Vendor the external cookbooks
Knife-Zero doesn't include Berkshelf support, so vendoring everything in the repo is convenient again
This commit is contained in:
88
cookbooks/openssl/resources/x509_crl.rb
Normal file
88
cookbooks/openssl/resources/x509_crl.rb
Normal file
@@ -0,0 +1,88 @@
|
||||
#
|
||||
# License:: Apache License, Version 2.0
|
||||
#
|
||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||
# you may not use this file except in compliance with the License.
|
||||
# You may obtain a copy of the License at
|
||||
#
|
||||
# http://www.apache.org/licenses/LICENSE-2.0
|
||||
#
|
||||
# Unless required by applicable law or agreed to in writing, software
|
||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
# See the License for the specific language governing permissions and
|
||||
# limitations under the License.
|
||||
#
|
||||
|
||||
chef_version_for_provides '< 14.4' if respond_to?(:chef_version_for_provides)
|
||||
resource_name :openssl_x509_crl
|
||||
|
||||
include OpenSSLCookbook::Helpers
|
||||
|
||||
property :path, String, name_property: true
|
||||
property :serial_to_revoke, [Integer, String]
|
||||
property :revocation_reason, Integer, default: 0
|
||||
property :expire, Integer, default: 8
|
||||
property :renewal_threshold, Integer, default: 1
|
||||
property :ca_cert_file, String, required: true
|
||||
property :ca_key_file, String, required: true
|
||||
property :ca_key_pass, String
|
||||
property :owner, String
|
||||
property :group, String
|
||||
property :mode, String
|
||||
|
||||
action :create do
|
||||
file new_resource.path do
|
||||
owner new_resource.owner unless new_resource.owner.nil?
|
||||
group new_resource.group unless new_resource.group.nil?
|
||||
mode new_resource.mode unless new_resource.mode.nil?
|
||||
content crl.to_pem
|
||||
action :create
|
||||
end
|
||||
end
|
||||
|
||||
action_class do
|
||||
def crl_info
|
||||
# Will contain issuer & expiration
|
||||
crl_info = {}
|
||||
|
||||
crl_info['issuer'] = ::OpenSSL::X509::Certificate.new ::File.read(new_resource.ca_cert_file)
|
||||
crl_info['validity'] = new_resource.expire
|
||||
|
||||
crl_info
|
||||
end
|
||||
|
||||
def revoke_info
|
||||
# Will contain Serial to revoke & reason
|
||||
revoke_info = {}
|
||||
|
||||
revoke_info['serial'] = new_resource.serial_to_revoke
|
||||
revoke_info['reason'] = new_resource.revocation_reason
|
||||
|
||||
revoke_info
|
||||
end
|
||||
|
||||
def ca_private_key
|
||||
ca_private_key = ::OpenSSL::PKey.read ::File.read(new_resource.ca_key_file), new_resource.ca_key_pass
|
||||
ca_private_key
|
||||
end
|
||||
|
||||
def crl
|
||||
if crl_file_valid?(new_resource.path)
|
||||
crl = ::OpenSSL::X509::CRL.new ::File.read(new_resource.path)
|
||||
else
|
||||
log "Creating a CRL #{new_resource.path} for CA #{new_resource.ca_cert_file}"
|
||||
crl = gen_x509_crl(ca_private_key, crl_info)
|
||||
end
|
||||
|
||||
if !new_resource.serial_to_revoke.nil? && serial_revoked?(crl, new_resource.serial_to_revoke) == false
|
||||
log "Revoking serial #{new_resource.serial_to_revoke} in CRL #{new_resource.path}"
|
||||
crl = revoke_x509_crl(revoke_info, crl, ca_private_key, crl_info)
|
||||
elsif crl.next_update <= Time.now + 3600 * 24 * new_resource.renewal_threshold
|
||||
log "Renewing CRL for CA #{new_resource.ca_cert_file}"
|
||||
crl = renew_x509_crl(crl, ca_private_key, crl_info)
|
||||
end
|
||||
|
||||
crl
|
||||
end
|
||||
end
|
||||
Reference in New Issue
Block a user