summaryrefslogtreecommitdiffstats
path: root/client/go/cmd/cert.go
blob: 6fbe19b524dc87bf253c1efb9a756c817a3ebf26 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
// Copyright Yahoo. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root.
// vespa cert command
// Author: mpolden
package cmd

import (
	"fmt"
	"os"
	"path/filepath"

	"github.com/spf13/cobra"
	"github.com/vespa-engine/vespa/client/go/util"
	"github.com/vespa-engine/vespa/client/go/vespa"
)

var overwriteCertificate bool

func init() {
	certCmd.Flags().BoolVarP(&overwriteCertificate, "force", "f", false, "Force overwrite of existing certificate and private key")
	certCmd.MarkPersistentFlagRequired(applicationFlag)
}

func certExample() string {
	if vespa.Auth0AccessTokenEnabled() {
		return "$ vespa auth cert -a my-tenant.my-app.my-instance"
	} else {
		return "$ vespa cert -a my-tenant.my-app.my-instance"
	}
}

var certCmd = &cobra.Command{
	Use:               "cert",
	Short:             "Create a new private key and self-signed certificate for Vespa Cloud deployment",
	Example:           certExample(),
	DisableAutoGenTag: true,
	Args:              cobra.MaximumNArgs(1),
	Run: func(cmd *cobra.Command, args []string) {
		app := getApplication()
		pkg, err := vespa.FindApplicationPackage(applicationSource(args), false)
		if err != nil {
			fatalErr(err)
			return
		}
		cfg, err := LoadConfig()
		if err != nil {
			fatalErr(err)
			return
		}
		privateKeyFile, err := cfg.PrivateKeyPath(app)
		if err != nil {
			fatalErr(err)
			return
		}
		certificateFile, err := cfg.CertificatePath(app)
		if err != nil {
			fatalErr(err)
			return
		}

		if !overwriteCertificate {
			hint := "Use -f flag to force overwriting"
			if pkg.HasCertificate() {
				fatalErrHint(fmt.Errorf("Application package %s already contains a certificate", pkg.Path), hint)
				return
			}
			if util.PathExists(privateKeyFile) {
				fatalErrHint(fmt.Errorf("Private key %s already exists", color.Cyan(privateKeyFile)), hint)
				return
			}
			if util.PathExists(certificateFile) {
				fatalErrHint(fmt.Errorf("Certificate %s already exists", color.Cyan(certificateFile)), hint)
				return
			}
		}
		if pkg.IsZip() {
			var msg string
			if vespa.Auth0AccessTokenEnabled() {
				msg = "Try running 'mvn clean' before 'vespa auth cert', and then 'mvn package'"
			} else {
				msg = "Try running 'mvn clean' before 'vespa cert', and then 'mvn package'"
			}
			fatalErrHint(fmt.Errorf("Cannot add certificate to compressed application package %s", pkg.Path),
				msg)
			return
		}

		keyPair, err := vespa.CreateKeyPair()
		if err != nil {
			fatalErr(err, "Could not create key pair")
			return
		}
		pkgCertificateFile := filepath.Join(pkg.Path, "security", "clients.pem")
		if err := os.MkdirAll(filepath.Dir(pkgCertificateFile), 0755); err != nil {
			fatalErr(err, "Could not create security directory")
			return
		}
		if err := keyPair.WriteCertificateFile(pkgCertificateFile, overwriteCertificate); err != nil {
			fatalErr(err, "Could not write certificate")
			return
		}
		if err := keyPair.WriteCertificateFile(certificateFile, overwriteCertificate); err != nil {
			fatalErr(err, "Could not write certificate")
			return
		}
		if err := keyPair.WritePrivateKeyFile(privateKeyFile, overwriteCertificate); err != nil {
			fatalErr(err, "Could not write private key")
			return
		}
		printSuccess("Certificate written to ", color.Cyan(pkgCertificateFile))
		printSuccess("Certificate written to ", color.Cyan(certificateFile))
		printSuccess("Private key written to ", color.Cyan(privateKeyFile))
	},
}