mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2024-12-23 07:33:27 -06:00
156 lines
5.0 KiB
Python
156 lines
5.0 KiB
Python
|
#
|
||
|
# Copyright (C) 2017 FreeIPA Contributors see COPYING for license
|
||
|
#
|
||
|
#
|
||
|
# This program is free software; you can redistribute it and/or modify
|
||
|
# it under the terms of the GNU General Public License as published by
|
||
|
# the Free Software Foundation, either version 3 of the License, or
|
||
|
# (at your option) any later version.
|
||
|
#
|
||
|
# This program is distributed in the hope that it will be useful,
|
||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
# GNU General Public License for more details.
|
||
|
#
|
||
|
# You should have received a copy of the GNU General Public License
|
||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||
|
|
||
|
from cryptography import x509
|
||
|
from cryptography.x509.oid import NameOID
|
||
|
from cryptography.hazmat.primitives import hashes
|
||
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
||
|
from cryptography.hazmat.backends import default_backend
|
||
|
from cryptography.hazmat.primitives import serialization
|
||
|
|
||
|
import datetime
|
||
|
import six
|
||
|
|
||
|
|
||
|
class ExternalCA(object):
|
||
|
"""
|
||
|
Provide external CA for testing
|
||
|
"""
|
||
|
def create_ca(self, cn='example.test'):
|
||
|
"""Create root CA.
|
||
|
|
||
|
:returns: bytes -- Root CA in PEM format.
|
||
|
"""
|
||
|
self.ca_key = rsa.generate_private_key(
|
||
|
public_exponent=65537,
|
||
|
key_size=2048,
|
||
|
backend=default_backend(),
|
||
|
)
|
||
|
|
||
|
self.ca_public_key = self.ca_key.public_key()
|
||
|
|
||
|
subject = self.issuer = x509.Name([
|
||
|
x509.NameAttribute(NameOID.COMMON_NAME, six.text_type(cn)),
|
||
|
])
|
||
|
|
||
|
builder = x509.CertificateBuilder()
|
||
|
builder = builder.subject_name(subject)
|
||
|
builder = builder.issuer_name(self.issuer)
|
||
|
builder = builder.public_key(self.ca_public_key)
|
||
|
builder = builder.serial_number(x509.random_serial_number())
|
||
|
builder = builder.not_valid_before(datetime.datetime.utcnow())
|
||
|
builder = builder.not_valid_after(
|
||
|
datetime.datetime.utcnow() + datetime.timedelta(days=365)
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.KeyUsage(
|
||
|
digital_signature=False,
|
||
|
content_commitment=False,
|
||
|
key_encipherment=False,
|
||
|
data_encipherment=False,
|
||
|
key_agreement=False,
|
||
|
key_cert_sign=True,
|
||
|
crl_sign=True,
|
||
|
encipher_only=False,
|
||
|
decipher_only=False,
|
||
|
),
|
||
|
critical=True,
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.BasicConstraints(ca=True, path_length=None),
|
||
|
critical=True,
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.SubjectKeyIdentifier.from_public_key(self.ca_public_key),
|
||
|
critical=False,
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.AuthorityKeyIdentifier.from_issuer_public_key(
|
||
|
self.ca_public_key
|
||
|
),
|
||
|
critical=False,
|
||
|
)
|
||
|
|
||
|
cert = builder.sign(self.ca_key, hashes.SHA256(), default_backend())
|
||
|
|
||
|
return cert.public_bytes(serialization.Encoding.PEM)
|
||
|
|
||
|
def sign_csr(self, ipa_csr):
|
||
|
"""Sign certificate CSR.
|
||
|
|
||
|
:param ipa_csr: CSR in PEM format.
|
||
|
:type ipa_csr: bytes.
|
||
|
:returns: bytes -- Signed CA in PEM format.
|
||
|
"""
|
||
|
csr_tbs = x509.load_pem_x509_csr(ipa_csr, default_backend())
|
||
|
|
||
|
csr_public_key = csr_tbs.public_key()
|
||
|
csr_subject = csr_tbs.subject
|
||
|
|
||
|
builder = x509.CertificateBuilder()
|
||
|
builder = builder.public_key(csr_public_key)
|
||
|
builder = builder.subject_name(csr_subject)
|
||
|
builder = builder.serial_number(x509.random_serial_number())
|
||
|
builder = builder.issuer_name(self.issuer)
|
||
|
builder = builder.not_valid_before(datetime.datetime.utcnow())
|
||
|
builder = builder.not_valid_after(
|
||
|
datetime.datetime.utcnow() + datetime.timedelta(days=365))
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.KeyUsage(
|
||
|
digital_signature=False,
|
||
|
content_commitment=False,
|
||
|
key_encipherment=False,
|
||
|
data_encipherment=False,
|
||
|
key_agreement=False,
|
||
|
key_cert_sign=True,
|
||
|
crl_sign=True,
|
||
|
encipher_only=False,
|
||
|
decipher_only=False,
|
||
|
),
|
||
|
critical=True,
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.SubjectKeyIdentifier.from_public_key(csr_public_key),
|
||
|
critical=False,
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.AuthorityKeyIdentifier.from_issuer_public_key(
|
||
|
self.ca_public_key
|
||
|
),
|
||
|
critical=False,
|
||
|
)
|
||
|
|
||
|
builder = builder.add_extension(
|
||
|
x509.BasicConstraints(ca=True, path_length=1),
|
||
|
critical=True,
|
||
|
)
|
||
|
|
||
|
cert = builder.sign(
|
||
|
private_key=self.ca_key,
|
||
|
algorithm=hashes.SHA256(),
|
||
|
backend=default_backend(),
|
||
|
)
|
||
|
|
||
|
return cert.public_bytes(serialization.Encoding.PEM)
|