225 lines
5.2 KiB
Python
225 lines
5.2 KiB
Python
from cryptography import x509
|
|
from flask import current_app
|
|
from lemur.constants import SAN_NAMING_TEMPLATE, DEFAULT_NAMING_TEMPLATE
|
|
|
|
|
|
def certificate_name(common_name, issuer, not_before, not_after, san):
|
|
"""
|
|
Create a name for our certificate. A naming standard
|
|
is based on a series of templates. The name includes
|
|
useful information such as Common Name, Validation dates,
|
|
and Issuer.
|
|
|
|
:param san:
|
|
:param common_name:
|
|
:param not_after:
|
|
:param issuer:
|
|
:param not_before:
|
|
:rtype: str
|
|
:return:
|
|
"""
|
|
if san:
|
|
t = SAN_NAMING_TEMPLATE
|
|
else:
|
|
t = DEFAULT_NAMING_TEMPLATE
|
|
|
|
temp = t.format(
|
|
subject=common_name,
|
|
issuer=issuer,
|
|
not_before=not_before.strftime('%Y%m%d'),
|
|
not_after=not_after.strftime('%Y%m%d')
|
|
)
|
|
|
|
disallowed_chars = ''.join(c for c in map(chr, range(256)) if not c.isalnum())
|
|
disallowed_chars = disallowed_chars.replace("-", "")
|
|
disallowed_chars = disallowed_chars.replace(".", "")
|
|
temp = temp.replace('*', "WILDCARD")
|
|
|
|
for c in disallowed_chars:
|
|
temp = temp.replace(c, "")
|
|
|
|
# white space is silly too
|
|
return temp.replace(" ", "-")
|
|
|
|
|
|
def signing_algorithm(cert):
|
|
return cert.signature_hash_algorithm.name
|
|
|
|
|
|
def common_name(cert):
|
|
"""
|
|
Attempts to get a sane common name from a given certificate.
|
|
|
|
:param cert:
|
|
:return: Common name or None
|
|
"""
|
|
return cert.subject.get_attributes_for_oid(
|
|
x509.OID_COMMON_NAME
|
|
)[0].value.strip()
|
|
|
|
|
|
def organization(cert):
|
|
"""
|
|
Attempt to get the organization name from a given certificate.
|
|
:param cert:
|
|
:return:
|
|
"""
|
|
return cert.subject.get_attributes_for_oid(
|
|
x509.OID_ORGANIZATION_NAME
|
|
)[0].value.strip()
|
|
|
|
|
|
def organizational_unit(cert):
|
|
"""
|
|
Attempt to get the organization unit from a given certificate.
|
|
:param cert:
|
|
:return:
|
|
"""
|
|
return cert.subject.get_attributes_for_oid(
|
|
x509.OID_ORGANIZATIONAL_UNIT_NAME
|
|
)[0].value.strip()
|
|
|
|
|
|
def country(cert):
|
|
"""
|
|
Attempt to get the country from a given certificate.
|
|
:param cert:
|
|
:return:
|
|
"""
|
|
return cert.subject.get_attributes_for_oid(
|
|
x509.OID_COUNTRY_NAME
|
|
)[0].value.strip()
|
|
|
|
|
|
def state(cert):
|
|
"""
|
|
Attempt to get the from a given certificate.
|
|
:param cert:
|
|
:return:
|
|
"""
|
|
return cert.subject.get_attributes_for_oid(
|
|
x509.OID_STATE_OR_PROVINCE_NAME
|
|
)[0].value.strip()
|
|
|
|
|
|
def location(cert):
|
|
"""
|
|
Attempt to get the location name from a given certificate.
|
|
:param cert:
|
|
:return:
|
|
"""
|
|
return cert.subject.get_attributes_for_oid(
|
|
x509.OID_LOCALITY_NAME
|
|
)[0].value.strip()
|
|
|
|
|
|
def domains(cert):
|
|
"""
|
|
Attempts to get an domains listed in a certificate.
|
|
If 'subjectAltName' extension is not available we simply
|
|
return the common name.
|
|
|
|
:param cert:
|
|
:return: List of domains
|
|
"""
|
|
domains = []
|
|
try:
|
|
ext = cert.extensions.get_extension_for_oid(x509.OID_SUBJECT_ALTERNATIVE_NAME)
|
|
entries = ext.value.get_values_for_type(x509.DNSName)
|
|
for entry in entries:
|
|
domains.append(entry)
|
|
except Exception as e:
|
|
current_app.logger.warning("Failed to get SubjectAltName: {0}".format(e))
|
|
|
|
return domains
|
|
|
|
|
|
def serial(cert):
|
|
"""
|
|
Fetch the serial number from the certificate.
|
|
|
|
:param cert:
|
|
:return: serial number
|
|
"""
|
|
return cert.serial
|
|
|
|
|
|
def san(cert):
|
|
"""
|
|
Determines if a given certificate is a SAN certificate.
|
|
SAN certificates are simply certificates that cover multiple domains.
|
|
|
|
:param cert:
|
|
:return: Bool
|
|
"""
|
|
if len(domains(cert)) > 1:
|
|
return True
|
|
|
|
|
|
def is_wildcard(cert):
|
|
"""
|
|
Determines if certificate is a wildcard certificate.
|
|
|
|
:param cert:
|
|
:return: Bool
|
|
"""
|
|
d = domains(cert)
|
|
if len(d) == 1 and d[0][0:1] == "*":
|
|
return True
|
|
|
|
if cert.subject.get_attributes_for_oid(x509.OID_COMMON_NAME)[0].value[0:1] == "*":
|
|
return True
|
|
|
|
|
|
def bitstrength(cert):
|
|
"""
|
|
Calculates a certificates public key bit length.
|
|
|
|
:param cert:
|
|
:return: Integer
|
|
"""
|
|
try:
|
|
return cert.public_key().key_size
|
|
except AttributeError:
|
|
current_app.logger.debug('Unable to get bitstrength.')
|
|
|
|
|
|
def issuer(cert):
|
|
"""
|
|
Gets a sane issuer from a given certificate.
|
|
|
|
:param cert:
|
|
:return: Issuer
|
|
"""
|
|
delchars = ''.join(c for c in map(chr, range(256)) if not c.isalnum())
|
|
try:
|
|
issuer = str(cert.issuer.get_attributes_for_oid(x509.OID_ORGANIZATION_NAME)[0].value)
|
|
for c in delchars:
|
|
issuer = issuer.replace(c, "")
|
|
return issuer
|
|
except Exception as e:
|
|
current_app.logger.error("Unable to get issuer! {0}".format(e))
|
|
|
|
|
|
def not_before(cert):
|
|
"""
|
|
Gets the naive datetime of the certificates 'not_before' field.
|
|
This field denotes the first date in time which the given certificate
|
|
is valid.
|
|
|
|
:param cert:
|
|
:return: Datetime
|
|
"""
|
|
return cert.not_valid_before
|
|
|
|
|
|
def not_after(cert):
|
|
"""
|
|
Gets the naive datetime of the certificates 'not_after' field.
|
|
This field denotes the last date in time which the given certificate
|
|
is valid.
|
|
|
|
:return: Datetime
|
|
"""
|
|
return cert.not_valid_after
|