config/sysinv/cgts-client/cgts-client/cgtsclient/v1/certificate_shell.py

284 lines
11 KiB
Python

#
# Copyright (c) 2022 Wind River Systems, Inc.
#
# SPDX-License-Identifier: Apache-2.0
#
# vim: tabstop=4 shiftwidth=4 softtabstop=4
# All Rights Reserved.
#
import os
from cgtsclient.common import constants
from cgtsclient.common import utils
from cgtsclient import exc
import re
# matches all openssl supported key headers
PRIVATE_KEY_PATTERN = \
"-----BEGIN (\w{2,9} )?PRIVATE KEY-----" \
"(.|\n)*" \
"-----END (\w{2,9} )?PRIVATE KEY-----"
def _print_certificate_show(certificate):
fields = ['uuid', 'certtype', 'signature', 'start_date', 'expiry_date', 'subject']
if isinstance(certificate, dict):
data = [(f, certificate.get(f, '')) for f in fields]
details = ('details', certificate.get('details', ''))
else:
data = [(f, getattr(certificate, f, '')) for f in fields]
details = ('details', getattr(certificate, 'details', ''))
if details[1]:
data.append(details)
utils.print_tuple_list(data)
def _install_cert(cc, certificate_file, data):
try:
sec_file = open(certificate_file, 'rb')
except Exception:
raise exc.CommandError("Error: Could not open file %s." %
certificate_file)
has_private_key = False
try:
with open(certificate_file, 'r') as reader:
file_contents = reader.read()
has_private_key = re.search(PRIVATE_KEY_PATTERN, file_contents)
except OSError:
raise exc.CommandError('Error: Could not read the '
'certificate %s' % certificate_file)
if has_private_key:
print("WARNING: For security reasons, the original certificate, ")
print("containing the private key, will be removed, ")
print("once the private key is processed.")
try:
response = cc.certificate.certificate_install(sec_file, data=data)
except exc.HTTPNotFound:
raise exc.CommandError('Certificate not installed %s. No response.' %
certificate_file)
except Exception as e:
raise exc.CommandError('Certificate %s not installed: %s' %
(certificate_file, e))
else:
certificates = response.get('certificates')
if certificates:
for certificate in certificates:
_print_certificate_show(certificate)
error = response.get('error')
if error:
print("WARNING: Some certificates were not installed.")
print(error)
else:
try:
if has_private_key:
os.remove(certificate_file)
except OSError:
raise exc.CommandError('Error: Could not remove the '
'certificate %s' % certificate_file)
@utils.arg('certificate_file',
metavar='<certificate_file>',
help='Path to Certificate file (PEM format) to install. '
'WARNING: For security reasons, the original certificate_file '
'will be removed. Installing an invalid certificate '
'could cause service interruption.')
@utils.arg('-p', '--passphrase',
metavar='<passphrase>',
help='The passphrase for the PEM file')
@utils.arg('-m', '--mode',
metavar='<mode>',
help="optional mode: 'server', 'ca'. ")
def do_os_certificate_install(cc, args):
"""Install certificate."""
certificate_file = args.certificate_file
data = {'passphrase': args.passphrase,
'mode': args.mode}
if not data['mode']:
raise exc.CommandError('Warning: Need to specify a valid mode: server or ca')
if data['mode'] == 'server':
data['mode'] = 'openstack'
elif data['mode'] == 'ca':
data['mode'] = 'openstack_ca'
else:
raise exc.CommandError('Warning: Invalid mode: %s' % data['mode'])
_install_cert(cc, certificate_file, data)
def do_os_certificate_list(cc, args):
"""List openstack certificates."""
os_cert_types = ['openstack', 'openstack_ca']
certificates = []
for certificate in cc.certificate.list():
if certificate.certtype in os_cert_types:
if certificate.certtype == "openstack":
certificate.certtype = "server"
elif certificate.certtype == "openstack_ca":
certificate.certtype = "ca"
certificates.append(certificate)
fields = ['uuid', 'certtype', 'expiry_date', 'subject']
field_labels = fields
for certificate in certificates:
if certificate.subject and len(certificate.subject) > 20:
certificate.subject = certificate.subject[:20] + "..."
utils.print_list(certificates, fields, field_labels, sortby=0)
@utils.arg('certificate_uuid', metavar='<certificate_uuid>',
help="UUID of certificate")
def do_os_certificate_show(cc, args):
"""Show Openstack Certificate details."""
certificate = cc.certificate.get(args.certificate_uuid)
if certificate.certtype in ['openstack', 'openstack_ca']:
if certificate.certtype == "openstack":
certificate.certtype = "server"
elif certificate.certtype == "openstack_ca":
certificate.certtype = "ca"
_print_certificate_show(certificate)
else:
print('No certificate of type "openstack" is installed '
'with this uuid: %s' % (args.certificate_uuid))
@utils.arg('certificate_file',
metavar='<certificate_file>',
help='Path to Certificate file (PEM format) to install. '
'WARNING: For security reasons, the original certificate_file '
'will be removed. Installing an invalid certificate '
'could cause service interruption.')
@utils.arg('-p', '--passphrase',
metavar='<passphrase>',
help='The passphrase for the PEM file')
def do_ca_certificate_install(cc, args):
"""Install certificate."""
certificate_file = args.certificate_file
data = {'passphrase': args.passphrase,
'mode': 'ssl_ca'}
_install_cert(cc, certificate_file, data)
@utils.arg('certificate_uuid', metavar='<certificate_uuid>',
help="UUID of certificate to uninstall")
def do_ca_certificate_uninstall(cc, args):
"""Uninstall ca certificate."""
certificate = cc.certificate.get(args.certificate_uuid)
if certificate.certtype == 'ssl_ca':
cc.certificate.certificate_uninstall(args.certificate_uuid)
print('Uninstalled certificate: %s' % (args.certificate_uuid))
else:
msg = "Only ssl_ca type certs can be uninstalled using this command"
raise exc.CommandError(msg)
def do_ca_certificate_list(cc, args):
"""List certificates."""
certificates = [certificate for certificate in cc.certificate.list()
if certificate.certtype == 'ssl_ca']
fields = ['uuid', 'expiry_date', 'subject']
field_labels = fields
for certificate in certificates:
if certificate.subject and len(certificate.subject) > 20:
certificate.subject = certificate.subject[:20] + "..."
utils.print_list(certificates, fields, field_labels, sortby=0)
@utils.arg('certificate_uuid', metavar='<certificate_uuid>',
help="UUID of certificate")
def do_ca_certificate_show(cc, args):
"""Show Certificate details."""
certificate = cc.certificate.get(args.certificate_uuid)
if certificate.certtype == 'ssl_ca':
_print_certificate_show(certificate)
else:
print('No certificate of type "ssl_ca" is installed with '
'this uuid: %s' % (args.certificate_uuid))
def _print_certificate_list(certs_dict):
keys = [constants.RESIDUAL_TIME, constants.VALIDITY, constants.ISSUER,
constants.SUBJECT, constants.NAMESPACE, constants.SECRET,
constants.RENEWAL, constants.SECRET_TYPE, constants.FILEPATH]
for cert in sorted(certs_dict):
print("+------------------------------------------------------------+")
print(cert)
print("+------------------------------------------------------------+")
for key in keys:
val = certs_dict[cert].get(key)
if val:
if key == constants.VALIDITY:
issue_date = certs_dict[cert][constants.VALIDITY][constants.NOT_BEFORE]
expiry_date = certs_dict[cert][constants.VALIDITY][constants.NOT_AFTER]
print(f' Issue Date\t: {issue_date}')
print(f' Expiry Date\t: {expiry_date}')
continue
print(f" {key}\t: {val}")
print("+------------------------------------------------------------+")
@utils.arg(constants.EXPIRED, action='store_true',
help="to show the expired certificates")
@utils.arg(constants.SOON_TO_EXPIRY, metavar='<no of days to expiry>',
help="to show the certificates expiring in n days")
def do_certificate_list(cc, args):
"""List system certificates."""
certs = cc.certificate.get_all_certs(expired=args.expired,
soon_to_expiry=args.soon_to_expiry)
_print_certificate_list(certs)
@utils.arg(constants.EXPIRED, action='store_true',
help="to show the expired certificates")
@utils.arg(constants.SOON_TO_EXPIRY, metavar='<no of days to expiry>',
help="to show the certificates expiring in n days")
def do_k8s_certificate_list(cc, args):
"""List k8s certificates."""
certs = cc.certificate.get_all_k8s_certs(expired=args.expired,
soon_to_expiry=args.soon_to_expiry)
_print_certificate_list(certs)
def _print_certificate_details(cert_info, i=1):
s = " " * i
for key, val in cert_info.items():
if isinstance(val, dict):
print(f"{s}{key}:")
_print_certificate_details(val, i=i + 1)
continue
print(f"{s}{key}: {val}")
def _print_certificate(certificate, args):
if certificate:
print("Certificate:")
_print_certificate_details(certificate)
else:
print(f"No Certificate exist with name {args.certificate_name}")
@utils.arg('certificate_name', metavar='<certificate_name>',
help="name of certificate")
def do_certificate_show(cc, args):
"""Show certificate details."""
certificate = cc.certificate.get_all_certs().get(args.certificate_name, None)
_print_certificate(certificate, args)
@utils.arg('certificate_name', metavar='<certificate_name>',
help="name of certificate")
def do_k8s_certificate_show(cc, args):
"""Show certificate details."""
certificate = cc.certificate.get_all_k8s_certs().get(args.certificate_name, None)
_print_certificate(certificate, args)