11 from cam import openssl_wrap
14 log = logging.getLogger(__name__)
17 class _CAFiles(object):
19 def __init__(self, basedir, **attrs):
20 for key, value in attrs.items():
21 setattr(self, key, os.path.join(basedir, value))
26 def __init__(self, basedir, config, password=None):
28 self.basedir = basedir
29 self.config = {'basedir': basedir, 'default_days': '365', 'ou': 'CA',
30 'days': '3650', 'country': 'XX', 'crl_url': '',
31 'signature_algorithm': 'sha1', 'bits': '2048'}
32 self.config.update(config)
33 self.files = _CAFiles(basedir,
35 public_key='public/ca.pem',
36 private_key='private/ca.key',
39 crlnumber='crlnumber',
45 self._pw = getpass.getpass(prompt='CA Password: ')
49 self._lockfd = open(os.path.join(self.basedir, '_lock'), 'w+')
53 fcntl.lockf(self._lockfd, fcntl.LOCK_EX | fcntl.LOCK_NB)
56 if e.errno in (errno.EACCES, errno.EAGAIN):
59 log.error('another instance is running')
66 fcntl.lockf(self._lockfd, fcntl.LOCK_UN)
69 def _update_config(self):
70 # Create the OpenSSL configuration file.
71 utils.render(self.files.conf, 'openssl_config', self.config)
77 old_umask = os.umask(077)
79 for pathext in ('', 'conf', 'public', 'public/certs',
80 'public/crl', 'private', 'newcerts'):
81 fullpath = os.path.join(self.basedir, pathext)
82 if not os.path.isdir(fullpath):
85 if not os.path.exists(self.files.index):
86 log.info('creating new index file')
87 open(self.files.index, 'w').close()
89 if not os.path.exists(self.files.serial):
90 serial = random.randint(1, 1000000000)
91 log.info('initializing serial number (%d)', serial)
92 with open(self.files.serial, 'w') as fd:
93 fd.write('%08X\n' % serial)
95 if not os.path.exists(self.files.crlnumber):
96 with open(self.files.crlnumber, 'w') as fd:
101 # Generate keys if they do not exist.
102 if not os.path.exists(self.files.public_key):
103 tmpdir = tempfile.mkdtemp()
104 csr_file = os.path.join(tmpdir, 'ca.csr')
105 log.info('creating new RSA CA CSR')
106 openssl_wrap.run_with_config(
107 self.basedir, self.files.conf,
109 '-passout', 'pass:%s' % self._getpw(),
110 '-keyout', self.files.private_key, '-out', csr_file)
111 log.info('self-signing RSA CA certificate')
112 openssl_wrap.run_with_config(
113 self.basedir, self.files.conf,
114 'ca', '-keyfile', self.files.private_key,
115 '-key', self._getpw(),
116 '-md', self.config['signature_algorithm'],
117 '-extensions', 'v3_ca', '-out', self.files.public_key,
118 '-days', self.config.get('days', self.config['default_days']),
119 '-selfsign', '-infiles', csr_file)
120 shutil.rmtree(tmpdir)
124 # Make some files public.
125 for path in (os.path.join(self.basedir, 'public'),
126 os.path.join(self.basedir, 'public/certs'),
127 self.files.public_key):
128 if os.path.isdir(path):
134 log.info('generating CRL')
136 self._update_config()
138 # Write the CRL in PEM format to a temporary file.
139 tmpf = self.files.crl + '.tmp'
140 openssl_wrap.run_with_config(
141 self.basedir, self.files.conf,
142 'ca', '-gencrl', '-out', tmpf,
143 '-key', self._getpw())
144 # Convert to DER format for distribution.
146 'crl', '-inform', 'PEM', '-outform', 'DER',
147 '-in', tmpf, '-out', self.files.crl)
149 os.chmod(self.files.crl, 0644)
151 def revoke(self, cert):
152 log.info('revoking certificate %s', cert.name)
153 openssl_wrap.run_with_config(
154 self.basedir, self.files.conf,
155 'ca', '-revoke', cert.public_key_file,
156 '-key', self._getpw())
159 def generate(self, cert):
160 self._update_config()
162 expiry = cert.get_expiration_date()
163 if expiry and expiry > time.time():
164 log.warn('certificate is still valid')
167 log.warn('revoking previous version')
170 log.info('generating new certificate %s', cert.name)
171 tmpdir = tempfile.mkdtemp()
173 csr_file = os.path.join(tmpdir, '%s.csr' % cert.name)
174 conf_file = os.path.join(tmpdir, '%s.conf' % cert.name)
175 ext_file = os.path.join(tmpdir, '%s-ext.conf' % cert.name)
176 conf = {'usage': 'client, server'}
177 conf.update(self.config)
179 conf['days'] = cert.days or self.config['default_days']
182 conf['alt_names'] = ''.join(
183 ['DNS.%d=%s\n' % (idx + 1, x)
184 for idx, x in enumerate(cert.alt_names)])
185 utils.render(conf_file, 'openssl_config', conf)
186 utils.render(ext_file, 'ext_config', conf)
187 openssl_wrap.run_with_config(
188 self.basedir, conf_file,
189 'req', '-new', '-keyout', cert.private_key_file,
190 '-' + self.config['signature_algorithm'],
191 '-nodes', '-out', csr_file)
192 os.chmod(cert.private_key_file, 0600)
193 openssl_wrap.run_with_config(
194 self.basedir, conf_file,
195 'ca', '-days', conf['days'],
196 '-key', self._getpw(),
197 '-md', self.config['signature_algorithm'],
198 '-policy', 'policy_anything', '-out', cert.public_key_file,
199 '-extfile', ext_file, '-infiles', csr_file)
201 shutil.rmtree(tmpdir)