3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/nixos/modules/services/misc/taskserver/helper-tool.py
aszlig 2acf8677fa
nixos/taskserver: Rewrite helper-tool in Python
In the comments of the pull request @nbp wrote:

"Why is it implemented in 3 different languages: Nix, Bash and C?"

And he's right, it doesn't make sense, because we were using C as a
runuser replacement and used Nix to generate the shellscript
boilerplates.

Writing this in Python gets rid of all of this and we also don't need
the boilerplate as well, because we're using Click to handle all the
command line stuff.

Note that this currently is a 1:1 implementation of what we had before.

Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2016-04-11 12:02:52 +02:00

277 lines
7.9 KiB
Python

import grp
import pwd
import os
import re
import string
import subprocess
import sys
from shutil import rmtree
from tempfile import NamedTemporaryFile
import click
CERTTOOL_COMMAND = "@certtool@"
TASKD_COMMAND = "@taskd@"
TASKD_DATA_DIR = "@dataDir@"
TASKD_USER = "@user@"
TASKD_GROUP = "@group@"
FQDN = "@fqdn@"
RE_CONFIGUSER = re.compile(r'^\s*user\s*=(.*)$')
def run_as_taskd_user():
uid = pwd.getpwnam(TASKD_USER).pw_uid
gid = grp.getgrnam(TASKD_GROUP).gr_gid
os.setgid(gid)
os.setuid(uid)
def taskd_cmd(cmd, *args, **kwargs):
return subprocess.call(
[TASKD_COMMAND, cmd, "--data", TASKD_DATA_DIR] + list(args),
preexec_fn=run_as_taskd_user,
**kwargs
)
def label(msg):
if sys.stdout.isatty() or sys.stderr.isatty():
sys.stderr.write(msg + "\n")
def mkpath(*args):
return os.path.join(TASKD_DATA_DIR, "orgs", *args)
def fetch_username(org, key):
for line in open(mkpath(org, "users", key, "config"), "r"):
match = RE_CONFIGUSER.match(line)
if match is None:
continue
return match.group(1).strip()
return None
def generate_key(org, user):
basedir = os.path.join(TASKD_DATA_DIR, "keys", org, user)
if os.path.exists(basedir):
raise OSError("Keyfile directory for {} already exists.".format(user))
privkey = os.path.join(basedir, "private.key")
pubcert = os.path.join(basedir, "public.cert")
cakey = os.path.join(TASKD_DATA_DIR, "keys", "ca.key")
cacert = os.path.join(TASKD_DATA_DIR, "keys", "ca.cert")
try:
os.makedirs(basedir, mode=0700)
cmd = [CERTTOOL_COMMAND, "-p", "--bits", "2048", "--outfile", privkey]
subprocess.call(cmd, preexec_fn=lambda: os.umask(0077))
template = NamedTemporaryFile(mode="w", prefix="certtool-template")
template.writelines(map(lambda l: l + "\n", [
"organization = {0}".format(org),
"cn = {}".format(FQDN),
"tls_www_client",
"encryption_key",
"signing_key"
]))
template.flush()
cmd = [CERTTOOL_COMMAND, "-c",
"--load-privkey", privkey,
"--load-ca-privkey", cakey,
"--load-ca-certificate", cacert,
"--template", template.name,
"--outfile", pubcert]
subprocess.call(cmd, preexec_fn=lambda: os.umask(0077))
except:
rmtree(basedir)
raise
def is_key_line(line, match):
return line.startswith("---") and line.lstrip("- ").startswith(match)
def getkey(*args):
path = os.path.join(TASKD_DATA_DIR, "keys", *args)
buf = []
for line in open(path, "r"):
if len(buf) == 0:
if is_key_line(line, "BEGIN"):
buf.append(line)
continue
buf.append(line)
if is_key_line(line, "END"):
return ''.join(buf)
raise IOError("Unable to get key from {}.".format(path))
def mktaskkey(cfg, path, keydata):
heredoc = 'cat > "{}" <<EOF\n{}EOF'.format(path, keydata)
cmd = 'task config taskd.{} -- "{}"'.format(cfg, path)
return heredoc + "\n" + cmd
@click.group()
@click.option('--service-helper', is_flag=True)
@click.pass_context
def cli(ctx, service_helper):
"""
Manage Taskserver users and certificates
"""
ctx.obj = {'is_service_helper': service_helper}
@cli.command("list-users")
@click.argument("organisation")
def list_users(organisation):
"""
List all users belonging to the specified organisation.
"""
label("The following users exist for {}:".format(organisation))
for key in os.listdir(mkpath(organisation, "users")):
name = fetch_username(organisation, key)
if name is not None:
sys.stdout.write(name + "\n")
@cli.command("list-orgs")
def list_orgs():
"""
List available organisations
"""
label("The following organisations exist:")
for org in os.listdir(mkpath()):
sys.stdout.write(org + "\n")
@cli.command("get-uuid")
@click.argument("organisation")
@click.argument("user")
def get_uuid(organisation, user):
"""
Get the UUID of the specified user belonging to the specified organisation.
"""
for key in os.listdir(mkpath(organisation, "users")):
name = fetch_username(organisation, key)
if name is not None and name == user:
label("User {} has the following UUID:".format(name))
sys.stdout.write(key + "\n")
return
sys.exit("No UUID found for user {}.".format(user))
@cli.command("export-user")
@click.argument("organisation")
@click.argument("user")
def export_user(organisation, user):
"""
Export user of the specified organisation as a series of shell commands
that can be used on the client side to easily import the certificates.
Note that the private key will be exported as well, so use this with care!
"""
name = key = None
for current_key in os.listdir(mkpath(organisation, "users")):
name = fetch_username(organisation, current_key)
if name is not None and name == user:
key = current_key
break
if name is None:
msg = "User {} doesn't exist in organisation {}."
sys.exit(msg.format(user, organisation))
pubcert = getkey(organisation, user, "public.cert")
privkey = getkey(organisation, user, "private.key")
cacert = getkey("ca.cert")
keydir = "${TASKDATA:-$HOME/.task}/keys"
credentials = '/'.join([organisation, user, key])
allow_unquoted = string.ascii_letters + string.digits + "/-_."
if not all((c in allow_unquoted) for c in credentials):
credentials = "'" + credentials.replace("'", r"'\''") + "'"
script = [
"umask 0077",
'mkdir -p "{}"'.format(keydir),
mktaskkey("certificate", os.path.join(keydir, "public.cert"), pubcert),
mktaskkey("key", os.path.join(keydir, "private.key"), privkey),
mktaskkey("ca", os.path.join(keydir, "ca.cert"), cacert),
"task config taskd.credentials -- {}".format(credentials)
]
sys.stdout.write('\n'.join(script))
@cli.command("add-org")
@click.argument("name")
@click.pass_obj
def add_org(obj, name):
"""
Create an organisation with the specified name.
"""
if os.path.exists(mkpath(name)):
if obj['is_service_helper']:
return
msg = "Organisation with name {} already exists."
sys.exit(msg.format(name))
taskd_cmd("add", "org", name)
@cli.command("add-user")
@click.argument("organisation")
@click.argument("user")
@click.pass_obj
def add_user(obj, organisation, user):
"""
Create a user for the given organisation along with a client certificate
and print the key of the new user.
The client certificate along with it's public key can be shown via the
'export-user' subcommand.
"""
if not os.path.exists(mkpath(organisation)):
sys.exit("Organisation {} does not exist.".format(organisation))
if os.path.exists(mkpath(organisation, "users")):
for key in os.listdir(mkpath(organisation, "users")):
name = fetch_username(organisation, key)
if name is not None and name == user:
if obj['is_service_helper']:
return
msg = "User {} already exists in organisation {}."
sys.exit(msg.format(user, organisation))
taskd_cmd("add", "user", organisation, user)
generate_key(organisation, user)
@cli.command("add-group")
@click.argument("organisation")
@click.argument("group")
@click.pass_obj
def add_group(obj, organisation, group):
"""
Create a group for the given organisation.
"""
if os.path.exists(mkpath(organisation, "groups", group)):
if obj['is_service_helper']:
return
msg = "Group {} already exists in organisation {}."
sys.exit(msg.format(group, organisation))
taskd_cmd("add", "group", organisation, group)
if __name__ == '__main__':
cli()