2023-07-17 03:23:26 +02:00
|
|
|
package vault
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
|
2024-05-04 01:06:24 +02:00
|
|
|
"github.com/quexten/goldwarden/cli/agent/bitwarden/crypto"
|
|
|
|
"github.com/quexten/goldwarden/cli/agent/bitwarden/models"
|
|
|
|
"github.com/quexten/goldwarden/cli/logging"
|
2023-07-17 03:23:26 +02:00
|
|
|
"golang.org/x/exp/slices"
|
|
|
|
)
|
|
|
|
|
2023-12-22 10:44:49 +01:00
|
|
|
var vaultLog = logging.GetLogger("Goldwarden", "Vault")
|
|
|
|
|
2023-07-17 03:23:26 +02:00
|
|
|
type Vault struct {
|
2023-12-26 21:52:49 +01:00
|
|
|
Keyring *crypto.Keyring
|
|
|
|
logins map[string]models.Cipher
|
|
|
|
secureNotes map[string]models.Cipher
|
|
|
|
sshKeyNoteIDs []string
|
|
|
|
envCredentials map[string]string
|
|
|
|
lastSynced int64
|
|
|
|
websockedConnected bool
|
|
|
|
mu sync.Mutex
|
2023-07-17 03:23:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewVault(keyring *crypto.Keyring) *Vault {
|
|
|
|
return &Vault{
|
2023-12-26 21:52:49 +01:00
|
|
|
Keyring: keyring,
|
|
|
|
logins: make(map[string]models.Cipher),
|
|
|
|
secureNotes: make(map[string]models.Cipher),
|
|
|
|
sshKeyNoteIDs: make([]string, 0),
|
|
|
|
envCredentials: make(map[string]string),
|
|
|
|
lastSynced: 0,
|
|
|
|
websockedConnected: false,
|
2023-07-17 03:23:26 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) lockMutex() {
|
|
|
|
vault.mu.Lock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) unlockMutex() {
|
|
|
|
vault.mu.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) Clear() {
|
|
|
|
vault.lockMutex()
|
|
|
|
vault.logins = make(map[string]models.Cipher)
|
|
|
|
vault.secureNotes = make(map[string]models.Cipher)
|
|
|
|
vault.sshKeyNoteIDs = make([]string, 0)
|
|
|
|
vault.envCredentials = make(map[string]string)
|
2023-12-28 01:25:59 +01:00
|
|
|
vault.lastSynced = 0
|
2023-07-17 03:23:26 +02:00
|
|
|
vault.unlockMutex()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) AddOrUpdateLogin(cipher models.Cipher) {
|
|
|
|
vault.lockMutex()
|
|
|
|
vault.logins[cipher.ID.String()] = cipher
|
|
|
|
vault.unlockMutex()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) DeleteCipher(uuid string) {
|
|
|
|
vault.lockMutex()
|
|
|
|
delete(vault.logins, uuid)
|
|
|
|
delete(vault.envCredentials, uuid)
|
|
|
|
|
|
|
|
newSecureNotes := make(map[string]models.Cipher)
|
|
|
|
for _, noteID := range vault.sshKeyNoteIDs {
|
|
|
|
if noteID != uuid {
|
|
|
|
newSecureNotes[noteID] = vault.secureNotes[noteID]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
vault.secureNotes = newSecureNotes
|
|
|
|
vault.unlockMutex()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) AddOrUpdateSecureNote(cipher models.Cipher) {
|
|
|
|
vault.lockMutex()
|
|
|
|
vault.secureNotes[cipher.ID.String()] = cipher
|
|
|
|
|
|
|
|
if vault.isSSHKey(cipher) {
|
|
|
|
if !slices.Contains(vault.sshKeyNoteIDs, cipher.ID.String()) {
|
|
|
|
vault.sshKeyNoteIDs = append(vault.sshKeyNoteIDs, cipher.ID.String())
|
|
|
|
}
|
|
|
|
} else if executableName, isEnv := vault.isEnv(cipher); isEnv {
|
|
|
|
vault.envCredentials[executableName] = cipher.ID.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
vault.unlockMutex()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) isEnv(cipher models.Cipher) (string, bool) {
|
|
|
|
if cipher.Type != models.CipherNote {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
|
|
|
|
if !cipher.DeletedDate.IsZero() {
|
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := cipher.GetKeyForCipher(*vault.Keyring)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to get key for cipher "+cipher.ID.String(), err.Error())
|
2023-07-17 03:23:26 +02:00
|
|
|
return "", false
|
|
|
|
}
|
|
|
|
|
|
|
|
isEnv := false
|
|
|
|
executableName := ""
|
|
|
|
|
|
|
|
for _, field := range cipher.Fields {
|
|
|
|
fieldName, err := crypto.DecryptWith(field.Name, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
fieldValue, err := crypto.DecryptWith(field.Value, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if string(fieldName) == "custom-type" && string(fieldValue) == "env" {
|
|
|
|
isEnv = true
|
|
|
|
} else if string(fieldName) == "executable" {
|
|
|
|
executableName = string(fieldValue)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return executableName, isEnv
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) isSSHKey(cipher models.Cipher) bool {
|
|
|
|
if cipher.Type != models.CipherNote {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
if !cipher.DeletedDate.IsZero() {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := cipher.GetKeyForCipher(*vault.Keyring)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to get key for cipher "+cipher.ID.String(), err.Error())
|
2023-07-17 03:23:26 +02:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, field := range cipher.Fields {
|
|
|
|
fieldName, err := crypto.DecryptWith(field.Name, key)
|
|
|
|
if err != nil {
|
|
|
|
cipherID := cipher.ID.String()
|
2023-12-22 10:44:49 +01:00
|
|
|
if cipher.OrganizationID != nil {
|
|
|
|
orgID := cipher.OrganizationID.String()
|
2024-03-03 01:38:27 +01:00
|
|
|
vaultLog.Error("Failed to decrypt field name with on cipher %s in organization %s: %s", cipherID, orgID, err.Error())
|
2023-12-22 10:44:49 +01:00
|
|
|
} else {
|
2024-03-03 01:38:27 +01:00
|
|
|
vaultLog.Error("Failed to decrypt field name with on cipher %s: %s", cipherID, err.Error())
|
2023-12-22 10:44:49 +01:00
|
|
|
}
|
2023-07-17 03:23:26 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
fieldValue, err := crypto.DecryptWith(field.Value, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if string(fieldName) == "custom-type" && string(fieldValue) == "ssh-key" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
type SSHKey struct {
|
|
|
|
Name string
|
|
|
|
Key string
|
|
|
|
PublicKey string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetSSHKeys() []SSHKey {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
var sshKeys []SSHKey
|
|
|
|
for _, id := range vault.sshKeyNoteIDs {
|
|
|
|
privateKey := ""
|
|
|
|
publicKey := ""
|
|
|
|
|
|
|
|
key, err := vault.secureNotes[id].GetKeyForCipher(*vault.Keyring)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, field := range vault.secureNotes[id].Fields {
|
|
|
|
fieldName, err := crypto.DecryptWith(field.Name, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if string(fieldName) == "private-key" {
|
|
|
|
pk, err := crypto.DecryptWith(field.Value, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
privateKey = string(pk)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if string(fieldName) == "public-key" {
|
|
|
|
pk, err := crypto.DecryptWith(field.Value, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
} else {
|
|
|
|
publicKey = string(pk)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
privateKey = strings.Replace(privateKey, "-----BEGIN OPENSSH PRIVATE KEY-----", "", 1)
|
|
|
|
privateKey = strings.Replace(privateKey, "-----END OPENSSH PRIVATE KEY-----", "", 1)
|
|
|
|
|
|
|
|
pkParts := strings.Join(strings.Split(privateKey, " "), "\n")
|
|
|
|
privateKeyString := "-----BEGIN OPENSSH PRIVATE KEY-----" + pkParts + "-----END OPENSSH PRIVATE KEY-----"
|
|
|
|
|
|
|
|
decryptedTitle, err := crypto.DecryptWith(vault.secureNotes[id].Name, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
sshKeys = append(sshKeys, SSHKey{
|
|
|
|
Name: string(decryptedTitle),
|
|
|
|
Key: string(privateKeyString),
|
|
|
|
PublicKey: string(publicKey),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return sshKeys
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetEnvCredentialForExecutable(executableName string) (map[string]string, bool) {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
env := make(map[string]string)
|
|
|
|
|
|
|
|
if id, ok := vault.envCredentials[executableName]; ok {
|
|
|
|
key, err := vault.secureNotes[id].GetKeyForCipher(*vault.Keyring)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to get key for cipher " + id)
|
2023-07-17 03:23:26 +02:00
|
|
|
return make(map[string]string), false
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, field := range vault.secureNotes[id].Fields {
|
|
|
|
fieldName, err := crypto.DecryptWith(field.Name, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
fieldValue, err := crypto.DecryptWith(field.Value, key)
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if string(fieldName) == "custom-type" || string(fieldName) == "executable" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
env[string(fieldName)] = string(fieldValue)
|
|
|
|
}
|
|
|
|
return env, true
|
|
|
|
}
|
|
|
|
return make(map[string]string), false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetLogins() []models.Cipher {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
var logins []models.Cipher
|
|
|
|
for _, cipher := range vault.logins {
|
|
|
|
if cipher.Type != models.CipherLogin {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !cipher.DeletedDate.IsZero() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
logins = append(logins, cipher)
|
|
|
|
}
|
|
|
|
return logins
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetNotes() []models.Cipher {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
var notes []models.Cipher
|
|
|
|
for _, cipher := range vault.secureNotes {
|
|
|
|
if cipher.Type != models.CipherNote {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !cipher.DeletedDate.IsZero() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
notes = append(notes, cipher)
|
|
|
|
}
|
|
|
|
return notes
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetLoginByFilter(uuid string, orgId string, name string, username string) (models.Cipher, error) {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
for _, cipher := range vault.logins {
|
|
|
|
if uuid != "" && cipher.ID.String() != uuid {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if orgId != "" && cipher.OrganizationID.String() != orgId {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := cipher.GetKeyForCipher(*vault.Keyring)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to get key for cipher " + cipher.ID.String())
|
2023-07-17 03:23:26 +02:00
|
|
|
continue
|
|
|
|
}
|
2023-08-21 19:53:17 +02:00
|
|
|
if name != "" {
|
|
|
|
if cipher.Name.IsNull() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-07-17 03:23:26 +02:00
|
|
|
decryptedName, err := crypto.DecryptWith(cipher.Name, key)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to decrypt name for cipher " + cipher.ID.String())
|
2023-07-17 03:23:26 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if name != "" && string(decryptedName) != name {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-21 19:53:17 +02:00
|
|
|
if username != "" {
|
|
|
|
if cipher.Login.Username.IsNull() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2023-07-17 03:23:26 +02:00
|
|
|
decryptedUsername, err := crypto.DecryptWith(cipher.Login.Username, key)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to decrypt username for cipher " + cipher.ID.String())
|
2023-07-17 03:23:26 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if username != "" && string(decryptedUsername) != username {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return cipher, nil
|
|
|
|
}
|
|
|
|
|
2023-12-22 10:44:49 +01:00
|
|
|
return models.Cipher{}, errors.New("cipher not found")
|
2023-07-17 03:23:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetNoteByFilter(uuid string, orgId string, name string) (models.Cipher, error) {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
for _, cipher := range vault.secureNotes {
|
|
|
|
if uuid != "" && cipher.ID.String() != uuid {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if orgId != "" && cipher.OrganizationID.String() != orgId {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
key, err := cipher.GetKeyForCipher(*vault.Keyring)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to get key for cipher "+cipher.ID.String(), err.Error())
|
2023-07-17 03:23:26 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
decryptedName, err := crypto.DecryptWith(cipher.Name, key)
|
|
|
|
if err != nil {
|
2023-12-22 10:44:49 +01:00
|
|
|
vaultLog.Error("Failed to decrypt name for cipher "+cipher.ID.String(), err.Error())
|
2023-07-17 03:23:26 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if name != "" && string(decryptedName) != name {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
return cipher, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return models.Cipher{}, errors.New("cipher not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetLogin(uuid string) (models.Cipher, error) {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
for _, cipher := range vault.logins {
|
|
|
|
if cipher.ID.String() == uuid {
|
|
|
|
return cipher, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return models.Cipher{}, errors.New("cipher not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetSecureNote(uuid string) (models.Cipher, error) {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
for _, cipher := range vault.secureNotes {
|
|
|
|
if cipher.ID.String() == uuid {
|
|
|
|
return cipher, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return models.Cipher{}, errors.New("cipher not found")
|
|
|
|
}
|
2023-12-26 21:52:49 +01:00
|
|
|
|
|
|
|
func (vault *Vault) SetLastSynced(lastSynced int64) {
|
|
|
|
vault.lockMutex()
|
|
|
|
vault.lastSynced = lastSynced
|
|
|
|
vault.unlockMutex()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) GetLastSynced() int64 {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
return vault.lastSynced
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) SetWebsocketConnected(connected bool) {
|
|
|
|
vault.lockMutex()
|
|
|
|
vault.websockedConnected = connected
|
|
|
|
vault.unlockMutex()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (vault *Vault) IsWebsocketConnected() bool {
|
|
|
|
vault.lockMutex()
|
|
|
|
defer vault.unlockMutex()
|
|
|
|
|
|
|
|
return vault.websockedConnected
|
|
|
|
}
|