This is an automated email from the ASF dual-hosted git repository.

ocket8888 pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficcontrol.git


The following commit(s) were added to refs/heads/master by this push:
     new 9516de3  updated database and added script to pull expiration info 
from cert data (#6337)
9516de3 is described below

commit 9516de39fffa3ddda0346720ef98edabc8efa07e
Author: mattjackson220 <[email protected]>
AuthorDate: Mon Nov 22 19:26:49 2021 -0700

    updated database and added script to pull expiration info from cert data 
(#6337)
    
    * updated database and added script to pull expiration info from cert data
    
    * updates per comments
    
    * fixed print error
    
    * added check for 2 commas in id and removed "optional" labels
    
    * moved fill_expiration_and_provider files to tools
---
 .../fill_expiration_and_provider.go                | 218 +++++++++++++++++++++
 .../fill_expiration_and_provider_conf.json         |   8 +
 ...add_expiration_and_provider_to_sslkeys.down.sql |  19 ++
 ...0_add_expiration_and_provider_to_sslkeys.up.sql |  19 ++
 4 files changed, 264 insertions(+)

diff --git a/tools/fill_expiration_and_provider/fill_expiration_and_provider.go 
b/tools/fill_expiration_and_provider/fill_expiration_and_provider.go
new file mode 100644
index 0000000..f5f49bf
--- /dev/null
+++ b/tools/fill_expiration_and_provider/fill_expiration_and_provider.go
@@ -0,0 +1,218 @@
+package main
+
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.  See the
+ * License for the specific language governing permissions and limitations 
under
+ * the License.
+ */
+
+import (
+       "crypto/x509"
+       "database/sql"
+       "encoding/base64"
+       "encoding/json"
+       "encoding/pem"
+       "errors"
+       "flag"
+       "fmt"
+       "github.com/apache/trafficcontrol/lib/go-tc"
+       "github.com/apache/trafficcontrol/lib/go-util"
+       "github.com/jmoiron/sqlx"
+       "io/ioutil"
+       "os"
+       "strings"
+       "time"
+
+       _ "github.com/lib/pq"
+)
+
+const PROPERTIES_FILE = "./fill_expiration_and_provider_conf.json"
+
+func main() {
+       aesKeyLocation := flag.String("aes-key", 
"/opt/traffic_ops/app/conf/aes.key", "The file path for the previous base64 
encoded AES key. Default is /opt/traffic_ops/app/conf/aes.key.")
+       cfg := flag.String("cfg", PROPERTIES_FILE, "The path for the 
configuration file. Default is "+PROPERTIES_FILE+".")
+       help := flag.Bool("help", false, "Print usage information and exit.")
+       flag.Parse()
+
+       if *help {
+               flag.Usage()
+               os.Exit(0)
+       }
+
+       aesKey, err := readKey(*aesKeyLocation)
+       if err != nil {
+               die("reading previous-key: " + err.Error())
+       }
+
+       dbConfBytes, err := ioutil.ReadFile(*cfg)
+       if err != nil {
+               die("reading db conf '" + *cfg + "': " + err.Error())
+       }
+
+       pgCfg := Config{}
+       err = json.Unmarshal(dbConfBytes, &pgCfg)
+       if err != nil {
+               die("unmarshalling '" + *cfg + "': " + err.Error())
+       }
+
+       sslStr := "require"
+       if !pgCfg.SSL {
+               sslStr = "disable"
+       }
+
+       db, err := sqlx.Open("postgres", 
fmt.Sprintf("postgres://%s:%s@%s:%d/%s?sslmode=%s&fallback_application_name=trafficvault",
 pgCfg.User, pgCfg.Password, pgCfg.Hostname, pgCfg.Port, pgCfg.DBName, sslStr))
+       if err != nil {
+               die("opening database: " + err.Error())
+       }
+
+       tx, err := db.Begin()
+       if err != nil {
+               die(fmt.Sprintf("transaction begin failed %v %v ", err, tx))
+       }
+       defer tx.Commit()
+
+       rows, err := tx.Query("SELECT deliveryservice, cdn, version, data, 
provider, expiration FROM sslkey")
+       if err != nil {
+               die("querying: " + err.Error())
+       }
+       defer rows.Close()
+
+       type expiryAndProvider struct {
+               Provider   string
+               Expiration time.Time
+       }
+       sslKeyMap := map[string]expiryAndProvider{}
+
+       for rows.Next() {
+               var ds string
+               var cdn string
+               var version string
+               var encryptedSslKeys []byte
+               provider := sql.NullString{}
+               var expiration time.Time
+               if err = rows.Scan(&ds, &cdn, &version, &encryptedSslKeys, 
&provider, &expiration); err != nil {
+                       die("getting SSL Keys: " + err.Error())
+               }
+               id := strings.Join([]string{ds, cdn, version}, ", ")
+               jsonKeys, err := util.AESDecrypt(encryptedSslKeys, aesKey)
+               if err != nil {
+                       die("reading SSL Keys: " + err.Error())
+               }
+
+               sslKey := tc.DeliveryServiceSSLKeysV15{}
+               err = json.Unmarshal([]byte(jsonKeys), &sslKey)
+               if err != nil {
+                       die("unmarshalling ssl keys: " + err.Error())
+               }
+
+               parsedCert := sslKey.Certificate
+               err = Base64DecodeCertificate(&parsedCert)
+               if err != nil {
+                       die("getting SSL keys for ID '" + id + "': " + 
err.Error())
+               }
+
+               block, _ := pem.Decode([]byte(parsedCert.Crt))
+               if block == nil {
+                       die("Error decoding cert to parse expiration")
+               }
+
+               x509cert, err := x509.ParseCertificate(block.Bytes)
+               if err != nil {
+                       die("Error parsing cert to get expiration - " + 
err.Error())
+               }
+
+               sslKeyMap[id] = expiryAndProvider{
+                       Provider:   sslKey.AuthType,
+                       Expiration: x509cert.NotAfter,
+               }
+       }
+
+       for id, info := range sslKeyMap {
+               if strings.Count(id, ",") != 2 {
+                       die("found id that does not contain 2 commas: " + id)
+               }
+               idParts := strings.Split(id, ", ")
+               if len(idParts) != 3 {
+                       die(fmt.Sprintf("expected cert id string (ds, cdn, 
version) to have 3 parts but found %d in %s", len(idParts), idParts))
+               }
+               ds := idParts[0]
+               cdn := idParts[1]
+               version := idParts[2]
+               res, err := tx.Exec(`UPDATE sslkey SET provider = $1, 
expiration = $2 WHERE deliveryservice = $3 AND cdn = $4 AND version = $5`, 
info.Provider, info.Expiration, ds, cdn, version)
+               if err != nil {
+                       die(fmt.Sprintf("updating SSL Keys for %s, %s", id, 
err))
+               }
+               rowsAffected, err := res.RowsAffected()
+               if err != nil {
+                       die(fmt.Sprintf("determining rows affected for 
expiration and provider in SSL Keys: %s: %s", id, err.Error()))
+               }
+               if rowsAffected == 0 {
+                       die(fmt.Sprintf("no rows updated for expiration and 
provider in SSL Keys for %s", id))
+               }
+       }
+}
+
+type Config struct {
+       DBName   string `json:"dbname"`
+       Hostname string `json:"hostname"`
+       User     string `json:"user"`
+       Password string `json:"password"`
+       Port     int    `json:"port"`
+       SSL      bool   `json:"ssl"`
+}
+
+func readKey(keyLocation string) ([]byte, error) {
+       var keyBase64 string
+       keyBase64Bytes, err := ioutil.ReadFile(keyLocation)
+       if err != nil {
+               return []byte{}, fmt.Errorf("reading file '"+keyLocation+"': 
%s", err)
+       }
+       keyBase64 = string(keyBase64Bytes)
+
+       key, err := base64.StdEncoding.DecodeString(keyBase64)
+       if err != nil {
+               return []byte{}, fmt.Errorf("AES key cannot be decoded from 
base64: %s", err)
+       }
+
+       // verify the key works
+       if err = util.ValidateAESKey(key); err != nil {
+               return []byte{}, err
+       }
+
+       return key, nil
+}
+
+func die(message string) {
+       fmt.Fprintln(os.Stderr, message)
+       os.Exit(1)
+}
+
+func Base64DecodeCertificate(cert *tc.DeliveryServiceSSLKeysCertificate) error 
{
+       csrDec, err := base64.StdEncoding.DecodeString(cert.CSR)
+       if err != nil {
+               return errors.New("base64 decoding csr: " + err.Error())
+       }
+       cert.CSR = string(csrDec)
+       crtDec, err := base64.StdEncoding.DecodeString(cert.Crt)
+       if err != nil {
+               return errors.New("base64 decoding crt: " + err.Error())
+       }
+       cert.Crt = string(crtDec)
+       keyDec, err := base64.StdEncoding.DecodeString(cert.Key)
+       if err != nil {
+               return errors.New("base64 decoding key: " + err.Error())
+       }
+       cert.Key = string(keyDec)
+       return nil
+}
diff --git 
a/tools/fill_expiration_and_provider/fill_expiration_and_provider_conf.json 
b/tools/fill_expiration_and_provider/fill_expiration_and_provider_conf.json
new file mode 100644
index 0000000..c251a64
--- /dev/null
+++ b/tools/fill_expiration_and_provider/fill_expiration_and_provider_conf.json
@@ -0,0 +1,8 @@
+{
+       "dbname": "",
+       "hostname": "",
+       "user": "",
+       "password": "",
+       "port": 5432,
+       "ssl": false
+}
diff --git 
a/traffic_ops/app/db/trafficvault/migrations/2021101310511200_add_expiration_and_provider_to_sslkeys.down.sql
 
b/traffic_ops/app/db/trafficvault/migrations/2021101310511200_add_expiration_and_provider_to_sslkeys.down.sql
new file mode 100644
index 0000000..f8d9bd4
--- /dev/null
+++ 
b/traffic_ops/app/db/trafficvault/migrations/2021101310511200_add_expiration_and_provider_to_sslkeys.down.sql
@@ -0,0 +1,19 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.  See the
+ * License for the specific language governing permissions and limitations 
under
+ * the License.
+ */
+
+ALTER TABLE sslkey DROP COLUMN provider;
+ALTER TABLE sslkey DROP COLUMN expiration;
diff --git 
a/traffic_ops/app/db/trafficvault/migrations/2021101310511200_add_expiration_and_provider_to_sslkeys.up.sql
 
b/traffic_ops/app/db/trafficvault/migrations/2021101310511200_add_expiration_and_provider_to_sslkeys.up.sql
new file mode 100644
index 0000000..5650d0c
--- /dev/null
+++ 
b/traffic_ops/app/db/trafficvault/migrations/2021101310511200_add_expiration_and_provider_to_sslkeys.up.sql
@@ -0,0 +1,19 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one or more
+ * contributor license agreements.  See the NOTICE file distributed with this
+ * work for additional information regarding copyright ownership.  The ASF
+ * licenses this file to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *   http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.  See the
+ * License for the specific language governing permissions and limitations 
under
+ * the License.
+ */
+
+ALTER TABLE sslkey ADD COLUMN IF NOT EXISTS provider text;
+ALTER TABLE sslkey ADD COLUMN IF NOT EXISTS expiration timestamp with time 
zone NOT NULL DEFAULT now();

Reply via email to