CertificateImportCommand.cs•4.76 kB
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
using AzureMcp.Core.Commands;
using AzureMcp.Core.Commands.Subscription;
using AzureMcp.KeyVault.Options;
using AzureMcp.KeyVault.Options.Certificate;
using AzureMcp.KeyVault.Services;
using Microsoft.Extensions.Logging;
namespace AzureMcp.KeyVault.Commands.Certificate;
public sealed class CertificateImportCommand(ILogger<CertificateImportCommand> logger) : SubscriptionCommand<CertificateImportOptions>
{
    private const string CommandTitle = "Import Key Vault Certificate";
    private readonly ILogger<CertificateImportCommand> _logger = logger;
    private readonly Option<string> _vaultOption = KeyVaultOptionDefinitions.VaultName;
    private readonly Option<string> _certificateOption = KeyVaultOptionDefinitions.CertificateName;
    private readonly Option<string> _certificateDataOption = KeyVaultOptionDefinitions.CertificateData;
    private readonly Option<string> _passwordOption = KeyVaultOptionDefinitions.CertificatePassword;
    public override string Name => "import";
    public override string Title => CommandTitle;
    public override ToolMetadata Metadata => new() { Destructive = true, ReadOnly = false };
    public override string Description =>
        """
        Imports (uploads) an existing certificate (PFX or PEM with private key) into an Azure Key Vault without generating
        a new certificate or key material. This command accepts either a file path to a PFX/PEM file, a base64 encoded PFX,
        or raw PEM text starting with -----BEGIN. If the certificate is a password-protected PFX, a password must be provided.
        Returns certificate details including name, id, keyId, secretId, cer (base64), thumbprint, validity, and policy
        subject/issuer.
        """;
    protected override void RegisterOptions(Command command)
    {
        base.RegisterOptions(command);
        command.AddOption(_vaultOption);
        command.AddOption(_certificateOption);
        command.AddOption(_certificateDataOption);
        command.AddOption(_passwordOption);
    }
    protected override CertificateImportOptions BindOptions(ParseResult parseResult)
    {
        var options = base.BindOptions(parseResult);
        options.VaultName = parseResult.GetValueForOption(_vaultOption);
        options.CertificateName = parseResult.GetValueForOption(_certificateOption);
        options.CertificateData = parseResult.GetValueForOption(_certificateDataOption);
        options.Password = parseResult.GetValueForOption(_passwordOption);
        return options;
    }
    public override async Task<CommandResponse> ExecuteAsync(CommandContext context, ParseResult parseResult)
    {
        var options = BindOptions(parseResult);
        try
        {
            if (!Validate(parseResult.CommandResult, context.Response).IsValid)
            {
                return context.Response;
            }
            var keyVaultService = context.GetService<IKeyVaultService>();
            var certificate = await keyVaultService.ImportCertificate(
                options.VaultName!,
                options.CertificateName!,
                options.CertificateData!,
                options.Password,
                options.Subscription!,
                options.Tenant,
                options.RetryPolicy);
            context.Response.Results = ResponseResult.Create(
                new CertificateImportCommandResult(
                    certificate.Name,
                    certificate.Id,
                    certificate.KeyId,
                    certificate.SecretId,
                    Convert.ToBase64String(certificate.Cer),
                    certificate.Properties.X509ThumbprintString,
                    certificate.Properties.Enabled,
                    certificate.Properties.NotBefore,
                    certificate.Properties.ExpiresOn,
                    certificate.Properties.CreatedOn,
                    certificate.Properties.UpdatedOn,
                    certificate.Policy.Subject,
                    certificate.Policy.IssuerName),
                KeyVaultJsonContext.Default.CertificateImportCommandResult);
        }
        catch (Exception ex)
        {
            _logger.LogError(ex, "Error importing certificate {CertificateName} into vault {VaultName}", options.CertificateName, options.VaultName);
            HandleException(context, ex);
        }
        return context.Response;
    }
    internal record CertificateImportCommandResult(string Name, Uri Id, Uri KeyId, Uri SecretId, string Cer, string Thumbprint, bool? Enabled, DateTimeOffset? NotBefore, DateTimeOffset? ExpiresOn, DateTimeOffset? CreatedOn, DateTimeOffset? UpdatedOn, string Subject, string IssuerName);
}