#!/usr/bin/python # -*- coding: utf-8 -*- # Copyright (c) 2016-2017, Yanis Guenane # Copyright (c) 2017, Markus Teufelberger # GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt) # SPDX-License-Identifier: GPL-3.0-or-later from __future__ import absolute_import, division, print_function __metaclass__ = type DOCUMENTATION = r''' --- module: openssl_privatekey_info short_description: Provide information for OpenSSL private keys description: - This module allows one to query information on OpenSSL private keys. - In case the key consistency checks fail, the module will fail as this indicates a faked private key. In this case, all return variables are still returned. Note that key consistency checks are not available all key types; if none is available, V(none) is returned for RV(key_is_consistent). - It uses the cryptography python library to interact with OpenSSL. requirements: - cryptography >= 1.2.3 author: - Felix Fontein (@felixfontein) - Yanis Guenane (@Spredzy) extends_documentation_fragment: - community.crypto.attributes - community.crypto.attributes.info_module options: path: description: - Remote absolute path where the private key file is loaded from. type: path content: description: - Content of the private key file. - Either O(path) or O(content) must be specified, but not both. type: str version_added: '1.0.0' passphrase: description: - The passphrase for the private key. type: str return_private_key_data: description: - Whether to return private key data. - Only set this to V(true) when you want private information about this key to leave the remote machine. - "B(WARNING:) you have to make sure that private key data is not accidentally logged!" type: bool default: false check_consistency: description: - Whether to check consistency of the private key. - In community.crypto < 2.0.0, consistency was always checked. - Since community.crypto 2.0.0, the consistency check has been disabled by default to avoid private key material to be transported around and computed with, and only do so when requested explicitly. This can potentially prevent L(side-channel attacks,https://en.wikipedia.org/wiki/Side-channel_attack). - Note that consistency checks only work for certain key types, and might depend on the version of the cryptography library. For example, with cryptography 42.0.0 and newer consistency of RSA keys can no longer be checked. type: bool default: false version_added: 2.0.0 select_crypto_backend: description: - Determines which crypto backend to use. - The default choice is V(auto), which tries to use C(cryptography) if available. - If set to V(cryptography), will try to use the L(cryptography,https://cryptography.io/) library. type: str default: auto choices: [ auto, cryptography ] seealso: - module: community.crypto.openssl_privatekey - module: community.crypto.openssl_privatekey_pipe - plugin: community.crypto.openssl_privatekey_info plugin_type: filter description: A filter variant of this module. ''' EXAMPLES = r''' - name: Generate an OpenSSL private key with the default values (4096 bits, RSA) community.crypto.openssl_privatekey: path: /etc/ssl/private/ansible.com.pem - name: Get information on generated key community.crypto.openssl_privatekey_info: path: /etc/ssl/private/ansible.com.pem register: result - name: Dump information ansible.builtin.debug: var: result ''' RETURN = r''' can_load_key: description: Whether the module was able to load the private key from disk. returned: always type: bool can_parse_key: description: Whether the module was able to parse the private key. returned: always type: bool key_is_consistent: description: - Whether the key is consistent. Can also return V(none) next to V(true) and V(false), to indicate that consistency could not be checked. - In case the check returns V(false), the module will fail. returned: when O(check_consistency=true) type: bool public_key: description: Private key's public key in PEM format. returned: success type: str sample: "-----BEGIN PUBLIC KEY-----\nMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A..." public_key_fingerprints: description: - Fingerprints of private key's public key. - For every hash algorithm available, the fingerprint is computed. returned: success type: dict sample: "{'sha256': 'd4:b3:aa:6d:c8:04:ce:4e:ba:f6:29:4d:92:a3:94:b0:c2:ff:bd:bf:33:63:11:43:34:0f:51:b0:95:09:2f:63', 'sha512': 'f7:07:4a:f0:b0:f0:e6:8b:95:5f:f9:e6:61:0a:32:68:f1..." type: description: - The key's type. - One of V(RSA), V(DSA), V(ECC), V(Ed25519), V(X25519), V(Ed448), or V(X448). - Will start with V(unknown) if the key type cannot be determined. returned: success type: str sample: RSA public_data: description: - Public key data. Depends on key type. returned: success type: dict contains: size: description: - Bit size of modulus (RSA) or prime number (DSA). type: int returned: When RV(type=RSA) or RV(type=DSA) modulus: description: - The RSA key's modulus. type: int returned: When RV(type=RSA) exponent: description: - The RSA key's public exponent. type: int returned: When RV(type=RSA) p: description: - The C(p) value for DSA. - This is the prime modulus upon which arithmetic takes place. type: int returned: When RV(type=DSA) q: description: - The C(q) value for DSA. - This is a prime that divides C(p - 1), and at the same time the order of the subgroup of the multiplicative group of the prime field used. type: int returned: When RV(type=DSA) g: description: - The C(g) value for DSA. - This is the element spanning the subgroup of the multiplicative group of the prime field used. type: int returned: When RV(type=DSA) curve: description: - The curve's name for ECC. type: str returned: When RV(type=ECC) exponent_size: description: - The maximum number of bits of a private key. This is basically the bit size of the subgroup used. type: int returned: When RV(type=ECC) x: description: - The C(x) coordinate for the public point on the elliptic curve. type: int returned: When RV(type=ECC) y: description: - For RV(type=ECC), this is the C(y) coordinate for the public point on the elliptic curve. - For RV(type=DSA), this is the publicly known group element whose discrete logarithm w.r.t. C(g) is the private key. type: int returned: When RV(type=DSA) or RV(type=ECC) private_data: description: - Private key data. Depends on key type. returned: success and when O(return_private_key_data) is set to V(true) type: dict ''' from ansible.module_utils.basic import AnsibleModule from ansible.module_utils.common.text.converters import to_native from ansible_collections.community.crypto.plugins.module_utils.crypto.basic import ( OpenSSLObjectError, ) from ansible_collections.community.crypto.plugins.module_utils.crypto.module_backends.privatekey_info import ( PrivateKeyConsistencyError, PrivateKeyParseError, select_backend, ) def main(): module = AnsibleModule( argument_spec=dict( path=dict(type='path'), content=dict(type='str', no_log=True), passphrase=dict(type='str', no_log=True), return_private_key_data=dict(type='bool', default=False), check_consistency=dict(type='bool', default=False), select_crypto_backend=dict(type='str', default='auto', choices=['auto', 'cryptography']), ), required_one_of=( ['path', 'content'], ), mutually_exclusive=( ['path', 'content'], ), supports_check_mode=True, ) result = dict( can_load_key=False, can_parse_key=False, key_is_consistent=None, ) if module.params['content'] is not None: data = module.params['content'].encode('utf-8') else: try: with open(module.params['path'], 'rb') as f: data = f.read() except (IOError, OSError) as e: module.fail_json(msg='Error while reading private key file from disk: {0}'.format(e), **result) result['can_load_key'] = True backend, module_backend = select_backend( module, module.params['select_crypto_backend'], data, passphrase=module.params['passphrase'], return_private_key_data=module.params['return_private_key_data'], check_consistency=module.params['check_consistency']) try: result.update(module_backend.get_info()) module.exit_json(**result) except PrivateKeyParseError as exc: result.update(exc.result) module.fail_json(msg=exc.error_message, **result) except PrivateKeyConsistencyError as exc: result.update(exc.result) module.fail_json(msg=exc.error_message, **result) except OpenSSLObjectError as exc: module.fail_json(msg=to_native(exc)) if __name__ == "__main__": main()