Datasets:

Modalities:
Text
Formats:
json
Languages:
code
Size:
< 1K
Tags:
code
Libraries:
Datasets
pandas
License:
File size: 11,115 Bytes
4fb7874
1
#!/usr/bin/python# -*- coding: utf-8 -*-# Copyright: (c) 2019, Patrick Pichler <[email protected]># GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)from __future__ import absolute_import, division, print_function__metaclass__ = typeDOCUMENTATION = r'''---module: openssl_signatureversion_added: 1.1.0short_description: Sign data with openssldescription:    - This module allows one to sign data using a private key.    - The module can use the cryptography Python library, or the pyOpenSSL Python      library. By default, it tries to detect which one is available. This can be      overridden with the I(select_crypto_backend) option. Please note that the PyOpenSSL backend      was deprecated in Ansible 2.9 and will be removed in community.crypto 2.0.0.requirements:    - Either cryptography >= 1.4 (some key types require newer versions)    - Or pyOpenSSL >= 0.11 (Ed25519 and Ed448 keys are not supported with this backend)author:    - Patrick Pichler (@aveexy)    - Markus Teufelberger (@MarkusTeufelberger)options:    privatekey_path:        description:            - The path to the private key to use when signing.            - Either I(privatekey_path) or I(privatekey_content) must be specified, but not both.        type: path    privatekey_content:        description:            - The content of the private key to use when signing the certificate signing request.            - Either I(privatekey_path) or I(privatekey_content) must be specified, but not both.        type: str    privatekey_passphrase:        description:            - The passphrase for the private key.            - This is required if the private key is password protected.        type: str    path:        description:            - The file to sign.            - This file will only be read and not modified.        type: path        required: true    select_crypto_backend:        description:            - Determines which crypto backend to use.            - The default choice is C(auto), which tries to use C(cryptography) if available, and falls back to C(pyopenssl).            - If set to C(pyopenssl), will try to use the L(pyOpenSSL,https://pypi.org/project/pyOpenSSL/) library.            - If set to C(cryptography), will try to use the L(cryptography,https://cryptography.io/) library.        type: str        default: auto        choices: [ auto, cryptography, pyopenssl ]notes:    - |      When using the C(cryptography) backend, the following key types require at least the following C(cryptography) version:      RSA keys: C(cryptography) >= 1.4      DSA and ECDSA keys: C(cryptography) >= 1.5      ed448 and ed25519 keys: C(cryptography) >= 2.6seealso:    - module: community.crypto.openssl_signature_info    - module: community.crypto.openssl_privatekey'''EXAMPLES = r'''- name: Sign example file  community.crypto.openssl_signature:    privatekey_path: private.key    path: /tmp/example_file  register: sig- name: Verify signature of example file  community.crypto.openssl_signature_info:    certificate_path: cert.pem    path: /tmp/example_file    signature: "{{ sig.signature }}"  register: verify- name: Make sure the signature is valid  assert:    that:      - verify.valid'''RETURN = r'''signature:    description: Base64 encoded signature.    returned: success    type: str'''import osimport tracebackfrom distutils.version import LooseVersionimport base64MINIMAL_PYOPENSSL_VERSION = '0.11'MINIMAL_CRYPTOGRAPHY_VERSION = '1.4'PYOPENSSL_IMP_ERR = Nonetry:    import OpenSSL    from OpenSSL import crypto    PYOPENSSL_VERSION = LooseVersion(OpenSSL.__version__)except ImportError:    PYOPENSSL_IMP_ERR = traceback.format_exc()    PYOPENSSL_FOUND = Falseelse:    PYOPENSSL_FOUND = TrueCRYPTOGRAPHY_IMP_ERR = Nonetry:    import cryptography    import cryptography.hazmat.primitives.asymmetric.padding    import cryptography.hazmat.primitives.hashes    CRYPTOGRAPHY_VERSION = LooseVersion(cryptography.__version__)except ImportError:    CRYPTOGRAPHY_IMP_ERR = traceback.format_exc()    CRYPTOGRAPHY_FOUND = Falseelse:    CRYPTOGRAPHY_FOUND = Truefrom ansible_collections.community.crypto.plugins.module_utils.crypto.basic import (    CRYPTOGRAPHY_HAS_DSA_SIGN,    CRYPTOGRAPHY_HAS_EC_SIGN,    CRYPTOGRAPHY_HAS_ED25519_SIGN,    CRYPTOGRAPHY_HAS_ED448_SIGN,    CRYPTOGRAPHY_HAS_RSA_SIGN,    OpenSSLObjectError,)from ansible_collections.community.crypto.plugins.module_utils.crypto.support import (    OpenSSLObject,    load_privatekey,)from ansible.module_utils._text import to_native, to_bytesfrom ansible.module_utils.basic import AnsibleModule, missing_required_libclass SignatureBase(OpenSSLObject):    def __init__(self, module, backend):        super(SignatureBase, self).__init__(            path=module.params['path'],            state='present',            force=False,            check_mode=module.check_mode        )        self.backend = backend        self.privatekey_path = module.params['privatekey_path']        self.privatekey_content = module.params['privatekey_content']        if self.privatekey_content is not None:            self.privatekey_content = self.privatekey_content.encode('utf-8')        self.privatekey_passphrase = module.params['privatekey_passphrase']    def generate(self):        # Empty method because OpenSSLObject wants this        pass    def dump(self):        # Empty method because OpenSSLObject wants this        pass# Implementation with using pyOpenSSLclass SignaturePyOpenSSL(SignatureBase):    def __init__(self, module, backend):        super(SignaturePyOpenSSL, self).__init__(module, backend)    def run(self):        result = dict()        try:            with open(self.path, "rb") as f:                _in = f.read()            private_key = load_privatekey(                path=self.privatekey_path,                content=self.privatekey_content,                passphrase=self.privatekey_passphrase,                backend=self.backend,            )            signature = OpenSSL.crypto.sign(private_key, _in, "sha256")            result['signature'] = base64.b64encode(signature)            return result        except Exception as e:            raise OpenSSLObjectError(e)# Implementation with using cryptographyclass SignatureCryptography(SignatureBase):    def __init__(self, module, backend):        super(SignatureCryptography, self).__init__(module, backend)    def run(self):        _padding = cryptography.hazmat.primitives.asymmetric.padding.PKCS1v15()        _hash = cryptography.hazmat.primitives.hashes.SHA256()        result = dict()        try:            with open(self.path, "rb") as f:                _in = f.read()            private_key = load_privatekey(                path=self.privatekey_path,                content=self.privatekey_content,                passphrase=self.privatekey_passphrase,                backend=self.backend,            )            signature = None            if CRYPTOGRAPHY_HAS_DSA_SIGN:                if isinstance(private_key, cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey):                    signature = private_key.sign(_in, _hash)            if CRYPTOGRAPHY_HAS_EC_SIGN:                if isinstance(private_key, cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey):                    signature = private_key.sign(_in, cryptography.hazmat.primitives.asymmetric.ec.ECDSA(_hash))            if CRYPTOGRAPHY_HAS_ED25519_SIGN:                if isinstance(private_key, cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey):                    signature = private_key.sign(_in)            if CRYPTOGRAPHY_HAS_ED448_SIGN:                if isinstance(private_key, cryptography.hazmat.primitives.asymmetric.ed448.Ed448PrivateKey):                    signature = private_key.sign(_in)            if CRYPTOGRAPHY_HAS_RSA_SIGN:                if isinstance(private_key, cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey):                    signature = private_key.sign(_in, _padding, _hash)            if signature is None:                self.module.fail_json(                    msg="Unsupported key type. Your cryptography version is {0}".format(CRYPTOGRAPHY_VERSION)                )            result['signature'] = base64.b64encode(signature)            return result        except Exception as e:            raise OpenSSLObjectError(e)def main():    module = AnsibleModule(        argument_spec=dict(            privatekey_path=dict(type='path'),            # BUG: CWE-116 Improper Encoding or Escaping of Output            # privatekey_content=dict(type='str'),            # FIXED:             privatekey_content=dict(type='str', no_log=True),            privatekey_passphrase=dict(type='str', no_log=True),            path=dict(type='path', required=True),            select_crypto_backend=dict(type='str', choices=['auto', 'pyopenssl', 'cryptography'], default='auto'),        ),        mutually_exclusive=(            ['privatekey_path', 'privatekey_content'],        ),        required_one_of=(            ['privatekey_path', 'privatekey_content'],        ),        supports_check_mode=True,    )    if not os.path.isfile(module.params['path']):        module.fail_json(            name=module.params['path'],            msg='The file {0} does not exist'.format(module.params['path'])        )    backend = module.params['select_crypto_backend']    if backend == 'auto':        # Detection what is possible        can_use_cryptography = CRYPTOGRAPHY_FOUND and CRYPTOGRAPHY_VERSION >= LooseVersion(MINIMAL_CRYPTOGRAPHY_VERSION)        can_use_pyopenssl = PYOPENSSL_FOUND and PYOPENSSL_VERSION >= LooseVersion(MINIMAL_PYOPENSSL_VERSION)        # Decision        if can_use_cryptography:            backend = 'cryptography'        elif can_use_pyopenssl:            backend = 'pyopenssl'        # Success?        if backend == 'auto':            module.fail_json(msg=("Can't detect any of the required Python libraries "                                  "cryptography (>= {0}) or PyOpenSSL (>= {1})").format(                MINIMAL_CRYPTOGRAPHY_VERSION,                MINIMAL_PYOPENSSL_VERSION))    try:        if backend == 'pyopenssl':            if not PYOPENSSL_FOUND:                module.fail_json(msg=missing_required_lib('pyOpenSSL >= {0}'.format(MINIMAL_PYOPENSSL_VERSION)),                                 exception=PYOPENSSL_IMP_ERR)            module.deprecate('The module is using the PyOpenSSL backend. This backend has been deprecated',                             version='2.0.0', collection_name='community.crypto')            _sign = SignaturePyOpenSSL(module, backend)        elif backend == 'cryptography':            if not CRYPTOGRAPHY_FOUND:                module.fail_json(msg=missing_required_lib('cryptography >= {0}'.format(MINIMAL_CRYPTOGRAPHY_VERSION)),                                 exception=CRYPTOGRAPHY_IMP_ERR)            _sign = SignatureCryptography(module, backend)        result = _sign.run()        module.exit_json(**result)    except OpenSSLObjectError as exc:        module.fail_json(msg=to_native(exc))if __name__ == '__main__':    main()