Knife-Zero doesn't include Berkshelf support, so vendoring everything in the repo is convenient again
152 lines
5.0 KiB
Ruby
152 lines
5.0 KiB
Ruby
#
|
|
# License:: Apache License, Version 2.0
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
#
|
|
|
|
chef_version_for_provides '< 14.4' if respond_to?(:chef_version_for_provides)
|
|
resource_name :openssl_x509_certificate
|
|
|
|
provides :openssl_x509 # legacy_name
|
|
|
|
include OpenSSLCookbook::Helpers
|
|
|
|
property :path, String, name_property: true
|
|
property :owner, String
|
|
property :group, String
|
|
property :expire, Integer, default: 365
|
|
property :mode, [Integer, String], default: '0644'
|
|
property :country, String
|
|
property :state, String
|
|
property :city, String
|
|
property :org, String
|
|
property :org_unit, String
|
|
property :common_name, String
|
|
property :email, String
|
|
property :extensions, Hash, default: {}
|
|
property :subject_alt_name, Array, default: []
|
|
property :key_file, String
|
|
property :key_pass, String
|
|
property :key_type, equal_to: %w(rsa ec), default: 'rsa'
|
|
property :key_length, equal_to: [1024, 2048, 4096, 8192], default: 2048
|
|
property :key_curve, equal_to: %w(secp384r1 secp521r1 prime256v1), default: 'prime256v1'
|
|
property :csr_file, String
|
|
property :ca_cert_file, String
|
|
property :ca_key_file, String
|
|
property :ca_key_pass, String
|
|
|
|
action :create do
|
|
unless ::File.exist? new_resource.path
|
|
converge_by("Create #{@new_resource}") do
|
|
file new_resource.path do
|
|
action :create_if_missing
|
|
mode new_resource.mode
|
|
owner new_resource.owner unless new_resource.owner.nil?
|
|
group new_resource.group unless new_resource.group.nil?
|
|
sensitive true
|
|
content cert.to_pem
|
|
end
|
|
|
|
if new_resource.csr_file.nil?
|
|
file new_resource.key_file do
|
|
action :create_if_missing
|
|
mode new_resource.mode
|
|
owner new_resource.owner unless new_resource.owner.nil?
|
|
group new_resource.group unless new_resource.group.nil?
|
|
sensitive true
|
|
content key.to_pem
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
action_class do
|
|
def generate_key_file
|
|
unless new_resource.key_file
|
|
path, file = ::File.split(new_resource.path)
|
|
filename = ::File.basename(file, ::File.extname(file))
|
|
new_resource.key_file path + '/' + filename + '.key'
|
|
end
|
|
new_resource.key_file
|
|
end
|
|
|
|
def key
|
|
@key ||= if priv_key_file_valid?(generate_key_file, new_resource.key_pass)
|
|
::OpenSSL::PKey.read ::File.read(generate_key_file), new_resource.key_pass
|
|
elsif new_resource.key_type == 'rsa'
|
|
gen_rsa_priv_key(new_resource.key_length)
|
|
else
|
|
gen_ec_priv_key(new_resource.key_curve)
|
|
end
|
|
@key
|
|
end
|
|
|
|
def request
|
|
request = if new_resource.csr_file.nil?
|
|
gen_x509_request(subject, key)
|
|
else
|
|
::OpenSSL::X509::Request.new ::File.read(new_resource.csr_file)
|
|
end
|
|
request
|
|
end
|
|
|
|
def subject
|
|
subject = ::OpenSSL::X509::Name.new()
|
|
subject.add_entry('C', new_resource.country) unless new_resource.country.nil?
|
|
subject.add_entry('ST', new_resource.state) unless new_resource.state.nil?
|
|
subject.add_entry('L', new_resource.city) unless new_resource.city.nil?
|
|
subject.add_entry('O', new_resource.org) unless new_resource.org.nil?
|
|
subject.add_entry('OU', new_resource.org_unit) unless new_resource.org_unit.nil?
|
|
subject.add_entry('CN', new_resource.common_name)
|
|
subject.add_entry('emailAddress', new_resource.email) unless new_resource.email.nil?
|
|
subject
|
|
end
|
|
|
|
def ca_private_key
|
|
ca_private_key = if new_resource.csr_file.nil?
|
|
key
|
|
else
|
|
::OpenSSL::PKey.read ::File.read(new_resource.ca_key_file), new_resource.ca_key_pass
|
|
end
|
|
ca_private_key
|
|
end
|
|
|
|
def ca_info
|
|
# Will contain issuer (if any) & expiration
|
|
ca_info = {}
|
|
|
|
unless new_resource.ca_cert_file.nil?
|
|
ca_info['issuer'] = ::OpenSSL::X509::Certificate.new ::File.read(new_resource.ca_cert_file)
|
|
end
|
|
ca_info['validity'] = new_resource.expire
|
|
|
|
ca_info
|
|
end
|
|
|
|
def extensions
|
|
extensions = gen_x509_extensions(new_resource.extensions)
|
|
|
|
unless new_resource.subject_alt_name.empty?
|
|
extensions += gen_x509_extensions('subjectAltName' => { 'values' => new_resource.subject_alt_name, 'critical' => false })
|
|
end
|
|
|
|
extensions
|
|
end
|
|
|
|
def cert
|
|
cert = gen_x509_cert(request, extensions, ca_info, ca_private_key)
|
|
cert
|
|
end
|
|
end
|