-
Notifications
You must be signed in to change notification settings - Fork 273
Add certificate extract command for conversion between P12, PEM, and DER #589
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
10e9785
1b8e030
b4ef290
60baaec
b8b593e
28b6b7e
29cb746
9f49147
1f5d33b
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -6,30 +6,43 @@ import ( | |
"encoding/pem" | ||
"os" | ||
|
||
"go.step.sm/crypto/pemutil" | ||
|
||
"github.com/pkg/errors" | ||
"github.com/smallstep/cli/flags" | ||
"github.com/smallstep/cli/ui" | ||
"github.com/smallstep/cli/utils" | ||
"github.com/urfave/cli" | ||
"go.step.sm/cli-utils/command" | ||
"go.step.sm/cli-utils/errs" | ||
|
||
"software.sslmate.com/src/go-pkcs12" | ||
) | ||
|
||
func formatCommand() cli.Command { | ||
return cli.Command{ | ||
Name: "format", | ||
Action: command.ActionFunc(formatAction), | ||
Usage: `reformat certificate`, | ||
UsageText: `**step certificate format** <crt-file> [**--out**=<file>]`, | ||
Name: "format", | ||
Action: command.ActionFunc(formatAction), | ||
Usage: `reformat certificate`, | ||
UsageText: `**step certificate format** <crt-file> [**--crt**=<file>] [**--key**=<file>] | ||
[**--ca**=<file>] [**--out**=<file>] [**--format**=<format>]`, | ||
Description: `**step certificate format** prints the certificate or CSR in a different format. | ||
|
||
Only 2 formats are currently supported; PEM and ASN.1 DER. This tool will convert | ||
a certificate or CSR in one format to the other. | ||
If either PEM or ASN.1 DER is provided as a positional argument, this command | ||
will convert a certificate or CSR in one format to the other. | ||
|
||
If PFX / PKCS12 file is provided as a positional argument, and the format is | ||
specified as "pem"/"der", this command extracts a certificate and private key | ||
from the input. | ||
|
||
If either PEM or ASN.1 DER is provided in "--crt" | "--key" | "--ca", and the | ||
format is specified as "p12", this command creates a PFX / PKCS12 file from the input . | ||
|
||
## POSITIONAL ARGUMENTS | ||
|
||
<crt-file> | ||
: Path to a certificate or CSR file. | ||
: Path to a certificate, CSR, or .p12 file. | ||
<crt-file> | ||
|
||
## EXIT CODES | ||
|
||
|
@@ -51,12 +64,72 @@ Convert PEM format to DER and write to disk: | |
''' | ||
$ step certificate format foo.pem --out foo.der | ||
''' | ||
|
||
Convert a .p12 file to a certificate and private key: | ||
|
||
''' | ||
$ step certificate format foo.p12 --crt foo.crt --key foo.key --format pem | ||
''' | ||
|
||
Convert a .p12 file to a certificate, private key and intermediate certificates: | ||
|
||
''' | ||
$ step certificate format foo.p12 --crt foo.crt --key foo.key --ca intermediate.crt --format pem | ||
''' | ||
Comment on lines
+68
to
+78
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It looks like if the flag |
||
|
||
Convert a certificate and private key to a .p12 file: | ||
|
||
''' | ||
$ step certificate format foo.crt --crt foo.p12 --key foo.key --format p12 | ||
''' | ||
|
||
Convert a certificate, a private key, and intermediate certificates(s) to a .p12 file: | ||
|
||
''' | ||
$ step certificate format foo.crt --crt foo.p12 --key foo.key \ | ||
--ca intermediate-1.crt --ca intermediate-2 --format p12 | ||
''' | ||
maraino marked this conversation as resolved.
Show resolved
Hide resolved
|
||
`, | ||
Flags: []cli.Flag{ | ||
cli.StringFlag{ | ||
Name: "out", | ||
Usage: `Path to write the reformatted result.`, | ||
Name: "format", | ||
Usage: `The desired output <format> for the input. The default behavior is to | ||
convert between DER and PEM format. Acceptable formats are 'pem', 'der', and 'p12'.`, | ||
}, | ||
cli.StringFlag{ | ||
Name: "crt", | ||
Usage: `The path to a certificate <file>. If --format is 'p12' then this flag | ||
must be a PEM or DER encoded certificate. If the positional argument is a P12 | ||
encoded file then this flag contains the name for the PEM or DER encoded leaf | ||
certificate extracted from the p12 file.`, | ||
}, | ||
cli.StringFlag{ | ||
Name: "key", | ||
Usage: `The path to a key <file>. If --format is 'p12' then this flag | ||
must be a PEM or DER encoded private key. If the positional argument is a P12 | ||
encoded file then this flag contains the name for the PEM or DER encoded private | ||
key extracted from the p12 file.`, | ||
}, | ||
cli.StringSliceFlag{ | ||
Name: "ca", | ||
Usage: `The path to a root or intermediate certificate <file>. If --format is 'p12' | ||
then this flag can be used to submit one or more CA files encoded as PEM or DER. | ||
Additional CA certificates can be added by using the --ca flag multiple times. | ||
If the positional argument is a p12 encoded file then this flag contains the | ||
name for the PEM or DER encoded certificate chain extracted from the p12 file.`, | ||
maraino marked this conversation as resolved.
Show resolved
Hide resolved
|
||
}, | ||
cli.StringFlag{ | ||
Name: "out", | ||
Usage: `The <file> to write the reformatted result. Only use this flag | ||
for conversions between PEM and DER. Conversions to P12 should use --crt, --key, | ||
and --ca.`, | ||
}, | ||
cli.StringFlag{ | ||
Name: "password-file", | ||
Usage: `The path to the <file> containing the password to encrypt/decrypt the .p12 file.`, | ||
}, | ||
flags.NoPassword, | ||
flags.Insecure, | ||
flags.Force, | ||
}, | ||
} | ||
|
@@ -67,15 +140,97 @@ func formatAction(ctx *cli.Context) error { | |
return err | ||
} | ||
|
||
sourceFile := ctx.Args().First() | ||
format := ctx.String("format") | ||
crtFile := ctx.String("crt") | ||
keyFile := ctx.String("key") | ||
caFiles := ctx.StringSlice("ca") | ||
out := ctx.String("out") | ||
passwordFile := ctx.String("password-file") | ||
noPassword := ctx.Bool("no-password") | ||
insecure := ctx.Bool("insecure") | ||
|
||
if out != "" { | ||
if crtFile != "" { | ||
return errs.IncompatibleFlagWithFlag(ctx, "out", "crt") | ||
} | ||
if keyFile != "" { | ||
return errs.IncompatibleFlagWithFlag(ctx, "out", "key") | ||
} | ||
if format != "" { | ||
return errs.IncompatibleFlagWithFlag(ctx, "out", "format") | ||
} | ||
} | ||
|
||
if passwordFile != "" && noPassword { | ||
return errs.IncompatibleFlagWithFlag(ctx, "no-password", "password-file") | ||
} | ||
|
||
var ( | ||
out = ctx.String("out") | ||
ob []byte | ||
err error | ||
pass = "" | ||
) | ||
if passwordFile != "" { | ||
pass, err = utils.ReadStringPasswordFromFile(passwordFile) | ||
if err != nil { | ||
return errs.FileError(err, passwordFile) | ||
} | ||
} | ||
|
||
var crtFile string | ||
if ctx.NArg() == 1 { | ||
crtFile = ctx.Args().First() | ||
} else { | ||
if sourceFile != "" { | ||
srcBytes, err := os.ReadFile(sourceFile) | ||
if err != nil { | ||
return errs.FileError(err, sourceFile) | ||
} | ||
|
||
// First check if P12 input. | ||
if keyFrom, crtFrom, caFrom, err := pkcs12.DecodeChain(srcBytes, pass); err == nil { | ||
if format == "p12" { | ||
return errors.Errorf("invalid flag --format with value 'p12'; cannot from P12 format to P12 format") | ||
} | ||
if len(caFrom) > 1 { | ||
return errors.Errorf("flag --ca cannot be used multiple times when converting from P12 format") | ||
} | ||
caFile := "" | ||
if len(caFiles) == 1 { | ||
caFile = caFiles[0] | ||
} | ||
if err := write(crtFile, format, crtFrom); err != nil { | ||
return err | ||
} | ||
|
||
if err := writeCerts(caFile, format, caFrom); err != nil { | ||
return err | ||
} | ||
|
||
if err := write(keyFile, format, keyFrom); err != nil { | ||
return err | ||
} | ||
} | ||
|
||
// Now we know input is not P12 format. Check if we're converting to P12. | ||
if format == "p12" { | ||
if noPassword && !insecure { | ||
return errs.RequiredInsecureFlag(ctx, "no-password") | ||
} | ||
return ToP12(out, crtFile, keyFile, caFiles, passwordFile, noPassword, insecure) | ||
} | ||
|
||
// Otherwise interconvert between PEM and DER. | ||
return interconvertPemAndDer(sourceFile, out) | ||
} | ||
|
||
// If format is PEM or DER (not P12) then an input certificate file is required. | ||
if format != "p12" { | ||
return errors.Errorf("flag --format with value '%s' requires a certificate file as positional argument", format) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Commands like these will stop working: $ cat cert.pem | step certificate format
... der data ...
$ cat cert.der | step certificate format
... pem data ... |
||
} | ||
return ToP12(out, crtFile, keyFile, caFiles, passwordFile, noPassword, insecure) | ||
} | ||
|
||
func interconvertPemAndDer(crtFile, out string) error { | ||
var ob []byte | ||
|
||
if crtFile == "" { | ||
crtFile = "-" | ||
} | ||
|
||
|
@@ -116,7 +271,7 @@ func formatAction(ctx *cli.Context) error { | |
} | ||
} | ||
if err := utils.WriteFile(out, ob, mode); err != nil { | ||
return err | ||
return errs.FileError(err, out) | ||
} | ||
ui.Printf("Your certificate has been saved in %s\n", out) | ||
} | ||
|
@@ -133,21 +288,95 @@ func decodeCertificatePem(b []byte) ([]byte, error) { | |
} | ||
switch block.Type { | ||
case "CERTIFICATE": | ||
crt, err := x509.ParseCertificate(block.Bytes) | ||
if err != nil { | ||
if _, err := x509.ParseCertificate(block.Bytes); err != nil { | ||
return nil, errors.Wrap(err, "error parsing certificate") | ||
} | ||
return crt.Raw, nil | ||
return block.Bytes, nil | ||
case "CERTIFICATE REQUEST": | ||
csr, err := x509.ParseCertificateRequest(block.Bytes) | ||
if err != nil { | ||
if _, err := x509.ParseCertificateRequest(block.Bytes); err != nil { | ||
return nil, errors.Wrap(err, "error parsing certificate request") | ||
} | ||
return csr.Raw, nil | ||
return block.Bytes, nil | ||
case "RSA PRIVATE KEY": | ||
if _, err := x509.ParsePKCS1PrivateKey(block.Bytes); err != nil { | ||
return nil, errors.Wrap(err, "error parsing RSA private key") | ||
} | ||
return block.Bytes, nil | ||
case "EC PRIVATE KEY": | ||
if _, err := x509.ParseECPrivateKey(block.Bytes); err != nil { | ||
return nil, errors.Wrap(err, "error parsing EC private key") | ||
} | ||
return block.Bytes, nil | ||
case "PRIVATE KEY": | ||
if _, err := x509.ParsePKCS8PrivateKey(block.Bytes); err != nil { | ||
return nil, errors.Wrap(err, "error parsing private key") | ||
} | ||
|
||
return block.Bytes, nil | ||
default: | ||
continue | ||
} | ||
} | ||
|
||
return nil, errors.Errorf("error decoding certificate: invalid PEM block") | ||
} | ||
|
||
func writeCerts(filename, format string, certs []*x509.Certificate) error { | ||
if len(certs) > 1 && format == "der" { | ||
return errors.Errorf("der format does not support a certificate bundle") | ||
} | ||
var data []byte | ||
for _, cert := range certs { | ||
b, err := toByte(cert, format) | ||
if err != nil { | ||
return err | ||
} | ||
data = append(data, b...) | ||
} | ||
if err := maybeWrite(filename, data); err != nil { | ||
return err | ||
} | ||
return nil | ||
} | ||
|
||
func write(filename, format string, in interface{}) error { | ||
b, err := toByte(in, format) | ||
if err != nil { | ||
return err | ||
} | ||
if err := maybeWrite(filename, b); err != nil { | ||
return err | ||
} | ||
return nil | ||
} | ||
|
||
func maybeWrite(filename string, out []byte) error { | ||
if filename == "" { | ||
os.Stdout.Write(out) | ||
} else { | ||
if err := utils.WriteFile(filename, out, 0600); err != nil { | ||
return errs.FileError(err, filename) | ||
} | ||
} | ||
return nil | ||
} | ||
|
||
func toByte(in interface{}, format string) ([]byte, error) { | ||
pemblk, err := pemutil.Serialize(in) | ||
if err != nil { | ||
return nil, err | ||
} | ||
pemByte := pem.EncodeToMemory(pemblk) | ||
switch format { | ||
case "der": | ||
derByte, err := decodeCertificatePem(pemByte) | ||
if err != nil { | ||
return nil, err | ||
} | ||
return derByte, nil | ||
case "pem", "": | ||
return pemByte, nil | ||
default: | ||
return nil, errors.Errorf("unsupported format: %s", format) | ||
} | ||
} |
Uh oh!
There was an error while loading. Please reload this page.