_jwt, jwk, kid): def _signer_kid(encoded_jwt):
decoded_jwt = jwt.decode(encoded_jwt, verify=False) decoded_jwt = jwt.decode(encoded_jwt, verify=False)
return decoded_jwt.get('signer_kid', None)
signer_kid = decoded_jwt.get('signer_kid', '')
# If we already have our own JWK and it's the signer, short-circuit. def _signer_key(signer_kid):
if (signer_kid == kid or signer_kid == '') and jwk is not None:
return jwk
else:
try: try:
service_key = data.model.service_keys.get_service_key(signer_kid) return data.model.service_keys.get_service_key(signer_kid)
except data.model.ServiceKeyDoesNotExist: except data.model.ServiceKeyDoesNotExist:
abort(404) abort(403)
return service_key.jwk
@key_server.route('/services/<service>/keys', methods=['GET']) @key_server.route('/services/<service>/keys', methods=['GET'])
@ -88,25 +86,31 @@ def put_service_keys(service, kid):
except ValueError: except ValueError:
abort(400) abort(400)
_validate_jwk(jwk, kid)
encoded_jwt = request.headers.get(JWT_HEADER_NAME, None) encoded_jwt = request.headers.get(JWT_HEADER_NAME, None)
if not encoded_jwt: if not encoded_jwt:
abort(400) abort(400)
signer_jwk = _signer_jwk(encoded_jwt, jwk, kid) _validate_jwk(jwk, kid)
_validate_jwt(encoded_jwt, signer_jwk, service)
signer_kid = _signer_kid(encoded_jwt)
signer_key = _signer_key(signer_kid)
if signer_key.service != service:
abort(403)
_validate_jwt(encoded_jwt, signer_key.jwk, service)
metadata = { metadata = {
'ip': request.remote_addr, 'ip': request.remote_addr,
'signer_jwk': signer_jwk, 'created_by': 'Key Rotation',
'rotated_by': json.dumps(signer_key),
} }
try: try:
data.model.service_keys.update_service_key('', kid, metadata, expiration_date) data.model.service_keys.replace_service_key(kid, jwk, metadata, expiration_date)
except data.model.ServiceKeyDoesNotExist: except data.model.ServiceKeyDoesNotExist:
data.model.service_keys.create_service_key('', kid, service, jwk, metadata, expiration_date) abort(404)
@key_server.route('/services/<service>/keys/<kid>', methods=['DELETE']) @key_server.route('/services/<service>/keys/<kid>', methods=['DELETE'])
@ -115,12 +119,15 @@ def delete_service_key(service, kid):
if not encoded_jwt: if not encoded_jwt:
abort(400) abort(400)
signer_jwk = _signer_jwk(encoded_jwt, None, kid) signer_kid = _signer_kid(encoded_jwt)
_validate_jwt(encoded_jwt, signer_jwk, service) signer_key = _signer_key(signer_kid)
if (kid == signer_kid) or (signer_key.approval is not None):
_validate_jwt(encoded_jwt, signer_key.jwk, service)
try: try:
data.model.service_keys.delete_service_key(service, kid) data.model.service_keys.delete_service_key(service, kid)
except data.model.ServiceKeyDoesNotExist: except data.model.ServiceKeyDoesNotExist:
abort(404) abort(404)
return make_response('', 200) return make_response('', 200)
abort(403)