Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code | Sign in
(831)

Unified Diff: environs/config/config.go

Issue 6852081: environs/config: old (reverted) CL
Patch Set: environs/config: old (reverted) CL Created 12 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Please Sign in to add in-line comments.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « environs/config/authkeys.go ('k') | environs/config/config_test.go » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: environs/config/config.go
=== modified file 'environs/config/config.go'
--- environs/config/config.go 2012-11-21 11:57:33 +0000
+++ environs/config/config.go 2012-11-21 13:05:46 +0000
@@ -4,6 +4,8 @@
"fmt"
"launchpad.net/juju-core/schema"
"launchpad.net/juju-core/version"
+ "os"
+ "strings"
)
// FirewallMode defines the way in which the environment
@@ -28,14 +30,29 @@
m, t map[string]interface{}
}
+// TODO(rog) update the doc comment below - it's getting messy
+// and it assumes too much prior knowledge.
+
// New returns a new configuration.
-// Fields that are common to all environment providers are verified,
-// and authorized-keys-path is also translated into authorized-keys
-// by loading the content from respective file.
-//
-// The required keys are: "name", "type" and "authorized-keys",
-// all of type string. Additional keys recognised are: "agent-version" and
-// "development", of types string and bool respectively.
+// Fields that are common to all environment providers are verified.
+// The "authorized-keys-path" key is translated into "authorized-keys"
+// by loading the content from respective file. Similarly,
+// "ca-cert-path" and "ca-private-key-path" are translated into the
+// "ca-cert" and "ca-private-key" values.
+// If not specified, authorized SSH keys and CA details will
+// be read from:
+//
+// ~/.ssh/id_dsa.pub
+// ~/.ssh/id_rsa.pub
+// ~/.ssh/identity.pub
+// ~/.juju/<name>-cert.pem
+// ~/.juju/<name>-private-key.pem
+//
+// The required keys (after any files have been read) are:
+// "name", "type", "authorized-keys" and
+// "ca-cert", all of type string. Additional keys recognised are:
+// "agent-version" and "development", of types string and bool
+// respectively.
func New(attrs map[string]interface{}) (*Config, error) {
m, err := checker.Coerce(attrs, nil)
if err != nil {
@@ -46,23 +63,67 @@
t: make(map[string]interface{}),
}
+ name := c.m["name"].(string)
+ if name == "" {
+ return nil, fmt.Errorf("empty name in environment configuration")
+ }
+ if strings.ContainsAny(name, "/\\") {
+ return nil, fmt.Errorf("environment name contains unsafe characters")
+ }
+
if c.m["default-series"].(string) == "" {
c.m["default-series"] = version.Current.Series
}
- // Load authorized-keys-path onto authorized-keys, if necessary.
+ // Load authorized-keys-path into authorized-keys if necessary.
path := c.m["authorized-keys-path"].(string)
keys := c.m["authorized-keys"].(string)
if path != "" || keys == "" {
- c.m["authorized-keys"], err = authorizedKeys(path)
+ c.m["authorized-keys"], err = readAuthorizedKeys(path)
if err != nil {
return nil, err
}
}
delete(c.m, "authorized-keys-path")
+ // Load CA certificate into ca-cert if necessary.
+ caCert := []byte(c.m["ca-cert"].(string))
+ caCertPath := c.m["ca-cert-path"].(string)
+ if caCertPath != "" || len(caCert) == 0 {
+ caCert, err = readFile(caCertPath, name+"-cert.pem")
+ if err != nil {
+ return nil, err
+ }
+ c.m["ca-cert"] = string(caCert)
+ }
+ delete(c.m, "ca-cert-path")
+
+ // Load CA key into ca-private-cert if necessary.
+ var caKey []byte
+ if k, ok := c.m["ca-private-key"]; ok {
+ caKey = []byte(k.(string))
+ }
+ caKeyPath := c.m["ca-private-key-path"].(string)
+ // Note: we do not read the key file if the CA key is
+ // specified as a empty string.
+ if caKeyPath != "" || caKey == nil {
+ caKey, err = readFile(caKeyPath, name+"-private-key.pem")
+ if err != nil && !os.IsNotExist(err) {
+ return nil, err
+ }
+ c.m["ca-private-key"] = string(caKey)
+ }
+ delete(c.m, "ca-private-key-path")
+
+ if err := verifyKeyPair(caCert, caKey); err != nil {
+ if caCertPath == "" {
+ return nil, fmt.Errorf("bad CA certificate/key in configuration: %v", err)
+ }
+ return nil, fmt.Errorf("bad CA certificate in %q: %v", caCertPath, err)
+ }
+
// Check if there are any required fields that are empty.
- for _, attr := range []string{"name", "type", "default-series", "authorized-keys"} {
+ for _, attr := range []string{"type", "default-series", "authorized-keys", "ca-cert"} {
if s, _ := c.m[attr].(string); s == "" {
return nil, fmt.Errorf("empty %s in environment configuration", attr)
}
@@ -113,6 +174,19 @@
return c.m["authorized-keys"].(string)
}
+// CACertPEM returns the X509 certificate for the
+// certifying authority, in PEM format.
+func (c *Config) CACertPEM() string {
+ return c.m["ca-cert"].(string)
+}
+
+// CAPrivateKeyPEM returns the private key of the
+// certifying authority, in PEM format.
+// It is empty if the key is not available.
+func (c *Config) CAPrivateKeyPEM() string {
+ return c.m["ca-private-key"].(string)
+}
+
// AdminSecret returns the administrator password.
// It's empty if the password has not been set.
func (c *Config) AdminSecret() string {
@@ -185,6 +259,10 @@
"agent-version": schema.String(),
"development": schema.Bool(),
"admin-secret": schema.String(),
+ "ca-cert": schema.String(),
+ "ca-cert-path": schema.String(),
+ "ca-private-key": schema.String(),
+ "ca-private-key-path": schema.String(),
}
var defaults = schema.Defaults{
@@ -195,6 +273,10 @@
"agent-version": schema.Omit,
"development": false,
"admin-secret": "",
+ "ca-cert-path": "",
+ "ca-cert": "",
+ "ca-private-key-path": "",
+ "ca-private-key": schema.Omit,
}
var checker = schema.FieldMap(fields, defaults)
« no previous file with comments | « environs/config/authkeys.go ('k') | environs/config/config_test.go » ('j') | no next file with comments »

Powered by Google App Engine
RSS Feeds Recent Issues | This issue
This is Rietveld f62528b