kiwi-vpn/api/kiwi_vpn_api/easyrsa.py

398 lines
9.8 KiB
Python
Raw Normal View History

2022-03-30 21:18:54 +00:00
"""
Python interface to EasyRSA CA.
"""
from __future__ import annotations
2022-03-22 00:34:06 +00:00
import subprocess
2022-04-01 15:39:48 +00:00
from enum import Enum, auto
2022-03-22 00:34:06 +00:00
from pathlib import Path
2022-04-05 00:42:55 +00:00
from cryptography import x509
2022-03-22 00:34:06 +00:00
from passlib import pwd
from pydantic import BaseModel
2022-03-22 00:34:06 +00:00
2022-04-05 21:33:48 +00:00
from .config import SETTINGS, Config, KeyAlgorithm
2022-03-30 23:59:25 +00:00
from .db import Connection, Device
class DistinguishedName(BaseModel):
"""
An `X.509 distinguished name` (DN) as specified in RFC 5280
"""
country: str
state: str
city: str
organization: str
organizational_unit: str
2022-03-31 16:34:36 +00:00
email: str
common_name: str
@classmethod
def build(cls, device: Device | None = None) -> DistinguishedName:
"""
Create a DN from the current config and an optional device
"""
# extract server DN config
server_dn = Config._.server_dn
result = cls(
country=server_dn.country.value,
state=server_dn.state.value,
city=server_dn.city.value,
organization=server_dn.organization.value,
organizational_unit=server_dn.organizational_unit.value,
email=server_dn.email.value,
common_name=server_dn.common_name,
)
# no device specified -> done
if device is None:
return result
# don't override locked or empty fields
if not (server_dn.country.locked
or device.owner.country is None):
result.country = device.owner.country
if not (server_dn.state.locked
or device.owner.state is None):
result.state = device.owner.state
if not (server_dn.city.locked
or device.owner.city is None):
result.city = device.owner.city
if not (server_dn.organization.locked
or device.owner.organization is None):
result.organization = device.owner.organization
if not (server_dn.organizational_unit.locked
or device.owner.organizational_unit is None):
result.organizational_unit = device.owner.organizational_unit
# definitely use derived email and common_name
result.email = device.owner.email
result.common_name = f"{device.owner.name}_{device.name}"
return result
@property
2022-04-02 00:08:27 +00:00
def easyrsa_env(self) -> dict[str, str]:
"""
Pass this DN as arguments to easyrsa
"""
2022-04-02 00:08:27 +00:00
return {
"EASYRSA_DN": "org",
2022-04-02 00:08:27 +00:00
"EASYRSA_REQ_COUNTRY": self.country,
"EASYRSA_REQ_PROVINCE": self.state,
"EASYRSA_REQ_CITY": self.city,
"EASYRSA_REQ_ORG": self.organization,
"EASYRSA_REQ_OU": self.organizational_unit,
"EASYRSA_REQ_EMAIL": self.email,
"EASYRSA_REQ_CN": self.common_name,
}
2022-03-22 00:34:06 +00:00
2022-04-01 15:39:48 +00:00
class CertificateType(Enum):
"""
Possible types of certificates
"""
ca = auto()
client = auto()
server = auto()
def __str__(self) -> str:
return self._name_
2022-03-30 21:18:54 +00:00
class EasyRSA:
"""
Represents an EasyRSA PKI.
"""
2022-04-02 00:08:27 +00:00
__mapKeyAlgorithm = {
KeyAlgorithm.rsa2048: {
"EASYRSA_ALGO": "rsa",
"EASYRSA_KEY_SIZE": "2048",
},
KeyAlgorithm.rsa4096: {
"EASYRSA_ALGO": "rsa",
2022-04-02 00:44:27 +00:00
"EASYRSA_KEY_SIZE": "4096",
2022-04-02 00:08:27 +00:00
},
KeyAlgorithm.secp256r1: {
"EASYRSA_ALGO": "ec",
"EASYRSA_CURVE": "secp256r1",
},
KeyAlgorithm.secp384r1: {
"EASYRSA_ALGO": "ec",
"EASYRSA_CURVE": "secp384r1",
},
KeyAlgorithm.ed25519: {
"EASYRSA_ALGO": "ed",
"EASYRSA_CURVE": "ed25519",
},
None: {},
}
2022-03-30 21:18:54 +00:00
@property
def output_directory(self) -> Path:
"""
Where certificates are stored
"""
2022-04-05 21:33:48 +00:00
return SETTINGS.data_dir.joinpath("pki")
2022-03-30 21:18:54 +00:00
@property
def ca_password(self) -> str:
"""
Get CA password from config, or generate a new one
"""
2022-03-30 21:18:54 +00:00
config = Config._
if (ca_password := config.crypto.ca_password) is None:
2022-03-31 23:15:49 +00:00
# generate and save new CA password
2022-03-30 21:18:54 +00:00
ca_password = pwd.genword(
length=32,
charset="ascii_62",
)
2022-03-22 00:34:06 +00:00
2022-03-30 21:18:54 +00:00
config.crypto.ca_password = ca_password
config.save()
2022-03-22 00:34:06 +00:00
2022-04-02 00:44:35 +00:00
return ca_password
2022-03-22 00:34:06 +00:00
def __easyrsa(
self,
2022-04-02 00:08:27 +00:00
*easyrsa_cmd: str,
**easyrsa_env: str,
2022-03-22 00:34:06 +00:00
) -> subprocess.CompletedProcess:
"""
Call the `easyrsa` executable
"""
2022-03-22 00:34:06 +00:00
return subprocess.run(
[
2022-04-02 00:08:27 +00:00
"/usr/local/bin/easyrsa",
*easyrsa_cmd,
2022-03-22 00:34:06 +00:00
],
2022-04-02 00:08:27 +00:00
env={
2022-04-07 05:44:42 +00:00
# base settings
2022-04-02 00:08:27 +00:00
"EASYRSA_BATCH": "1",
"EASYRSA_PKI": str(self.output_directory),
2022-04-07 05:44:42 +00:00
# always include CA password
"EASYRSA_PASSOUT": f"pass:{self.ca_password}",
"EASYRSA_PASSIN": f"pass:{self.ca_password}",
# include env from parameters
2022-04-02 00:08:27 +00:00
**easyrsa_env,
},
2022-03-22 00:34:06 +00:00
stdout=subprocess.DEVNULL, stderr=subprocess.DEVNULL,
check=True,
)
def __build_cert(
self,
2022-04-02 00:08:27 +00:00
*easyrsa_cmd: str,
**easyrsa_env: str,
2022-04-07 09:43:58 +00:00
) -> None:
"""
Create an X.509 certificate
"""
2022-03-30 22:27:17 +00:00
config = Config._
2022-04-02 00:08:27 +00:00
if ((algorithm := config.crypto.key_algorithm)
not in EasyRSA.__mapKeyAlgorithm):
raise ValueError(f"Unexpected algorithm: {algorithm}")
# include expiry options
if (ca_expiry_days := config.crypto.ca_expiry_days) is not None:
easyrsa_env["EASYRSA_CA_EXPIRE"] = str(ca_expiry_days)
if (cert_expiry_days := config.crypto.cert_expiry_days) is not None:
easyrsa_env["EASYRSA_CERT_EXPIRE"] = str(cert_expiry_days)
2022-03-30 22:27:17 +00:00
2022-04-06 00:34:37 +00:00
try:
# call easyrsa
self.__easyrsa(
*easyrsa_cmd,
2022-04-02 00:08:27 +00:00
2022-04-06 00:34:37 +00:00
# include algorithm options
**EasyRSA.__mapKeyAlgorithm[algorithm],
**easyrsa_env,
2022-03-22 00:34:06 +00:00
)
2022-04-07 09:43:58 +00:00
except (subprocess.CalledProcessError):
# certificate couldn't be built
pass
return None
def get_certificate(
self,
cert_type: CertificateType | None,
dn: DistinguishedName | None = None,
) -> x509.Certificate | None:
if cert_type is CertificateType.ca:
cert_filename = self.output_directory.joinpath("ca.crt")
else:
if dn is None:
dn = DistinguishedName.build()
cert_filename = (self.output_directory.joinpath("issued")
.joinpath(f"{dn.common_name}.crt"))
try:
# parse the certificate
with open(cert_filename, "rb") as cert_file:
2022-04-06 00:34:37 +00:00
return x509.load_pem_x509_certificate(
cert_file.read()
)
2022-04-07 09:43:58 +00:00
except FileNotFoundError:
2022-04-06 00:34:37 +00:00
return None
2022-03-31 16:32:07 +00:00
def init_pki(self) -> None:
"""
2022-03-31 23:15:49 +00:00
Clean working directory
"""
2022-03-22 00:34:06 +00:00
self.__easyrsa("init-pki")
2022-04-05 00:42:55 +00:00
def build_ca(self) -> x509.Certificate:
"""
Build the CA certificate
"""
2022-03-30 21:18:54 +00:00
2022-04-07 09:43:58 +00:00
self.__build_cert(
2022-03-22 00:34:06 +00:00
"build-ca",
2022-04-02 00:08:27 +00:00
EASYRSA_DN="cn_only",
EASYRSA_REQ_CN="kiwi-vpn-ca",
2022-03-22 00:34:06 +00:00
)
2022-04-07 09:43:58 +00:00
cert = self.get_certificate(
cert_type=CertificateType.ca,
dn=None,
)
2022-04-06 00:34:37 +00:00
assert cert is not None
# # this takes long!
2022-03-30 21:18:54 +00:00
# self.__easyrsa("gen-dh")
2022-03-24 23:27:35 +00:00
return cert
2022-03-22 00:34:06 +00:00
def issue(
self,
2022-04-01 15:39:48 +00:00
cert_type: CertificateType = CertificateType.client,
dn: DistinguishedName | None = None,
2022-04-05 00:42:55 +00:00
) -> x509.Certificate | None:
"""
Issue a client or server certificate
"""
2022-03-30 21:18:54 +00:00
if dn is None:
dn = DistinguishedName.build()
2022-04-01 15:39:48 +00:00
if not (cert_type is CertificateType.client
or cert_type is CertificateType.server):
return None
2022-04-07 09:43:58 +00:00
self.__build_cert(
2022-03-22 00:34:06 +00:00
f"build-{cert_type}-full",
dn.common_name,
2022-03-22 00:34:06 +00:00
"nopass",
2022-04-02 00:08:27 +00:00
**dn.easyrsa_env,
2022-03-22 00:34:06 +00:00
)
2022-04-07 09:43:58 +00:00
return self.get_certificate(
cert_type=cert_type,
dn=dn,
)
2022-04-06 00:34:37 +00:00
def renew(
self,
dn: DistinguishedName | None = None,
) -> x509.Certificate | None:
"""
2022-04-07 06:23:09 +00:00
Renew a client or server certificate
2022-04-06 00:34:37 +00:00
"""
if dn is None:
dn = DistinguishedName.build()
2022-04-07 09:43:58 +00:00
self.__build_cert(
2022-04-06 00:34:37 +00:00
"renew",
dn.common_name,
"nopass",
2022-04-07 06:22:24 +00:00
# allow renewal 14 days before cert expiry
EASYRSA_CERT_RENEW="14",
2022-04-06 00:34:37 +00:00
**dn.easyrsa_env,
)
2022-04-07 09:43:58 +00:00
return self.get_certificate(
cert_type=None,
dn=dn,
)
2022-04-07 05:44:42 +00:00
def revoke(
self,
dn: DistinguishedName | None = None,
) -> bool:
"""
Revoke a client or server certificate
"""
if dn is None:
dn = DistinguishedName.build()
try:
self.__easyrsa(
"revoke",
dn.common_name,
**dn.easyrsa_env,
)
except subprocess.CalledProcessError:
return False
return True
2022-03-22 00:34:06 +00:00
2022-04-05 22:39:09 +00:00
EASYRSA = EasyRSA()
# some basic test
2022-03-22 00:34:06 +00:00
if __name__ == "__main__":
2022-04-05 22:39:09 +00:00
ca = EASYRSA.build_ca()
server = EASYRSA.issue(CertificateType.server)
2022-03-30 23:59:25 +00:00
client = None
# check if configured
2022-03-31 16:32:07 +00:00
if (current_config := Config.load()) is not None:
2022-03-30 23:59:25 +00:00
# connect to database
Connection.connect(current_config.db.uri)
if (device := Device.get(1)) is not None:
2022-04-05 22:39:09 +00:00
client = EASYRSA.issue(
2022-04-05 01:26:48 +00:00
dn=DistinguishedName.build(device)
)
2022-03-22 00:34:06 +00:00
2022-03-30 23:59:25 +00:00
for cert in (ca, server, client):
if cert is not None:
2022-04-05 00:42:55 +00:00
print(cert.subject)
print(cert.signature_hash_algorithm)
print(cert.not_valid_after)