summaryrefslogtreecommitdiffstats
path: root/nova/crypto.py
diff options
context:
space:
mode:
authorEric Windisch <eric@cloudscaling.com>2011-03-08 01:01:41 -0500
committerEric Windisch <eric@cloudscaling.com>2011-03-08 01:01:41 -0500
commitcac5881eaa35f94e004c18dd34ca78014f067976 (patch)
tree33c3934593777c4ce87ff208ed36e262eca2a940 /nova/crypto.py
parent90abcdc7ae9e3f855dadb1ccc88892a2cc7bab05 (diff)
downloadnova-cac5881eaa35f94e004c18dd34ca78014f067976.tar.gz
nova-cac5881eaa35f94e004c18dd34ca78014f067976.tar.xz
nova-cac5881eaa35f94e004c18dd34ca78014f067976.zip
execvp
Diffstat (limited to 'nova/crypto.py')
-rw-r--r--nova/crypto.py32
1 files changed, 19 insertions, 13 deletions
diff --git a/nova/crypto.py b/nova/crypto.py
index b240a3958..dd24723b8 100644
--- a/nova/crypto.py
+++ b/nova/crypto.py
@@ -105,8 +105,10 @@ def generate_key_pair(bits=1024):
tmpdir = tempfile.mkdtemp()
keyfile = os.path.join(tmpdir, 'temp')
- utils.execute('ssh-keygen','-q','-b',"%d" % bits,'-N','""','-f',keyfile)
- (out, err) = utils.execute('ssh-keygen','-q','-l','-f',"%s.pub" % (keyfile))
+ utils.execute('ssh-keygen', '-q', '-b', '%d' % bits, '-N', '',
+ '-f', keyfile)
+ (out, err) = utils.execute('ssh-keygen', '-q', '-l', '-f',
+ '%s.pub' % (keyfile))
fingerprint = out.split(' ')[1]
private_key = open(keyfile).read()
public_key = open(keyfile + '.pub').read()
@@ -118,7 +120,7 @@ def generate_key_pair(bits=1024):
# bio = M2Crypto.BIO.MemoryBuffer()
# key.save_pub_key_bio(bio)
# public_key = bio.read()
- # public_key, err = execute('ssh-keygen','-y','-f','/dev/stdin', private_key)
+ # public_key, err = execute('ssh-keygen', '-y', '-f', '/dev/stdin', private_key)
return (private_key, public_key, fingerprint)
@@ -143,9 +145,10 @@ def revoke_cert(project_id, file_name):
start = os.getcwd()
os.chdir(ca_folder(project_id))
# NOTE(vish): potential race condition here
- utils.execute('openssl','ca','-config','./openssl.cnf','-revoke',"'%s'" % file_name)
- utils.execute('openssl','ca','-gencrl','-config','./openssl.cnf','-out',"'%s'" %
- FLAGS.crl_file)
+ utils.execute('openssl', 'ca', '-config', './openssl.cnf', '-revoke',
+ '%s' % file_name)
+ utils.execute('openssl', 'ca', '-gencrl', '-config', './openssl.cnf',
+ '-out', '%s' % FLAGS.crl_file)
os.chdir(start)
@@ -193,8 +196,9 @@ def generate_x509_cert(user_id, project_id, bits=1024):
tmpdir = tempfile.mkdtemp()
keyfile = os.path.abspath(os.path.join(tmpdir, 'temp.key'))
csrfile = os.path.join(tmpdir, 'temp.csr')
- utils.execute('openssl','genrsa','-out',keyfile,bits)
- utils.execute('openssl','req','-new','-key',keyfile,'-out',csrfile,'-batch','-subj',subject)
+ utils.execute('openssl', 'genrsa', '-out', keyfile, bits)
+ utils.execute('openssl', 'req', '-new', '-key', keyfile, '-out', csrfile,
+ '-batch', '-subj', subject)
private_key = open(keyfile).read()
csr = open(csrfile).read()
shutil.rmtree(tmpdir)
@@ -211,7 +215,8 @@ def _ensure_project_folder(project_id):
if not os.path.exists(ca_path(project_id)):
start = os.getcwd()
os.chdir(ca_folder())
- utils.execute('sh','geninter.sh',project_id, _project_cert_subject(project_id))
+ utils.execute('sh', 'geninter.sh', project_id,
+ _project_cert_subject(project_id))
os.chdir(start)
@@ -226,7 +231,7 @@ def generate_vpn_files(project_id):
start = os.getcwd()
os.chdir(ca_folder())
# TODO(vish): the shell scripts could all be done in python
- utils.execute('sh','genvpn.sh',
+ utils.execute('sh', 'genvpn.sh',
project_id, _vpn_cert_subject(project_id))
with open(csr_fn, "r") as csrfile:
csr_text = csrfile.read()
@@ -257,9 +262,10 @@ def _sign_csr(csr_text, ca_folder):
start = os.getcwd()
# Change working dir to CA
os.chdir(ca_folder)
- utils.execute('openssl','ca','-batch','-out',outbound,'-config'
- './openssl.cnf','-infiles',inbound)
- out, _err = utils.execute('openssl','x509','-in',outbound','-serial','-noout')
+ utils.execute('openssl', 'ca', '-batch', '-out', outbound, '-config',
+ './openssl.cnf', '-infiles', inbound)
+ out, _err = utils.execute('openssl', 'x509', '-in', outbound,
+ '-serial', '-noout')
serial = out.rpartition("=")[2]
os.chdir(start)
with open(outbound, "r") as crtfile: