Exemplo n.º 1
0
    def get_secrets_key_value(yml_obj):
        r = {
            'data' : None,
            'error' : '',
            'warning' : ''
        }
        l.log_info('Attempting to retrieve \'secrets\' key from secrets.yml....')

        # If we couldn't conver the yaml to an object, outside of this func ...
        if yml_obj is {}:
            m='Failed to render object from decrypted secrets.yml. That\'s not good!'
            l.log_error(m)
            r['error']=m
            return r
        elif yml_obj is None:
            # Blank object, i.e. ---
            m='Document was parsable as YAML but there isn\'t any data.'
            l.log_warn(m)
            r['warning']=m
            return r

        secrets=yml_obj.get('secrets', None)
        r['data']=secrets
        if secrets is None:
            m='Document was parsable as YAML, however there was no \'secrets\' key.'
            l.log_warn(m)
            r['warning']=m
        else:
            l.log_info('Found "secrets" key. Looking even better!')        

        return r
Exemplo n.º 2
0
    def analyze_values(values):
        # Skip - no work to do
        errors=''
        report_list=['Found entries in values.yml for env:']
        if values is None or values is {}:
            l.log_info('No "values" found, so skipping analysis.')
            return { 'error' : '', 'report' : '' }

        # Loop through data kvps
        for k, v in values.items():
            message = '\t {:30s} => {:3s}'.format(k, str(v))
            report_list.append(message)

        return { 'error' : errors, 'report' : '\n'.join(report_list)+'\n' }
Exemplo n.º 3
0
    def load_yml_from_str(yml_content, secrets_file):
        r = {
            'yml_obj' : {},
            'error' : ''
        }
        try:
            obj = yaml.safe_load(yml_content)
            l.log_info('Successfully loaded yaml file into an object. Not bad...')
            r['yml_obj'] = obj
        except yaml.YAMLError as exc:
            l.log_error('Invalid syntax detected in yml file: {} \n\n{}'.format(secrets_file, exc))
            r['error'] = str(exc)

        return r
Exemplo n.º 4
0
    def get_file_contents(fp):
        r = {
            'content' : '',
            'errors' : ''
        }
        try:
            with open(fp, 'r') as y:
                content = y.readlines()
            r['content'] = content
        except IOError as e:
            m = 'Failed to load file: {0} due to error: {1}'.format(
                fp,
                e.strerror
            )
            l.log_error(m)
            r['errors'] = e.strerror

        return r
Exemplo n.º 5
0
 def decrypt_ansible_vault(secrets_file):
     result = {
         'exit_code' : 0,
         'errors' : [''],
         'output' : ''
     }
     try:
         cmd = 'cat {} | ansible-vault decrypt'.format(secrets_file)
         output = check_output(cmd, stderr=STDOUT, shell=True)
         result['output'] = output
     except CalledProcessError as ex:
         l.log_error(
             'Failed to decrypt the secrets.yml file for:\n\t{}'.format(
                 secrets_file
             )
         )
         result['exit_code'] = ex.returncode
         result['errors'][0] = str(ex.output)
     
     return result
Exemplo n.º 6
0
    def analyze_secrets(secrets):
        # Skip - no work to do
        errors=''
        report_list=[]
        if secrets is None or secrets is {}:
            l.log_info('No "secrets" found, so skipping analysis.')
            return { 'error' : '', 'report' : '' }

        for secret in secrets:
            # Loop through data kvps
            data_objs=secret.get('data', {})
            s_name = secret.get('name')
            if s_name is None:
                m='Expecting "name" item in secret entry, but it wasn\'t found.'
                l.log_error(m)
                errors = errors + m
            else:
                # l.log_info('\tFound secret {}'.format(s_name), label=False)
                message = 'Found secret "{0}": {1}'.format(
                    s_name, p.build_secret_data_keys_rpt(s_name, data_objs).get('text_report', '')
                )
                report_list.append(message)

        return { 'error' : errors, 'report' : '\n'.join(report_list) }
Exemplo n.º 7
0
    def get_decrypted_secrets(secrets_path_list):
        l.show_banner()
        # If there aren't any secrets, let's just skip out.
        secret_objects=[]
        if secrets_path_list is []:
            sys.exit(0)
        for yml_file_path in secrets_path_list:
            l.log_inspect(yml_file_path)
            l.log_info('Preparing to test decryption on {}'.format(yml_file_path))
            # Used to append errors/warnings
            error=''
            warning=''
            values_key_report = ""

            # Get values.yml loaded into object, for current env
            values_result = SecretValidators.get_loaded_values_yml(yml_file_path)
            values_yml_obj = values_result.get('yaml_obj', {})
            values_yml_err = values_result.get('error', '')
                        
            # Only process values.yml if we loaded the object properly, of course.
            if values_yml_err is '' or values_yml_obj is {}:
                # Index values found and build report
                results = SecretValidators.analyze_values(values_yml_obj)
                values_key_report = results.get('report', '')

            # Load secrets.yml
            with open(yml_file_path, 'r') as y:
                content = y.readlines()
            string_contents = ''.join(content)

            # Make sure it's encrypted to begin with
            if '$ANSIBLE_VAULT;' not in string_contents:
                l.log_error('[FATAL] - File {} isn\'t encrypted!!'.format(
                    yml_file_path
                ))
                error = error + 'File is not encrypted!!!'
                # Index the object with collected metadata
                secret_objects.append({
                    'secrets_file' : yml_file_path,
                    'encrypted' : string_contents,
                    'raw' : '',
                    'yaml_obj' : {},
                    'values_yml_obj' : values_yml_obj or {},
                    'values_key_report' : values_key_report or '',
                    'errors' : error
                })
            else:
                # Let's try to decrypt it
                results = SecretValidators.decrypt_ansible_vault(yml_file_path)
                yaml_obj={}
                secrets_key={}
                data_key_report=""
                # Collect any errors
                if results['errors'][0] is not '':
                    error = error + results['errors'][0]
                else:
                    print('[PASS] - Successfully decrypted {}!'.format(yml_file_path))
                    # Load YAML into an object
                    loaded_yml_result = SecretValidators.load_yml_from_str(results['output'], yml_file_path)
                    yaml_obj = loaded_yml_result.get('yml_obj','')
                    yml_load_err = loaded_yml_result.get('error','')

                    # Only process secrets if we loaded the object properly, of course.
                    if yml_load_err is '':
                        # Extract 'secrets' from yaml object
                        secrets_key = SecretValidators.get_secrets_key_value(yaml_obj)
                        if secrets_key.get('data') is not None:
                            # Append 'secret' to yaml_obj we're building
                            yaml_obj['secrets_key']=secrets_key['data']
                            # Pull out data keys in object since they could be of interest
                            # e.g. example-db-creds.username
                            secret_data_keys = SecretValidators.analyze_secrets(yaml_obj['secrets_key'])
                            data_key_report = data_key_report + secret_data_keys.get('report')
                    

                    # Track errors and warnings
                    if len(values_yml_err) > 0:
                        error = error + values_yml_err
                    if yaml_obj is not None:
                        error = error + yml_load_err
                    if secrets_key is not None:
                        error = error + secrets_key.get('error', '')
                    if len(secrets_key.get('warning','')) > 0:
                        warning = warning + secrets_key.get('warning','')

                # Index the object with collected metadata
                secret_objects.append({
                    'secrets_file' : yml_file_path,
                    'encrypted' : string_contents,
                    'raw' : results.get('output'),
                    'yaml_obj' : yaml_obj,
                    'values_yml_obj' : values_yml_obj or {},
                    'errors' : error,
                    'warnings' : warning,
                    'data_key_report' : data_key_report or '',
                    'values_key_report' : values_key_report or ''
                })
        
        return secret_objects
Exemplo n.º 8
0
from secretvalidator import SecretValidators as sv
from helpers import FileHelpers

if __name__ == "__main__":

    # Change directories to where provisioning/k8s will be mounted
    os.chdir(os.environ.get('WORKING_DIR', '/home/secrets'))

    # Load available secrets.yml, values.yml and k8s manifests
    deploy_info = FileHelpers()

    # Decrypt them and return the results
    secrets_report = sv.get_decrypted_secrets(deploy_info.secret_files)

    # Prepare the report
    l.log_info('\n\nEvaluating results...', label=False)
    failure_count = 0
    for result in secrets_report:
        # Happy path
        l.log_results_banner(result['secrets_file'])
        warnings = result.get('warnings', '')
        if result.get('errors') is '':
            # Cool, no errors. Any warnings or are we all good?
            if len(warnings) > 0:
                l.log_info('[OK w/ Warnings] - ................... {}'.format(
                    result['secrets_file']),
                           label=False)
                l.log_info('\n\tWarnings: \n\t{}'.format(warnings),
                           label=False)
            else:
                l.log_info('[OK] - ......................... {}'.format(