Python interface to the Sectigo Certificate Manager REST API
Project description
python-cert_manager
This library provides a Python interface to the Sectigo Certificate Manager REST API. python-cert_manager is open sourced under the BSD 3-Clause license.
Basics
cert_manager
runs on Python >= 3.7
Features
There are many API endpoints under Certificate Manager, and this library currently supports a subset of those endpoints. The current list of written and tested endpoint classes includes:
- Organization (/organization)
- Person (/person)
- SSL (/ssl)
- Client Administrator (/admin)
- Domain (/domain)
- Report (/report)
Other endpoints we hope to add in the near future:
- Code Signing Certificates (/csod)
- Custom Fields (/customField)
- Domain Control Validation (/dcv)
- Device Certificates (/device)
- Discovery (/discovery)
- SMIME (/smime)
Installing
You can use pip to install cert_manager:
pip install cert_manager
Examples
This is a simple example that just shows initializing the Client
object and using it to query the Organization
and SSL
endpoints:
from cert_manager import Organization
from cert_manager import Client
from cert_manager import SSL
client = Client(
base_url="https://cert-manager.com/api",
login_uri="SomeOrg",
username="your_username",
password="your_password",
)
org = Organization(client=client)
ssl = SSL(client=client)
print(ssl.types)
print(org.all())
The most common process you would do, however, is enroll and then collect a certificate you want to order from the Certificate Manager:
from time import sleep
from cert_manager import Organization
from cert_manager import Client
from cert_manager import SSL
client = Client(
base_url="https://cert-manager.com/api",
login_uri="SomeOrg",
username="your_username",
password="your_password",
)
# We need to enroll the certificate under an organization, so we will need to query the API for that
org = Organization(client=client)
# We need the SSL module to enroll the certificate
ssl = SSL(client=client)
cert_org = org.find(dept_name="MyDept")
with open("host.csr", "r") as filep:
csr = filep.read()
result = ssl.enroll(cert_type_name="InCommon SSL (SHA-2)", csr=csr, term=365, org_id=cert_org[0]["id"])
# This is just for demonstration purposes.
# Doing a wait loop like this to poll for the certificate is not the best way to go about this.
while(True):
# Collect the certificate from Sectigo
try:
cert_pem = ssl.collect(cert_id=result["sslId"], cert_format="x509CO")
print(cert_pem)
break
except PendingError:
print("Certificate is still pending...sleeping for 60s")
sleep(60)
continue
except Exception:
# For some unexpected exception, exit
break
Contributing
Pull requests to add functionality and fix bugs are always welcome. Please check the CONTRIBUTING.md for specifics on contributions.
Testing
We try to have a high level of test coverage on the code. Therefore, when adding anything to the repo, tests should be written to test a new feature or to test a bug fix so that there won't be a regression. This library is setup to be pretty simple to build a working development environment using Docker. Therefore, it is suggested that you have Docker installed where you clone this repository to make development easier.
To start a development environment, you should be able to just run the dev.sh
script. This script will use the Dockerfile
in this repository to build a Docker container with all the dependencies for development installed using Pipenv.
./dev.sh
The first time you run the script, it should build the Docker image and then drop you into the container's shell. The directory where you cloned this repository should be volume mounted in to /usr/src
, which should also be the current working directory. From there, you can make changes as you see fit. Tests can be run from the /usr/src
directory by simply typing green
as green has been setup to with the correct parameters.
Changelog
To generate the CHANGELOG.md
, you will need Docker and a GitHub personal access token. We currently use github-changelog-generator for this purpose. The following should generate the file using information from GitHub:
docker run -it --rm \
-e CHANGELOG_GITHUB_TOKEN='yourtokenhere' \
-v "$(pwd)":/working \
-w /working \
ferrarimarco/github-changelog-generator --verbose
To generate the log for an upcoming release that has not yet been tagged, you can run a command to include the upcoming release version. For example, 2.0.0
:
docker run -it --rm \
-e CHANGELOG_GITHUB_TOKEN='yourtokenhere' \
-v "$(pwd)":/working \
-w /working \
ferrarimarco/github-changelog-generator --verbose --future-release 2.0.0 --unreleased
As a note, this repository uses the default labels for formatting the CHANGELOG.md
. Label information can be found here: Advanced-change-log-generation-examples
Releases
Releases to the codebase are typically done using the bump2version tool. This tool takes care of updating the version in all necessary files, updating its own configuration, and making a GitHub commit and tag. We typically do version bumps as part of a PR, so you don't want to have bump2version tag the version at the same time it does the commit as commit hashes may change. Therefore, to bump the version a patch level, one would run the command:
bump2version --verbose --no-tag patch
Once the PR is merged, you can then checkout the new main
branch and tag it using the new version number that is now in .bumpversion.cfg
:
git checkout main
git pull --rebase
git tag 1.0.0 -m 'Bump version: 0.1.0 → 1.0.0'
git push --tags
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for cert_manager-2.4.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2ff51e21b46d552476b0aa9d3e08af0b5d6f6bd42d96f91b096c7a742e384618 |
|
MD5 | ccc4dd9ec4788118ddf2fb60e4958ae8 |
|
BLAKE2b-256 | 60b8360d9a864812ba673ca93e4ce24d1937f0d485078834f832260d9ef67887 |