package admin import ( "errors" "io" "github.com/golang/glog" "k8s.io/kubernetes/pkg/auth/user" "github.com/openshift/origin/pkg/cmd/server/crypto" ) type CreateClientCertOptions struct { SignerCertOptions *SignerCertOptions CertFile string KeyFile string ExpireDays int User string Groups []string Overwrite bool Output io.Writer } func (o CreateClientCertOptions) Validate(args []string) error { if len(args) != 0 { return errors.New("no arguments are supported") } if len(o.CertFile) == 0 { return errors.New("cert must be provided") } if len(o.KeyFile) == 0 { return errors.New("key must be provided") } if o.ExpireDays <= 0 { return errors.New("expire-days must be valid number of days") } if len(o.User) == 0 { return errors.New("user must be provided") } if o.SignerCertOptions == nil { return errors.New("signer options are required") } if err := o.SignerCertOptions.Validate(); err != nil { return err } return nil } func (o CreateClientCertOptions) CreateClientCert() (*crypto.TLSCertificateConfig, error) { glog.V(4).Infof("Creating a client cert with: %#v and %#v", o, o.SignerCertOptions) signerCert, err := o.SignerCertOptions.CA() if err != nil { return nil, err } var cert *crypto.TLSCertificateConfig written := true userInfo := &user.DefaultInfo{Name: o.User, Groups: o.Groups} if o.Overwrite { cert, err = signerCert.MakeClientCertificate(o.CertFile, o.KeyFile, userInfo, o.ExpireDays) } else { cert, written, err = signerCert.EnsureClientCertificate(o.CertFile, o.KeyFile, userInfo, o.ExpireDays) } if written { glog.V(3).Infof("Generated new client cert as %s and key as %s\n", o.CertFile, o.KeyFile) } else { glog.V(3).Infof("Keeping existing client cert at %s and key at %s\n", o.CertFile, o.KeyFile) } return cert, err }