2016-02-05 07:38:45 +00:00
|
|
|
# encoding: utf-8
|
|
|
|
# author: Christoph Hartmann
|
|
|
|
# author: Dominik Richter
|
|
|
|
|
|
|
|
require 'net/http'
|
|
|
|
require 'uri'
|
|
|
|
|
|
|
|
module Compliance
|
|
|
|
# API Implementation does not hold any state by itself,
|
|
|
|
# everything will be stored in local Configuration store
|
2016-03-01 19:51:23 +00:00
|
|
|
class API # rubocop:disable Metrics/ClassLength
|
2016-03-23 13:32:10 +00:00
|
|
|
# saves the api token supplied by the user
|
2016-04-04 15:29:13 +00:00
|
|
|
def self.api_token(url, refresh_token, verify, user, insecure)
|
2016-02-05 07:38:45 +00:00
|
|
|
config = Compliance::Configuration.new
|
2016-04-04 15:29:13 +00:00
|
|
|
config['server'] = url
|
2016-03-23 13:32:10 +00:00
|
|
|
config['refresh_token'] = refresh_token
|
|
|
|
config['user'] = user
|
|
|
|
config['insecure'] = insecure
|
2016-04-04 15:29:13 +00:00
|
|
|
config['version'] = version(url, insecure)
|
2016-03-23 13:32:10 +00:00
|
|
|
|
|
|
|
if !verify
|
|
|
|
config.store
|
|
|
|
success = true
|
|
|
|
msg = 'token stored'
|
|
|
|
else
|
|
|
|
url = "#{server}/login"
|
|
|
|
success, msg, access_token = Compliance::API.post_refresh_token(url, refresh_token, insecure)
|
|
|
|
if success
|
|
|
|
config['token'] = access_token
|
2016-02-05 07:38:45 +00:00
|
|
|
config.store
|
2016-03-23 13:32:10 +00:00
|
|
|
msg = 'token verified and stored'
|
2016-02-05 07:38:45 +00:00
|
|
|
end
|
|
|
|
end
|
2016-03-23 13:32:10 +00:00
|
|
|
|
|
|
|
[success, msg]
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.access_token(server, token, insecure, api_path)
|
|
|
|
config = Compliance::Configuration.new
|
2016-04-04 15:29:13 +00:00
|
|
|
config['server'] = server + api_path
|
2016-03-23 13:32:10 +00:00
|
|
|
config['insecure'] = insecure
|
|
|
|
config['token'] = token
|
|
|
|
config.store
|
|
|
|
|
|
|
|
[true, 'access token stored']
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.login(insecure)
|
|
|
|
config = Compliance::Configuration.new
|
|
|
|
if config['refresh_token'].nil?
|
|
|
|
puts 'No API token stored, please run `inspec compliance token` first'
|
|
|
|
exit 1
|
|
|
|
end
|
|
|
|
|
|
|
|
url = "#{config['server']}/login"
|
|
|
|
success, msg, access_token = Compliance::API.post_refresh_token(url, config['refresh_token'], insecure)
|
|
|
|
config['token'] = access_token
|
|
|
|
config.store
|
|
|
|
|
2016-02-05 07:38:45 +00:00
|
|
|
[success, msg]
|
|
|
|
end
|
|
|
|
|
2016-04-04 15:29:13 +00:00
|
|
|
def self.legacy_login(server, username, password, insecure, apipath)
|
|
|
|
config = Compliance::Configuration.new
|
|
|
|
config['server'] = "#{server}#{apipath}"
|
|
|
|
url = "#{config['server']}/oauth/token"
|
|
|
|
|
|
|
|
success, data = Compliance::API.legacy_login_post(url, username, password, insecure)
|
|
|
|
if !data.nil?
|
|
|
|
tokendata = JSON.parse(data)
|
|
|
|
if tokendata['access_token']
|
|
|
|
config['user'] = username
|
|
|
|
config['token'] = tokendata['access_token']
|
|
|
|
config['insecure'] = insecure
|
|
|
|
config.store
|
|
|
|
success = true
|
|
|
|
msg = 'Successfully authenticated'
|
|
|
|
else
|
|
|
|
msg = 'Reponse does not include a token'
|
|
|
|
end
|
|
|
|
else
|
|
|
|
msg = "Authentication failed for Server: #{url}"
|
|
|
|
end
|
|
|
|
[success, msg]
|
|
|
|
end
|
|
|
|
|
2016-02-05 07:38:45 +00:00
|
|
|
def self.logout
|
|
|
|
config = Compliance::Configuration.new
|
|
|
|
config.destroy
|
|
|
|
end
|
|
|
|
|
2016-04-04 15:29:13 +00:00
|
|
|
def self.legacy_logout
|
2016-02-05 07:38:45 +00:00
|
|
|
config = Compliance::Configuration.new
|
2016-04-04 15:29:13 +00:00
|
|
|
url = "#{config['server']}/logout"
|
|
|
|
Compliance::API.post(url, config['token'], config['insecure'], !config.supported?(:oidc))
|
|
|
|
config.destroy
|
|
|
|
end
|
|
|
|
|
|
|
|
# return the server api version
|
|
|
|
# NB this method does not use Compliance::Configuration to allow for using
|
|
|
|
# it before we know the version (e.g. oidc or not)
|
|
|
|
def self.version(url, insecure)
|
|
|
|
url = "#{url}/version"
|
2016-02-05 07:38:45 +00:00
|
|
|
|
2016-04-04 15:29:13 +00:00
|
|
|
_success, data = Compliance::API.get(url, nil, insecure)
|
2016-02-05 07:38:45 +00:00
|
|
|
if !data.nil?
|
|
|
|
JSON.parse(data)
|
|
|
|
else
|
|
|
|
{}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# return all compliance profiles available for the user
|
|
|
|
def self.profiles
|
|
|
|
config = Compliance::Configuration.new
|
|
|
|
url = "#{config['server']}/user/compliance"
|
2016-04-04 15:29:13 +00:00
|
|
|
_success, data = get(url, config['token'], config['insecure'], !config.supported?(:oidc))
|
2016-02-05 07:38:45 +00:00
|
|
|
|
|
|
|
if !data.nil?
|
|
|
|
profiles = JSON.parse(data)
|
|
|
|
# iterate over profiles
|
2016-03-23 13:36:46 +00:00
|
|
|
profiles.map do |owner, ps|
|
|
|
|
ps.keys.map do |name|
|
|
|
|
{ org: owner, name: name }
|
2016-03-23 13:32:10 +00:00
|
|
|
end
|
2016-03-23 13:36:46 +00:00
|
|
|
end.flatten
|
2016-02-05 07:38:45 +00:00
|
|
|
else
|
|
|
|
[]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-02-05 10:06:00 +00:00
|
|
|
# verifies that a profile
|
|
|
|
def self.exist?(profile)
|
|
|
|
profiles = Compliance::API.profiles
|
|
|
|
if !profiles.empty?
|
|
|
|
index = profiles.index { |p| "#{p[:org]}/#{p[:name]}" == profile }
|
|
|
|
!index.nil? && index >= 0
|
|
|
|
else
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2016-04-04 15:29:13 +00:00
|
|
|
def self.get(url, token, insecure, legacy = false)
|
2016-02-05 07:38:45 +00:00
|
|
|
uri = URI.parse(url)
|
|
|
|
req = Net::HTTP::Get.new(uri.path)
|
2016-04-04 15:29:13 +00:00
|
|
|
|
|
|
|
return send_request(uri, req, insecure) if token.nil?
|
|
|
|
|
|
|
|
if legacy
|
|
|
|
req.basic_auth(token, '')
|
|
|
|
else
|
|
|
|
req['Authorization'] = "Bearer #{token}"
|
|
|
|
end
|
2016-02-05 07:38:45 +00:00
|
|
|
|
2016-03-01 19:51:23 +00:00
|
|
|
send_request(uri, req, insecure)
|
2016-02-05 07:38:45 +00:00
|
|
|
end
|
|
|
|
|
2016-03-23 13:32:10 +00:00
|
|
|
def self.post_refresh_token(url, token, insecure)
|
|
|
|
uri = URI.parse(url)
|
|
|
|
req = Net::HTTP::Post.new(uri.path)
|
|
|
|
req['Authorization'] = "Bearer #{token}"
|
|
|
|
req.body = { token: token }.to_json
|
|
|
|
|
|
|
|
access_token = ''
|
|
|
|
success, data = send_request(uri, req, insecure)
|
|
|
|
if !data.nil?
|
|
|
|
begin
|
|
|
|
tokendata = JSON.parse(data)
|
|
|
|
access_token = tokendata['access_token']
|
|
|
|
msg = 'successfully fetched access token'
|
|
|
|
success = true
|
|
|
|
rescue JSON::ParserError => e
|
|
|
|
success = false
|
|
|
|
msg = e.message
|
|
|
|
end
|
|
|
|
else
|
|
|
|
success = false
|
|
|
|
msg = 'invalid response'
|
|
|
|
end
|
|
|
|
|
|
|
|
[success, msg, access_token]
|
|
|
|
end
|
|
|
|
|
2016-04-04 15:29:13 +00:00
|
|
|
def self.post(url, token, insecure, legacy = false)
|
2016-02-05 07:38:45 +00:00
|
|
|
# form request
|
|
|
|
uri = URI.parse(url)
|
|
|
|
req = Net::HTTP::Post.new(uri.path)
|
2016-04-04 15:29:13 +00:00
|
|
|
if legacy
|
|
|
|
req.basic_auth token, ''
|
|
|
|
else
|
|
|
|
req['Authorization'] = "Bearer #{token}"
|
|
|
|
end
|
|
|
|
req.form_data={}
|
|
|
|
|
|
|
|
send_request(uri, req, insecure)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.legacy_login_post(url, username, password, insecure)
|
|
|
|
# form request
|
|
|
|
uri = URI.parse(url)
|
|
|
|
req = Net::HTTP::Post.new(uri.path)
|
|
|
|
req.basic_auth(username, password)
|
2016-02-05 07:38:45 +00:00
|
|
|
req.form_data={}
|
|
|
|
|
2016-03-01 19:51:23 +00:00
|
|
|
send_request(uri, req, insecure)
|
2016-02-05 07:38:45 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
# upload a file
|
2016-04-04 15:29:13 +00:00
|
|
|
def self.post_file(url, token, file_path, insecure, legacy = false)
|
2016-02-05 07:38:45 +00:00
|
|
|
uri = URI.parse(url)
|
|
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
2016-03-01 19:51:23 +00:00
|
|
|
|
|
|
|
# set connection flags
|
|
|
|
http.use_ssl = (uri.scheme == 'https')
|
|
|
|
http.verify_mode = OpenSSL::SSL::VERIFY_NONE if insecure
|
|
|
|
|
2016-02-05 07:38:45 +00:00
|
|
|
req = Net::HTTP::Post.new(uri.path)
|
2016-04-04 15:29:13 +00:00
|
|
|
if legacy
|
|
|
|
req.basic_auth token, ''
|
|
|
|
else
|
|
|
|
req['Authorization'] = "Bearer #{token}"
|
|
|
|
end
|
2016-02-05 07:38:45 +00:00
|
|
|
|
2016-03-23 15:13:23 +00:00
|
|
|
req.body_stream=File.open(file_path, 'rb')
|
2016-02-05 07:38:45 +00:00
|
|
|
req.add_field('Content-Length', File.size(file_path))
|
|
|
|
req.add_field('Content-Type', 'application/x-gtar')
|
|
|
|
|
|
|
|
boundary = 'INSPEC-PROFILE-UPLOAD'
|
|
|
|
req.add_field('session', boundary)
|
|
|
|
res=http.request(req)
|
|
|
|
|
2016-02-05 10:06:00 +00:00
|
|
|
[res.is_a?(Net::HTTPSuccess), res.body]
|
2016-02-05 07:38:45 +00:00
|
|
|
end
|
|
|
|
|
2016-03-01 19:51:23 +00:00
|
|
|
def self.send_request(uri, req, insecure)
|
|
|
|
opts = {
|
|
|
|
use_ssl: uri.scheme == 'https',
|
|
|
|
}
|
|
|
|
opts[:verify_mode] = OpenSSL::SSL::VERIFY_NONE if insecure
|
|
|
|
|
|
|
|
res = Net::HTTP.start(uri.host, uri.port, opts) {|http|
|
2016-02-05 07:38:45 +00:00
|
|
|
http.request(req)
|
|
|
|
}
|
2016-02-05 10:06:00 +00:00
|
|
|
[res.is_a?(Net::HTTPSuccess), res.body]
|
2016-02-05 07:38:45 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|