summaryrefslogtreecommitdiff
path: root/deps/rabbitmq_management/src/rabbit_mgmt_wm_health_check_certificate_expiration.erl
diff options
context:
space:
mode:
Diffstat (limited to 'deps/rabbitmq_management/src/rabbit_mgmt_wm_health_check_certificate_expiration.erl')
-rw-r--r--deps/rabbitmq_management/src/rabbit_mgmt_wm_health_check_certificate_expiration.erl178
1 files changed, 178 insertions, 0 deletions
diff --git a/deps/rabbitmq_management/src/rabbit_mgmt_wm_health_check_certificate_expiration.erl b/deps/rabbitmq_management/src/rabbit_mgmt_wm_health_check_certificate_expiration.erl
new file mode 100644
index 0000000000..f0fd466b2a
--- /dev/null
+++ b/deps/rabbitmq_management/src/rabbit_mgmt_wm_health_check_certificate_expiration.erl
@@ -0,0 +1,178 @@
+%% This Source Code Form is subject to the terms of the Mozilla Public
+%% License, v. 2.0. If a copy of the MPL was not distributed with this
+%% file, You can obtain one at https://mozilla.org/MPL/2.0/.
+%%
+%% Copyright (c) 2007-2020 VMware, Inc. or its affiliates. All rights reserved.
+%%
+
+%% An HTTP API counterpart of 'rabbitmq-diagnostics check_certificate_expiration'
+-module(rabbit_mgmt_wm_health_check_certificate_expiration).
+
+-export([init/2, to_json/2, content_types_provided/2, is_authorized/2]).
+-export([resource_exists/2]).
+-export([variances/2]).
+
+-include_lib("public_key/include/public_key.hrl").
+-include_lib("rabbitmq_management_agent/include/rabbit_mgmt_records.hrl").
+-include_lib("rabbit_common/include/rabbit.hrl").
+
+-define(DAYS_SECONDS, 86400).
+-define(WEEKS_SECONDS, ?DAYS_SECONDS * 7).
+-define(MONTHS_SECONDS, ?DAYS_SECONDS * (365 / 12)).
+-define(YEARS_SECONDS, ?DAYS_SECONDS * 365).
+
+%%--------------------------------------------------------------------
+
+init(Req, _State) ->
+ {cowboy_rest, rabbit_mgmt_headers:set_common_permission_headers(Req, ?MODULE), #context{}}.
+
+variances(Req, Context) ->
+ {[<<"accept-encoding">>, <<"origin">>], Req, Context}.
+
+content_types_provided(ReqData, Context) ->
+ {rabbit_mgmt_util:responder_map(to_json), ReqData, Context}.
+
+resource_exists(ReqData, Context) ->
+ {true, ReqData, Context}.
+
+to_json(ReqData, Context) ->
+ Listeners = rabbit_networking:active_listeners(),
+ Local = [L || #listener{node = N} = L <- Listeners, N == node()],
+ case convert(within(ReqData), unit(ReqData)) of
+ {error, Reason} ->
+ rabbit_mgmt_util:bad_request(iolist_to_binary(Reason), ReqData, Context);
+ Seconds ->
+ ExpiringListeners = lists:foldl(fun(L, Acc) ->
+ case listener_expiring_within(L, Seconds) of
+ false -> Acc;
+ Map -> [Map | Acc]
+ end
+ end, [], Local),
+ case ExpiringListeners of
+ [] ->
+ rabbit_mgmt_util:reply([{status, ok}], ReqData, Context);
+ _ ->
+ Msg = <<"Certificates expiring">>,
+ failure(Msg, ExpiringListeners, ReqData, Context)
+ end
+ end.
+
+failure(Message, Listeners, ReqData, Context) ->
+ {Response, ReqData1, Context1} = rabbit_mgmt_util:reply([{status, failed},
+ {reason, Message},
+ {expired, Listeners}],
+ ReqData, Context),
+ {stop, cowboy_req:reply(503, #{}, Response, ReqData1), Context1}.
+
+is_authorized(ReqData, Context) ->
+ rabbit_mgmt_util:is_authorized(ReqData, Context).
+
+within(ReqData) ->
+ rabbit_mgmt_util:id(within, ReqData).
+
+unit(ReqData) ->
+ rabbit_mgmt_util:id(unit, ReqData).
+
+convert(Time, Unit) ->
+ try
+ do_convert(binary_to_integer(Time), string:lowercase(binary_to_list(Unit)))
+ catch
+ error:badarg ->
+ {error, "Invalid expiration value."};
+ invalid_unit ->
+ {error, "Time unit not recognised. Use: days, seconds, months, years."}
+ end.
+
+do_convert(Time, "days") ->
+ Time * ?DAYS_SECONDS;
+do_convert(Time, "weeks") ->
+ Time * ?WEEKS_SECONDS;
+do_convert(Time, "months") ->
+ Time * ?MONTHS_SECONDS;
+do_convert(Time, "years") ->
+ Time * ?YEARS_SECONDS;
+do_convert(_, _) ->
+ throw(invalid_unit).
+
+listener_expiring_within(#listener{node = Node, protocol = Protocol, ip_address = Interface,
+ port = Port, opts = Opts}, Seconds) ->
+ Certfile = proplists:get_value(certfile, Opts),
+ Cacertfile = proplists:get_value(cacertfile, Opts),
+ Now = calendar:datetime_to_gregorian_seconds(calendar:universal_time()),
+ ExpiryDate = Now + Seconds,
+ CertfileExpiresOn = expired(cert_validity(read_cert(Certfile)), ExpiryDate),
+ CacertfileExpiresOn = expired(cert_validity(read_cert(Cacertfile)), ExpiryDate),
+ case {CertfileExpiresOn, CacertfileExpiresOn} of
+ {[], []} ->
+ false;
+ _ ->
+ #{node => Node,
+ protocol => Protocol,
+ interface => list_to_binary(inet:ntoa(Interface)),
+ port => Port,
+ certfile => list_to_binary(Certfile),
+ cacertfile => list_to_binary(Cacertfile),
+ certfile_expires_on => expires_on_list(CertfileExpiresOn),
+ cacertfile_expires_on => expires_on_list(CacertfileExpiresOn)
+ }
+ end.
+
+expires_on_list({error, Reason}) ->
+ {error, list_to_binary(Reason)};
+expires_on_list(ExpiresOn) ->
+ [seconds_to_bin(S) || S <- ExpiresOn].
+
+read_cert(undefined) ->
+ undefined;
+read_cert({pem, Pem}) ->
+ Pem;
+read_cert(Path) ->
+ case file:read_file(Path) of
+ {ok, Bin} ->
+ Bin;
+ Err ->
+ Err
+ end.
+
+cert_validity(undefined) ->
+ undefined;
+cert_validity(Cert) ->
+ DsaEntries = public_key:pem_decode(Cert),
+ case DsaEntries of
+ [] ->
+ {error, "The certificate file provided does not contain any PEM entry."};
+ _ ->
+ Now = calendar:datetime_to_gregorian_seconds(calendar:universal_time()),
+ lists:map(
+ fun({'Certificate', _, _} = DsaEntry) ->
+ #'Certificate'{tbsCertificate = TBSCertificate} = public_key:pem_entry_decode(DsaEntry),
+ #'TBSCertificate'{validity = Validity} = TBSCertificate,
+ #'Validity'{notAfter = NotAfter, notBefore = NotBefore} = Validity,
+ Start = pubkey_cert:time_str_2_gregorian_sec(NotBefore),
+ case Start > Now of
+ true ->
+ {error, "Certificate is not yet valid"};
+ false ->
+ pubkey_cert:time_str_2_gregorian_sec(NotAfter)
+ end;
+ ({Type, _, _}) ->
+ {error, io_lib:format("The certificate file provided contains a ~p entry",
+ [Type])}
+ end, DsaEntries)
+ end.
+
+expired(undefined, _ExpiryDate) ->
+ [];
+expired({error, _} = Error, _ExpiryDate) ->
+ Error;
+expired(Expires, ExpiryDate) ->
+ lists:filter(fun({error, _}) ->
+ true;
+ (Seconds) ->
+ Seconds < ExpiryDate
+ end, Expires).
+
+seconds_to_bin(Seconds) ->
+ {{Y, M, D}, {H, Min, S}} = calendar:gregorian_seconds_to_datetime(Seconds),
+ list_to_binary(lists:flatten(io_lib:format("~w-~2.2.0w-~2.2.0w ~w:~2.2.0w:~2.2.0w",
+ [Y, M, D, H, Min, S]))).