2 from __future__ import with_statement
7 from argparse import ArgumentParser
9 from sfa.util.sfalogging import logger
10 from sfa.util.faults import CredentialNotVerifiable, CertMissingParent #, ChildRightsNotSubsetOfParent
12 from sfa.trust.certificate import Certificate
13 from sfa.trust.credential import Credential
14 from sfa.trust.gid import GID
16 from sfa.storage.record import Record
18 def determine_sfa_filekind(fn):
20 if fn.endswith('.gid'): return 'gid'
21 elif fn.endswith('.cert'): return 'certificate'
22 elif fn.endswith('cred'): return 'credential'
25 cred=Credential(filename=fn)
31 if gid.uuid: return 'gid'
35 cert = Certificate(filename = fn)
40 # if "gidCaller" in dict:
50 lastpart = hrn.split(".")[-1]
51 filename = lastpart + ".gid"
53 if os.path.exists(filename):
54 print filename, ": already exists... skipping"
57 print filename, ": extracting gid of", hrn
59 gid.save_to_file(filename, save_parents = True)
61 def extract_gids(cred, extract_parents):
62 gidCaller = cred.get_gid_caller()
66 gidObject = cred.get_gid_object()
67 if gidObject and ((gidCaller == None) or (gidCaller.get_hrn() != gidObject.get_hrn())):
70 # no such method Credential.get_parent
72 # parent = cred.get_parent()
74 # extract_gids(parent, extract_parents)
76 def verify_input_object (obj, kind, options):
77 if options.trusted_roots:
79 message= "against [" + (" + ".join(options.trusted_roots)) + "]"
81 if kind=='credential':
82 print "verify",message,
83 obj.verify(options.trusted_roots)
84 elif kind in ['certificate','gid']:
85 print "verify_chain",message,
86 obj.verify_chain(options.trusted_roots)
88 except Exception as inst:
89 print "--> KO",type(inst).__name__
91 def handle_input (filename, options):
92 kind = determine_sfa_filekind(filename)
94 # dump methods current do 'print' so let's go this road for now
95 if kind=="certificate":
96 cert=Certificate (filename=filename)
97 print '--------------------',filename,'IS A',kind
98 cert.dump(show_extensions=options.show_extensions)
99 verify_input_object (cert, kind, options)
100 elif kind=="credential":
101 cred = Credential(filename = filename)
102 print '--------------------',filename,'IS A',kind
103 cred.dump(dump_parents = options.dump_parents, show_xml=options.show_xml)
104 if options.extract_gids:
105 print '--------------------',filename,'embedded GIDs'
106 extract_gids(cred, extract_parents = options.dump_parents)
107 verify_input_object (cred, kind, options)
109 gid = GID(filename = filename)
110 print '--------------------',filename,'IS A',kind
111 gid.dump(dump_parents = options.dump_parents)
112 verify_input_object (gid, kind, options)
114 print "%s: unknown filekind '%s'"% (filename,kind)
117 usage = """%(prog)s file1 [ .. filen]
118 display info on input files"""
119 parser = ArgumentParser(usage=usage)
121 parser.add_argument("-g", "--extract-gids", action="store_true", dest="extract_gids",
122 default=False, help="Extract GIDs from credentials")
123 parser.add_argument("-p", "--dump-parents", action="store_true", dest="dump_parents",
124 default=False, help="Show parents")
125 parser.add_argument("-e", "--extensions", action="store_true",
126 dest="show_extensions", default="False", help="Show certificate extensions")
127 parser.add_argument("-v", "--verbose", action='count',
128 dest='verbose', default=0, help="More and more verbose")
129 parser.add_argument("-x", "--xml", action='store_true',
130 dest='show_xml', default=False, help="dumps xml tree (cred. only)")
131 parser.add_argument("-c", "--check", action='append', dest='trusted_roots',
132 help="cumulative list of trusted GIDs - when provided, the input is verify'ed against these")
133 parser.add_argument("filenames",metavar='F',nargs='+',help="filenames to dump")
134 options = parser.parse_args()
136 logger.setLevelFromOptVerbose(options.verbose)
137 for filename in options.filenames:
138 handle_input(filename,options)
140 if __name__=="__main__":