Skip to main content

Manage Chrome-trusted CA certificates in Palo Alto Strata Cloud Manager

Project description

scm-chainguard

Manage Trusted CA certificates for Outbound Decryption in Strata Cloud Manager

Python License


Beta: This project is under active development. APIs, CLI flags, and behavior may change between releases. Use --dry-run to preview changes before applying them.

Overview

scm-chainguard keeps your Strata Cloud Manager SSL decryption trust store in sync with the Chrome Root Store maintained by CCADB. It downloads the latest Chrome-trusted root (and optionally intermediate) CA certificates, compares them against what is already configured in SCM, imports any missing certificates, and adds them to the trusted root CA list used for SSL decryption.

All managed certificates are prefixed with CG_ so they can be identified and cleaned up independently.

Features

  • Fetch Chrome-trusted root and intermediate CA certificates from CCADB
  • Compare local certificates against SCM predefined and imported certificate stores
  • Sync missing certificates into SCM and configure them as trusted roots
  • Cleanup expired CG_-managed certificates from SCM
  • Dry-run mode for all write operations

Requirements

  • Python >= 3.11
  • An SCM service account with client_id, client_secret, and tsg_id

Installation

pip install scm-chainguard

Or install from source:

git clone https://gitlab.com/dephell/scm-chainguard.git
cd scm-chainguard
pip install -e "."

Configuration

Set environment variables:

export SCM_CLIENT_ID="your-client-id"
export SCM_CLIENT_SECRET="your-client-secret"
export SCM_TSG_ID="your-tsg-id"

Or use a YAML config file:

scm:
  client_id: "your-client-id"
  client_secret: "your-client-secret"
  tsg_id: "your-tsg-id"

Quick Start

# Download Chrome-trusted root CAs from CCADB
scm-chainguard fetch

# Compare local certs against SCM
scm-chainguard compare

# Import missing certs and add as trusted roots (dry-run first)
scm-chainguard sync --dry-run
scm-chainguard sync

# Full pipeline: fetch -> compare -> sync
scm-chainguard run --dry-run
scm-chainguard run

# Remove expired CG_-managed certificates
scm-chainguard cleanup --dry-run
scm-chainguard cleanup

Common Options

Option Description
--config / -c Path to YAML config file
--debug Enable debug logging
--log-file Write logs to file
--dry-run / -n Show what would be done without making changes
--include-intermediates / -i Include intermediate certificates

Disclaimer

scm-chainguard currently imports all certificates in the 'Global' folder due to an existing SCM API Implementation.

License

Apache 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

scm_chainguard-0.0.4.tar.gz (35.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

scm_chainguard-0.0.4-py3-none-any.whl (31.8 kB view details)

Uploaded Python 3

File details

Details for the file scm_chainguard-0.0.4.tar.gz.

File metadata

  • Download URL: scm_chainguard-0.0.4.tar.gz
  • Upload date:
  • Size: 35.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.15

File hashes

Hashes for scm_chainguard-0.0.4.tar.gz
Algorithm Hash digest
SHA256 31ba5f51e932e5e0095bc298ce4b392ae6e5049629ebd4ac9c7433794dd38007
MD5 c64eae4a79cb057edb7dd3bc6fc4ce7c
BLAKE2b-256 b1d1fdcbaf8e785e7281abe04e90e7de297eff0cffcfee88bb73864a90b5f9db

See more details on using hashes here.

File details

Details for the file scm_chainguard-0.0.4-py3-none-any.whl.

File metadata

  • Download URL: scm_chainguard-0.0.4-py3-none-any.whl
  • Upload date:
  • Size: 31.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.15

File hashes

Hashes for scm_chainguard-0.0.4-py3-none-any.whl
Algorithm Hash digest
SHA256 8f640ee0cb32cf72f58e485cdefc192bcfa564aa1b92758db7cbd2f0867e3d04
MD5 0bdc5bde759602e8d495293cfa8e652c
BLAKE2b-256 1f2128c141b8b2e46fdeca8fc418f40821c4509a8cea46de455d66daf6d1bd9e

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page