|
|
@ -0,0 +1,219 @@ |
|
|
|
#!/usr/bin/env python3 |
|
|
|
# -*- coding: utf-8 -*- |
|
|
|
|
|
|
|
import os |
|
|
|
import os.path |
|
|
|
import sqlite3 |
|
|
|
import subprocess |
|
|
|
|
|
|
|
from paths import * |
|
|
|
|
|
|
|
class SignRequest(object): |
|
|
|
def __init__(self, req_id): |
|
|
|
self.req_id = req_id |
|
|
|
|
|
|
|
def get_name(self): |
|
|
|
raise NotImplementedError() |
|
|
|
|
|
|
|
def get_fields(self): |
|
|
|
raise NotImplementedError() |
|
|
|
|
|
|
|
|
|
|
|
class UserSSHRequest(SignRequest, object): |
|
|
|
def __init__(self, req_id, user_name, root_requested, key_data): |
|
|
|
super(UserSSHRequest, self).__init__(req_id) |
|
|
|
|
|
|
|
self.user_name = user_name |
|
|
|
self.root_requested = root_requested |
|
|
|
self.key_data = key_data |
|
|
|
|
|
|
|
def get_name(self): |
|
|
|
return "User: %s [R:%d]" % (self.user_name, int(self.root_requested)) |
|
|
|
|
|
|
|
def get_fields(self): |
|
|
|
return [ |
|
|
|
("User name", self.user_name), |
|
|
|
("Root access requested", 'yes' if self.root_requested else 'no') |
|
|
|
] |
|
|
|
|
|
|
|
def __str__(self): |
|
|
|
return ("%s %s" % (self.req_id, self.user_name)) |
|
|
|
|
|
|
|
class HostSSLRequest(SignRequest, object): |
|
|
|
def __init__(self, req_id, host_name, key_data): |
|
|
|
super(HostSSLRequest, self).__init__(req_id) |
|
|
|
|
|
|
|
self.host_name = host_name |
|
|
|
self.key_data = key_data |
|
|
|
|
|
|
|
def get_name(self): |
|
|
|
return "Hostname: %s" % self.host_name |
|
|
|
|
|
|
|
def get_fields(self): |
|
|
|
return [ |
|
|
|
("Hostname", self.host_name) |
|
|
|
] |
|
|
|
def __str__(self): |
|
|
|
return ("%s %s" % (self.req_id, self.host_name)) |
|
|
|
|
|
|
|
class HostSSHRequest(SignRequest, object): |
|
|
|
def __init__(self, req_id, host_name, key_data): |
|
|
|
super(HostSSHRequest, self).__init__(req_id) |
|
|
|
|
|
|
|
self.host_name = host_name |
|
|
|
self.key_data = key_data |
|
|
|
|
|
|
|
def get_name(self): |
|
|
|
return "Hostname: %s" % self.host_name |
|
|
|
|
|
|
|
def get_fields(self): |
|
|
|
return [ |
|
|
|
("Hostname", self.host_name) |
|
|
|
] |
|
|
|
def __str__(self): |
|
|
|
return ("%s %s" % (self.req_id, self.host_name)) |
|
|
|
|
|
|
|
|
|
|
|
class Authority(object): |
|
|
|
ca_type = None |
|
|
|
|
|
|
|
def __init__(self, ca_id, name, path): |
|
|
|
self.ca_id = ca_id |
|
|
|
self.name = name |
|
|
|
self.path = path |
|
|
|
|
|
|
|
def generate(self): |
|
|
|
raise NotImplementedError() |
|
|
|
|
|
|
|
def sign(self, request): |
|
|
|
raise NotImplementedError() |
|
|
|
|
|
|
|
|
|
|
|
class SSHAuthority(Authority): |
|
|
|
ca_type = 'ssh' |
|
|
|
|
|
|
|
key_algorithm = 'ed25519' |
|
|
|
|
|
|
|
user_validity = '+52w' |
|
|
|
host_validity = '+52w' |
|
|
|
|
|
|
|
def generate(self): |
|
|
|
if os.path.exists(self.path): |
|
|
|
raise ValueError("A CA with the same id and type already exists") |
|
|
|
|
|
|
|
subprocess.call(['ssh-keygen', |
|
|
|
'-f', self.path, |
|
|
|
'-t', self.key_algorithm, |
|
|
|
'-C', self.name]) |
|
|
|
|
|
|
|
with open(self.path + '.serial', 'w') as stream: |
|
|
|
stream.write(str(0)) |
|
|
|
|
|
|
|
|
|
|
|
def sign(self, request): |
|
|
|
|
|
|
|
assert type(request) in [UserSSHRequest, HostSSHRequest] |
|
|
|
|
|
|
|
pub_key_path = os.path.join(OUTPUT_PATH, request.req_id + '.pub') |
|
|
|
cert_path = os.path.join(OUTPUT_PATH, request.req_id + '-cert.pub') |
|
|
|
|
|
|
|
with open(self.path + '.serial', 'r') as stream: |
|
|
|
next_serial = int(stream.read()) |
|
|
|
with open(self.path + '.serial', 'w') as stream: |
|
|
|
stream.write(str(next_serial + 1)) |
|
|
|
|
|
|
|
with open(pub_key_path, 'w') as stream: |
|
|
|
stream.write(request.key_data) |
|
|
|
|
|
|
|
ca_private_key = self.path |
|
|
|
|
|
|
|
if type(request) == UserSSHRequest: |
|
|
|
login_names = [request.user_name] |
|
|
|
if request.root_requested: |
|
|
|
login_names.append('root') |
|
|
|
|
|
|
|
subprocess.call(['ssh-keygen', |
|
|
|
'-s', ca_private_key, |
|
|
|
'-I', 'user_%s' % request.user_name, |
|
|
|
'-n', ','.join(login_names), |
|
|
|
'-V', self.user_validity, |
|
|
|
'-z', str(next_serial), |
|
|
|
pub_key_path]) |
|
|
|
elif type(request) == HostSSHRequest: |
|
|
|
subprocess.call(['ssh-keygen', |
|
|
|
'-s', ca_private_key, |
|
|
|
'-I', 'host_%s' % request.host_name.replace('.', '_'), |
|
|
|
'-h', |
|
|
|
'-n', request.host_name, |
|
|
|
'-V', self.host_validity, |
|
|
|
'-z', str(next_serial), |
|
|
|
pub_key_path]) |
|
|
|
|
|
|
|
return cert_path |
|
|
|
|
|
|
|
class SSLAuthority(Authority): |
|
|
|
ca_type = 'ssl' |
|
|
|
|
|
|
|
ca_key_algorithm = 'des3' |
|
|
|
key_length = '4096' |
|
|
|
|
|
|
|
key_algorithm = 'sha256' |
|
|
|
ca_validity = '365' |
|
|
|
cert_validity = '365' |
|
|
|
|
|
|
|
def generate(self): |
|
|
|
if os.path.exists(self.path): |
|
|
|
raise ValueError("A CA with the same id and type already exists") |
|
|
|
|
|
|
|
subprocess.call(['openssl', |
|
|
|
'genrsa', |
|
|
|
'-%s'%self.ca_key_algorithm, |
|
|
|
'-out', '%s'%(self.path), |
|
|
|
self.key_length]) |
|
|
|
|
|
|
|
subprocess.call(['openssl', |
|
|
|
'req', |
|
|
|
'-new', |
|
|
|
'-x509', |
|
|
|
'-days', self.ca_validity, |
|
|
|
'-key', self.path, |
|
|
|
# '-extensions', 'v3_ca' |
|
|
|
'-out', "%s.pub"%self.path, |
|
|
|
# '-config', "%s.conf"%self.path |
|
|
|
]) |
|
|
|
|
|
|
|
with open(self.path + '.serial', 'w') as stream: |
|
|
|
stream.write(str(0)) |
|
|
|
|
|
|
|
|
|
|
|
def sign(self, request): |
|
|
|
OUTPUT_PATH |
|
|
|
|
|
|
|
assert type(request) in [HostSSLRequest] |
|
|
|
|
|
|
|
pub_key_path = os.path.join(OUTPUT_PATH, request.req_id + '.pub') |
|
|
|
cert_path = os.path.join(OUTPUT_PATH, request.req_id + '-cert.pub') |
|
|
|
|
|
|
|
with open(self.path + '.serial', 'r') as stream: |
|
|
|
next_serial = int(stream.read()) |
|
|
|
with open(self.path + '.serial', 'w') as stream: |
|
|
|
stream.write(str(next_serial + 1)) |
|
|
|
|
|
|
|
with open(pub_key_path, 'w') as stream: |
|
|
|
stream.write(request.key_data) |
|
|
|
|
|
|
|
ca_private_key = self.path |
|
|
|
|
|
|
|
# openssl x509 -req -days 360 -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt # print() |
|
|
|
subprocess.check_output(['openssl', |
|
|
|
'x509', |
|
|
|
'-req', |
|
|
|
'-days', self.ca_validity, |
|
|
|
'-in', pub_key_path, |
|
|
|
'-CA', "%s.pub"%self.path, |
|
|
|
'-CAkey', self.path, |
|
|
|
'-CAcreateserial', |
|
|
|
'-out', cert_path, |
|
|
|
'-%s'%self.key_algorithm]) |
|
|
|
|
|
|
|
return cert_path |