Skip to content
This repository was archived by the owner on Jul 6, 2023. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
13 changes: 13 additions & 0 deletions samples/snippets/conftest.py
Original file line number Diff line number Diff line change
Expand Up @@ -56,3 +56,16 @@ def certificate_authority(ca_pool):
yield ca_pool, CA_NAME

delete_certificate_authority(PROJECT, LOCATION, ca_pool, CA_NAME)


@pytest.fixture
def deleted_certificate_authority(ca_pool):
CA_NAME = generate_name()

create_certificate_authority(
PROJECT, LOCATION, ca_pool, CA_NAME, COMMON_NAME, ORGANIZATION, CA_DURATION
)

delete_certificate_authority(PROJECT, LOCATION, ca_pool, CA_NAME)

yield ca_pool, CA_NAME
48 changes: 48 additions & 0 deletions samples/snippets/filter_certificates.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
#!/usr/bin/env python

# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

# [START privateca_filter_certificate]
import google.cloud.security.privateca_v1 as privateca_v1


def filter_certificates(
project_id: str, location: str, ca_pool_name: str, filter_condition: str
) -> None:
"""
Filter certificates based on a condition and list them.

Args:
project_id: project ID or project number of the Cloud project you want to use.
location: location you want to use. For a list of locations, see: https://cloud.google.com/certificate-authority-service/docs/locations.
ca_pool_name: name of the CA pool which contains the certificates to be listed.
"""

caServiceClient = privateca_v1.CertificateAuthorityServiceClient()

ca_pool_path = caServiceClient.ca_pool_path(project_id, location, ca_pool_name)

# Create the certificate request and set the filter condition.
request = privateca_v1.ListCertificatesRequest(
parent=ca_pool_path, filter=filter_condition,
)

# Retrieve and print the certificate names.
print("Available certificates: ")
for cert in caServiceClient.list_certificates(request=request):
print(f"- {cert.name}")


# [END privateca_filter_certificate]
15 changes: 7 additions & 8 deletions samples/snippets/test_certificate_authorities.py
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@
from delete_certificate_authority import delete_certificate_authority
from disable_certificate_authority import disable_certificate_authority
from enable_certificate_authority import enable_certificate_authority
from undelete_certificate_authority import undelete_certificate_authority


PROJECT = google.auth.default()[1]
Expand Down Expand Up @@ -71,17 +72,15 @@ def test_enable_and_disable_certificate_authority(
assert re.search(f"Disabled Certificate Authority: {CA_NAME}", out,)


def test_delete_certificate_authority(capsys: typing.Any) -> None:
CA_POOL_NAME = generate_name()
CA_NAME = generate_name()
def test_undelete_certificate_authority(
deleted_certificate_authority, capsys: typing.Any
) -> None:
CA_POOL_NAME, CA_NAME = deleted_certificate_authority

create_ca_pool(PROJECT, LOCATION, CA_POOL_NAME)
create_certificate_authority(
PROJECT, LOCATION, CA_POOL_NAME, CA_NAME, COMMON_NAME, ORGANIZATION, CA_DURATION
)
undelete_certificate_authority(PROJECT, LOCATION, CA_POOL_NAME, CA_NAME)
delete_certificate_authority(PROJECT, LOCATION, CA_POOL_NAME, CA_NAME)
delete_ca_pool(PROJECT, LOCATION, CA_POOL_NAME)

out, _ = capsys.readouterr()

assert re.search(f"Successfully undeleted Certificate Authority: {CA_NAME}", out,)
assert re.search(f"Successfully deleted Certificate Authority: {CA_NAME}", out,)
13 changes: 12 additions & 1 deletion samples/snippets/test_certificates.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@
# limitations under the License.


import re
import time
import typing
import uuid
Expand All @@ -28,6 +29,7 @@
from create_certificate import create_certificate
from disable_certificate_authority import disable_certificate_authority
from enable_certificate_authority import enable_certificate_authority
from filter_certificates import filter_certificates
from revoke_certificate import revoke_certificate


Expand Down Expand Up @@ -74,13 +76,22 @@ def test_create_and_revoke_certificate_authority(
public_key_bytes,
)

FILTER_CONDITION = (
f"certificate_description.subject_description.subject.common_name={COMMON_NAME}"
)
filter_certificates(PROJECT, LOCATION, CA_POOL_NAME, FILTER_CONDITION)

revoke_certificate(
PROJECT, LOCATION, CA_POOL_NAME, CERT_NAME,
)

disable_certificate_authority(PROJECT, LOCATION, CA_POOL_NAME, CA_NAME)

out, _ = capsys.readouterr()

assert "Certificate creation result:" in out
assert "Available certificates:" in out
assert re.search(
f"- projects/.*/locations/{LOCATION}/caPools/{CA_POOL_NAME}/certificates/{CERT_NAME}",
out,
)
assert "Certificate revoke result:" in out
68 changes: 68 additions & 0 deletions samples/snippets/undelete_certificate_authority.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
#!/usr/bin/env python

# Copyright 2021 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.

# [START privateca_undelete_ca]
import google.cloud.security.privateca_v1 as privateca_v1


def undelete_certificate_authority(
project_id: str, location: str, ca_pool_name: str, ca_name: str
) -> None:
"""
Restore a deleted CA, if still within the grace period of 30 days.

Args:
project_id: project ID or project number of the Cloud project you want to use.
location: location you want to use. For a list of locations, see: https://cloud.google.com/certificate-authority-service/docs/locations.
ca_pool_name: the name of the CA pool under which the deleted CA is present.
ca_name: the name of the CA to be restored (undeleted).
"""

caServiceClient = privateca_v1.CertificateAuthorityServiceClient()
ca_path = caServiceClient.certificate_authority_path(
project_id, location, ca_pool_name, ca_name
)

# Confirm if the CA is in DELETED stage.
ca_state = caServiceClient.get_certificate_authority(name=ca_path).state
if ca_state != privateca_v1.CertificateAuthority.State.DELETED:
print("CA is not deleted !")
return

# Create the Request.
request = privateca_v1.UndeleteCertificateAuthorityRequest(name=ca_path)

# Undelete the CA.
operation = caServiceClient.undelete_certificate_authority(request=request)
result = operation.result()

print("Operation result", result)

# Get the current CA state.
ca_state = caServiceClient.get_certificate_authority(name=ca_path).state

# CA state changes from DELETED to DISABLED if successfully restored.
# Confirm if the CA is DISABLED.
if ca_state == privateca_v1.CertificateAuthority.State.DISABLED:
print("Successfully undeleted Certificate Authority:", ca_name)
else:
print(
"Unable to restore the Certificate Authority! Please try again! Current state:",
ca_state,
)


# [END privateca_undelete_ca]