""" .. module: service :platform: Unix :copyright: (c) 2015 by Netflix Inc., see AUTHORS for more :license: Apache, see LICENSE for more details. .. moduleauthor:: Kevin Glisson """ import arrow from sqlalchemy import func, or_ from flask import g, current_app from lemur import database from lemur.extensions import metrics from lemur.plugins.base import plugins from lemur.certificates.models import Certificate from lemur.destinations.models import Destination from lemur.notifications.models import Notification from lemur.authorities.models import Authority from lemur.domains.models import Domain from lemur.roles.models import Role from lemur.roles import service as role_service from cryptography import x509 from cryptography.hazmat.backends import default_backend from cryptography.hazmat.primitives import hashes, serialization from cryptography.hazmat.primitives.asymmetric import rsa def get(cert_id): """ Retrieves certificate by it's ID. :param cert_id: :return: """ return database.get(Certificate, cert_id) def get_by_name(name): """ Retrieves certificate by it's Name. :param name: :return: """ return database.get(Certificate, name, field='name') def delete(cert_id): """ Delete's a certificate. :param cert_id: """ database.delete(get(cert_id)) def get_all_certs(): """ Retrieves all certificates within Lemur. :return: """ return Certificate.query.all() def find_duplicates(cert_body): """ Finds certificates that already exist within Lemur. We do this by looking for certificate bodies that are the same. This is the most reliable way to determine if a certificate is already being tracked by Lemur. :param cert_body: :return: """ return Certificate.query.filter_by(body=cert_body).all() def export(cert, export_plugin): """ Exports a certificate to the requested format. This format may be a binary format. :param export_plugin: :param cert: :return: """ plugin = plugins.get(export_plugin['slug']) return plugin.export(cert.body, cert.chain, cert.private_key, export_plugin['pluginOptions']) def update(cert_id, owner, description, active, destinations, notifications, replaces, roles): """ Updates a certificate :param cert_id: :param owner: :param description: :param active: :param destinations: :param notifications: :param replaces: :return: """ cert = get(cert_id) cert.active = active cert.description = description cert.destinations = destinations cert.notifications = notifications cert.roles = roles cert.replaces = replaces cert.owner = owner return database.update(cert) def create_certificate_roles(**kwargs): # create an role for the owner and assign it owner_role = role_service.get_by_name(kwargs['owner']) if not owner_role: owner_role = role_service.create( kwargs['owner'], description="Auto generated role based on owner: {0}".format(kwargs['owner']) ) if kwargs.get('roles'): kwargs['roles'].append(owner_role) return kwargs def mint(**kwargs): """ Minting is slightly different for each authority. Support for multiple authorities is handled by individual plugins. """ authority = kwargs['authority'] issuer = plugins.get(authority.plugin_name) # allow the CSR to be specified by the user if not kwargs.get('csr'): csr, private_key = create_csr(**kwargs) else: csr = str(kwargs.get('csr')) private_key = None cert_body, cert_chain = issuer.create_certificate(csr, kwargs) return cert_body, private_key, cert_chain, def import_certificate(**kwargs): """ Uploads already minted certificates and pulls the required information into Lemur. This is to be used for certificates that are created outside of Lemur but should still be tracked. Internally this is used to bootstrap Lemur with external certificates, and used when certificates are 'discovered' through various discovery techniques. was still in aws. :param kwargs: """ from lemur.users import service as user_service if not kwargs.get('owner'): kwargs['owner'] = current_app.config.get('LEMUR_SECURITY_TEAM_EMAIL')[0] if not kwargs.get('creator'): kwargs['creator'] = user_service.get_by_email('lemur@nobody') return upload(**kwargs) def upload(**kwargs): """ Allows for pre-made certificates to be imported into Lemur. """ kwargs = create_certificate_roles(**kwargs) cert = Certificate(**kwargs) # we override the generated name if one is provided if kwargs.get('name'): cert.name = kwargs['name'] cert = database.create(cert) g.user.certificates.append(cert) database.update(cert) return cert def create(**kwargs): """ Creates a new certificate. """ kwargs['creator'] = g.user.email cert_body, private_key, cert_chain = mint(**kwargs) kwargs['body'] = cert_body kwargs['private_key'] = private_key kwargs['chain'] = cert_chain kwargs = create_certificate_roles(**kwargs) cert = Certificate(**kwargs) # we override the generated name if one is provided if kwargs.get('name'): cert.name = kwargs['name'] g.user.certificates.append(cert) database.commit() metrics.send('certificate_issued', 'counter', 1, metric_tags=dict(owner=cert.owner, issuer=cert.issuer)) return cert def render(args): """ Helper function that allows use to render our REST Api. :param args: :return: """ query = database.session_query(Certificate) time_range = args.pop('time_range') destination_id = args.pop('destination_id') notification_id = args.pop('notification_id', None) show = args.pop('show') # owner = args.pop('owner') # creator = args.pop('creator') # TODO we should enabling filtering by owner filt = args.pop('filter') if filt: terms = filt.split(';') if 'issuer' in terms: # we can't rely on issuer being correct in the cert directly so we combine queries sub_query = database.session_query(Authority.id)\ .filter(Authority.name.ilike('%{0}%'.format(terms[1])))\ .subquery() query = query.filter( or_( Certificate.issuer.ilike('%{0}%'.format(terms[1])), Certificate.authority_id.in_(sub_query) ) ) return database.sort_and_page(query, Certificate, args) elif 'destination' in terms: query = query.filter(Certificate.destinations.any(Destination.id == terms[1])) elif 'active' in filt: # this is really weird but strcmp seems to not work here?? query = query.filter(Certificate.active == terms[1]) elif 'cn' in terms: query = query.filter( or_( Certificate.cn.ilike('%{0}%'.format(terms[1])), Certificate.domains.any(Domain.name.ilike('%{0}%'.format(terms[1]))) ) ) else: query = database.filter(query, Certificate, terms) if show: sub_query = database.session_query(Role.name).filter(Role.user_id == g.user.id).subquery() query = query.filter( or_( Certificate.user_id == g.user.id, Certificate.owner.in_(sub_query) ) ) if destination_id: query = query.filter(Certificate.destinations.any(Destination.id == destination_id)) if notification_id: query = query.filter(Certificate.notifications.any(Notification.id == notification_id)) if time_range: to = arrow.now().replace(weeks=+time_range).format('YYYY-MM-DD') now = arrow.now().format('YYYY-MM-DD') query = query.filter(Certificate.not_after <= to).filter(Certificate.not_after >= now) return database.sort_and_page(query, Certificate, args) def create_csr(**csr_config): """ Given a list of domains create the appropriate csr for those domains :param csr_config: """ private_key = rsa.generate_private_key( public_exponent=65537, key_size=2048, backend=default_backend() ) # TODO When we figure out a better way to validate these options they should be parsed as str builder = x509.CertificateSigningRequestBuilder() builder = builder.subject_name(x509.Name([ x509.NameAttribute(x509.OID_COMMON_NAME, csr_config['common_name']), x509.NameAttribute(x509.OID_ORGANIZATION_NAME, csr_config['organization']), x509.NameAttribute(x509.OID_ORGANIZATIONAL_UNIT_NAME, csr_config['organizational_unit']), x509.NameAttribute(x509.OID_COUNTRY_NAME, csr_config['country']), x509.NameAttribute(x509.OID_STATE_OR_PROVINCE_NAME, csr_config['state']), x509.NameAttribute(x509.OID_LOCALITY_NAME, csr_config['location']), ])) builder = builder.add_extension( x509.BasicConstraints(ca=False, path_length=None), critical=True, ) if csr_config.get('extensions'): for k, v in csr_config.get('extensions', {}).items(): if k == 'sub_alt_names': # map types to their x509 objects general_names = [] for name in v['names']: if name['name_type'] == 'DNSName': general_names.append(x509.DNSName(name['value'])) builder = builder.add_extension( x509.SubjectAlternativeName(general_names), critical=True ) # TODO support more CSR options, none of the authority plugins currently support these options # builder.add_extension( # x509.KeyUsage( # digital_signature=digital_signature, # content_commitment=content_commitment, # key_encipherment=key_enipherment, # data_encipherment=data_encipherment, # key_agreement=key_agreement, # key_cert_sign=key_cert_sign, # crl_sign=crl_sign, # encipher_only=enchipher_only, # decipher_only=decipher_only # ), critical=True # ) # # # we must maintain our own list of OIDs here # builder.add_extension( # x509.ExtendedKeyUsage( # server_authentication=server_authentication, # email= # ) # ) # # builder.add_extension( # x509.AuthorityInformationAccess() # ) # # builder.add_extension( # x509.AuthorityKeyIdentifier() # ) # # builder.add_extension( # x509.SubjectKeyIdentifier() # ) # # builder.add_extension( # x509.CRLDistributionPoints() # ) # # builder.add_extension( # x509.ObjectIdentifier(oid) # ) request = builder.sign( private_key, hashes.SHA256(), default_backend() ) # serialize our private key and CSR private_key = private_key.private_bytes( encoding=serialization.Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL, # would like to use PKCS8 but AWS ELBs don't like it encryption_algorithm=serialization.NoEncryption() ) csr = request.public_bytes( encoding=serialization.Encoding.PEM ) return csr, private_key def stats(**kwargs): """ Helper that defines some useful statistics about certifications. :param kwargs: :return: """ if kwargs.get('metric') == 'not_after': start = arrow.utcnow() end = start.replace(weeks=+32) items = database.db.session.query(Certificate.issuer, func.count(Certificate.id))\ .group_by(Certificate.issuer)\ .filter(Certificate.not_after <= end.format('YYYY-MM-DD')) \ .filter(Certificate.not_after >= start.format('YYYY-MM-DD')).all() else: attr = getattr(Certificate, kwargs.get('metric')) query = database.db.session.query(attr, func.count(attr)) items = query.group_by(attr).all() keys = [] values = [] for key, count in items: keys.append(key) values.append(count) return {'labels': keys, 'values': values} def get_account_number(arn): """ Extract the account number from an arn. :param arn: IAM SSL arn :return: account number associated with ARN """ return arn.split(":")[4] def get_name_from_arn(arn): """ Extract the certificate name from an arn. :param arn: IAM SSL arn :return: name of the certificate as uploaded to AWS """ return arn.split("/", 1)[1]