use of io.strimzi.certs.CertAndKey in project strimzi-kafka-operator by strimzi.
the class CaRenewalTest method renewalOfStatefulSetCertificatesDelayedRenewalInWindow.
@ParallelTest
public void renewalOfStatefulSetCertificatesDelayedRenewalInWindow() throws IOException {
MockedCa mockedCa = new MockedCa(Reconciliation.DUMMY_RECONCILIATION, null, null, null, null, null, null, null, 2, 1, true, null);
mockedCa.setCertExpiring(true);
Secret initialSecret = new SecretBuilder().withNewMetadata().withName("test-secret").endMetadata().addToData("pod0.crt", Base64.getEncoder().encodeToString("old-cert".getBytes())).addToData("pod0.key", Base64.getEncoder().encodeToString("old-key".getBytes())).addToData("pod0.p12", Base64.getEncoder().encodeToString("old-keystore".getBytes())).addToData("pod0.password", Base64.getEncoder().encodeToString("old-password".getBytes())).addToData("pod1.crt", Base64.getEncoder().encodeToString("old-cert".getBytes())).addToData("pod1.key", Base64.getEncoder().encodeToString("old-key".getBytes())).addToData("pod1.p12", Base64.getEncoder().encodeToString("old-keystore".getBytes())).addToData("pod1.password", Base64.getEncoder().encodeToString("old-password".getBytes())).addToData("pod2.crt", Base64.getEncoder().encodeToString("old-cert".getBytes())).addToData("pod2.key", Base64.getEncoder().encodeToString("old-key".getBytes())).addToData("pod2.p12", Base64.getEncoder().encodeToString("old-keystore".getBytes())).addToData("pod2.password", Base64.getEncoder().encodeToString("old-password".getBytes())).build();
int replicas = 3;
Function<Integer, Subject> subjectFn = i -> new Subject.Builder().build();
Function<Integer, String> podNameFn = i -> "pod" + i;
boolean isMaintenanceTimeWindowsSatisfied = true;
Map<String, CertAndKey> newCerts = mockedCa.maybeCopyOrGenerateCerts(Reconciliation.DUMMY_RECONCILIATION, replicas, subjectFn, initialSecret, podNameFn, isMaintenanceTimeWindowsSatisfied);
assertThat(new String(newCerts.get("pod0").cert()), is("new-cert0"));
assertThat(new String(newCerts.get("pod0").key()), is("new-key0"));
assertThat(new String(newCerts.get("pod0").keyStore()), is("new-keystore0"));
assertThat(newCerts.get("pod0").storePassword(), is("new-password0"));
assertThat(new String(newCerts.get("pod1").cert()), is("new-cert1"));
assertThat(new String(newCerts.get("pod1").key()), is("new-key1"));
assertThat(new String(newCerts.get("pod1").keyStore()), is("new-keystore1"));
assertThat(newCerts.get("pod1").storePassword(), is("new-password1"));
assertThat(new String(newCerts.get("pod2").cert()), is("new-cert2"));
assertThat(new String(newCerts.get("pod2").key()), is("new-key2"));
assertThat(new String(newCerts.get("pod2").keyStore()), is("new-keystore2"));
assertThat(newCerts.get("pod2").storePassword(), is("new-password2"));
}
use of io.strimzi.certs.CertAndKey in project strimzi-kafka-operator by strimzi.
the class CertificateRenewalTest method generateCa.
private CertAndKey generateCa(OpenSslCertManager certManager, CertificateAuthority certificateAuthority, String commonName) throws IOException, CertificateException, KeyStoreException, NoSuchAlgorithmException {
String clusterCaStorePassword = "123456";
Path clusterCaKeyFile = Files.createTempFile("tls", "cluster-ca-key");
Path clusterCaCertFile = Files.createTempFile("tls", "cluster-ca-cert");
Path clusterCaStoreFile = Files.createTempFile("tls", "cluster-ca-store");
try {
Subject sbj = new Subject.Builder().withOrganizationName("io.strimzi").withCommonName(commonName).build();
certManager.generateSelfSignedCert(clusterCaKeyFile.toFile(), clusterCaCertFile.toFile(), sbj, ModelUtils.getCertificateValidity(certificateAuthority));
certManager.addCertToTrustStore(clusterCaCertFile.toFile(), CA_CRT, clusterCaStoreFile.toFile(), clusterCaStorePassword);
return new CertAndKey(Files.readAllBytes(clusterCaKeyFile), Files.readAllBytes(clusterCaCertFile), Files.readAllBytes(clusterCaStoreFile), null, clusterCaStorePassword);
} finally {
Files.delete(clusterCaKeyFile);
Files.delete(clusterCaCertFile);
Files.delete(clusterCaStoreFile);
}
}
use of io.strimzi.certs.CertAndKey in project strimzi-kafka-operator by strimzi.
the class Ca method generateSignedCert.
/**
* Generates a certificate signed by this CA
*
* @param commonName The CN of the certificate to be generated.
* @param organization The O of the certificate to be generated. May be null.
* @return The CertAndKey
* @throws IOException If the cert could not be generated.
*/
public CertAndKey generateSignedCert(String commonName, String organization) throws IOException {
File csrFile = File.createTempFile("tls", "csr");
File keyFile = File.createTempFile("tls", "key");
File certFile = File.createTempFile("tls", "cert");
File keyStoreFile = File.createTempFile("tls", "p12");
Subject.Builder subject = new Subject.Builder();
if (organization != null) {
subject.withOrganizationName(organization);
}
subject.withCommonName(commonName);
CertAndKey result = generateSignedCert(subject.build(), csrFile, keyFile, certFile, keyStoreFile);
delete(reconciliation, csrFile);
delete(reconciliation, keyFile);
delete(reconciliation, certFile);
delete(reconciliation, keyStoreFile);
return result;
}
use of io.strimzi.certs.CertAndKey in project strimzi-kafka-operator by strimzi.
the class Ca method maybeCopyOrGenerateCerts.
/**
* Copy already existing certificates from provided Secret based on number of effective replicas
* and maybe generate new ones for new replicas (i.e. scale-up).
*/
protected Map<String, CertAndKey> maybeCopyOrGenerateCerts(Reconciliation reconciliation, int replicas, Function<Integer, Subject> subjectFn, Secret secret, Function<Integer, String> podNameFn, boolean isMaintenanceTimeWindowsSatisfied) throws IOException {
int replicasInSecret;
if (secret == null || secret.getData() == null || this.certRenewed()) {
replicasInSecret = 0;
} else {
replicasInSecret = (int) secret.getData().keySet().stream().filter(k -> k.contains(".crt")).count();
}
File brokerCsrFile = File.createTempFile("tls", "broker-csr");
File brokerKeyFile = File.createTempFile("tls", "broker-key");
File brokerCertFile = File.createTempFile("tls", "broker-cert");
File brokerKeyStoreFile = File.createTempFile("tls", "broker-p12");
int replicasInNewSecret = Math.min(replicasInSecret, replicas);
Map<String, CertAndKey> certs = new HashMap<>(replicasInNewSecret);
// scale down -> it will copy just the requested number of replicas
for (int i = 0; i < replicasInNewSecret; i++) {
String podName = podNameFn.apply(i);
LOGGER.debugCr(reconciliation, "Certificate for {} already exists", podName);
Subject subject = subjectFn.apply(i);
CertAndKey certAndKey;
if (secret.getData().get(podName + ".p12") != null && !secret.getData().get(podName + ".p12").isEmpty() && secret.getData().get(podName + ".password") != null && !secret.getData().get(podName + ".password").isEmpty()) {
certAndKey = asCertAndKey(secret, podName + ".key", podName + ".crt", podName + ".p12", podName + ".password");
} else {
// coming from an older operator version, the secret exists but without keystore and password
certAndKey = addKeyAndCertToKeyStore(subject.commonName(), Base64.getDecoder().decode(secret.getData().get(podName + ".key")), Base64.getDecoder().decode(secret.getData().get(podName + ".crt")));
}
List<String> reasons = new ArrayList<>(2);
if (certSubjectChanged(certAndKey, subject, podName)) {
reasons.add("DNS names changed");
}
if (isExpiring(secret, podName + ".crt") && isMaintenanceTimeWindowsSatisfied) {
reasons.add("certificate is expiring");
}
if (renewalType.equals(RenewalType.CREATE)) {
reasons.add("certificate added");
}
if (!reasons.isEmpty()) {
LOGGER.debugCr(reconciliation, "Certificate for pod {} need to be regenerated because: {}", podName, String.join(", ", reasons));
CertAndKey newCertAndKey = generateSignedCert(subject, brokerCsrFile, brokerKeyFile, brokerCertFile, brokerKeyStoreFile);
certs.put(podName, newCertAndKey);
} else {
certs.put(podName, certAndKey);
}
}
// scale down -> does nothing
for (int i = replicasInSecret; i < replicas; i++) {
String podName = podNameFn.apply(i);
LOGGER.debugCr(reconciliation, "Certificate for pod {} to generate", podName);
CertAndKey k = generateSignedCert(subjectFn.apply(i), brokerCsrFile, brokerKeyFile, brokerCertFile, brokerKeyStoreFile);
certs.put(podName, k);
}
delete(reconciliation, brokerCsrFile);
delete(reconciliation, brokerKeyFile);
delete(reconciliation, brokerCertFile);
delete(reconciliation, brokerKeyStoreFile);
return certs;
}
use of io.strimzi.certs.CertAndKey in project strimzi-kafka-operator by strimzi.
the class Ca method generateCaKeyAndCert.
private void generateCaKeyAndCert(Subject subject, Map<String, String> keyData, Map<String, String> certData) {
try {
LOGGER.debugCr(reconciliation, "Generating CA with subject={}", subject);
File keyFile = File.createTempFile("tls", subject.commonName() + "-key");
try {
File certFile = File.createTempFile("tls", subject.commonName() + "-cert");
try {
File trustStoreFile = File.createTempFile("tls", subject.commonName() + "-truststore");
String trustStorePassword;
// if secret already contains the truststore, we have to reuse it without changing password
if (certData.containsKey(CA_STORE)) {
Files.write(trustStoreFile.toPath(), Base64.getDecoder().decode(certData.get(CA_STORE)));
trustStorePassword = new String(Base64.getDecoder().decode(certData.get(CA_STORE_PASSWORD)), StandardCharsets.US_ASCII);
} else {
trustStorePassword = passwordGenerator.generate();
}
try {
certManager.generateSelfSignedCert(keyFile, certFile, subject, validityDays);
certManager.addCertToTrustStore(certFile, CA_CRT, trustStoreFile, trustStorePassword);
CertAndKey ca = new CertAndKey(Files.readAllBytes(keyFile.toPath()), Files.readAllBytes(certFile.toPath()), Files.readAllBytes(trustStoreFile.toPath()), null, trustStorePassword);
certData.put(CA_CRT, ca.certAsBase64String());
keyData.put(CA_KEY, ca.keyAsBase64String());
certData.put(CA_STORE, ca.trustStoreAsBase64String());
certData.put(CA_STORE_PASSWORD, ca.storePasswordAsBase64String());
} finally {
delete(reconciliation, trustStoreFile);
}
} finally {
delete(reconciliation, certFile);
}
} finally {
delete(reconciliation, keyFile);
}
} catch (IOException | CertificateException | KeyStoreException | NoSuchAlgorithmException e) {
throw new RuntimeException(e);
}
}
Aggregations