66718cc5e6
added --dev command line option, cfgstruct.DevFlag(), and cfgstruct.SetupFlag()
216 lines
5.3 KiB
Go
216 lines
5.3 KiB
Go
// Copyright (C) 2019 Storj Labs, Inc.
|
|
// See LICENSE for copying information.
|
|
|
|
package main
|
|
|
|
import (
|
|
"crypto/x509"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"storj.io/storj/pkg/cfgstruct"
|
|
"storj.io/storj/pkg/identity"
|
|
"storj.io/storj/pkg/peertls"
|
|
"storj.io/storj/pkg/process"
|
|
)
|
|
|
|
var (
|
|
caCmd = &cobra.Command{
|
|
Use: "certificate-authority",
|
|
Short: "Manage certificate authorities",
|
|
Annotations: map[string]string{"type": "setup"},
|
|
}
|
|
|
|
newCACmd = &cobra.Command{
|
|
Use: "create",
|
|
Short: "Create a new certificate authority",
|
|
RunE: cmdNewCA,
|
|
Annotations: map[string]string{"type": "setup"},
|
|
}
|
|
|
|
getIDCmd = &cobra.Command{
|
|
Use: "id",
|
|
Short: "Get the id of a CA",
|
|
RunE: cmdGetID,
|
|
Annotations: map[string]string{"type": "setup"},
|
|
}
|
|
|
|
caExtCmd = &cobra.Command{
|
|
Use: "extensions [service]",
|
|
Short: "Prints the extensions attached to the identity CA certificate",
|
|
RunE: cmdCAExtensions,
|
|
Args: cobra.MaximumNArgs(1),
|
|
Annotations: map[string]string{"type": "setup"},
|
|
}
|
|
revokeCACmd = &cobra.Command{
|
|
Use: "revoke",
|
|
Short: "Revoke the identity's CA certificate (creates backup)",
|
|
RunE: cmdRevokeCA,
|
|
Annotations: map[string]string{"type": "setup"},
|
|
}
|
|
revokePeerCACmd = &cobra.Command{
|
|
Use: "revoke-peer [service] [revoked cert path]",
|
|
Short: "Revoke a peer identity's CA certificate and add to local revocation database",
|
|
Args: cobra.MaximumNArgs(2),
|
|
RunE: cmdRevokePeerCA,
|
|
Annotations: map[string]string{"type": "setup"},
|
|
}
|
|
|
|
newCACfg struct {
|
|
CA identity.CASetupConfig
|
|
}
|
|
|
|
getIDCfg struct {
|
|
CA identity.PeerCAConfig
|
|
}
|
|
|
|
caExtCfg struct {
|
|
CA identity.FullCAConfig
|
|
}
|
|
|
|
revokeCACfg struct {
|
|
CA identity.FullCAConfig
|
|
// TODO: add "broadcast" option to send revocation to network nodes
|
|
}
|
|
|
|
revokePeerCACfg struct {
|
|
CA identity.FullCAConfig
|
|
PeerCA identity.PeerCAConfig
|
|
RevocationDBURL string
|
|
}
|
|
)
|
|
|
|
func init() {
|
|
// NB: init functions are executed in lexicographical order of filename
|
|
identityDirParam := cfgstruct.FindIdentityDirParam()
|
|
if identityDirParam != "" {
|
|
defaultIdentityDir = identityDirParam
|
|
}
|
|
|
|
confDirParam := cfgstruct.FindConfigDirParam()
|
|
if confDirParam != "" {
|
|
defaultConfigDir = confDirParam
|
|
}
|
|
|
|
rootCmd.PersistentFlags().StringVar(&configDir, "config-dir", defaultConfigDir, "service config directory")
|
|
rootCmd.PersistentFlags().StringVar(&identityDir, "identity-dir", defaultIdentityDir, "root directory for identity output")
|
|
|
|
rootCmd.AddCommand(caCmd)
|
|
|
|
caCmd.AddCommand(newCACmd)
|
|
caCmd.AddCommand(getIDCmd)
|
|
caCmd.AddCommand(caExtCmd)
|
|
caCmd.AddCommand(revokeCACmd)
|
|
caCmd.AddCommand(revokePeerCACmd)
|
|
|
|
cfgstruct.Bind(newCACmd.Flags(), &newCACfg, isDev, cfgstruct.IdentityDir(defaultIdentityDir))
|
|
cfgstruct.Bind(getIDCmd.Flags(), &getIDCfg, isDev, cfgstruct.IdentityDir(defaultIdentityDir))
|
|
cfgstruct.Bind(caExtCmd.Flags(), &caExtCfg, isDev, cfgstruct.IdentityDir(defaultIdentityDir))
|
|
cfgstruct.Bind(revokeCACmd.Flags(), &revokeCACfg, isDev, cfgstruct.IdentityDir(defaultIdentityDir))
|
|
cfgstruct.Bind(revokePeerCACmd.Flags(), &revokePeerCACfg, isDev, cfgstruct.ConfDir(defaultConfigDir), cfgstruct.IdentityDir(defaultIdentityDir))
|
|
}
|
|
|
|
func cmdNewCA(cmd *cobra.Command, args []string) error {
|
|
_, err := newCACfg.CA.Create(process.Ctx(cmd), os.Stdout)
|
|
return err
|
|
}
|
|
|
|
func cmdGetID(cmd *cobra.Command, args []string) (err error) {
|
|
p, err := getIDCfg.CA.Load()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
fmt.Println(p.ID.String())
|
|
return nil
|
|
}
|
|
|
|
func cmdRevokeCA(cmd *cobra.Command, args []string) (err error) {
|
|
ca, err := revokeCACfg.CA.Load()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// NB: backup original cert
|
|
if err := revokeCACfg.CA.SaveBackup(ca); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := peertls.AddRevocationExt(ca.Key, ca.Cert, ca.Cert); err != nil {
|
|
return err
|
|
}
|
|
|
|
updateCfg := identity.FullCAConfig{
|
|
CertPath: revokeCACfg.CA.CertPath,
|
|
}
|
|
if err := updateCfg.Save(ca); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func cmdRevokePeerCA(cmd *cobra.Command, args []string) (err error) {
|
|
argLen := len(args)
|
|
switch {
|
|
case argLen > 0:
|
|
revokePeerCACfg.CA = identity.FullCAConfig{
|
|
CertPath: filepath.Join(identityDir, args[0], "ca.cert"),
|
|
KeyPath: filepath.Join(identityDir, args[0], "ca.key"),
|
|
}
|
|
|
|
revokePeerCACfg.RevocationDBURL = "bolt://" + filepath.Join(configDir, args[0], "revocations.db")
|
|
fallthrough
|
|
case argLen > 1:
|
|
revokePeerCACfg.PeerCA = identity.PeerCAConfig{
|
|
CertPath: args[1],
|
|
}
|
|
}
|
|
|
|
if len(args) > 0 {
|
|
}
|
|
|
|
ca, err := revokePeerCACfg.CA.Load()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
peerCA, err := revokePeerCACfg.PeerCA.Load()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ext, err := peertls.NewRevocationExt(ca.Key, peerCA.Cert)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
revDB, err := identity.NewRevDB(revokePeerCACfg.RevocationDBURL)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err = revDB.Put([]*x509.Certificate{ca.Cert, peerCA.Cert}, ext); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func cmdCAExtensions(cmd *cobra.Command, args []string) (err error) {
|
|
if len(args) > 0 {
|
|
caExtCfg.CA = identity.FullCAConfig{
|
|
CertPath: filepath.Join(identityDir, args[0], "ca.cert"),
|
|
KeyPath: filepath.Join(identityDir, args[0], "ca.key"),
|
|
}
|
|
}
|
|
|
|
ca, err := caExtCfg.CA.Load()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return printExtensions(ca.Cert.Raw, ca.Cert.ExtraExtensions)
|
|
}
|