kiwi-vpn/api/kiwi_vpn_api/easyrsa.py

308 lines
7.9 KiB
Python
Raw Normal View History

2022-03-30 21:18:54 +00:00
"""
Python interface to EasyRSA CA.
"""
from __future__ import annotations
2022-03-22 00:34:06 +00:00
import subprocess
from datetime import datetime
2022-04-01 15:39:48 +00:00
from enum import Enum, auto
2022-03-22 00:34:06 +00:00
from pathlib import Path
from OpenSSL import crypto
from passlib import pwd
from pydantic import BaseModel
2022-03-22 00:34:06 +00:00
2022-03-31 16:59:14 +00:00
from .config import Config, KeyAlgorithm, Settings
2022-03-30 23:59:25 +00:00
from .db import Connection, Device
class DistinguishedName(BaseModel):
"""
An `X.509 distinguished name` (DN) as specified in RFC 5280
"""
country: str
state: str
city: str
organization: str
organizational_unit: str
2022-03-31 16:34:36 +00:00
email: str
common_name: str
@classmethod
def build(cls, device: Device | None = None) -> DistinguishedName:
"""
Create a DN from the current config and an optional device
"""
# extract server DN config
server_dn = Config._.server_dn
result = cls(
country=server_dn.country.value,
state=server_dn.state.value,
city=server_dn.city.value,
organization=server_dn.organization.value,
organizational_unit=server_dn.organizational_unit.value,
email=server_dn.email.value,
common_name=server_dn.common_name,
)
# no device specified -> done
if device is None:
return result
# don't override locked or empty fields
if not (server_dn.country.locked
or device.owner.country is None):
result.country = device.owner.country
if not (server_dn.state.locked
or device.owner.state is None):
result.state = device.owner.state
if not (server_dn.city.locked
or device.owner.city is None):
result.city = device.owner.city
if not (server_dn.organization.locked
or device.owner.organization is None):
result.organization = device.owner.organization
if not (server_dn.organizational_unit.locked
or device.owner.organizational_unit is None):
result.organizational_unit = device.owner.organizational_unit
# definitely use derived email and common_name
result.email = device.owner.email
result.common_name = f"{device.owner.name}_{device.name}"
return result
@property
2022-03-31 16:32:07 +00:00
def easyrsa_args(self) -> list[str]:
"""
Pass this DN as arguments to easyrsa
"""
2022-03-31 16:32:07 +00:00
return [
"--dn-mode=org",
f"--req-c={self.country}",
f"--req-st={self.state}",
f"--req-city={self.city}",
f"--req-org={self.organization}",
f"--req-ou={self.organizational_unit}",
f"--req-email={self.email}",
f"--req-cn={self.common_name}",
2022-03-31 16:32:07 +00:00
]
2022-03-22 00:34:06 +00:00
2022-04-01 15:39:48 +00:00
class CertificateType(Enum):
"""
Possible types of certificates
"""
ca = auto()
client = auto()
server = auto()
def __str__(self) -> str:
return self._name_
2022-03-30 21:18:54 +00:00
class EasyRSA:
"""
Represents an EasyRSA PKI.
"""
@property
def output_directory(self) -> Path:
"""
Where certificates are stored
"""
2022-03-30 21:18:54 +00:00
return Settings._.data_dir.joinpath("pki")
@property
def ca_password(self) -> str:
"""
Get CA password from config, or generate a new one
"""
2022-03-30 21:18:54 +00:00
config = Config._
if (ca_password := config.crypto.ca_password) is None:
2022-03-31 23:15:49 +00:00
# generate and save new CA password
2022-03-30 21:18:54 +00:00
ca_password = pwd.genword(
length=32,
charset="ascii_62",
)
2022-03-22 00:34:06 +00:00
2022-03-30 21:18:54 +00:00
config.crypto.ca_password = ca_password
config.save()
2022-03-22 00:34:06 +00:00
2022-03-30 21:18:54 +00:00
return config.crypto.ca_password
2022-03-22 00:34:06 +00:00
def __easyrsa(
self,
*easyrsa_args: str,
) -> subprocess.CompletedProcess:
"""
Call the `easyrsa` executable
"""
2022-03-22 00:34:06 +00:00
return subprocess.run(
[
"easyrsa", "--batch",
f"--pki-dir={self.output_directory}",
2022-03-22 00:34:06 +00:00
*easyrsa_args,
],
stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL,
check=True,
)
def __build_cert(
self,
cert_filename: Path,
2022-03-30 22:27:17 +00:00
expiry_days: int | None,
2022-03-22 00:34:06 +00:00
*easyrsa_args: str,
) -> crypto.X509:
"""
Create an X.509 certificate
"""
2022-03-30 22:27:17 +00:00
config = Config._
2022-03-31 23:15:49 +00:00
# always include password options
2022-03-31 16:32:07 +00:00
extra_args: list[str] = [
f"--passout=pass:{self.ca_password}",
f"--passin=pass:{self.ca_password}",
2022-03-31 16:32:07 +00:00
]
2022-03-30 22:27:17 +00:00
2022-03-31 23:15:49 +00:00
# if given, include expiry option
2022-03-30 22:27:17 +00:00
if expiry_days is not None:
2022-03-31 16:32:07 +00:00
extra_args += [f"--days={expiry_days}"]
2022-03-30 22:27:17 +00:00
2022-03-31 23:15:49 +00:00
# if configured, include algorithm option
2022-03-31 16:59:14 +00:00
if (algorithm := config.crypto.key_algorithm) is not None:
args_map = {
KeyAlgorithm.rsa2048: [
"--use-algo=rsa", "--keysize=2048"
],
KeyAlgorithm.rsa2048: [
"--use-algo=rsa", "--keysize=2048"
],
KeyAlgorithm.secp256r1: [
"--use-algo=ec", "--curve=secp256r1"
],
KeyAlgorithm.secp384r1: [
"--use-algo=ec", "--curve=secp384r1"
],
KeyAlgorithm.ed25519: [
"--use-algo=ed", "--curve=ed25519"
]
}
if algorithm not in args_map:
raise ValueError(f"Unexpected algorithm: {algorithm}")
extra_args += args_map[algorithm]
2022-03-30 22:27:17 +00:00
2022-03-31 23:15:49 +00:00
# call easyrsa
2022-03-30 22:27:17 +00:00
self.__easyrsa(
*extra_args,
*easyrsa_args
)
2022-03-22 00:34:06 +00:00
2022-03-31 23:15:49 +00:00
# parse the new certificate
2022-03-22 00:34:06 +00:00
with open(
2022-03-31 16:32:07 +00:00
self.output_directory.joinpath(cert_filename), "rb"
2022-03-22 00:34:06 +00:00
) as cert_file:
return crypto.load_certificate(
crypto.FILETYPE_PEM, cert_file.read()
)
2022-03-31 16:32:07 +00:00
def init_pki(self) -> None:
"""
2022-03-31 23:15:49 +00:00
Clean working directory
"""
2022-03-22 00:34:06 +00:00
self.__easyrsa("init-pki")
2022-03-30 22:27:17 +00:00
def build_ca(self) -> crypto.X509:
"""
Build the CA certificate
"""
2022-03-30 21:18:54 +00:00
2022-03-24 23:27:35 +00:00
cert = self.__build_cert(
2022-03-22 00:34:06 +00:00
Path("ca.crt"),
Config._.crypto.ca_expiry_days,
2022-03-22 00:34:06 +00:00
2022-04-01 15:39:48 +00:00
"--dn-mode=cn_only",
"--req-cn=kiwi-vpn-ca",
2022-03-22 00:57:09 +00:00
2022-03-22 00:34:06 +00:00
"build-ca",
)
# # this takes long!
2022-03-30 21:18:54 +00:00
# self.__easyrsa("gen-dh")
2022-03-24 23:27:35 +00:00
return cert
2022-03-22 00:34:06 +00:00
def issue(
self,
2022-04-01 15:39:48 +00:00
cert_type: CertificateType = CertificateType.client,
dn: DistinguishedName = DistinguishedName.build(),
2022-04-01 15:39:48 +00:00
) -> crypto.X509 | None:
"""
Issue a client or server certificate
"""
2022-03-30 21:18:54 +00:00
2022-04-01 15:39:48 +00:00
if not (cert_type is CertificateType.client
or cert_type is CertificateType.server):
return None
2022-03-22 00:34:06 +00:00
return self.__build_cert(
Path(f"issued/{dn.common_name}.crt"),
Config._.crypto.cert_expiry_days,
2022-03-22 00:34:06 +00:00
*dn.easyrsa_args,
2022-03-22 00:34:06 +00:00
f"build-{cert_type}-full",
dn.common_name,
2022-03-22 00:34:06 +00:00
"nopass",
)
# some basic test
2022-03-22 00:34:06 +00:00
if __name__ == "__main__":
2022-03-30 21:18:54 +00:00
easy_rsa = EasyRSA()
2022-03-22 00:57:09 +00:00
easy_rsa.init_pki()
2022-03-22 00:34:06 +00:00
2022-03-30 21:18:54 +00:00
ca = easy_rsa.build_ca()
2022-04-01 15:39:48 +00:00
server = easy_rsa.issue(CertificateType.server)
2022-03-30 23:59:25 +00:00
client = None
# check if configured
2022-03-31 16:32:07 +00:00
if (current_config := Config.load()) is not None:
2022-03-30 23:59:25 +00:00
# connect to database
Connection.connect(current_config.db.uri)
if (device := Device.get(1)) is not None:
with Connection.session as db:
db.add(device)
dn = DistinguishedName.build(device)
2022-04-01 15:39:48 +00:00
client = easy_rsa.issue(dn=dn)
2022-03-22 00:34:06 +00:00
date_format, encoding = "%Y%m%d%H%M%SZ", "ascii"
2022-03-22 00:57:09 +00:00
2022-03-30 23:59:25 +00:00
for cert in (ca, server, client):
if cert is not None:
print(cert.get_subject().CN)
print(cert.get_signature_algorithm().decode(encoding))
2022-03-31 16:32:07 +00:00
assert (na := cert.get_notAfter()) is not None
print(datetime.strptime(na.decode(encoding), date_format))