6 from argparse import ArgumentParser
8 from sfa.util.sfalogging import logger
9 from sfa.util.faults import CredentialNotVerifiable, CertMissingParent #, ChildRightsNotSubsetOfParent
11 from sfa.trust.certificate import Certificate
12 from sfa.trust.credential import Credential
13 from sfa.trust.gid import GID
15 from sfa.storage.record import Record
17 def determine_sfa_filekind(fn):
19 if fn.endswith('.gid'): return 'gid'
20 elif fn.endswith('.cert'): return 'certificate'
21 elif fn.endswith('cred'): return 'credential'
24 cred=Credential(filename=fn)
30 if gid.uuid: return 'gid'
34 cert = Certificate(filename = fn)
39 # if "gidCaller" in dict:
49 lastpart = hrn.split(".")[-1]
50 filename = lastpart + ".gid"
52 if os.path.exists(filename):
53 print filename, ": already exists... skipping"
56 print filename, ": extracting gid of", hrn
58 gid.save_to_file(filename, save_parents = True)
60 def extract_gids(cred, extract_parents):
61 gidCaller = cred.get_gid_caller()
65 gidObject = cred.get_gid_object()
66 if gidObject and ((gidCaller == None) or (gidCaller.get_hrn() != gidObject.get_hrn())):
69 # no such method Credential.get_parent
71 # parent = cred.get_parent()
73 # extract_gids(parent, extract_parents)
75 def verify_input_object (obj, kind, options):
76 if options.trusted_roots:
78 message= "against [" + (" + ".join(options.trusted_roots)) + "]"
80 if kind=='credential':
81 print "verify",message,
82 obj.verify(options.trusted_roots)
83 elif kind in ['certificate','gid']:
84 print "verify_chain",message,
85 obj.verify_chain(options.trusted_roots)
87 except Exception as inst:
88 print "--> KO",type(inst).__name__
90 def handle_input (filename, options):
91 kind = determine_sfa_filekind(filename)
93 # dump methods current do 'print' so let's go this road for now
94 if kind=="certificate":
95 cert=Certificate (filename=filename)
96 print '--------------------',filename,'IS A',kind
97 cert.dump(show_extensions=options.show_extensions)
98 verify_input_object (cert, kind, options)
99 elif kind=="credential":
100 cred = Credential(filename = filename)
101 print '--------------------',filename,'IS A',kind
102 cred.dump(dump_parents = options.dump_parents, show_xml=options.show_xml)
103 if options.extract_gids:
104 print '--------------------',filename,'embedded GIDs'
105 extract_gids(cred, extract_parents = options.dump_parents)
106 verify_input_object (cred, kind, options)
108 gid = GID(filename = filename)
109 print '--------------------',filename,'IS A',kind
110 gid.dump(dump_parents = options.dump_parents)
111 verify_input_object (gid, kind, options)
113 print "%s: unknown filekind '%s'"% (filename,kind)
116 usage = """%(prog)s file1 [ .. filen]
117 display info on input files"""
118 parser = ArgumentParser(usage=usage)
120 parser.add_argument("-g", "--extract-gids", action="store_true", dest="extract_gids",
121 default=False, help="Extract GIDs from credentials")
122 parser.add_argument("-p", "--dump-parents", action="store_true", dest="dump_parents",
123 default=False, help="Show parents")
124 parser.add_argument("-e", "--extensions", action="store_true",
125 dest="show_extensions", default="False", help="Show certificate extensions")
126 parser.add_argument("-v", "--verbose", action='count',
127 dest='verbose', default=0, help="More and more verbose")
128 parser.add_argument("-x", "--xml", action='store_true',
129 dest='show_xml', default=False, help="dumps xml tree (cred. only)")
130 parser.add_argument("-c", "--check", action='append', dest='trusted_roots',
131 help="cumulative list of trusted GIDs - when provided, the input is verify'ed against these")
132 parser.add_argument("filenames",metavar='F',nargs='+',help="filenames to dump")
133 options = parser.parse_args()
135 logger.setLevelFromOptVerbose(options.verbose)
136 for filename in options.filenames:
137 handle_input(filename,options)
139 if __name__=="__main__":