kiwi-vpn/api/kiwi_vpn_api/routers/device.py

249 lines
7.5 KiB
Python
Raw Normal View History

2022-03-29 00:01:12 +00:00
"""
/device endpoints.
"""
2022-04-07 11:59:42 +00:00
from fastapi import APIRouter, Depends, HTTPException, Response, status
2022-03-29 00:01:12 +00:00
2022-04-07 09:02:28 +00:00
from ..db import Device, DeviceCreate, DeviceRead, DeviceStatus, User
2022-04-07 09:43:58 +00:00
from ..easyrsa import DistinguishedName, EasyRSA
from ._common import (Responses, get_current_user, get_device_by_id, get_pki,
2022-03-29 23:36:23 +00:00
get_user_by_name)
2022-03-29 00:01:12 +00:00
router = APIRouter(prefix="/device", tags=["device"])
@router.post(
2022-03-29 23:36:23 +00:00
"/{user_name}",
2022-03-29 00:01:12 +00:00
responses={
2022-04-01 06:35:28 +00:00
status.HTTP_201_CREATED: Responses.ENTRY_ADDED,
2022-03-29 00:01:12 +00:00
status.HTTP_400_BAD_REQUEST: Responses.NOT_INSTALLED,
status.HTTP_401_UNAUTHORIZED: Responses.NEEDS_USER,
2022-03-30 02:02:45 +00:00
status.HTTP_403_FORBIDDEN: Responses.NEEDS_PERMISSION,
2022-03-29 00:01:12 +00:00
status.HTTP_409_CONFLICT: Responses.ENTRY_EXISTS,
},
response_model=DeviceRead,
2022-04-01 06:35:28 +00:00
status_code=status.HTTP_201_CREATED,
2022-03-29 00:01:12 +00:00
)
async def add_device(
device: DeviceCreate,
2022-03-29 23:36:23 +00:00
current_user: User = Depends(get_current_user),
owner: User = Depends(get_user_by_name),
2022-03-29 00:01:12 +00:00
) -> Device:
"""
POST ./: Create a new device in the database.
2022-04-07 06:23:09 +00:00
Status:
- 403: no user permission to create device
- 409: device creation unsuccessful
2022-03-29 00:01:12 +00:00
"""
2022-03-29 23:36:23 +00:00
# check permission
2022-03-30 01:51:43 +00:00
if not current_user.can_create(Device, owner):
2022-03-29 23:36:23 +00:00
raise HTTPException(status_code=status.HTTP_403_FORBIDDEN)
2022-03-29 00:01:12 +00:00
# create the new device
new_device = Device.create(
2022-03-31 16:48:52 +00:00
owner=owner,
2022-03-29 00:01:12 +00:00
device=device,
)
# fail if creation was unsuccessful
if new_device is None:
raise HTTPException(status_code=status.HTTP_409_CONFLICT)
# return the created device on success
return new_device
2022-03-29 15:56:12 +00:00
@router.delete(
"/{device_id}",
responses={
2022-04-07 11:59:42 +00:00
status.HTTP_200_OK: Responses.OK_NONE,
2022-03-29 15:56:12 +00:00
status.HTTP_400_BAD_REQUEST: Responses.NOT_INSTALLED,
status.HTTP_401_UNAUTHORIZED: Responses.NEEDS_USER,
2022-03-30 02:07:22 +00:00
status.HTTP_403_FORBIDDEN: Responses.NEEDS_PERMISSION,
2022-04-07 06:23:09 +00:00
status.HTTP_404_NOT_FOUND: Responses.ENTRY_DOESNT_EXIST,
2022-03-29 15:56:12 +00:00
},
response_model=User,
)
async def remove_device(
2022-03-29 23:36:23 +00:00
current_user: User = Depends(get_current_user),
device: Device = Depends(get_device_by_id),
2022-03-29 15:56:12 +00:00
):
"""
DELETE ./{device_id}: Remove a device from the database.
2022-04-07 06:23:09 +00:00
Status:
- 403: no user permission to edit device
2022-03-29 15:56:12 +00:00
"""
2022-03-29 23:36:23 +00:00
# check permission
2022-03-30 01:51:43 +00:00
if not current_user.can_edit(device):
2022-03-29 23:36:23 +00:00
raise HTTPException(status_code=status.HTTP_403_FORBIDDEN)
2022-03-29 15:56:12 +00:00
# delete device
device.delete()
2022-04-07 11:59:42 +00:00
@router.put(
"/{device_id}/certificate",
responses={
2022-04-07 11:59:42 +00:00
status.HTTP_200_OK: Responses.OK | {"model": DeviceRead},
status.HTTP_202_ACCEPTED: Responses.OK_WAIT | {"model": DeviceRead},
status.HTTP_400_BAD_REQUEST: Responses.NOT_INSTALLED,
status.HTTP_401_UNAUTHORIZED: Responses.NEEDS_USER,
status.HTTP_403_FORBIDDEN: Responses.NEEDS_PERMISSION,
status.HTTP_404_NOT_FOUND: Responses.ENTRY_DOESNT_EXIST,
2022-04-05 01:55:35 +00:00
status.HTTP_409_CONFLICT: Responses.ENTRY_EXISTS,
2022-04-07 09:43:58 +00:00
status.HTTP_425_TOO_EARLY: Responses.NEEDS_PKI,
},
2022-04-05 01:55:35 +00:00
response_model=DeviceRead,
2022-04-07 11:59:42 +00:00
status_code=status.HTTP_202_ACCEPTED,
)
2022-04-05 22:34:25 +00:00
async def request_certificate_issuance(
2022-04-07 11:59:42 +00:00
response: Response,
current_user: User = Depends(get_current_user),
device: Device = Depends(get_device_by_id),
2022-04-07 09:43:58 +00:00
pki: EasyRSA = Depends(get_pki),
2022-04-05 01:55:35 +00:00
) -> Device:
"""
2022-04-07 11:59:42 +00:00
PUT ./{device_id}/certificate: Request certificate issuance for a device.
2022-04-07 06:23:09 +00:00
Status:
2022-04-07 11:59:42 +00:00
- 200: certificate issued
- 202: issuance requested
2022-04-07 06:23:09 +00:00
- 403: no user permission to edit device
- 409: device certificate cannot be "issued"
"""
# check permission
if not current_user.can_edit(device):
raise HTTPException(status_code=status.HTTP_403_FORBIDDEN)
# can only "request" on an uncertified device
if device.status is not DeviceStatus.uncertified:
2022-04-05 01:55:35 +00:00
raise HTTPException(status_code=status.HTTP_409_CONFLICT)
2022-04-02 21:24:44 +00:00
device.set_status(DeviceStatus.pending)
2022-04-02 21:24:44 +00:00
# check if we can issue the certificate immediately
if current_user.can_issue:
2022-04-07 09:43:58 +00:00
if (certificate := pki.issue(
2022-04-05 01:55:35 +00:00
dn=DistinguishedName.build(device)
)) is not None:
device.set_status(DeviceStatus.certified)
2022-04-05 01:55:35 +00:00
device.expiry = certificate.not_valid_after
2022-04-02 21:24:44 +00:00
2022-04-07 11:59:42 +00:00
response.status_code = status.HTTP_200_OK
2022-04-05 01:55:35 +00:00
# return updated device
device.update()
return device
2022-04-06 00:34:37 +00:00
2022-04-07 11:59:42 +00:00
@router.patch(
"/{device_id}/certificate",
2022-04-06 00:34:37 +00:00
responses={
2022-04-07 11:59:42 +00:00
status.HTTP_200_OK: Responses.OK | {"model": DeviceRead},
status.HTTP_202_ACCEPTED: Responses.OK_WAIT | {"model": DeviceRead},
2022-04-06 00:34:37 +00:00
status.HTTP_400_BAD_REQUEST: Responses.NOT_INSTALLED,
status.HTTP_401_UNAUTHORIZED: Responses.NEEDS_USER,
status.HTTP_403_FORBIDDEN: Responses.NEEDS_PERMISSION,
status.HTTP_404_NOT_FOUND: Responses.ENTRY_DOESNT_EXIST,
status.HTTP_409_CONFLICT: Responses.ENTRY_EXISTS,
2022-04-07 09:43:58 +00:00
status.HTTP_425_TOO_EARLY: Responses.NEEDS_PKI,
2022-04-06 00:34:37 +00:00
},
response_model=DeviceRead,
2022-04-07 11:59:42 +00:00
status_code=status.HTTP_202_ACCEPTED,
2022-04-06 00:34:37 +00:00
)
async def request_certificate_renewal(
2022-04-07 11:59:42 +00:00
response: Response,
2022-04-06 00:34:37 +00:00
current_user: User = Depends(get_current_user),
device: Device = Depends(get_device_by_id),
2022-04-07 09:43:58 +00:00
pki: EasyRSA = Depends(get_pki),
2022-04-06 00:34:37 +00:00
) -> Device:
"""
2022-04-07 11:59:42 +00:00
PATCH ./{device_id}/certificate: Request certificate renewal for a device.
2022-04-07 06:23:09 +00:00
Status:
2022-04-07 11:59:42 +00:00
- 200: certificate renewed
- 202: renewal requested
2022-04-07 06:23:09 +00:00
- 403: no user permission to edit device
- 409: device certificate cannot be "renewed"
2022-04-06 00:34:37 +00:00
"""
# check permission
if not current_user.can_edit(device):
raise HTTPException(status_code=status.HTTP_403_FORBIDDEN)
# can only "renew" on an already certified device
if device.status is not DeviceStatus.certified:
2022-04-06 00:34:37 +00:00
raise HTTPException(status_code=status.HTTP_409_CONFLICT)
device.set_status(DeviceStatus.pending)
2022-04-06 00:34:37 +00:00
# check if we can renew the certificate immediately
if current_user.can_renew:
2022-04-07 09:43:58 +00:00
if (certificate := pki.renew(
2022-04-06 00:34:37 +00:00
dn=DistinguishedName.build(device)
)) is not None:
device.set_status(DeviceStatus.certified)
2022-04-06 00:34:37 +00:00
device.expiry = certificate.not_valid_after
2022-04-07 11:59:42 +00:00
response.status_code = status.HTTP_200_OK
2022-04-06 00:34:37 +00:00
# return updated device
device.update()
return device
2022-04-07 05:44:42 +00:00
2022-04-07 11:59:42 +00:00
@router.delete(
"/{device_id}/certificate",
2022-04-07 05:44:42 +00:00
responses={
2022-04-07 11:59:42 +00:00
status.HTTP_200_OK: Responses.OK_NONE,
2022-04-07 05:44:42 +00:00
status.HTTP_400_BAD_REQUEST: Responses.NOT_INSTALLED,
status.HTTP_401_UNAUTHORIZED: Responses.NEEDS_USER,
status.HTTP_403_FORBIDDEN: Responses.NEEDS_PERMISSION,
status.HTTP_404_NOT_FOUND: Responses.ENTRY_DOESNT_EXIST,
status.HTTP_409_CONFLICT: Responses.ENTRY_EXISTS,
2022-04-07 09:43:58 +00:00
status.HTTP_425_TOO_EARLY: Responses.NEEDS_PKI,
2022-04-07 05:44:42 +00:00
},
response_model=DeviceRead,
)
async def revoke_certificate(
current_user: User = Depends(get_current_user),
device: Device = Depends(get_device_by_id),
2022-04-07 09:43:58 +00:00
pki: EasyRSA = Depends(get_pki),
2022-04-07 05:44:42 +00:00
) -> Device:
"""
2022-04-07 11:59:42 +00:00
DELETE ./{device_id}/certificate: Revoke a device certificate.
2022-04-07 06:23:09 +00:00
Status:
- 403: no user permission to edit device
- 409: device certificate cannot be "revoked"
2022-04-07 05:44:42 +00:00
"""
# check permission
if not current_user.can_edit(device):
raise HTTPException(status_code=status.HTTP_403_FORBIDDEN)
# can only "revoke" on a currently certified device
if device.status is not DeviceStatus.certified:
2022-04-07 05:44:42 +00:00
raise HTTPException(status_code=status.HTTP_409_CONFLICT)
# revoke the device certificate
2022-04-07 09:43:58 +00:00
pki.revoke(dn=DistinguishedName.build(device))
2022-04-07 05:44:42 +00:00
# reset the device
device.set_status(DeviceStatus.uncertified)
2022-04-07 05:44:42 +00:00
device.expiry = None
# return updated device
device.update()
return device