storj/cmd/identity/certificate_authority.go

221 lines
5.5 KiB
Go
Raw Normal View History

2019-01-24 20:15:10 +00:00
// Copyright (C) 2019 Storj Labs, Inc.
// See LICENSE for copying information.
package main
import (
2019-02-06 16:40:55 +00:00
"crypto/x509"
"fmt"
2019-01-26 14:59:53 +00:00
"os"
2019-02-06 16:40:55 +00:00
"path/filepath"
"github.com/spf13/cobra"
"storj.io/storj/pkg/cfgstruct"
2019-01-30 20:47:21 +00:00
"storj.io/storj/pkg/identity"
"storj.io/storj/pkg/peertls/extensions"
"storj.io/storj/pkg/process"
"storj.io/storj/pkg/revocation"
)
var (
caCmd = &cobra.Command{
2019-01-24 15:41:16 +00:00
Use: "certificate-authority",
Short: "Manage certificate authorities",
Annotations: map[string]string{"type": "setup"},
}
newCACmd = &cobra.Command{
2019-01-24 15:41:16 +00:00
Use: "create",
Short: "Create a new certificate authority",
RunE: cmdNewCA,
Annotations: map[string]string{"type": "setup"},
}
getIDCmd = &cobra.Command{
Use: "id",
Short: "Get the id of a CA",
RunE: cmdGetID,
Annotations: map[string]string{"type": "setup"},
}
caExtCmd = &cobra.Command{
2019-02-06 16:40:55 +00:00
Use: "extensions [service]",
Short: "Prints the extensions attached to the identity CA certificate",
RunE: cmdCAExtensions,
2019-02-06 16:40:55 +00:00
Args: cobra.MaximumNArgs(1),
Annotations: map[string]string{"type": "setup"},
}
revokeCACmd = &cobra.Command{
Use: "revoke",
Short: "Revoke the identity's CA certificate (creates backup)",
RunE: cmdRevokeCA,
Annotations: map[string]string{"type": "setup"},
}
2019-02-06 16:40:55 +00:00
revokePeerCACmd = &cobra.Command{
Use: "revoke-peer [service] [revoked cert path]",
Short: "Revoke a peer identity's CA certificate and add to local revocation database",
Args: cobra.MaximumNArgs(2),
RunE: cmdRevokePeerCA,
Annotations: map[string]string{"type": "setup"},
}
newCACfg struct {
2019-01-30 20:47:21 +00:00
CA identity.CASetupConfig
}
getIDCfg struct {
2019-01-30 20:47:21 +00:00
CA identity.PeerCAConfig
}
caExtCfg struct {
2019-01-30 20:47:21 +00:00
CA identity.FullCAConfig
}
revokeCACfg struct {
2019-01-30 20:47:21 +00:00
CA identity.FullCAConfig
// TODO: add "broadcast" option to send revocation to network nodes
}
2019-02-06 16:40:55 +00:00
revokePeerCACfg struct {
CA identity.FullCAConfig
PeerCA identity.PeerCAConfig
RevocationDBURL string
}
)
func init() {
2019-02-06 16:40:55 +00:00
// NB: init functions are executed in lexicographical order of filename
identityDirParam := cfgstruct.FindIdentityDirParam()
if identityDirParam != "" {
defaultIdentityDir = identityDirParam
}
confDirParam := cfgstruct.FindConfigDirParam()
if confDirParam != "" {
defaultConfigDir = confDirParam
}
rootCmd.PersistentFlags().StringVar(&configDir, "config-dir", defaultConfigDir, "service config directory")
rootCmd.PersistentFlags().StringVar(&identityDir, "identity-dir", defaultIdentityDir, "root directory for identity output")
rootCmd.AddCommand(caCmd)
caCmd.AddCommand(newCACmd)
caCmd.AddCommand(getIDCmd)
caCmd.AddCommand(caExtCmd)
caCmd.AddCommand(revokeCACmd)
2019-02-06 16:40:55 +00:00
caCmd.AddCommand(revokePeerCACmd)
process.Bind(newCACmd, &newCACfg, defaults, cfgstruct.IdentityDir(defaultIdentityDir))
process.Bind(getIDCmd, &getIDCfg, defaults, cfgstruct.IdentityDir(defaultIdentityDir))
process.Bind(caExtCmd, &caExtCfg, defaults, cfgstruct.IdentityDir(defaultIdentityDir))
process.Bind(revokeCACmd, &revokeCACfg, defaults, cfgstruct.IdentityDir(defaultIdentityDir))
process.Bind(revokePeerCACmd, &revokePeerCACfg, defaults, cfgstruct.ConfDir(defaultConfigDir), cfgstruct.IdentityDir(defaultIdentityDir))
}
func cmdNewCA(cmd *cobra.Command, args []string) error {
2019-01-26 14:59:53 +00:00
_, err := newCACfg.CA.Create(process.Ctx(cmd), os.Stdout)
return err
}
func cmdGetID(cmd *cobra.Command, args []string) (err error) {
p, err := getIDCfg.CA.Load()
if err != nil {
return err
}
2019-04-09 18:01:45 +01:00
fmt.Printf("base58-check node ID:\t%s\n", p.ID)
fmt.Printf("hex node ID:\t\t%x\n", p.ID)
fmt.Printf("node ID bytes:\t\t%v\n", p.ID[:])
difficulty, err := p.ID.Difficulty()
if err != nil {
return nil
}
fmt.Printf("difficulty:\t\t%d\n", difficulty)
return nil
}
func cmdRevokeCA(cmd *cobra.Command, args []string) (err error) {
ca, err := revokeCACfg.CA.Load()
if err != nil {
return err
}
// NB: backup original cert
if err := revokeCACfg.CA.SaveBackup(ca); err != nil {
return err
}
2019-04-03 16:03:53 +01:00
if err := ca.Revoke(); err != nil {
return err
}
2019-01-30 20:47:21 +00:00
updateCfg := identity.FullCAConfig{
CertPath: revokeCACfg.CA.CertPath,
}
if err := updateCfg.Save(ca); err != nil {
return err
}
return nil
}
2019-02-06 16:40:55 +00:00
func cmdRevokePeerCA(cmd *cobra.Command, args []string) (err error) {
ctx := process.Ctx(cmd)
if len(args) > 0 {
2019-02-06 16:40:55 +00:00
revokePeerCACfg.CA = identity.FullCAConfig{
CertPath: filepath.Join(identityDir, args[0], "ca.cert"),
KeyPath: filepath.Join(identityDir, args[0], "ca.key"),
}
revokePeerCACfg.RevocationDBURL = "bolt://" + filepath.Join(configDir, args[0], "revocations.db")
}
if len(args) > 1 {
2019-02-06 16:40:55 +00:00
revokePeerCACfg.PeerCA = identity.PeerCAConfig{
CertPath: args[1],
}
}
ca, err := revokePeerCACfg.CA.Load()
if err != nil {
return err
}
peerCA, err := revokePeerCACfg.PeerCA.Load()
if err != nil {
return err
}
ext, err := extensions.NewRevocationExt(ca.Key, peerCA.Cert)
2019-02-06 16:40:55 +00:00
if err != nil {
return err
}
revDB, err := revocation.NewDB(revokePeerCACfg.RevocationDBURL)
2019-02-06 16:40:55 +00:00
if err != nil {
return err
}
if err = revDB.Put(ctx, []*x509.Certificate{ca.Cert, peerCA.Cert}, ext); err != nil {
2019-02-06 16:40:55 +00:00
return err
}
return nil
}
func cmdCAExtensions(cmd *cobra.Command, args []string) (err error) {
2019-02-06 16:40:55 +00:00
if len(args) > 0 {
caExtCfg.CA = identity.FullCAConfig{
CertPath: filepath.Join(identityDir, args[0], "ca.cert"),
KeyPath: filepath.Join(identityDir, args[0], "ca.key"),
}
}
ca, err := caExtCfg.CA.Load()
if err != nil {
return err
}
2019-04-03 16:03:53 +01:00
return printExtensions(ca.Cert.Raw, ca.Cert.Extensions)
}