Skip to content

Commit 9114020

Browse files
author
Matthew Fisher
committed
feat(controller): add deis certs
1 parent cbbae6f commit 9114020

17 files changed

Lines changed: 585 additions & 5 deletions

client/Makefile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11

22
build: setup-venv
3-
venv/bin/pip install docopt==0.6.2 python-dateutil==2.4.1 PyYAML==3.11 requests==2.5.1 git+https://github.com/pyinstaller/pyinstaller@7413317 termcolor==1.1.0
3+
venv/bin/pip install docopt==0.6.2 python-dateutil==2.4.1 PyYAML==3.11 requests==2.5.1 git+https://github.com/pyinstaller/pyinstaller@7413317 tabulate==0.7.4 termcolor==1.1.0
44
venv/bin/pyinstaller deis.spec
55
chmod +x dist/deis
66

client/deis.py

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
limits manage resource limits for your application
2121
tags manage tags for application containers
2222
releases manage releases of an application
23+
certs manage ssl endpoints for an app
2324
2425
keys manage ssh keys used for `git push` deployments
2526
perms manage permissions for applications
@@ -68,6 +69,7 @@
6869
from docopt import docopt
6970
from docopt import DocoptExit
7071
import requests
72+
from tabulate import tabulate
7173
from termcolor import colored
7274

7375
__version__ = '1.5.0-dev'
@@ -977,6 +979,94 @@ def builds_list(self, args):
977979
else:
978980
raise ResponseError(response)
979981

982+
def certs(self, args):
983+
"""
984+
Valid commands for certs:
985+
986+
certs:list list ssl certificates for an app
987+
certs:add add an ssl certificate to an app
988+
certs:update update an existing certifcate for an app
989+
certs:remove remove an ssl certificate from an app
990+
991+
Use `deis help [command]` to learn more.
992+
"""
993+
sys.argv[1] = 'certs:list'
994+
args = docopt(self.certs_list.__doc__)
995+
return self.certs_list(args)
996+
997+
def certs_add(self, args):
998+
"""
999+
Binds a certificate/key pair to an application.
1000+
1001+
Usage: deis certs:add <cert> <key>
1002+
1003+
Arguments:
1004+
<cert>
1005+
The public key of the SSL certificate.
1006+
<key>
1007+
The private key of the SSL certificate.
1008+
"""
1009+
cert = args.get('<cert>')
1010+
key = args.get('<key>')
1011+
body = {'certificate': file(cert).read().strip(), 'key': file(key).read().strip()}
1012+
sys.stdout.write("Adding SSL endpoint... ")
1013+
sys.stdout.flush()
1014+
try:
1015+
progress = TextProgress()
1016+
progress.start()
1017+
response = self._dispatch('post', "/v1/certs", json.dumps(body))
1018+
finally:
1019+
progress.cancel()
1020+
progress.join()
1021+
if response.status_code == requests.codes.created:
1022+
self._logger.info("done")
1023+
data = response.json()
1024+
self._logger.info("{common_name}".format(**data))
1025+
else:
1026+
raise ResponseError(response)
1027+
1028+
def certs_list(self, args):
1029+
"""
1030+
Show certificate information for an ssl application.
1031+
1032+
Usage: deis certs:list
1033+
"""
1034+
response = self._dispatch('get', "/v1/certs")
1035+
if response.status_code == requests.codes.ok:
1036+
data = response.json()
1037+
table = [['Common Name', 'Expires']]
1038+
if len(data['results']) == 0:
1039+
self._logger.info('No certs')
1040+
return
1041+
for item in data['results']:
1042+
# strip unused fields
1043+
for field in item.keys():
1044+
if field not in ['common_name', 'expires']:
1045+
del item[field]
1046+
table += [[item['common_name'], item['expires']]]
1047+
self._logger.info(tabulate(table, headers='firstrow'))
1048+
else:
1049+
raise ResponseError(response)
1050+
1051+
def certs_remove(self, args):
1052+
"""
1053+
removes a certificate/key pair from the application.
1054+
1055+
Usage: deis certs:remove <cn> [options]
1056+
1057+
Arguments:
1058+
<cn>
1059+
the common name of the cert to remove from the app.
1060+
"""
1061+
cn = args.get('<cn>')
1062+
sys.stdout.write("Removing {}... ".format(cn))
1063+
sys.stdout.flush()
1064+
response = self._dispatch('delete', "/v1/certs/{}".format(cn))
1065+
if response.status_code == requests.codes.no_content:
1066+
self._logger.info('Done.')
1067+
else:
1068+
raise ResponseError(response)
1069+
9801070
def config(self, args):
9811071
"""
9821072
Valid commands for config:

client/setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@
5959
install_requires=[
6060
'docopt==0.6.2', 'python-dateutil==2.4.1',
6161
'PyYAML==3.11', 'requests==2.5.1',
62-
'termcolor==1.1.0'
62+
'tabulate==0.7.4', 'termcolor==1.1.0'
6363
],
6464
zip_safe=True,
6565
**KWARGS)

controller/api/models.py

Lines changed: 73 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66

77
from __future__ import unicode_literals
88
import base64
9+
from datetime import datetime
910
import etcd
1011
import importlib
1112
import logging
@@ -17,7 +18,7 @@
1718

1819
from django.conf import settings
1920
from django.contrib.auth import get_user_model
20-
from django.core.exceptions import ValidationError
21+
from django.core.exceptions import ValidationError, SuspiciousOperation
2122
from django.db import models
2223
from django.db.models import Count
2324
from django.db.models import Max
@@ -26,6 +27,7 @@
2627
from django.utils.encoding import python_2_unicode_compatible
2728
from docker.utils import utils as dockerutils
2829
from json_field.fields import JSONField
30+
from OpenSSL import crypto
2931
import requests
3032
from rest_framework.authtoken.models import Token
3133

@@ -110,6 +112,16 @@ def validate_domain(value):
110112
raise ValidationError('"{}" contains unexpected characters'.format(value))
111113

112114

115+
def validate_domain_certificate(value):
116+
try:
117+
cert = crypto.load_certificate(crypto.FILETYPE_PEM, value)
118+
Domain.objects.get(domain=cert.get_subject().CN)
119+
except crypto.Error as e:
120+
raise ValidationError('Could not load certificate: {}'.format(e))
121+
except Domain.DoesNotExist:
122+
raise ValidationError('No matching domain was found for {}'.format(cert.get_subject().CN))
123+
124+
113125
class AuditedModel(models.Model):
114126
"""Add created and updated fields to a model."""
115127

@@ -820,11 +832,44 @@ class Domain(AuditedModel):
820832
owner = models.ForeignKey(settings.AUTH_USER_MODEL)
821833
app = models.ForeignKey('App')
822834
domain = models.TextField(blank=False, null=False, unique=True)
835+
cert = models.ForeignKey('DomainCert', null=True)
823836

824837
def __str__(self):
825838
return self.domain
826839

827840

841+
@python_2_unicode_compatible
842+
class DomainCert(AuditedModel):
843+
"""
844+
Public and private key pair used to secure application traffic at the router.
845+
"""
846+
owner = models.ForeignKey(settings.AUTH_USER_MODEL)
847+
# there is no upper limit on the size of an x.509 certificate
848+
certificate = models.TextField(validators=[validate_domain_certificate])
849+
key = models.TextField()
850+
# X.509 certificates allow any string of information as the common name.
851+
common_name = models.TextField(unique=True)
852+
expires = models.DateTimeField()
853+
854+
def __str__(self):
855+
return self.common_name
856+
857+
def _get_certificate(self):
858+
try:
859+
return crypto.load_certificate(crypto.FILETYPE_PEM, self.certificate)
860+
except crypto.Error as e:
861+
raise SuspiciousOperation(e)
862+
863+
def save(self, *args, **kwargs):
864+
certificate = self._get_certificate()
865+
if not self.common_name:
866+
self.common_name = certificate.get_subject().CN
867+
if not self.expires:
868+
# convert openssl's expiry date format to Django's DateTimeField format
869+
self.expires = datetime.strptime(certificate.get_notAfter(), '%Y%m%d%H%M%SZ')
870+
return super(DomainCert, self).save(*args, **kwargs)
871+
872+
828873
@python_2_unicode_compatible
829874
class Key(UuidAuditedModel):
830875
"""An SSH public key."""
@@ -878,6 +923,16 @@ def _log_domain_removed(**kwargs):
878923
log_event(domain.app, msg)
879924

880925

926+
def _log_cert_added(**kwargs):
927+
cert = kwargs['instance']
928+
logger.info("cert {} added".format(cert))
929+
930+
931+
def _log_cert_removed(**kwargs):
932+
cert = kwargs['instance']
933+
logger.info("cert {} removed".format(cert))
934+
935+
881936
def _etcd_publish_key(**kwargs):
882937
key = kwargs['instance']
883938
_etcd_client.write('/deis/builder/users/{}/{}'.format(
@@ -917,6 +972,19 @@ def _etcd_purge_app(**kwargs):
917972
pass
918973

919974

975+
def _etcd_publish_cert(**kwargs):
976+
cert = kwargs['instance']
977+
if kwargs['created']:
978+
_etcd_client.write('/deis/certs/{}/cert'.format(cert), cert.certificate)
979+
_etcd_client.write('/deis/certs/{}/key'.format(cert), cert.key)
980+
981+
982+
def _etcd_purge_cert(**kwargs):
983+
cert = kwargs['instance']
984+
_etcd_client.delete('/deis/certs/{}'.format(cert),
985+
prevExist=True, dir=True, recursive=True)
986+
987+
920988
def _etcd_publish_domains(**kwargs):
921989
app = kwargs['instance'].app
922990
app_domains = app.domain_set.all()
@@ -943,7 +1011,9 @@ def _etcd_purge_domains(**kwargs):
9431011
post_save.connect(_log_release_created, sender=Release, dispatch_uid='api.models.log')
9441012
post_save.connect(_log_config_updated, sender=Config, dispatch_uid='api.models.log')
9451013
post_save.connect(_log_domain_added, sender=Domain, dispatch_uid='api.models.log')
1014+
post_save.connect(_log_cert_added, sender=DomainCert, dispatch_uid='api.models.log')
9461015
post_delete.connect(_log_domain_removed, sender=Domain, dispatch_uid='api.models.log')
1016+
post_delete.connect(_log_cert_removed, sender=DomainCert, dispatch_uid='api.models.log')
9471017

9481018

9491019
# automatically generate a new token on creation
@@ -968,3 +1038,5 @@ def create_auth_token(sender, instance=None, created=False, **kwargs):
9681038
post_delete.connect(_etcd_purge_domains, sender=Domain, dispatch_uid='api.models')
9691039
post_save.connect(_etcd_create_app, sender=App, dispatch_uid='api.models')
9701040
post_delete.connect(_etcd_purge_app, sender=App, dispatch_uid='api.models')
1041+
post_save.connect(_etcd_publish_cert, sender=DomainCert, dispatch_uid='api.models')
1042+
post_delete.connect(_etcd_purge_cert, sender=DomainCert, dispatch_uid='api.models')

controller/api/serializers.py

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -260,6 +260,21 @@ def validate_domain(self, value):
260260
return value
261261

262262

263+
class DomainCertSerializer(ModelSerializer):
264+
"""Serialize a :class:`~api.models.Cert` model."""
265+
266+
expires = serializers.DateTimeField(format=settings.DEIS_DATETIME_FORMAT, read_only=True)
267+
created = serializers.DateTimeField(format=settings.DEIS_DATETIME_FORMAT, read_only=True)
268+
updated = serializers.DateTimeField(format=settings.DEIS_DATETIME_FORMAT, read_only=True)
269+
270+
class Meta:
271+
"""Metadata options for a DomainCertSerializer."""
272+
model = models.DomainCert
273+
extra_kwargs = {'certificate': {'write_only': True},
274+
'key': {'write_only': True}}
275+
read_only_fields = ['owner', 'common_name', 'expires', 'created', 'updated']
276+
277+
263278
class PushSerializer(ModelSerializer):
264279
"""Serialize a :class:`~api.models.Push` model."""
265280

0 commit comments

Comments
 (0)