Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixed #41 -- allow updating cloudfront certificates #44

Open
wants to merge 4 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,13 @@ environment variable. This should be a JSON object with the following schema:
},
"hosts": ["list of hosts you want on the certificate (strings)"],
"key_type": "rsa or ecdsa, optional, defaults to rsa (string)"
},
{
"cloudfront": {
"id": "CloudFront distribution ID (string)"
},
"hosts": ["list of hosts you want on the certificate (strings)"],
"key_type": "rsa or ecdsa, optional, defaults to rsa (string)"
}
],
"acme_account_key": "location of the account private key (string)",
Expand Down
123 changes: 87 additions & 36 deletions letsencrypt-aws.py
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,41 @@ def __init__(self, cert_location, dns_challenge_completer, hosts,
self.key_type = key_type


def _get_iam_certificate(iam_client, certificate_id):
paginator = iam_client.get_paginator("list_server_certificates")
for page in paginator.paginate():
for server_certificate in page["ServerCertificateMetadataList"]:
if server_certificate["Arn"] == certificate_id:
cert_name = server_certificate["ServerCertificateName"]
response = iam_client.get_server_certificate(
ServerCertificateName=cert_name,
)
return x509.load_pem_x509_certificate(
response["ServerCertificate"]["CertificateBody"],
default_backend(),
)


def _upload_iam_certificate(iam_client, hosts, private_key, pem_certificate,
pem_certificate_chain):
response = iam_client.upload_server_certificate(
ServerCertificateName=generate_certificate_name(
hosts,
x509.load_pem_x509_certificate(
pem_certificate, default_backend()
)
),
PrivateKey=private_key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption(),
),
CertificateBody=pem_certificate,
CertificateChain=pem_certificate_chain,
)
return response["ServerCertificateMetadata"]["Arn"]


class ELBCertificate(object):
def __init__(self, elb_client, iam_client, elb_name, elb_port):
self.elb_client = elb_client
Expand All @@ -72,41 +107,18 @@ def get_current_certificate(self):
if listener["Listener"]["LoadBalancerPort"] == self.elb_port
]

paginator = self.iam_client.get_paginator("list_server_certificates")
for page in paginator.paginate():
for server_certificate in page["ServerCertificateMetadataList"]:
if server_certificate["Arn"] == certificate_id:
cert_name = server_certificate["ServerCertificateName"]
response = self.iam_client.get_server_certificate(
ServerCertificateName=cert_name,
)
return x509.load_pem_x509_certificate(
response["ServerCertificate"]["CertificateBody"],
default_backend(),
)
return _get_iam_certificate(self.iam_client, certificate_id)

def update_certificate(self, logger, hosts, private_key, pem_certificate,
pem_certificate_chain):
logger.emit(
"updating-elb.upload-iam-certificate", elb_name=self.elb_name
)

response = self.iam_client.upload_server_certificate(
ServerCertificateName=generate_certificate_name(
hosts,
x509.load_pem_x509_certificate(
pem_certificate, default_backend()
)
),
PrivateKey=private_key.private_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PrivateFormat.TraditionalOpenSSL,
encryption_algorithm=serialization.NoEncryption(),
),
CertificateBody=pem_certificate,
CertificateChain=pem_certificate_chain,
new_cert_arn = _upload_iam_certificate(
self.iam_client,
hosts, private_key, pem_certificate, pem_certificate_chain
)
new_cert_arn = response["ServerCertificateMetadata"]["Arn"]

# Sleep before trying to set the certificate, it appears to sometimes
# fail without this.
Expand All @@ -119,6 +131,46 @@ def update_certificate(self, logger, hosts, private_key, pem_certificate,
)


class CloudFrontCertificate(object):
def __init__(self, cloudfront_client, iam_client, distribution_id):
self.cloudfront_client = cloudfront_client
self.iam_client = iam_client
self.distribution_id = distribution_id

def get_current_certificate(self):
response = self.cloudfront_client.get_distribution_config(
Id=self.distribution_id
)
cert = response["DistributionConfig"]["ViewerCertificate"]
# If the cert is of a different type then we don't have code to check
# for it, annoying.
assert cert.get("IAMCertificateId")
return _get_iam_certificate(
self.iam_client, cert["IAMCertificateId"]
)

def update_certificate(self, logger, hosts, private_key, pem_certificate,
pem_certificate_chain):
logger.emit("upload-iam-certificate")
new_cert_arn = _upload_iam_certificate(
self.iam_client,
hosts, private_key, pem_certificate, pem_certificate_chain
)

# Sleep before trying to set the certificate, it appears to sometimes
# fail without this.
time.sleep(15)

config = self.cloudfront_client.get_distribution_config(
Id=self.distribution_id
)
cert = config["DistributionConfig"]["ViewerCertificate"]
cert["IAMCertificateId"] = new_cert_arn

logger.emit("set-cloudfront-distribution-certificate")
self.cloudfront_client.update_distribution(DistributionConfig=config)


class Route53ChallengeCompleter(object):
def __init__(self, route53_client):
self.route53_client = route53_client
Expand Down Expand Up @@ -460,18 +512,12 @@ def update_certificates(persistent=False, force_issue=False):
raise ValueError("Can't specify both --persistent and --force-issue")

session = boto3.Session()
s3_client = session.client("s3")
elb_client = session.client("elb")
route53_client = session.client("route53")
s3_client = session.client("s3")
iam_client = session.client("iam")
elb_client = session.client("elb")
cloudfront_client = session.client("cloudfront")

# Structure: {
# "domains": [
# {"elb": {"name" "...", "port" 443}, hosts: ["..."]}
# ],
# "acme_account_key": "s3://bucket/object",
# "acme_directory_url": "(optional)"
# }
config = json.loads(os.environ["LETSENCRYPT_AWS_CONFIG"])
domains = config["domains"]
acme_directory_url = config.get(
Expand All @@ -489,6 +535,11 @@ def update_certificates(persistent=False, force_issue=False):
elb_client, iam_client,
domain["elb"]["name"], int(domain["elb"].get("port", 443))
)
elif "cloudfront" in domain:
cert_location = CloudFrontCertificate(
cloudfront_client, iam_client,
domain["cloudfront"]["id"],
)
else:
raise ValueError(
"Unknown certificate location: {!r}".format(domain)
Expand Down