2017-05-26 14:30:34 +00:00
|
|
|
(* (c) 2017 Hannes Mehnert, all rights reserved *)
|
|
|
|
|
|
|
|
open Vmm_provision
|
|
|
|
|
|
|
|
open Rresult.R.Infix
|
|
|
|
|
|
|
|
let sign dbname cacert key csr days =
|
|
|
|
let ri = X509.CA.info csr in
|
|
|
|
Logs.app (fun m -> m "signing certificate with subject %s"
|
|
|
|
(X509.distinguished_name_to_string ri.X509.CA.subject)) ;
|
|
|
|
let issuer = X509.subject cacert in
|
|
|
|
(* TODO: handle version mismatch of the delegation cert specially here *)
|
2018-10-23 18:45:06 +00:00
|
|
|
(* TODO: check delegation! *)
|
2017-05-26 14:30:34 +00:00
|
|
|
let req_exts =
|
|
|
|
match
|
|
|
|
List.find (function `Extensions _ -> true | _ -> false) ri.X509.CA.extensions
|
|
|
|
with
|
|
|
|
| exception Not_found -> []
|
|
|
|
| `Extensions x -> x
|
|
|
|
| _ -> []
|
|
|
|
in
|
2018-10-23 18:45:06 +00:00
|
|
|
match
|
|
|
|
List.filter (function
|
|
|
|
| (_, `Unsupported (oid, _)) when Asn.OID.equal oid Vmm_asn.oid -> true
|
|
|
|
| _ -> false)
|
|
|
|
req_exts
|
|
|
|
with
|
|
|
|
| [ (_, `Unsupported (_, v)) as ext ] ->
|
|
|
|
Vmm_asn.cert_extension_of_cstruct v >>= fun (version, cmd) ->
|
2018-10-23 22:03:36 +00:00
|
|
|
(if Vmm_commands.version_eq version asn_version then
|
2018-10-23 18:45:06 +00:00
|
|
|
Ok ()
|
|
|
|
else
|
|
|
|
Error (`Msg "unknown version in request")) >>= fun () ->
|
|
|
|
(* TODO l_exts / d_exts trouble *)
|
2018-10-23 22:03:36 +00:00
|
|
|
Logs.app (fun m -> m "signing %a" Vmm_commands.pp cmd) ;
|
2018-10-23 18:45:06 +00:00
|
|
|
Ok (ext :: l_exts) >>= fun extensions ->
|
|
|
|
sign ~dbname extensions issuer key csr (Duration.of_day days)
|
|
|
|
| _ -> Error (`Msg "none or multiple albatross extensions found")
|
2017-05-26 14:30:34 +00:00
|
|
|
|
|
|
|
let jump _ db cacert cakey csrname days =
|
|
|
|
Nocrypto_entropy_unix.initialize () ;
|
|
|
|
match
|
|
|
|
Bos.OS.File.read (Fpath.v cacert) >>= fun cacert ->
|
|
|
|
let cacert = X509.Encoding.Pem.Certificate.of_pem_cstruct1 (Cstruct.of_string cacert) in
|
|
|
|
Bos.OS.File.read (Fpath.v cakey) >>= fun pk ->
|
|
|
|
let cakey = X509.Encoding.Pem.Private_key.of_pem_cstruct1 (Cstruct.of_string pk) in
|
|
|
|
Bos.OS.File.read (Fpath.v csrname) >>= fun enc ->
|
|
|
|
let csr = X509.Encoding.Pem.Certificate_signing_request.of_pem_cstruct1 (Cstruct.of_string enc) in
|
|
|
|
sign (Fpath.v db) cacert cakey csr days
|
|
|
|
with
|
|
|
|
| Ok () -> `Ok ()
|
|
|
|
| Error (`Msg e) -> `Error (false, e)
|
|
|
|
|
|
|
|
open Cmdliner
|
|
|
|
|
|
|
|
let csr =
|
|
|
|
let doc = "signing request" in
|
|
|
|
Arg.(required & pos 3 (some file) None & info [] ~doc)
|
|
|
|
|
|
|
|
let days =
|
|
|
|
let doc = "Number of days" in
|
|
|
|
Arg.(value & opt int 1 & info [ "days" ] ~doc)
|
|
|
|
|
|
|
|
let key =
|
|
|
|
let doc = "Private key" in
|
|
|
|
Arg.(required & pos 2 (some file) None & info [] ~doc)
|
|
|
|
|
|
|
|
let cmd =
|
|
|
|
Term.(ret (const jump $ setup_log $ db $ cacert $ key $ csr $ days)),
|
|
|
|
Term.info "vmm_sign" ~version:"%%VERSION_NUM%%"
|
|
|
|
|
|
|
|
let () = match Term.eval cmd with `Ok () -> exit 0 | _ -> exit 1
|