Certificate generation and sync, implemented proper grant and revocation flows. Pubkey uploading. Added openssh-client to Dockerfile
This commit is contained in:
@@ -14,3 +14,26 @@ class ErasureRequestForm(forms.Form):
|
||||
min_length=10,
|
||||
max_length=2000,
|
||||
)
|
||||
|
||||
|
||||
class SSHKeyForm(forms.Form):
|
||||
name = forms.CharField(
|
||||
label="Key name",
|
||||
max_length=128,
|
||||
widget=forms.TextInput(
|
||||
attrs={
|
||||
"placeholder": "MacBook Pro",
|
||||
"class": "w-full rounded-md border border-gray-300 bg-white px-3 py-2 text-sm text-gray-900 shadow-sm focus:border-purple-600 focus:outline-none focus:ring-1 focus:ring-purple-600",
|
||||
}
|
||||
),
|
||||
)
|
||||
public_key = forms.CharField(
|
||||
label="SSH public key",
|
||||
widget=forms.Textarea(
|
||||
attrs={
|
||||
"rows": 4,
|
||||
"placeholder": "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB... you@host",
|
||||
"class": "w-full rounded-md border border-gray-300 bg-white px-3 py-2 text-sm text-gray-900 shadow-sm focus:border-purple-600 focus:outline-none focus:ring-1 focus:ring-purple-600",
|
||||
}
|
||||
),
|
||||
)
|
||||
|
||||
@@ -78,7 +78,7 @@ class ErasureRequest(models.Model):
|
||||
from guardian.models import UserObjectPermission
|
||||
|
||||
from apps.access.models import AccessRequest
|
||||
from apps.keys.models import SSHKey
|
||||
from apps.keys.models import SSHCertificate, SSHKey
|
||||
|
||||
user = self.user
|
||||
token = uuid.uuid4().hex
|
||||
@@ -113,6 +113,7 @@ class ErasureRequest(models.Model):
|
||||
UserObjectPermission.objects.filter(user=user).delete()
|
||||
|
||||
SSHKey.objects.filter(user=user, is_active=True).update(is_active=False, revoked_at=now)
|
||||
SSHCertificate.objects.filter(user=user, is_active=True).update(is_active=False, revoked_at=now)
|
||||
AccessRequest.objects.filter(requester=user).update(reason="[redacted]")
|
||||
AccessRequest.objects.filter(
|
||||
requester=user,
|
||||
|
||||
@@ -46,6 +46,152 @@
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="mt-6 rounded-xl border border-gray-200 bg-white p-6 shadow-sm sm:p-8">
|
||||
<h2 class="text-base font-semibold tracking-tight text-gray-900">SSH certificates</h2>
|
||||
<p class="mt-2 text-sm text-gray-600">
|
||||
Upload your SSH public key to receive a signed certificate for server access.
|
||||
</p>
|
||||
|
||||
{% if can_add_key %}
|
||||
<form method="post" class="mt-4 space-y-3">
|
||||
{% csrf_token %}
|
||||
<input type="hidden" name="form_type" value="ssh_key">
|
||||
<div>
|
||||
<label for="{{ key_form.name.id_for_label }}" class="block text-sm font-medium text-gray-700">
|
||||
Key name
|
||||
</label>
|
||||
<div class="mt-1">
|
||||
{{ key_form.name }}
|
||||
</div>
|
||||
{% if key_form.name.errors %}
|
||||
<p class="mt-1 text-sm text-red-600">{{ key_form.name.errors|striptags }}</p>
|
||||
{% endif %}
|
||||
</div>
|
||||
<div>
|
||||
<label for="{{ key_form.public_key.id_for_label }}" class="block text-sm font-medium text-gray-700">
|
||||
SSH public key
|
||||
</label>
|
||||
<div class="mt-1">
|
||||
{{ key_form.public_key }}
|
||||
</div>
|
||||
{% if key_form.public_key.errors %}
|
||||
<p class="mt-1 text-sm text-red-600">{{ key_form.public_key.errors|striptags }}</p>
|
||||
{% endif %}
|
||||
</div>
|
||||
{% if key_form.non_field_errors %}
|
||||
<p class="text-sm text-red-600">{{ key_form.non_field_errors|striptags }}</p>
|
||||
{% endif %}
|
||||
<button type="submit" class="inline-flex items-center rounded-md bg-purple-600 px-4 py-2 text-sm font-semibold text-white shadow hover:bg-purple-700 focus:outline-none focus-visible:ring-2 focus-visible:ring-purple-600">
|
||||
Upload key
|
||||
</button>
|
||||
</form>
|
||||
{% else %}
|
||||
<p class="mt-4 text-sm text-gray-600">You do not have permission to add SSH keys.</p>
|
||||
{% endif %}
|
||||
|
||||
{% if ssh_keys %}
|
||||
<div class="mt-6 divide-y divide-gray-200">
|
||||
{% for key in ssh_keys %}
|
||||
<div class="flex items-center justify-between py-4">
|
||||
<div>
|
||||
<p class="text-sm font-semibold text-gray-900">{{ key.name }}</p>
|
||||
<p class="text-xs text-gray-500">{{ key.fingerprint }}</p>
|
||||
</div>
|
||||
<div class="flex items-center gap-3">
|
||||
{% if key.is_active %}
|
||||
<div class="inline-flex overflow-hidden rounded-md shadow-sm">
|
||||
<button
|
||||
type="button"
|
||||
class="inline-flex items-center rounded-l-md bg-purple-600 px-3 py-1.5 text-xs font-semibold text-white hover:bg-purple-700"
|
||||
data-download-url="/api/v1/keys/{{ key.id }}/certificate"
|
||||
>
|
||||
Download
|
||||
</button>
|
||||
<button
|
||||
type="button"
|
||||
class="inline-flex items-center rounded-r-md border border-l-0 border-gray-200 bg-gray-100 px-3 py-1.5 text-xs font-semibold text-gray-700 hover:bg-gray-200"
|
||||
data-download-url="/api/v1/keys/{{ key.id }}/certificate.sha256"
|
||||
>
|
||||
Hash
|
||||
</button>
|
||||
</div>
|
||||
<button
|
||||
type="button"
|
||||
class="inline-flex items-center rounded-md bg-red-600 px-3 py-1.5 text-xs font-semibold text-white hover:bg-red-700 js-regenerate-cert"
|
||||
data-key-id="{{ key.id }}"
|
||||
>
|
||||
Regenerate
|
||||
</button>
|
||||
{% else %}
|
||||
<span class="text-xs font-semibold text-gray-500">Revoked</span>
|
||||
{% endif %}
|
||||
</div>
|
||||
</div>
|
||||
{% endfor %}
|
||||
</div>
|
||||
{% else %}
|
||||
<p class="mt-4 text-sm text-gray-600">No SSH keys uploaded yet.</p>
|
||||
{% endif %}
|
||||
</div>
|
||||
<script>
|
||||
(function () {
|
||||
function getCookie(name) {
|
||||
var value = "; " + document.cookie;
|
||||
var parts = value.split("; " + name + "=");
|
||||
if (parts.length === 2) {
|
||||
return parts.pop().split(";").shift();
|
||||
}
|
||||
return "";
|
||||
}
|
||||
|
||||
function handleDownload(event) {
|
||||
var button = event.currentTarget;
|
||||
var url = button.getAttribute("data-download-url");
|
||||
if (!url) {
|
||||
return;
|
||||
}
|
||||
window.location.href = url;
|
||||
}
|
||||
|
||||
function handleRegenerate(event) {
|
||||
var button = event.currentTarget;
|
||||
var keyId = button.getAttribute("data-key-id");
|
||||
if (!keyId) {
|
||||
return;
|
||||
}
|
||||
if (!window.confirm("Regenerate the certificate for this key?")) {
|
||||
return;
|
||||
}
|
||||
var csrf = getCookie("csrftoken");
|
||||
fetch("/api/v1/keys/" + keyId + "/certificate", {
|
||||
method: "POST",
|
||||
credentials: "same-origin",
|
||||
headers: {
|
||||
"X-CSRFToken": csrf,
|
||||
},
|
||||
})
|
||||
.then(function (response) {
|
||||
if (!response.ok) {
|
||||
throw new Error("Certificate regeneration failed.");
|
||||
}
|
||||
window.location.href = "/api/v1/keys/" + keyId + "/certificate";
|
||||
})
|
||||
.catch(function (err) {
|
||||
window.alert(err.message);
|
||||
});
|
||||
}
|
||||
|
||||
var downloadButtons = document.querySelectorAll("[data-download-url]");
|
||||
for (var i = 0; i < downloadButtons.length; i += 1) {
|
||||
downloadButtons[i].addEventListener("click", handleDownload);
|
||||
}
|
||||
var buttons = document.querySelectorAll(".js-regenerate-cert");
|
||||
for (var j = 0; j < buttons.length; j += 1) {
|
||||
buttons[j].addEventListener("click", handleRegenerate);
|
||||
}
|
||||
})();
|
||||
</script>
|
||||
|
||||
<div class="mt-6 rounded-xl border border-gray-200 bg-white p-6 shadow-sm sm:p-8">
|
||||
<h2 class="text-base font-semibold tracking-tight text-gray-900">Data erasure request</h2>
|
||||
<p class="mt-2 text-sm text-gray-600">
|
||||
@@ -81,6 +227,7 @@
|
||||
{% if not erasure_request or erasure_request.status != "pending" %}
|
||||
<form method="post" class="mt-4 space-y-3">
|
||||
{% csrf_token %}
|
||||
<input type="hidden" name="form_type" value="erasure">
|
||||
<div>
|
||||
<label for="{{ erasure_form.reason.id_for_label }}" class="block text-sm font-medium text-gray-700">
|
||||
Reason for request
|
||||
|
||||
@@ -2,9 +2,14 @@ from django.conf import settings
|
||||
from django.contrib.auth import logout
|
||||
from django.contrib.auth import views as auth_views
|
||||
from django.contrib.auth.decorators import login_required
|
||||
from django.core.exceptions import ValidationError
|
||||
from django.db import IntegrityError
|
||||
from django.shortcuts import redirect, render
|
||||
|
||||
from .forms import ErasureRequestForm
|
||||
from apps.keys.certificates import issue_certificate_for_key
|
||||
from apps.keys.models import SSHKey
|
||||
|
||||
from .forms import ErasureRequestForm, SSHKeyForm
|
||||
from .models import ErasureRequest
|
||||
|
||||
|
||||
@@ -13,25 +18,55 @@ def profile(request):
|
||||
erasure_request = (
|
||||
ErasureRequest.objects.filter(user=request.user).order_by("-requested_at").first()
|
||||
)
|
||||
can_add_key = request.user.has_perm("keys.add_sshkey")
|
||||
if request.method == "POST":
|
||||
form = ErasureRequestForm(request.POST)
|
||||
if form.is_valid():
|
||||
if erasure_request and erasure_request.status == ErasureRequest.Status.PENDING:
|
||||
form.add_error(None, "You already have a pending erasure request.")
|
||||
else:
|
||||
ErasureRequest.objects.create(
|
||||
user=request.user,
|
||||
reason=form.cleaned_data["reason"].strip(),
|
||||
)
|
||||
return redirect("accounts:profile")
|
||||
form_type = request.POST.get("form_type")
|
||||
if form_type == "ssh_key":
|
||||
erasure_form = ErasureRequestForm()
|
||||
key_form = SSHKeyForm(request.POST)
|
||||
if key_form.is_valid():
|
||||
if not can_add_key:
|
||||
key_form.add_error(None, "You do not have permission to add SSH keys.")
|
||||
else:
|
||||
name = key_form.cleaned_data["name"].strip()
|
||||
public_key = key_form.cleaned_data["public_key"].strip()
|
||||
key = SSHKey(user=request.user, name=name)
|
||||
try:
|
||||
key.set_public_key(public_key)
|
||||
key.save()
|
||||
issue_certificate_for_key(key, created_by=request.user)
|
||||
return redirect("accounts:profile")
|
||||
except ValidationError as exc:
|
||||
key_form.add_error("public_key", str(exc))
|
||||
except IntegrityError:
|
||||
key_form.add_error("public_key", "Key already exists.")
|
||||
except Exception:
|
||||
key_form.add_error(None, "Certificate issuance failed.")
|
||||
else:
|
||||
key_form = SSHKeyForm()
|
||||
erasure_form = ErasureRequestForm(request.POST)
|
||||
if erasure_form.is_valid():
|
||||
if erasure_request and erasure_request.status == ErasureRequest.Status.PENDING:
|
||||
erasure_form.add_error(None, "You already have a pending erasure request.")
|
||||
else:
|
||||
ErasureRequest.objects.create(
|
||||
user=request.user,
|
||||
reason=erasure_form.cleaned_data["reason"].strip(),
|
||||
)
|
||||
return redirect("accounts:profile")
|
||||
else:
|
||||
form = ErasureRequestForm()
|
||||
erasure_form = ErasureRequestForm()
|
||||
key_form = SSHKeyForm()
|
||||
|
||||
ssh_keys = SSHKey.objects.filter(user=request.user).order_by("-created_at")
|
||||
context = {
|
||||
"user": request.user,
|
||||
"auth_mode": getattr(settings, "KEYWARDEN_AUTH_MODE", "hybrid"),
|
||||
"erasure_request": erasure_request,
|
||||
"erasure_form": form,
|
||||
"erasure_form": erasure_form,
|
||||
"key_form": key_form,
|
||||
"ssh_keys": ssh_keys,
|
||||
"can_add_key": can_add_key,
|
||||
}
|
||||
return render(request, "accounts/profile.html", context)
|
||||
|
||||
|
||||
Reference in New Issue
Block a user