2016-10-20 07:10:40 +03:00
|
|
|
# Copyright (c) Microsoft Corporation
|
|
|
|
#
|
|
|
|
# All rights reserved.
|
|
|
|
#
|
|
|
|
# MIT License
|
|
|
|
#
|
|
|
|
# Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
# copy of this software and associated documentation files (the "Software"),
|
|
|
|
# to deal in the Software without restriction, including without limitation
|
|
|
|
# the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
|
|
# and/or sell copies of the Software, and to permit persons to whom the
|
|
|
|
# Software is furnished to do so, subject to the following conditions:
|
|
|
|
#
|
|
|
|
# The above copyright notice and this permission notice shall be included in
|
|
|
|
# all copies or substantial portions of the Software.
|
|
|
|
#
|
|
|
|
# THE SOFTWARE IS PROVIDED *AS IS*, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
|
|
# FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
|
|
|
|
# DEALINGS IN THE SOFTWARE.
|
|
|
|
|
2016-10-31 18:45:05 +03:00
|
|
|
# compat imports
|
|
|
|
from __future__ import (
|
|
|
|
absolute_import, division, print_function, unicode_literals
|
|
|
|
)
|
2016-11-03 18:03:55 +03:00
|
|
|
from builtins import ( # noqa
|
|
|
|
bytes, dict, int, list, object, range, str, ascii, chr, hex, input,
|
|
|
|
next, oct, open, pow, round, super, filter, map, zip)
|
2016-10-20 07:10:40 +03:00
|
|
|
# stdlib imports
|
2016-11-11 20:19:04 +03:00
|
|
|
import collections
|
2016-10-20 07:10:40 +03:00
|
|
|
import getpass
|
|
|
|
import logging
|
2016-10-26 06:53:09 +03:00
|
|
|
try:
|
|
|
|
import pathlib2 as pathlib
|
2016-11-05 01:00:11 +03:00
|
|
|
except ImportError:
|
|
|
|
import pathlib
|
2016-10-20 07:10:40 +03:00
|
|
|
import tempfile
|
|
|
|
import subprocess
|
|
|
|
# local imports
|
2016-11-11 20:19:04 +03:00
|
|
|
from . import settings
|
2016-11-01 06:49:24 +03:00
|
|
|
from . import util
|
2016-10-20 07:10:40 +03:00
|
|
|
|
|
|
|
# create logger
|
|
|
|
logger = logging.getLogger(__name__)
|
2016-11-01 06:49:24 +03:00
|
|
|
util.setup_logger(logger)
|
2016-10-20 07:10:40 +03:00
|
|
|
# global defines
|
|
|
|
_SSH_KEY_PREFIX = 'id_rsa_shipyard'
|
2016-11-11 20:19:04 +03:00
|
|
|
# named tuples
|
|
|
|
PfxSettings = collections.namedtuple(
|
|
|
|
'PfxSettings', ['filename', 'passphrase', 'sha1'])
|
2016-10-20 07:10:40 +03:00
|
|
|
|
|
|
|
|
|
|
|
def get_ssh_key_prefix():
|
|
|
|
# type: (None) -> str
|
|
|
|
"""Get SSH key prefix
|
|
|
|
:rtype: str
|
|
|
|
:return: ssh key prefix
|
|
|
|
"""
|
|
|
|
return _SSH_KEY_PREFIX
|
|
|
|
|
|
|
|
|
2016-10-26 06:53:09 +03:00
|
|
|
def generate_ssh_keypair(export_path):
|
2016-10-20 07:10:40 +03:00
|
|
|
# type: (str) -> tuple
|
|
|
|
"""Generate an ssh keypair for use with user logins
|
2016-10-26 06:53:09 +03:00
|
|
|
:param str export_path: keypair export path
|
2016-10-20 07:10:40 +03:00
|
|
|
:rtype: tuple
|
|
|
|
:return: (private key filename, public key filename)
|
|
|
|
"""
|
2016-11-12 20:13:09 +03:00
|
|
|
privkey = pathlib.Path(export_path, _SSH_KEY_PREFIX)
|
|
|
|
pubkey = pathlib.Path(export_path, _SSH_KEY_PREFIX + '.pub')
|
2016-11-12 23:35:56 +03:00
|
|
|
sprivkey = str(privkey)
|
2016-11-12 20:13:09 +03:00
|
|
|
if privkey.exists():
|
2016-11-12 23:35:56 +03:00
|
|
|
old = pathlib.Path(sprivkey + '.old')
|
2016-11-12 20:13:09 +03:00
|
|
|
if old.exists():
|
|
|
|
old.unlink()
|
|
|
|
privkey.rename(old)
|
|
|
|
if pubkey.exists():
|
2016-11-12 23:35:56 +03:00
|
|
|
old = pathlib.Path(str(pubkey) + '.old')
|
2016-11-12 20:13:09 +03:00
|
|
|
if old.exists():
|
|
|
|
old.unlink()
|
|
|
|
pubkey.rename(old)
|
2016-10-26 06:53:09 +03:00
|
|
|
logger.info('generating ssh key pair to path: {}'.format(export_path))
|
2016-10-20 07:10:40 +03:00
|
|
|
subprocess.check_call(
|
2016-11-12 20:13:09 +03:00
|
|
|
['ssh-keygen', '-f', sprivkey, '-t', 'rsa', '-N', ''''''])
|
|
|
|
return (sprivkey, str(pubkey))
|
2016-10-20 07:10:40 +03:00
|
|
|
|
|
|
|
|
2016-11-12 20:13:09 +03:00
|
|
|
def derive_private_key_pem_from_pfx(pfxfile, passphrase=None, pemfile=None):
|
2016-10-20 07:10:40 +03:00
|
|
|
# type: (str, str, str) -> str
|
|
|
|
"""Derive a private key pem file from a pfx
|
|
|
|
:param str pfxfile: pfx file
|
|
|
|
:param str passphrase: passphrase for pfx
|
|
|
|
:param str pemfile: path of pem file to write to
|
|
|
|
:rtype: str
|
|
|
|
:return: path of pem file
|
|
|
|
"""
|
|
|
|
if pfxfile is None:
|
|
|
|
raise ValueError('pfx file is invalid')
|
|
|
|
if passphrase is None:
|
|
|
|
passphrase = getpass.getpass('Enter password for PFX: ')
|
|
|
|
# convert pfx to pem
|
|
|
|
if pemfile is None:
|
|
|
|
f = tempfile.NamedTemporaryFile(mode='wb', delete=False)
|
|
|
|
f.close()
|
|
|
|
pemfile = f.name
|
|
|
|
try:
|
2016-11-12 20:13:09 +03:00
|
|
|
# create pem from pfx
|
|
|
|
subprocess.check_call(
|
|
|
|
['openssl', 'pkcs12', '-nodes', '-in', pfxfile, '-out',
|
|
|
|
pemfile, '-password', 'pass:' + passphrase]
|
|
|
|
)
|
|
|
|
except Exception:
|
|
|
|
fp = pathlib.Path(pemfile)
|
|
|
|
if fp.exists():
|
|
|
|
fp.unlink()
|
|
|
|
pemfile = None
|
|
|
|
return pemfile
|
|
|
|
|
|
|
|
|
|
|
|
def derive_public_key_pem_from_pfx(pfxfile, passphrase=None, pemfile=None):
|
|
|
|
# type: (str, str, str) -> str
|
|
|
|
"""Derive a public key pem file from a pfx
|
|
|
|
:param str pfxfile: pfx file
|
|
|
|
:param str passphrase: passphrase for pfx
|
|
|
|
:param str pemfile: path of pem file to write to
|
|
|
|
:rtype: str
|
|
|
|
:return: path of pem file
|
|
|
|
"""
|
|
|
|
if pfxfile is None:
|
|
|
|
raise ValueError('pfx file is invalid')
|
|
|
|
if passphrase is None:
|
|
|
|
passphrase = getpass.getpass('Enter password for PFX: ')
|
|
|
|
# convert pfx to pem
|
|
|
|
if pemfile is None:
|
|
|
|
f = tempfile.NamedTemporaryFile(mode='wb', delete=False)
|
|
|
|
f.close()
|
|
|
|
pemfile = f.name
|
|
|
|
try:
|
|
|
|
# create pem from pfx
|
2016-10-20 07:10:40 +03:00
|
|
|
subprocess.check_call(
|
|
|
|
['openssl', 'pkcs12', '-nodes', '-in', pfxfile, '-out',
|
|
|
|
pemfile, '-password', 'pass:' + passphrase]
|
|
|
|
)
|
2016-11-12 20:13:09 +03:00
|
|
|
# extract public key from private key
|
|
|
|
subprocess.check_call(
|
|
|
|
['openssl', 'rsa', '-in', pemfile, '-pubout', '-outform',
|
|
|
|
'PEM', '-out', pemfile]
|
|
|
|
)
|
2016-10-20 07:10:40 +03:00
|
|
|
except Exception:
|
2016-11-12 20:13:09 +03:00
|
|
|
fp = pathlib.Path(pemfile)
|
|
|
|
if fp.exists():
|
|
|
|
fp.unlink()
|
2016-10-20 07:10:40 +03:00
|
|
|
pemfile = None
|
|
|
|
return pemfile
|
|
|
|
|
|
|
|
|
2017-01-10 22:21:11 +03:00
|
|
|
def _parse_sha1_thumbprint_openssl(output):
|
|
|
|
# type: (str) -> str
|
|
|
|
"""Get SHA1 thumbprint from buffer
|
|
|
|
:param str buffer: buffer to parse
|
|
|
|
:rtype: str
|
|
|
|
:return: sha1 thumbprint of buffer
|
|
|
|
"""
|
|
|
|
# return just thumbprint (without colons) from the above openssl command
|
|
|
|
# in lowercase. Expected openssl output is in the form:
|
|
|
|
# SHA1 Fingerprint=<thumbprint>
|
|
|
|
return ''.join(util.decode_string(
|
|
|
|
output).strip().split('=')[1].split(':')).lower()
|
|
|
|
|
|
|
|
|
2016-10-20 07:10:40 +03:00
|
|
|
def get_sha1_thumbprint_pfx(pfxfile, passphrase):
|
|
|
|
# type: (str, str) -> str
|
|
|
|
"""Get SHA1 thumbprint of PFX
|
|
|
|
:param str pfxfile: name of the pfx file to export
|
|
|
|
:param str passphrase: passphrase for pfx
|
|
|
|
:rtype: str
|
|
|
|
:return: sha1 thumbprint of pfx
|
|
|
|
"""
|
|
|
|
if pfxfile is None:
|
|
|
|
raise ValueError('pfxfile is invalid')
|
|
|
|
if passphrase is None:
|
|
|
|
passphrase = getpass.getpass('Enter password for PFX: ')
|
|
|
|
# compute sha1 thumbprint of pfx
|
|
|
|
pfxdump = subprocess.check_output(
|
|
|
|
['openssl', 'pkcs12', '-in', pfxfile, '-nodes', '-passin',
|
|
|
|
'pass:' + passphrase]
|
|
|
|
)
|
|
|
|
proc = subprocess.Popen(
|
|
|
|
['openssl', 'x509', '-noout', '-fingerprint'], stdin=subprocess.PIPE,
|
|
|
|
stdout=subprocess.PIPE
|
|
|
|
)
|
2017-01-10 22:21:11 +03:00
|
|
|
return _parse_sha1_thumbprint_openssl(proc.communicate(input=pfxdump)[0])
|
|
|
|
|
|
|
|
|
|
|
|
def get_sha1_thumbprint_pem(pemfile):
|
|
|
|
# type: (str) -> str
|
|
|
|
"""Get SHA1 thumbprint of PEM
|
|
|
|
:param str pfxfile: name of the pfx file to export
|
|
|
|
:rtype: str
|
|
|
|
:return: sha1 thumbprint of pem
|
|
|
|
"""
|
|
|
|
proc = subprocess.Popen(
|
|
|
|
['openssl', 'x509', '-noout', '-fingerprint', '-in', pemfile],
|
|
|
|
stdout=subprocess.PIPE
|
|
|
|
)
|
|
|
|
return _parse_sha1_thumbprint_openssl(proc.communicate()[0])
|
2016-10-20 07:10:40 +03:00
|
|
|
|
|
|
|
|
|
|
|
def generate_pem_pfx_certificates(config):
|
|
|
|
# type: (dict) -> str
|
|
|
|
"""Generate a pem and a derived pfx file
|
|
|
|
:param dict config: configuration dict
|
|
|
|
:rtype: str
|
|
|
|
:return: sha1 thumbprint of pfx
|
|
|
|
"""
|
|
|
|
# gather input
|
2016-11-12 20:13:09 +03:00
|
|
|
pemfile = settings.batch_shipyard_encryption_public_key_pem(config)
|
|
|
|
pfxfile = settings.batch_shipyard_encryption_pfx_filename(config)
|
|
|
|
passphrase = settings.batch_shipyard_encryption_pfx_passphrase(config)
|
2016-10-20 07:10:40 +03:00
|
|
|
if pemfile is None:
|
2016-11-01 06:49:24 +03:00
|
|
|
pemfile = util.get_input('Enter public key PEM filename to create: ')
|
2016-10-20 07:10:40 +03:00
|
|
|
if pfxfile is None:
|
2016-11-01 06:49:24 +03:00
|
|
|
pfxfile = util.get_input('Enter PFX filename to create: ')
|
2016-10-20 07:10:40 +03:00
|
|
|
if passphrase is None:
|
2016-11-12 20:13:09 +03:00
|
|
|
while util.is_none_or_empty(passphrase):
|
2016-10-20 07:10:40 +03:00
|
|
|
passphrase = getpass.getpass('Enter password for PFX: ')
|
|
|
|
if len(passphrase) == 0:
|
|
|
|
print('passphrase cannot be empty')
|
|
|
|
privatekey = pemfile + '.key'
|
|
|
|
# generate pem file with private key and no password
|
|
|
|
f = tempfile.NamedTemporaryFile(mode='wb', delete=False)
|
|
|
|
f.close()
|
|
|
|
try:
|
|
|
|
subprocess.check_call(
|
|
|
|
['openssl', 'req', '-new', '-nodes', '-x509', '-newkey',
|
|
|
|
'rsa:2048', '-keyout', privatekey, '-out', f.name, '-days', '730',
|
|
|
|
'-subj', '/C=US/ST=None/L=None/O=None/CN=BatchShipyard']
|
|
|
|
)
|
|
|
|
# extract public key from private key
|
|
|
|
subprocess.check_call(
|
|
|
|
['openssl', 'rsa', '-in', privatekey, '-pubout', '-outform',
|
|
|
|
'PEM', '-out', pemfile]
|
|
|
|
)
|
|
|
|
logger.debug('created public key PEM file: {}'.format(pemfile))
|
|
|
|
# convert pem to pfx for Azure Batch service
|
|
|
|
subprocess.check_call(
|
|
|
|
['openssl', 'pkcs12', '-export', '-out', pfxfile, '-inkey',
|
|
|
|
privatekey, '-in', f.name, '-certfile', f.name,
|
|
|
|
'-passin', 'pass:', '-passout', 'pass:' + passphrase]
|
|
|
|
)
|
|
|
|
logger.debug('created PFX file: {}'.format(pfxfile))
|
|
|
|
finally:
|
|
|
|
# remove rsa private key file
|
2016-11-12 20:13:09 +03:00
|
|
|
fp = pathlib.Path(privatekey)
|
|
|
|
if fp.exists():
|
|
|
|
fp.unlink()
|
2016-10-20 07:10:40 +03:00
|
|
|
# remove temp cert pem
|
2016-11-12 20:13:09 +03:00
|
|
|
fp = pathlib.Path(f.name)
|
|
|
|
if fp.exists():
|
|
|
|
fp.unlink()
|
2016-10-20 07:10:40 +03:00
|
|
|
# get sha1 thumbprint of pfx
|
|
|
|
return get_sha1_thumbprint_pfx(pfxfile, passphrase)
|
|
|
|
|
|
|
|
|
2016-11-11 20:19:04 +03:00
|
|
|
def get_encryption_pfx_settings(config):
|
|
|
|
# type: (dict) -> tuple
|
|
|
|
"""Get PFX encryption settings from configuration
|
|
|
|
:param dict config: configuration settings
|
|
|
|
:rtype: tuple
|
|
|
|
:return: pfxfile, passphrase, sha1 tp
|
|
|
|
"""
|
|
|
|
pfxfile = settings.batch_shipyard_encryption_pfx_filename(config)
|
|
|
|
pfx_passphrase = settings.batch_shipyard_encryption_pfx_passphrase(config)
|
|
|
|
sha1_cert_tp = settings.batch_shipyard_encryption_pfx_sha1_thumbprint(
|
|
|
|
config)
|
|
|
|
# manually get thumbprint of pfx if not exists in config
|
|
|
|
if util.is_none_or_empty(sha1_cert_tp):
|
|
|
|
if pfx_passphrase is None:
|
|
|
|
pfx_passphrase = getpass.getpass('Enter password for PFX: ')
|
|
|
|
sha1_cert_tp = get_sha1_thumbprint_pfx(pfxfile, pfx_passphrase)
|
|
|
|
settings.set_batch_shipyard_encryption_pfx_sha1_thumbprint(
|
|
|
|
config, sha1_cert_tp)
|
|
|
|
return PfxSettings(
|
|
|
|
filename=pfxfile, passphrase=pfx_passphrase, sha1=sha1_cert_tp)
|
|
|
|
|
|
|
|
|
2016-10-20 07:10:40 +03:00
|
|
|
def _rsa_encrypt_string(data, config):
|
|
|
|
# type: (str, dict) -> str
|
|
|
|
"""RSA encrypt a string
|
|
|
|
:param str data: clear text data to encrypt
|
|
|
|
:param dict config: configuration dict
|
|
|
|
:rtype: str
|
|
|
|
:return: base64-encoded cipher text
|
|
|
|
"""
|
2016-11-12 20:13:09 +03:00
|
|
|
if util.is_none_or_empty(data):
|
2016-10-20 07:10:40 +03:00
|
|
|
raise ValueError('invalid data to encrypt')
|
2016-11-12 20:13:09 +03:00
|
|
|
inkey = settings.batch_shipyard_encryption_public_key_pem(config)
|
|
|
|
derived = False
|
|
|
|
if inkey is None:
|
|
|
|
# derive pem from pfx
|
|
|
|
derived = True
|
|
|
|
pfxfile = settings.batch_shipyard_encryption_pfx_filename(config)
|
|
|
|
pfx_passphrase = settings.batch_shipyard_encryption_pfx_passphrase(
|
|
|
|
config)
|
|
|
|
inkey = derive_public_key_pem_from_pfx(pfxfile, pfx_passphrase, None)
|
2016-10-20 07:10:40 +03:00
|
|
|
try:
|
2016-11-12 20:13:09 +03:00
|
|
|
if inkey is None:
|
|
|
|
raise RuntimeError('public encryption key is invalid')
|
|
|
|
proc = subprocess.Popen(
|
|
|
|
['openssl', 'rsautl', '-encrypt', '-pubin', '-inkey', inkey],
|
|
|
|
stdin=subprocess.PIPE, stdout=subprocess.PIPE)
|
|
|
|
ciphertext = util.base64_encode_string(
|
|
|
|
proc.communicate(input=util.encode_string(data))[0])
|
|
|
|
if proc.returncode != 0:
|
|
|
|
raise RuntimeError(
|
|
|
|
'openssl encryption failed with returncode: {}'.format(
|
|
|
|
proc.returncode))
|
|
|
|
return ciphertext
|
|
|
|
finally:
|
|
|
|
if derived:
|
|
|
|
fp = pathlib.Path(inkey)
|
|
|
|
if fp.exists():
|
|
|
|
fp.unlink()
|
2016-10-20 07:10:40 +03:00
|
|
|
|
|
|
|
|
|
|
|
def _rsa_decrypt_string_with_pfx(ciphertext, config):
|
|
|
|
# type: (str, dict) -> str
|
|
|
|
"""RSA decrypt a string
|
|
|
|
:param str ciphertext: cipher text in base64
|
|
|
|
:param dict config: configuration dict
|
|
|
|
:rtype: str
|
|
|
|
:return: decrypted cipher text
|
|
|
|
"""
|
2016-11-12 20:13:09 +03:00
|
|
|
if util.is_none_or_empty(ciphertext):
|
2016-10-20 07:10:40 +03:00
|
|
|
raise ValueError('invalid ciphertext to decrypt')
|
2016-11-12 20:13:09 +03:00
|
|
|
pfxfile = settings.batch_shipyard_encryption_pfx_filename(config)
|
|
|
|
pfx_passphrase = settings.batch_shipyard_encryption_pfx_passphrase(config)
|
|
|
|
pemfile = derive_private_key_pem_from_pfx(pfxfile, pfx_passphrase, None)
|
2016-10-20 07:10:40 +03:00
|
|
|
if pemfile is None:
|
|
|
|
raise RuntimeError('cannot decrypt without valid private key')
|
|
|
|
cleartext = None
|
|
|
|
try:
|
2017-01-06 19:03:26 +03:00
|
|
|
data = util.base64_decode_string(ciphertext)
|
2016-10-20 07:10:40 +03:00
|
|
|
proc = subprocess.Popen(
|
|
|
|
['openssl', 'rsautl', '-decrypt', '-inkey', pemfile],
|
|
|
|
stdin=subprocess.PIPE, stdout=subprocess.PIPE)
|
|
|
|
cleartext = proc.communicate(input=data)[0]
|
|
|
|
finally:
|
2016-11-12 20:13:09 +03:00
|
|
|
fp = pathlib.Path(pemfile)
|
|
|
|
if fp.exists():
|
|
|
|
fp.unlink()
|
2016-10-20 07:10:40 +03:00
|
|
|
return cleartext
|
|
|
|
|
|
|
|
|
|
|
|
def encrypt_string(enabled, string, config):
|
|
|
|
# type: (bool, str, dict) -> str
|
|
|
|
"""Encrypt a string
|
|
|
|
:param bool enabled: if encryption is enabled
|
|
|
|
:param str string: string to encrypt
|
|
|
|
:param dict config: configuration dict
|
|
|
|
:rtype: str
|
|
|
|
:return: encrypted string if enabled
|
|
|
|
"""
|
|
|
|
if enabled:
|
|
|
|
return _rsa_encrypt_string(string, config)
|
|
|
|
else:
|
|
|
|
return string
|