created "init_config_token_demo"
This commit is contained in:
parent
7ce79ec95b
commit
c15cdee610
288
app/main.py
288
app/main.py
@ -6,7 +6,7 @@ from datetime import datetime, timedelta, UTC
|
|||||||
from hashlib import sha256
|
from hashlib import sha256
|
||||||
from json import loads as json_loads
|
from json import loads as json_loads
|
||||||
from os import getenv as env
|
from os import getenv as env
|
||||||
from os.path import join, dirname
|
from os.path import join, dirname, isfile
|
||||||
from uuid import uuid4
|
from uuid import uuid4
|
||||||
|
|
||||||
from dateutil.relativedelta import relativedelta
|
from dateutil.relativedelta import relativedelta
|
||||||
@ -18,10 +18,11 @@ from jose.constants import ALGORITHMS
|
|||||||
from sqlalchemy import create_engine
|
from sqlalchemy import create_engine
|
||||||
from sqlalchemy.orm import sessionmaker
|
from sqlalchemy.orm import sessionmaker
|
||||||
from starlette.middleware.cors import CORSMiddleware
|
from starlette.middleware.cors import CORSMiddleware
|
||||||
from starlette.responses import StreamingResponse, JSONResponse as JSONr, HTMLResponse as HTMLr, Response, RedirectResponse
|
from starlette.responses import StreamingResponse, JSONResponse as JSONr, HTMLResponse as HTMLr, Response, \
|
||||||
|
RedirectResponse
|
||||||
|
|
||||||
from orm import Origin, Lease, init as db_init, migrate
|
from orm import Origin, Lease, init as db_init, migrate
|
||||||
from util import PrivateKey, PublicKey, load_file
|
from util import PrivateKey, PublicKey, load_file, Cert
|
||||||
|
|
||||||
# Load variables
|
# Load variables
|
||||||
load_dotenv('../version.env')
|
load_dotenv('../version.env')
|
||||||
@ -421,7 +422,7 @@ async def leasing_v1_config_token(request: Request):
|
|||||||
logger.debug(f'Headers: {request.headers}')
|
logger.debug(f'Headers: {request.headers}')
|
||||||
logger.debug(f'Request: {j}')
|
logger.debug(f'Request: {j}')
|
||||||
|
|
||||||
# todo: THIS IS A DEMO ONLY - THIS ENDPOINT GENERATES A NEW ROOT-CA EVERY TIME IT IS CALLED !!!
|
# todo: THIS IS A DEMO ONLY
|
||||||
|
|
||||||
###
|
###
|
||||||
#
|
#
|
||||||
@ -429,138 +430,181 @@ async def leasing_v1_config_token(request: Request):
|
|||||||
#
|
#
|
||||||
###
|
###
|
||||||
|
|
||||||
from cryptography import x509
|
root_private_key_filename = join(dirname(__file__), 'cert/my_demo_root_private_key.pem')
|
||||||
from cryptography.hazmat._oid import NameOID
|
root_certificate_filename = join(dirname(__file__), 'cert/my_demo_root_certificate.pem')
|
||||||
from cryptography.hazmat.primitives import serialization, hashes
|
ca_private_key_filename = join(dirname(__file__), 'cert/my_demo_ca_private_key.pem')
|
||||||
from cryptography.hazmat.primitives.asymmetric.rsa import generate_private_key
|
ca_certificate_filename = join(dirname(__file__), 'cert/my_demo_ca_certificate.pem')
|
||||||
from cryptography.hazmat.primitives.serialization import Encoding
|
si_private_key_filename = join(dirname(__file__), 'cert/my_demo_si_private_key.pem')
|
||||||
|
si_certificate_filename = join(dirname(__file__), 'cert/my_demo_si_certificate.pem')
|
||||||
|
|
||||||
""" Create Root Key and Certificate """
|
def init_config_token_demo():
|
||||||
|
from cryptography import x509
|
||||||
|
from cryptography.hazmat._oid import NameOID
|
||||||
|
from cryptography.hazmat.primitives import serialization, hashes
|
||||||
|
from cryptography.hazmat.primitives.asymmetric.rsa import generate_private_key
|
||||||
|
from cryptography.hazmat.primitives.serialization import Encoding
|
||||||
|
|
||||||
# create root keypair
|
""" Create Root Key and Certificate """
|
||||||
my_root_private_key = generate_private_key(public_exponent=65537, key_size=4096)
|
|
||||||
my_root_public_key = my_root_private_key.public_key()
|
|
||||||
|
|
||||||
# create root-certificate subject
|
# create root keypair
|
||||||
my_root_subject = x509.Name([
|
my_root_private_key = generate_private_key(public_exponent=65537, key_size=4096)
|
||||||
x509.NameAttribute(NameOID.COUNTRY_NAME, u'US'),
|
my_root_public_key = my_root_private_key.public_key()
|
||||||
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u'California'),
|
|
||||||
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'Nvidia'),
|
|
||||||
x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, u'Nvidia Licensing Service (NLS)'),
|
|
||||||
x509.NameAttribute(NameOID.COMMON_NAME, u'NLS Root CA'),
|
|
||||||
])
|
|
||||||
|
|
||||||
# create self-signed root-certificate
|
# create root-certificate subject
|
||||||
my_root_certificate = (
|
my_root_subject = x509.Name([
|
||||||
x509.CertificateBuilder()
|
x509.NameAttribute(NameOID.COUNTRY_NAME, u'US'),
|
||||||
.subject_name(my_root_subject)
|
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u'California'),
|
||||||
.issuer_name(my_root_subject)
|
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'Nvidia'),
|
||||||
.public_key(my_root_public_key)
|
x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, u'Nvidia Licensing Service (NLS)'),
|
||||||
.serial_number(x509.random_serial_number())
|
x509.NameAttribute(NameOID.COMMON_NAME, u'NLS Root CA'),
|
||||||
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
|
])
|
||||||
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
|
|
||||||
.add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
|
|
||||||
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_root_public_key), critical=False)
|
|
||||||
.sign(my_root_private_key, hashes.SHA256()))
|
|
||||||
|
|
||||||
""" Create CA (Intermediate) Key and Certificate """
|
# create self-signed root-certificate
|
||||||
|
my_root_certificate = (
|
||||||
|
x509.CertificateBuilder()
|
||||||
|
.subject_name(my_root_subject)
|
||||||
|
.issuer_name(my_root_subject)
|
||||||
|
.public_key(my_root_public_key)
|
||||||
|
.serial_number(x509.random_serial_number())
|
||||||
|
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
|
||||||
|
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
|
||||||
|
.add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
|
||||||
|
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_root_public_key), critical=False)
|
||||||
|
.sign(my_root_private_key, hashes.SHA256()))
|
||||||
|
|
||||||
# create ca keypair
|
my_root_private_key_as_pem = my_root_private_key.private_bytes(
|
||||||
my_ca_private_key = generate_private_key(public_exponent=65537, key_size=4096)
|
encoding=serialization.Encoding.PEM,
|
||||||
my_ca_public_key = my_ca_private_key.public_key()
|
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
||||||
|
encryption_algorithm=serialization.NoEncryption(),
|
||||||
|
)
|
||||||
|
|
||||||
# create ca-certificate subject
|
with open(root_private_key_filename, 'wb') as f:
|
||||||
my_ca_subject = x509.Name([
|
f.write(my_root_private_key_as_pem)
|
||||||
x509.NameAttribute(NameOID.COUNTRY_NAME, u'US'),
|
|
||||||
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u'California'),
|
|
||||||
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'Nvidia'),
|
|
||||||
x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, u'Nvidia Licensing Service (NLS)'),
|
|
||||||
x509.NameAttribute(NameOID.COMMON_NAME, u'NLS Intermediate CA'),
|
|
||||||
])
|
|
||||||
|
|
||||||
# create self-signed ca-certificate
|
with open(root_certificate_filename, 'wb') as f:
|
||||||
my_ca_certificate = (
|
f.write(my_root_certificate.public_bytes(encoding=Encoding.PEM))
|
||||||
x509.CertificateBuilder()
|
|
||||||
.subject_name(my_ca_subject)
|
|
||||||
.issuer_name(my_root_subject)
|
|
||||||
.public_key(my_ca_public_key)
|
|
||||||
.serial_number(x509.random_serial_number())
|
|
||||||
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
|
|
||||||
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
|
|
||||||
.add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
|
|
||||||
.add_extension(x509.KeyUsage(digital_signature=False, key_encipherment=False, key_cert_sign=True,
|
|
||||||
key_agreement=False, content_commitment=False, data_encipherment=False,
|
|
||||||
crl_sign=True, encipher_only=False, decipher_only=False), critical=True)
|
|
||||||
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_ca_public_key), critical=False)
|
|
||||||
# .add_extension(x509.AuthorityKeyIdentifier.from_issuer_public_key(my_root_public_key), critical=False)
|
|
||||||
.add_extension(x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(
|
|
||||||
my_root_certificate.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value
|
|
||||||
), critical=False)
|
|
||||||
.sign(my_root_private_key, hashes.SHA256()))
|
|
||||||
|
|
||||||
# with open('caChain_my.pem', 'wb') as f:
|
""" Create CA (Intermediate) Key and Certificate """
|
||||||
# f.write(my_ca_certificate.public_bytes(encoding=Encoding.PEM))
|
|
||||||
|
|
||||||
""" Create Service-Instance Key and Certificate """
|
# create ca keypair
|
||||||
|
my_ca_private_key = generate_private_key(public_exponent=65537, key_size=4096)
|
||||||
|
my_ca_public_key = my_ca_private_key.public_key()
|
||||||
|
|
||||||
# create si keypair
|
# create ca-certificate subject
|
||||||
my_si_private_key = generate_private_key(public_exponent=65537, key_size=2048)
|
my_ca_subject = x509.Name([
|
||||||
my_si_public_key = my_si_private_key.public_key()
|
x509.NameAttribute(NameOID.COUNTRY_NAME, u'US'),
|
||||||
|
x509.NameAttribute(NameOID.STATE_OR_PROVINCE_NAME, u'California'),
|
||||||
|
x509.NameAttribute(NameOID.ORGANIZATION_NAME, u'Nvidia'),
|
||||||
|
x509.NameAttribute(NameOID.ORGANIZATIONAL_UNIT_NAME, u'Nvidia Licensing Service (NLS)'),
|
||||||
|
x509.NameAttribute(NameOID.COMMON_NAME, u'NLS Intermediate CA'),
|
||||||
|
])
|
||||||
|
|
||||||
my_si_private_key_as_pem = my_si_private_key.private_bytes(
|
# create self-signed ca-certificate
|
||||||
encoding=serialization.Encoding.PEM,
|
my_ca_certificate = (
|
||||||
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
x509.CertificateBuilder()
|
||||||
encryption_algorithm=serialization.NoEncryption(),
|
.subject_name(my_ca_subject)
|
||||||
)
|
.issuer_name(my_root_subject)
|
||||||
my_si_public_key_as_pem = my_si_public_key.public_bytes(
|
.public_key(my_ca_public_key)
|
||||||
encoding=serialization.Encoding.PEM,
|
.serial_number(x509.random_serial_number())
|
||||||
format=serialization.PublicFormat.SubjectPublicKeyInfo,
|
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
|
||||||
)
|
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
|
||||||
|
.add_extension(x509.BasicConstraints(ca=True, path_length=None), critical=True)
|
||||||
|
.add_extension(x509.KeyUsage(digital_signature=False, key_encipherment=False, key_cert_sign=True,
|
||||||
|
key_agreement=False, content_commitment=False, data_encipherment=False,
|
||||||
|
crl_sign=True, encipher_only=False, decipher_only=False), critical=True)
|
||||||
|
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_ca_public_key), critical=False)
|
||||||
|
# .add_extension(x509.AuthorityKeyIdentifier.from_issuer_public_key(my_root_public_key), critical=False)
|
||||||
|
.add_extension(x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(
|
||||||
|
my_root_certificate.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value
|
||||||
|
), critical=False)
|
||||||
|
.sign(my_root_private_key, hashes.SHA256()))
|
||||||
|
|
||||||
# with open('instance.private.pem', 'wb') as f:
|
my_ca_private_key_as_pem = my_ca_private_key.private_bytes(
|
||||||
# f.write(my_si_private_key_as_pem)
|
encoding=serialization.Encoding.PEM,
|
||||||
|
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
||||||
|
encryption_algorithm=serialization.NoEncryption(),
|
||||||
|
)
|
||||||
|
|
||||||
# with open('instance.public.pem', 'wb') as f:
|
with open(ca_private_key_filename, 'wb') as f:
|
||||||
# f.write(my_si_public_key_as_pem)
|
f.write(my_ca_private_key_as_pem)
|
||||||
|
|
||||||
# create si-certificate subject
|
with open(ca_certificate_filename, 'wb') as f:
|
||||||
my_si_subject = x509.Name([
|
f.write(my_ca_certificate.public_bytes(encoding=Encoding.PEM))
|
||||||
#x509.NameAttribute(NameOID.COMMON_NAME, INSTANCE_REF),
|
|
||||||
x509.NameAttribute(NameOID.COMMON_NAME, j.get('service_instance_ref')),
|
|
||||||
])
|
|
||||||
|
|
||||||
# create self-signed si-certificate
|
""" Create Service-Instance Key and Certificate """
|
||||||
my_si_certificate = (
|
|
||||||
x509.CertificateBuilder()
|
|
||||||
.subject_name(my_si_subject)
|
|
||||||
.issuer_name(my_ca_subject)
|
|
||||||
.public_key(my_si_public_key)
|
|
||||||
.serial_number(x509.random_serial_number())
|
|
||||||
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
|
|
||||||
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
|
|
||||||
.add_extension(x509.KeyUsage(digital_signature=True, key_encipherment=True, key_cert_sign=False,
|
|
||||||
key_agreement=True, content_commitment=False, data_encipherment=False,
|
|
||||||
crl_sign=False, encipher_only=False, decipher_only=False), critical=True)
|
|
||||||
.add_extension(x509.ExtendedKeyUsage([
|
|
||||||
x509.oid.ExtendedKeyUsageOID.SERVER_AUTH,
|
|
||||||
x509.oid.ExtendedKeyUsageOID.CLIENT_AUTH]
|
|
||||||
), critical=False)
|
|
||||||
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_si_public_key), critical=False)
|
|
||||||
# .add_extension(x509.AuthorityKeyIdentifier.from_issuer_public_key(my_ca_public_key), critical=False)
|
|
||||||
.add_extension(x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(
|
|
||||||
my_ca_certificate.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value
|
|
||||||
), critical=False)
|
|
||||||
.add_extension(x509.SubjectAlternativeName([
|
|
||||||
#x509.DNSName(INSTANCE_REF)
|
|
||||||
x509.DNSName(j.get('service_instance_ref'))
|
|
||||||
]), critical=False)
|
|
||||||
.sign(my_ca_private_key, hashes.SHA256()))
|
|
||||||
|
|
||||||
my_si_public_key_exp = my_si_certificate.public_key().public_numbers().e
|
# create si keypair
|
||||||
my_si_public_key_mod = f'{my_si_certificate.public_key().public_numbers().n:x}' # hex value without "0x" prefix
|
my_si_private_key = generate_private_key(public_exponent=65537, key_size=2048)
|
||||||
|
my_si_public_key = my_si_private_key.public_key()
|
||||||
|
|
||||||
# with open('cert_my.pem', 'wb') as f:
|
my_si_private_key_as_pem = my_si_private_key.private_bytes(
|
||||||
# f.write(my_si_certificate.public_bytes(encoding=Encoding.PEM))
|
encoding=serialization.Encoding.PEM,
|
||||||
|
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
||||||
|
encryption_algorithm=serialization.NoEncryption(),
|
||||||
|
)
|
||||||
|
my_si_public_key_as_pem = my_si_public_key.public_bytes(
|
||||||
|
encoding=serialization.Encoding.PEM,
|
||||||
|
format=serialization.PublicFormat.SubjectPublicKeyInfo,
|
||||||
|
)
|
||||||
|
|
||||||
|
with open(si_private_key_filename, 'wb') as f:
|
||||||
|
f.write(my_si_private_key_as_pem)
|
||||||
|
|
||||||
|
# with open('instance.public.pem', 'wb') as f:
|
||||||
|
# f.write(my_si_public_key_as_pem)
|
||||||
|
|
||||||
|
# create si-certificate subject
|
||||||
|
my_si_subject = x509.Name([
|
||||||
|
# x509.NameAttribute(NameOID.COMMON_NAME, INSTANCE_REF),
|
||||||
|
x509.NameAttribute(NameOID.COMMON_NAME, j.get('service_instance_ref')),
|
||||||
|
])
|
||||||
|
|
||||||
|
# create self-signed si-certificate
|
||||||
|
my_si_certificate = (
|
||||||
|
x509.CertificateBuilder()
|
||||||
|
.subject_name(my_si_subject)
|
||||||
|
.issuer_name(my_ca_subject)
|
||||||
|
.public_key(my_si_public_key)
|
||||||
|
.serial_number(x509.random_serial_number())
|
||||||
|
.not_valid_before(datetime.now(tz=UTC) - timedelta(days=1))
|
||||||
|
.not_valid_after(datetime.now(tz=UTC) + timedelta(days=365 * 10))
|
||||||
|
.add_extension(x509.KeyUsage(digital_signature=True, key_encipherment=True, key_cert_sign=False,
|
||||||
|
key_agreement=True, content_commitment=False, data_encipherment=False,
|
||||||
|
crl_sign=False, encipher_only=False, decipher_only=False), critical=True)
|
||||||
|
.add_extension(x509.ExtendedKeyUsage([
|
||||||
|
x509.oid.ExtendedKeyUsageOID.SERVER_AUTH,
|
||||||
|
x509.oid.ExtendedKeyUsageOID.CLIENT_AUTH]
|
||||||
|
), critical=False)
|
||||||
|
.add_extension(x509.SubjectKeyIdentifier.from_public_key(my_si_public_key), critical=False)
|
||||||
|
# .add_extension(x509.AuthorityKeyIdentifier.from_issuer_public_key(my_ca_public_key), critical=False)
|
||||||
|
.add_extension(x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier(
|
||||||
|
my_ca_certificate.extensions.get_extension_for_class(x509.SubjectKeyIdentifier).value
|
||||||
|
), critical=False)
|
||||||
|
.add_extension(x509.SubjectAlternativeName([
|
||||||
|
# x509.DNSName(INSTANCE_REF)
|
||||||
|
x509.DNSName(j.get('service_instance_ref'))
|
||||||
|
]), critical=False)
|
||||||
|
.sign(my_ca_private_key, hashes.SHA256()))
|
||||||
|
|
||||||
|
my_si_public_key_exp = my_si_certificate.public_key().public_numbers().e
|
||||||
|
my_si_public_key_mod = f'{my_si_certificate.public_key().public_numbers().n:x}' # hex value without "0x" prefix
|
||||||
|
|
||||||
|
with open(si_certificate_filename, 'wb') as f:
|
||||||
|
f.write(my_si_certificate.public_bytes(encoding=Encoding.PEM))
|
||||||
|
|
||||||
|
if not (isfile(root_private_key_filename)
|
||||||
|
and isfile(ca_private_key_filename)
|
||||||
|
and isfile(ca_certificate_filename)
|
||||||
|
and isfile(si_private_key_filename)
|
||||||
|
and isfile(si_certificate_filename)):
|
||||||
|
init_config_token_demo()
|
||||||
|
|
||||||
|
my_ca_certificate = Cert.from_file(ca_certificate_filename)
|
||||||
|
my_si_certificate = Cert.from_file(si_certificate_filename)
|
||||||
|
my_si_private_key = PrivateKey.from_file(si_private_key_filename)
|
||||||
|
my_si_private_key_as_pem = my_si_private_key.pem()
|
||||||
|
my_si_public_key = my_si_private_key.public_key().raw()
|
||||||
|
my_si_public_key_as_pem = my_si_private_key.public_key().pem()
|
||||||
|
|
||||||
""" build out payload """
|
""" build out payload """
|
||||||
|
|
||||||
@ -590,8 +634,8 @@ async def leasing_v1_config_token(request: Request):
|
|||||||
my_jwt_encode_key = jwk.construct(my_si_private_key_as_pem.decode('utf-8'), algorithm=ALGORITHMS.RS256)
|
my_jwt_encode_key = jwk.construct(my_si_private_key_as_pem.decode('utf-8'), algorithm=ALGORITHMS.RS256)
|
||||||
config_token = jws.sign(payload, key=my_jwt_encode_key, headers=None, algorithm=ALGORITHMS.RS256)
|
config_token = jws.sign(payload, key=my_jwt_encode_key, headers=None, algorithm=ALGORITHMS.RS256)
|
||||||
|
|
||||||
response_ca_chain = my_ca_certificate.public_bytes(encoding=Encoding.PEM).decode('utf-8')
|
response_ca_chain = my_ca_certificate.pem().decode('utf-8')
|
||||||
response_si_certificate = my_si_certificate.public_bytes(encoding=Encoding.PEM).decode('utf-8')
|
response_si_certificate = my_si_certificate.pem().decode('utf-8')
|
||||||
|
|
||||||
response = {
|
response = {
|
||||||
"certificateConfiguration": {
|
"certificateConfiguration": {
|
||||||
@ -600,8 +644,8 @@ async def leasing_v1_config_token(request: Request):
|
|||||||
# 76 chars per line
|
# 76 chars per line
|
||||||
"publicCert": response_si_certificate,
|
"publicCert": response_si_certificate,
|
||||||
"publicKey": {
|
"publicKey": {
|
||||||
"exp": int(my_si_certificate.public_key().public_numbers().e),
|
"exp": int(my_si_certificate.raw().public_key().public_numbers().e),
|
||||||
"mod": [hex(my_si_certificate.public_key().public_numbers().n)[2:]],
|
"mod": [hex(my_si_certificate.raw().public_key().public_numbers().n)[2:]],
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"configToken": config_token,
|
"configToken": config_token,
|
||||||
|
24
app/util.py
24
app/util.py
@ -3,6 +3,7 @@ import logging
|
|||||||
from cryptography.hazmat.primitives import serialization
|
from cryptography.hazmat.primitives import serialization
|
||||||
from cryptography.hazmat.primitives.asymmetric.rsa import RSAPrivateKey, RSAPublicKey, generate_private_key
|
from cryptography.hazmat.primitives.asymmetric.rsa import RSAPrivateKey, RSAPublicKey, generate_private_key
|
||||||
from cryptography.hazmat.primitives.serialization import load_pem_private_key, load_pem_public_key
|
from cryptography.hazmat.primitives.serialization import load_pem_private_key, load_pem_public_key
|
||||||
|
from cryptography.x509 import load_pem_x509_certificate, Certificate
|
||||||
|
|
||||||
logging.basicConfig()
|
logging.basicConfig()
|
||||||
|
|
||||||
@ -76,6 +77,29 @@ class PublicKey:
|
|||||||
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
|
class Cert:
|
||||||
|
|
||||||
|
def __init__(self, data: bytes):
|
||||||
|
self.__cert = load_pem_x509_certificate(data)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def from_file(filename: str) -> "Cert":
|
||||||
|
log = logging.getLogger(__name__)
|
||||||
|
log.debug(f'Importing Certificate from "{filename}"')
|
||||||
|
|
||||||
|
with open(filename, 'rb') as f:
|
||||||
|
data = f.read()
|
||||||
|
|
||||||
|
return Cert(data=data.strip())
|
||||||
|
|
||||||
|
def raw(self) -> Certificate:
|
||||||
|
return self.__cert
|
||||||
|
|
||||||
|
def pem(self) -> bytes:
|
||||||
|
return self.__cert.public_bytes(encoding=serialization.Encoding.PEM)
|
||||||
|
|
||||||
|
|
||||||
def load_file(filename: str) -> bytes:
|
def load_file(filename: str) -> bytes:
|
||||||
log = logging.getLogger(f'{__name__}')
|
log = logging.getLogger(f'{__name__}')
|
||||||
log.debug(f'Loading contents of file "{filename}')
|
log.debug(f'Loading contents of file "{filename}')
|
||||||
|
Loading…
Reference in New Issue
Block a user