2018-12-20 18:29:05 +00:00
|
|
|
// Copyright (C) 2018 Storj Labs, Inc.
|
|
|
|
// See LICENSE for copying information.
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/csv"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"text/tabwriter"
|
|
|
|
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"github.com/zeebo/errs"
|
|
|
|
|
|
|
|
"storj.io/storj/internal/fpath"
|
|
|
|
"storj.io/storj/pkg/certificates"
|
|
|
|
"storj.io/storj/pkg/cfgstruct"
|
|
|
|
"storj.io/storj/pkg/process"
|
|
|
|
"storj.io/storj/pkg/provider"
|
|
|
|
"storj.io/storj/pkg/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
type batchCfg struct {
|
|
|
|
EmailsPath string `help:"optional path to a list of emails, delimited by <delimiter>, for batch processing"`
|
|
|
|
Delimiter string `help:"delimiter to split emails loaded from <emails-path> on (e.g. comma, new-line)" default:"\n"`
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
rootCmd = &cobra.Command{
|
|
|
|
Use: "certificates",
|
|
|
|
Short: "Certificate request signing",
|
|
|
|
}
|
|
|
|
|
|
|
|
setupCmd = &cobra.Command{
|
|
|
|
Use: "setup",
|
|
|
|
Short: "Setup a certificate signing server",
|
|
|
|
RunE: cmdSetup,
|
|
|
|
}
|
|
|
|
|
|
|
|
runCmd = &cobra.Command{
|
|
|
|
Use: "run",
|
|
|
|
Short: "Run a certificate signing server",
|
|
|
|
RunE: cmdRun,
|
|
|
|
}
|
|
|
|
|
|
|
|
authCmd = &cobra.Command{
|
|
|
|
Use: "auth",
|
|
|
|
Short: "CSR authorization management",
|
|
|
|
}
|
|
|
|
|
|
|
|
authCreateCmd = &cobra.Command{
|
|
|
|
Use: "create <auth_increment_count> [<email>, ...]",
|
|
|
|
Short: "Create authorizations from a list of emails",
|
|
|
|
Args: cobra.MinimumNArgs(1),
|
|
|
|
RunE: cmdCreateAuth,
|
|
|
|
}
|
|
|
|
|
|
|
|
authInfoCmd = &cobra.Command{
|
|
|
|
Use: "info [<email>, ...]",
|
|
|
|
Short: "Get authorization(s) info from CSR authorization DB",
|
|
|
|
RunE: cmdInfoAuth,
|
|
|
|
}
|
|
|
|
|
|
|
|
authExportCmd = &cobra.Command{
|
|
|
|
Use: "export [<email>, ...]",
|
|
|
|
Short: "Export authorization(s) from CSR authorization DB to a CSV file (or stdout)",
|
|
|
|
RunE: cmdExportAuth,
|
|
|
|
}
|
|
|
|
|
|
|
|
setupCfg struct {
|
|
|
|
// NB: cert and key paths overridden in setup
|
|
|
|
CA provider.CASetupConfig
|
|
|
|
// NB: cert and key paths overridden in setup
|
|
|
|
Identity provider.IdentitySetupConfig
|
|
|
|
certificates.CertSignerConfig
|
|
|
|
}
|
|
|
|
|
|
|
|
runCfg struct {
|
|
|
|
CertSigner certificates.CertSignerConfig
|
|
|
|
Identity provider.IdentityConfig
|
|
|
|
}
|
|
|
|
|
|
|
|
authCreateCfg struct {
|
|
|
|
certificates.CertSignerConfig
|
|
|
|
batchCfg
|
|
|
|
}
|
|
|
|
|
|
|
|
authInfoCfg struct {
|
|
|
|
ShowTokens bool `help:"if true, token strings will be printed" default:"false"`
|
|
|
|
certificates.CertSignerConfig
|
|
|
|
batchCfg
|
|
|
|
}
|
|
|
|
|
|
|
|
authExportCfg struct {
|
|
|
|
All bool `help:"export all authorizations" default:"false"`
|
|
|
|
Out string `help:"output file path; if \"-\", will use STDOUT" default:"$CONFDIR/authorizations.csv"`
|
|
|
|
certificates.CertSignerConfig
|
|
|
|
batchCfg
|
|
|
|
}
|
|
|
|
|
|
|
|
defaultConfDir = fpath.ApplicationDir("storj", "cert-signing")
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
rootCmd.AddCommand(setupCmd)
|
|
|
|
cfgstruct.Bind(setupCmd.Flags(), &setupCfg, cfgstruct.ConfDir(defaultConfDir))
|
|
|
|
rootCmd.AddCommand(authCmd)
|
|
|
|
authCmd.AddCommand(authCreateCmd)
|
|
|
|
cfgstruct.Bind(authCreateCmd.Flags(), &authCreateCfg, cfgstruct.ConfDir(defaultConfDir))
|
|
|
|
authCmd.AddCommand(authInfoCmd)
|
|
|
|
cfgstruct.Bind(authInfoCmd.Flags(), &authInfoCfg, cfgstruct.ConfDir(defaultConfDir))
|
|
|
|
authCmd.AddCommand(authExportCmd)
|
|
|
|
cfgstruct.Bind(authExportCmd.Flags(), &authExportCfg, cfgstruct.ConfDir(defaultConfDir))
|
|
|
|
}
|
|
|
|
|
|
|
|
func cmdSetup(cmd *cobra.Command, args []string) error {
|
|
|
|
setupDir, err := filepath.Abs(defaultConfDir)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
valid, err := fpath.IsValidSetupDir(setupDir)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if !setupCfg.Overwrite && !valid {
|
|
|
|
fmt.Printf("certificate signer configuration already exists (%v). rerun with --overwrite\n", setupDir)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, err := setupCfg.NewAuthDB(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = os.MkdirAll(setupDir, 0700)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
setupCfg.CA.CertPath = filepath.Join(setupDir, "ca.cert")
|
|
|
|
setupCfg.CA.KeyPath = filepath.Join(setupDir, "ca.key")
|
|
|
|
setupCfg.Identity.CertPath = filepath.Join(setupDir, "identity.cert")
|
|
|
|
setupCfg.Identity.KeyPath = filepath.Join(setupDir, "identity.key")
|
|
|
|
|
|
|
|
err = provider.SetupCA(process.Ctx(cmd), setupCfg.CA)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
o := map[string]interface{}{
|
|
|
|
"ca.cert-path": setupCfg.CA.CertPath,
|
|
|
|
"ca.key-path": setupCfg.CA.KeyPath,
|
|
|
|
"identity.cert-path": setupCfg.Identity.CertPath,
|
|
|
|
"identity.key-path": setupCfg.Identity.KeyPath,
|
|
|
|
}
|
|
|
|
return process.SaveConfig(runCmd.Flags(),
|
|
|
|
filepath.Join(setupDir, "config.yaml"), o)
|
|
|
|
}
|
|
|
|
|
|
|
|
func cmdRun(cmd *cobra.Command, args []string) error {
|
|
|
|
ctx := process.Ctx(cmd)
|
|
|
|
|
|
|
|
return runCfg.Identity.Run(ctx, nil, runCfg.CertSigner)
|
|
|
|
}
|
|
|
|
|
|
|
|
func cmdCreateAuth(cmd *cobra.Command, args []string) error {
|
|
|
|
count, err := strconv.Atoi(args[0])
|
|
|
|
if err != nil {
|
|
|
|
return errs.New("Count couldn't be parsed: %s", args[0])
|
|
|
|
}
|
|
|
|
authDB, err := authCreateCfg.NewAuthDB()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var emails []string
|
|
|
|
if len(args) > 1 {
|
|
|
|
if authCreateCfg.EmailsPath != "" {
|
|
|
|
return errs.New("Either use `--emails-path` or positional args, not both.")
|
|
|
|
}
|
|
|
|
emails = args[1:]
|
|
|
|
} else {
|
|
|
|
list, err := ioutil.ReadFile(authCreateCfg.EmailsPath)
|
|
|
|
if err != nil {
|
|
|
|
return errs.Wrap(err)
|
|
|
|
}
|
|
|
|
emails = strings.Split(string(list), authCreateCfg.Delimiter)
|
|
|
|
}
|
|
|
|
|
|
|
|
var incErrs utils.ErrorGroup
|
|
|
|
for _, email := range emails {
|
|
|
|
if _, err := authDB.Create(email, count); err != nil {
|
|
|
|
incErrs.Add(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return incErrs.Finish()
|
|
|
|
}
|
|
|
|
|
|
|
|
func cmdInfoAuth(cmd *cobra.Command, args []string) error {
|
|
|
|
authDB, err := authInfoCfg.NewAuthDB()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var emails []string
|
|
|
|
if len(args) > 0 {
|
|
|
|
if authInfoCfg.EmailsPath != "" {
|
|
|
|
return errs.New("Either use `--emails-path` or positional args, not both.")
|
|
|
|
}
|
|
|
|
emails = args
|
|
|
|
} else if _, err := os.Stat(authInfoCfg.EmailsPath); err != nil {
|
|
|
|
return errs.New("Emails path error: %s", err)
|
|
|
|
} else {
|
|
|
|
list, err := ioutil.ReadFile(authInfoCfg.EmailsPath)
|
|
|
|
if err != nil {
|
|
|
|
return errs.Wrap(err)
|
|
|
|
}
|
|
|
|
emails = strings.Split(string(list), authInfoCfg.Delimiter)
|
|
|
|
}
|
|
|
|
|
|
|
|
var emailErrs, printErrs utils.ErrorGroup
|
|
|
|
w := tabwriter.NewWriter(os.Stdout, 0, 2, 2, ' ', 0)
|
|
|
|
if _, err := fmt.Fprintln(w, "Email\tClaimed\tAvail.\t"); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, email := range emails {
|
|
|
|
if err := writeAuthInfo(authDB, email, w); err != nil {
|
|
|
|
emailErrs.Add(err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := w.Flush(); err != nil {
|
|
|
|
return errs.Wrap(err)
|
|
|
|
}
|
|
|
|
return utils.CombineErrors(emailErrs.Finish(), printErrs.Finish())
|
|
|
|
}
|
|
|
|
|
|
|
|
func writeAuthInfo(authDB *certificates.AuthorizationDB, email string, w io.Writer) error {
|
|
|
|
auths, err := authDB.Get(email)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(auths) < 1 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
claimed, open := auths.Group()
|
|
|
|
if _, err := fmt.Fprintf(w,
|
|
|
|
"%s\t%d\t%d\t\n",
|
|
|
|
email,
|
|
|
|
len(claimed),
|
|
|
|
len(open),
|
|
|
|
); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if authInfoCfg.ShowTokens {
|
|
|
|
if err := writeTokenInfo(claimed, open, w); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func writeTokenInfo(claimed, open certificates.Authorizations, w io.Writer) error {
|
|
|
|
groups := map[string]certificates.Authorizations{
|
|
|
|
"Claimed": claimed,
|
|
|
|
"Open": open,
|
|
|
|
}
|
|
|
|
for label, group := range groups {
|
2018-12-31 15:45:43 +00:00
|
|
|
if _, err := fmt.Fprintf(w, "\t%s:\n", label); err != nil {
|
2018-12-20 18:29:05 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(group) > 0 {
|
|
|
|
for _, auth := range group {
|
2018-12-31 15:45:43 +00:00
|
|
|
if _, err := fmt.Fprintf(w, "\t\t%s\n", auth.Token.String()); err != nil {
|
2018-12-20 18:29:05 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2018-12-31 15:45:43 +00:00
|
|
|
if _, err := fmt.Fprintln(w, "\t\tnone"); err != nil {
|
2018-12-20 18:29:05 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func cmdExportAuth(cmd *cobra.Command, args []string) error {
|
|
|
|
authDB, err := authExportCfg.NewAuthDB()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var emails []string
|
|
|
|
if len(args) > 0 && !authExportCfg.All {
|
|
|
|
if authExportCfg.EmailsPath != "" {
|
|
|
|
return errs.New("Either use `--emails-path` or positional args, not both.")
|
|
|
|
}
|
|
|
|
emails = args
|
|
|
|
} else if authExportCfg.All {
|
2018-12-31 15:45:43 +00:00
|
|
|
emails, err = authDB.UserIDs()
|
2018-12-20 18:29:05 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
list, err := ioutil.ReadFile(authExportCfg.EmailsPath)
|
|
|
|
if err != nil {
|
|
|
|
return errs.Wrap(err)
|
|
|
|
}
|
|
|
|
emails = strings.Split(string(list), authExportCfg.Delimiter)
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
|
|
|
emailErrs, csvErrs utils.ErrorGroup
|
|
|
|
output io.Writer
|
|
|
|
)
|
|
|
|
switch authExportCfg.Out {
|
|
|
|
case "-":
|
|
|
|
output = os.Stdout
|
|
|
|
default:
|
|
|
|
output, err = os.OpenFile(authExportCfg.Out, os.O_CREATE, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return errs.Wrap(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
csvWriter := csv.NewWriter(output)
|
|
|
|
|
|
|
|
for _, email := range emails {
|
|
|
|
if err := writeAuthExport(authDB, email, csvWriter); err != nil {
|
|
|
|
emailErrs.Add(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
csvWriter.Flush()
|
|
|
|
return utils.CombineErrors(emailErrs.Finish(), csvErrs.Finish())
|
|
|
|
}
|
|
|
|
|
|
|
|
func writeAuthExport(authDB *certificates.AuthorizationDB, email string, w *csv.Writer) error {
|
|
|
|
auths, err := authDB.Get(email)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(auths) < 1 {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var authErrs utils.ErrorGroup
|
|
|
|
for _, auth := range auths {
|
|
|
|
if err := w.Write([]string{email, auth.Token.String()}); err != nil {
|
|
|
|
authErrs.Add(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return authErrs.Finish()
|
|
|
|
}
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
process.Exec(rootCmd)
|
|
|
|
}
|