2015-06-22 22:47:27 +02:00
|
|
|
"""
|
|
|
|
.. module: lemur.authorities.views
|
|
|
|
:platform: Unix
|
|
|
|
:copyright: (c) 2015 by Netflix Inc., see AUTHORS for more
|
|
|
|
:license: Apache, see LICENSE for more details.
|
|
|
|
.. moduleauthor:: Kevin Glisson <kglisson@netflix.com>
|
|
|
|
"""
|
2016-05-20 21:48:12 +02:00
|
|
|
from flask import Blueprint
|
2016-05-09 20:00:16 +02:00
|
|
|
from flask.ext.restful import reqparse, Api
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
from lemur.common.utils import paginated_parser
|
|
|
|
from lemur.common.schema import validate_schema
|
2015-06-22 22:47:27 +02:00
|
|
|
from lemur.auth.service import AuthenticatedResource
|
|
|
|
from lemur.auth.permissions import AuthorityPermission
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
from lemur.certificates import service as certificate_service
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
from lemur.authorities import service
|
2016-05-16 18:23:48 +02:00
|
|
|
from lemur.authorities.schemas import authority_input_schema, authority_output_schema, authorities_output_schema, authority_update_schema
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
mod = Blueprint('authorities', __name__)
|
|
|
|
api = Api(mod)
|
|
|
|
|
|
|
|
|
|
|
|
class AuthoritiesList(AuthenticatedResource):
|
|
|
|
""" Defines the 'authorities' endpoint """
|
|
|
|
def __init__(self):
|
|
|
|
self.reqparse = reqparse.RequestParser()
|
|
|
|
super(AuthoritiesList, self).__init__()
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(None, authorities_output_schema)
|
2015-06-22 22:47:27 +02:00
|
|
|
def get(self):
|
|
|
|
"""
|
|
|
|
.. http:get:: /authorities
|
|
|
|
|
|
|
|
The current list of authorities
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
GET /authorities HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"items": [
|
|
|
|
{
|
|
|
|
"id": 1,
|
|
|
|
"name": "authority1",
|
|
|
|
"description": "this is authority1",
|
|
|
|
"pluginName": null,
|
|
|
|
"chain": "-----Begin ...",
|
|
|
|
"body": "-----Begin ...",
|
|
|
|
"active": true,
|
|
|
|
"notBefore": "2015-06-05T17:09:39",
|
|
|
|
"notAfter": "2015-06-10T17:09:39"
|
|
|
|
"options": null
|
|
|
|
}
|
|
|
|
]
|
|
|
|
"total": 1
|
|
|
|
}
|
|
|
|
|
|
|
|
:query sortBy: field to sort on
|
|
|
|
:query sortDir: acs or desc
|
2016-01-29 20:47:16 +01:00
|
|
|
:query page: int default is 1
|
|
|
|
:query filter: key value pair. format is k;v
|
|
|
|
:query limit: limit number default is 10
|
2015-06-22 22:47:27 +02:00
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
|
|
|
|
:note: this will only show certificates that the current user is authorized to use
|
|
|
|
"""
|
|
|
|
parser = paginated_parser.copy()
|
|
|
|
args = parser.parse_args()
|
|
|
|
return service.render(args)
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(authority_input_schema, authority_output_schema)
|
|
|
|
def post(self, data=None):
|
2015-06-22 22:47:27 +02:00
|
|
|
"""
|
|
|
|
.. http:post:: /authorities
|
|
|
|
|
|
|
|
Create an authority
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
POST /authorities HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"caDN": {
|
|
|
|
"country": "US",
|
|
|
|
"state": "CA",
|
|
|
|
"location": "A Location",
|
|
|
|
"organization": "ExampleInc",
|
|
|
|
"organizationalUnit": "Operations",
|
|
|
|
"commonName": "a common name"
|
|
|
|
},
|
|
|
|
"caType": "root",
|
|
|
|
"caSigningAlgo": "sha256WithRSA",
|
|
|
|
"caSensitivity": "medium",
|
|
|
|
"keyType": "RSA2048",
|
|
|
|
"pluginName": "cloudca",
|
|
|
|
"validityStart": "2015-06-11T07:00:00.000Z",
|
|
|
|
"validityEnd": "2015-06-13T07:00:00.000Z",
|
|
|
|
"caName": "DoctestCA",
|
|
|
|
"ownerEmail": "jimbob@example.com",
|
|
|
|
"caDescription": "Example CA",
|
|
|
|
"extensions": {
|
|
|
|
"subAltNames": {
|
|
|
|
"names": []
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"id": 1,
|
|
|
|
"name": "authority1",
|
|
|
|
"description": "this is authority1",
|
|
|
|
"pluginName": null,
|
|
|
|
"chain": "-----Begin ...",
|
|
|
|
"body": "-----Begin ...",
|
|
|
|
"active": true,
|
|
|
|
"notBefore": "2015-06-05T17:09:39",
|
|
|
|
"notAfter": "2015-06-10T17:09:39"
|
|
|
|
"options": null
|
|
|
|
}
|
|
|
|
|
|
|
|
:arg caName: authority's name
|
|
|
|
:arg caDescription: a sensible description about what the CA with be used for
|
|
|
|
:arg ownerEmail: the team or person who 'owns' this authority
|
|
|
|
:arg validityStart: when this authority should start issuing certificates
|
|
|
|
:arg validityEnd: when this authority should stop issuing certificates
|
|
|
|
:arg extensions: certificate extensions
|
|
|
|
:arg pluginName: name of the plugin to create the authority
|
|
|
|
:arg caType: the type of authority (root/subca)
|
|
|
|
:arg caParent: the parent authority if this is to be a subca
|
|
|
|
:arg caSigningAlgo: algorithm used to sign the authority
|
|
|
|
:arg keyType: key type
|
|
|
|
:arg caSensitivity: the sensitivity of the root key, for CloudCA this determines if the root keys are stored
|
|
|
|
in an HSM
|
|
|
|
:arg caKeyName: name of the key to store in the HSM (CloudCA)
|
|
|
|
:arg caSerialNumber: serial number of the authority
|
|
|
|
:arg caFirstSerial: specifies the starting serial number for certificates issued off of this authority
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
:statuscode 200: no error
|
|
|
|
"""
|
2016-05-09 20:00:16 +02:00
|
|
|
return service.create(data)
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
class Authorities(AuthenticatedResource):
|
|
|
|
def __init__(self):
|
|
|
|
self.reqparse = reqparse.RequestParser()
|
|
|
|
super(Authorities, self).__init__()
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(None, authority_output_schema)
|
2015-06-22 22:47:27 +02:00
|
|
|
def get(self, authority_id):
|
|
|
|
"""
|
|
|
|
.. http:get:: /authorities/1
|
|
|
|
|
|
|
|
One authority
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
GET /authorities/1 HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"id": 1,
|
|
|
|
"name": "authority1",
|
|
|
|
"description": "this is authority1",
|
|
|
|
"pluginName": null,
|
|
|
|
"chain": "-----Begin ...",
|
|
|
|
"body": "-----Begin ...",
|
|
|
|
"active": true,
|
|
|
|
"notBefore": "2015-06-05T17:09:39",
|
|
|
|
"notAfter": "2015-06-10T17:09:39"
|
|
|
|
"options": null
|
|
|
|
}
|
|
|
|
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
"""
|
|
|
|
return service.get(authority_id)
|
|
|
|
|
2016-05-16 18:23:48 +02:00
|
|
|
@validate_schema(authority_update_schema, authority_output_schema)
|
2016-05-09 20:00:16 +02:00
|
|
|
def put(self, authority_id, data=None):
|
2015-06-22 22:47:27 +02:00
|
|
|
"""
|
|
|
|
.. http:put:: /authorities/1
|
|
|
|
|
|
|
|
Update a authority
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
PUT /authorities/1 HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"roles": [],
|
2015-09-01 23:05:32 +02:00
|
|
|
"active": false,
|
|
|
|
"owner": "bob@example.com",
|
|
|
|
"description": "this is authority1"
|
2015-06-22 22:47:27 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"id": 1,
|
|
|
|
"name": "authority1",
|
|
|
|
"description": "this is authority1",
|
2015-09-01 23:05:32 +02:00
|
|
|
"pluginName": null,
|
2015-06-22 22:47:27 +02:00
|
|
|
"chain": "-----begin ...",
|
|
|
|
"body": "-----begin ...",
|
|
|
|
"active": false,
|
2015-09-01 23:05:32 +02:00
|
|
|
"notBefore": "2015-06-05t17:09:39",
|
|
|
|
"notAfter": "2015-06-10t17:09:39"
|
2015-06-22 22:47:27 +02:00
|
|
|
"options": null
|
|
|
|
}
|
|
|
|
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
"""
|
|
|
|
authority = service.get(authority_id)
|
2016-05-16 18:23:48 +02:00
|
|
|
|
|
|
|
if not authority:
|
|
|
|
return dict(message='Not Found'), 404
|
|
|
|
|
2015-06-22 22:47:27 +02:00
|
|
|
# all the authority role members should be allowed
|
|
|
|
roles = [x.name for x in authority.roles]
|
|
|
|
permission = AuthorityPermission(authority_id, roles)
|
|
|
|
|
2016-05-19 22:37:05 +02:00
|
|
|
if permission.can():
|
2015-09-01 23:05:32 +02:00
|
|
|
return service.update(
|
|
|
|
authority_id,
|
2016-05-09 20:00:16 +02:00
|
|
|
owner=data['owner'],
|
|
|
|
description=data['description'],
|
|
|
|
active=data['active'],
|
|
|
|
roles=data['roles']
|
2015-09-01 23:05:32 +02:00
|
|
|
)
|
2015-06-22 22:47:27 +02:00
|
|
|
|
2016-05-19 22:37:05 +02:00
|
|
|
return dict(message="You are not authorized to update this authority."), 403
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
class CertificateAuthority(AuthenticatedResource):
|
|
|
|
def __init__(self):
|
|
|
|
super(CertificateAuthority, self).__init__()
|
|
|
|
|
2016-05-09 20:00:16 +02:00
|
|
|
@validate_schema(None, authority_output_schema)
|
2015-06-22 22:47:27 +02:00
|
|
|
def get(self, certificate_id):
|
|
|
|
"""
|
|
|
|
.. http:get:: /certificates/1/authority
|
|
|
|
|
|
|
|
One authority for given certificate
|
|
|
|
|
|
|
|
**Example request**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
GET /certificates/1/authority HTTP/1.1
|
|
|
|
Host: example.com
|
|
|
|
Accept: application/json, text/javascript
|
|
|
|
|
|
|
|
**Example response**:
|
|
|
|
|
|
|
|
.. sourcecode:: http
|
|
|
|
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Vary: Accept
|
|
|
|
Content-Type: text/javascript
|
|
|
|
|
|
|
|
{
|
|
|
|
"id": 1,
|
|
|
|
"name": "authority1",
|
|
|
|
"description": "this is authority1",
|
|
|
|
"pluginName": null,
|
|
|
|
"chain": "-----Begin ...",
|
|
|
|
"body": "-----Begin ...",
|
|
|
|
"active": true,
|
|
|
|
"notBefore": "2015-06-05T17:09:39",
|
|
|
|
"notAfter": "2015-06-10T17:09:39"
|
|
|
|
"options": null
|
|
|
|
}
|
|
|
|
|
|
|
|
:reqheader Authorization: OAuth token to authenticate
|
|
|
|
:statuscode 200: no error
|
|
|
|
:statuscode 403: unauthenticated
|
|
|
|
"""
|
2015-06-29 21:36:27 +02:00
|
|
|
cert = certificate_service.get(certificate_id)
|
|
|
|
if not cert:
|
2016-05-19 22:37:05 +02:00
|
|
|
return dict(message="Certificate not found."), 404
|
2015-06-29 21:36:27 +02:00
|
|
|
|
|
|
|
return cert.authority
|
2015-06-22 22:47:27 +02:00
|
|
|
|
|
|
|
api.add_resource(AuthoritiesList, '/authorities', endpoint='authorities')
|
|
|
|
api.add_resource(Authorities, '/authorities/<int:authority_id>', endpoint='authority')
|
|
|
|
api.add_resource(CertificateAuthority, '/certificates/<int:certificate_id>/authority', endpoint='certificateAuthority')
|