enh(passwdmgr): Add Centreon Vault mode (#4254)

This commit is contained in:
Laurent Pinsivy 2023-03-10 11:07:51 +01:00 committed by David Boucher
parent 875e10041b
commit 80dfb92d6c
1 changed files with 221 additions and 0 deletions

View File

@ -0,0 +1,221 @@
#
# Copyright 2023 Centreon (http://www.centreon.com/)
#
# Centreon is a full-fledged industry-strength solution that meets
# the needs in IT infrastructure and application monitoring for
# service performance.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
package centreon::plugins::passwordmgr::centreonvault;
use strict;
use warnings;
use Data::Dumper;
use centreon::plugins::http;
use JSON::XS;
sub new {
my ($class, %options) = @_;
my $self = {};
bless $self, $class;
if (!defined($options{output})) {
print "Class PasswordMgr: Need to specify 'output' argument.\n";
exit 3;
}
if (!defined($options{options})) {
$options{output}->add_option_msg(short_msg => "Class PasswordMgr: Need to specify 'options' argument.");
$options{output}->option_exit();
}
$options{options}->add_options(arguments => {
'vault-config:s' => { name => 'vault_config', default => '/etc/centreon-engine/centreonvault.json'},
});
$options{options}->add_help(package => __PACKAGE__, sections => 'VAULT OPTIONS');
$self->{output} = $options{output};
$self->{http} = centreon::plugins::http->new(%options, noptions => 1, default_backend => 'curl');
return $self;
}
sub extract_map_options {
my ($self, %options) = @_;
$self->{map_option} = [];
# Parse all options to find '/\{.*\:\:secret\:\:(.*)\}/' dedicated patern in value and add entries in map_option
foreach my $option (keys %{$options{option_results}}) {
if (defined($options{option_results}{$option})) {
next if ($option eq 'map_option');
if (ref($options{option_results}{$option}) eq 'ARRAY') {
foreach (@{$options{option_results}{$option}}) {
if ($_ =~ /\{.*\:\:secret\:\:(.*)\}/i) {
push (@{$self->{request_endpoint}}, "/v1".$1);
push (@{$self->{map_option}}, $option."=%".$_);
}
}
} else {
if ($options{option_results}{$option} =~ /\{.*\:\:secret\:\:(.*)\}/i) {
push (@{$self->{request_endpoint}}, "/v1".$1);
push (@{$self->{map_option}}, $option."=%".$options{option_results}{$option});
}
}
}
}
}
sub vault_settings {
my ($self, %options) = @_;
if (!defined($options{option_results}->{vault_config})
|| $options{option_results}->{vault_config} eq '') {
$self->{output}->add_option_msg(short_msg => "Please set --vault-config option");
$self->{output}->option_exit();
}
if (! -f $options{option_results}->{vault_config}) {
$self->{output}->add_option_msg(short_msg => "Cannot find file '$options{option_results}->{vault_config}'");
$self->{output}->option_exit();
}
my $file_content = do {
local $/ = undef;
if (!open my $fh, "<", $options{option_results}->{vault_config}) {
$self->{output}->add_option_msg(short_msg => "Could not open file $options{option_results}->{vault_config}: $!");
$self->{output}->option_exit();
}
<$fh>;
};
my $json;
eval {
$json = JSON::XS->new->utf8->decode($file_content);
};
if ($@) {
$self->{output}->add_option_msg(short_msg => "Cannot decode json file");
$self->{output}->option_exit();
}
foreach my $vault_name (keys %$json) {
$self->{$vault_name}->{vault_protocol} = 'https';
$self->{$vault_name}->{vault_address} = '127.0.0.1';
$self->{$vault_name}->{vault_port} = '8100';
$self->{$vault_name}->{vault_protocol} = $json->{$vault_name}->{'vault-protocol'}
if ($json->{$vault_name}->{'vault-protocol'} && $json->{$vault_name}->{'vault-protocol'} ne '');
$self->{$vault_name}->{vault_address} = $json->{$vault_name}->{'vault-address'}
if ($json->{$vault_name}->{'vault-address'} && $json->{$vault_name}->{'vault-address'} ne '');
$self->{$vault_name}->{vault_port} = $json->{$vault_name}->{'vault-port'}
if ($json->{$vault_name}->{'vault-port'} && $json->{$vault_name}->{'vault-port'} ne '');
$self->{$vault_name}->{vault_token} = $json->{$vault_name}->{'vault-token'}
if ($json->{$vault_name}->{'vault-token'} && $json->{$vault_name}->{'vault-token'} ne '');
}
}
sub request_api {
my ($self, %options) = @_;
$self->vault_settings(%options);
$self->{lookup_values} = {};
foreach my $endpoint (@{$self->{request_endpoint}}) {
# Extract vault name configuration from endpoint
my $vault_path = substr($endpoint, index($endpoint, '/', 1), length($endpoint));
my $vault_name = substr($vault_path, 1, index($vault_path, '/', 1) - 1);
my $headers = ['Accept: application/json'];
if (defined($self->{$vault_name}->{vault_token})) {
push @$headers, 'X-Vault-Token: ' . $self->{$vault_name}->{vault_token};
}
my ($response) = $self->{http}->request(
hostname => $self->{$vault_name}->{vault_address},
port => $self->{$vault_name}->{vault_port},
proto => $self->{$vault_name}->{vault_protocol},
method => 'GET',
url_path => $endpoint,
header => $headers
);
my $json;
eval {
$json = JSON::XS->new->utf8->decode($response);
};
if ($@) {
$self->{output}->add_option_msg(short_msg => "Cannot decode Vault JSON response: $@");
$self->{output}->option_exit();
};
foreach (keys %{$json->{data}}) {
$self->{lookup_values}->{'{' . $_ . '::secret::' . substr($endpoint, index($endpoint, '/', 1)) . '}'} = $json->{data}->{$_};
}
}
}
sub do_map {
my ($self, %options) = @_;
foreach (@{$self->{map_option}}) {
next if (! /^(.+?)=%(.+)$/);
my ($option, $map) = ($1, $2);
$map = $self->{lookup_values}->{$2} if (defined($self->{lookup_values}->{$2}));
$option =~ s/-/_/g;
$options{option_results}->{$option} = $map;
}
}
sub manage_options {
my ($self, %options) = @_;
$self->extract_map_options(%options);
return if (scalar(@{$self->{map_option}}) <= 0);
$self->request_api(%options);
$self->do_map(%options);
}
1;
__END__
=head1 NAME
Centreon Vault password manager
=head1 SYNOPSIS
Centreon Vault password manager
To be used with an array containing keys/values saved in a secret path by resource
=head1 VAULT OPTIONS
=over 8
=item B<--vault-config>
The path to the file defining access to the Centreon vault (/etc/centreon-engine/centreonvault.json by default)
=back
=head1 DESCRIPTION
B<centreonvault>.
=cut