Knife-Zero doesn't include Berkshelf support, so vendoring everything in the repo is convenient again
		
			
				
	
	
		
			152 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
			
		
		
	
	
			152 lines
		
	
	
		
			5.0 KiB
		
	
	
	
		
			Ruby
		
	
	
	
	
	
#
 | 
						|
# License:: Apache License, Version 2.0
 | 
						|
#
 | 
						|
# Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
# you may not use this file except in compliance with the License.
 | 
						|
# You may obtain a copy of the License at
 | 
						|
#
 | 
						|
#     http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
#
 | 
						|
# Unless required by applicable law or agreed to in writing, software
 | 
						|
# distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
# See the License for the specific language governing permissions and
 | 
						|
# limitations under the License.
 | 
						|
#
 | 
						|
 | 
						|
chef_version_for_provides '< 14.4' if respond_to?(:chef_version_for_provides)
 | 
						|
resource_name :openssl_x509_certificate
 | 
						|
 | 
						|
provides :openssl_x509 # legacy_name
 | 
						|
 | 
						|
include OpenSSLCookbook::Helpers
 | 
						|
 | 
						|
property :path,             String, name_property: true
 | 
						|
property :owner,            String
 | 
						|
property :group,            String
 | 
						|
property :expire,           Integer, default: 365
 | 
						|
property :mode,             [Integer, String], default: '0644'
 | 
						|
property :country,          String
 | 
						|
property :state,            String
 | 
						|
property :city,             String
 | 
						|
property :org,              String
 | 
						|
property :org_unit,         String
 | 
						|
property :common_name,      String
 | 
						|
property :email,            String
 | 
						|
property :extensions,       Hash, default: {}
 | 
						|
property :subject_alt_name, Array, default: []
 | 
						|
property :key_file,         String
 | 
						|
property :key_pass,         String
 | 
						|
property :key_type,         equal_to: %w(rsa ec), default: 'rsa'
 | 
						|
property :key_length,       equal_to: [1024, 2048, 4096, 8192], default: 2048
 | 
						|
property :key_curve,        equal_to: %w(secp384r1 secp521r1 prime256v1), default: 'prime256v1'
 | 
						|
property :csr_file,         String
 | 
						|
property :ca_cert_file,     String
 | 
						|
property :ca_key_file,      String
 | 
						|
property :ca_key_pass,      String
 | 
						|
 | 
						|
action :create do
 | 
						|
  unless ::File.exist? new_resource.path
 | 
						|
    converge_by("Create #{@new_resource}") do
 | 
						|
      file new_resource.path do
 | 
						|
        action :create_if_missing
 | 
						|
        mode new_resource.mode
 | 
						|
        owner new_resource.owner unless new_resource.owner.nil?
 | 
						|
        group new_resource.group unless new_resource.group.nil?
 | 
						|
        sensitive true
 | 
						|
        content cert.to_pem
 | 
						|
      end
 | 
						|
 | 
						|
      if new_resource.csr_file.nil?
 | 
						|
        file new_resource.key_file do
 | 
						|
          action :create_if_missing
 | 
						|
          mode new_resource.mode
 | 
						|
          owner new_resource.owner unless new_resource.owner.nil?
 | 
						|
          group new_resource.group unless new_resource.group.nil?
 | 
						|
          sensitive true
 | 
						|
          content key.to_pem
 | 
						|
        end
 | 
						|
      end
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 | 
						|
 | 
						|
action_class do
 | 
						|
  def generate_key_file
 | 
						|
    unless new_resource.key_file
 | 
						|
      path, file = ::File.split(new_resource.path)
 | 
						|
      filename = ::File.basename(file, ::File.extname(file))
 | 
						|
      new_resource.key_file path + '/' + filename + '.key'
 | 
						|
    end
 | 
						|
    new_resource.key_file
 | 
						|
  end
 | 
						|
 | 
						|
  def key
 | 
						|
    @key ||= if priv_key_file_valid?(generate_key_file, new_resource.key_pass)
 | 
						|
               ::OpenSSL::PKey.read ::File.read(generate_key_file), new_resource.key_pass
 | 
						|
             elsif new_resource.key_type == 'rsa'
 | 
						|
               gen_rsa_priv_key(new_resource.key_length)
 | 
						|
             else
 | 
						|
               gen_ec_priv_key(new_resource.key_curve)
 | 
						|
             end
 | 
						|
    @key
 | 
						|
  end
 | 
						|
 | 
						|
  def request
 | 
						|
    request = if new_resource.csr_file.nil?
 | 
						|
                gen_x509_request(subject, key)
 | 
						|
              else
 | 
						|
                ::OpenSSL::X509::Request.new ::File.read(new_resource.csr_file)
 | 
						|
              end
 | 
						|
    request
 | 
						|
  end
 | 
						|
 | 
						|
  def subject
 | 
						|
    subject = ::OpenSSL::X509::Name.new()
 | 
						|
    subject.add_entry('C', new_resource.country) unless new_resource.country.nil?
 | 
						|
    subject.add_entry('ST', new_resource.state) unless new_resource.state.nil?
 | 
						|
    subject.add_entry('L', new_resource.city) unless new_resource.city.nil?
 | 
						|
    subject.add_entry('O', new_resource.org) unless new_resource.org.nil?
 | 
						|
    subject.add_entry('OU', new_resource.org_unit) unless new_resource.org_unit.nil?
 | 
						|
    subject.add_entry('CN', new_resource.common_name)
 | 
						|
    subject.add_entry('emailAddress', new_resource.email) unless new_resource.email.nil?
 | 
						|
    subject
 | 
						|
  end
 | 
						|
 | 
						|
  def ca_private_key
 | 
						|
    ca_private_key = if new_resource.csr_file.nil?
 | 
						|
                       key
 | 
						|
                     else
 | 
						|
                       ::OpenSSL::PKey.read ::File.read(new_resource.ca_key_file), new_resource.ca_key_pass
 | 
						|
                     end
 | 
						|
    ca_private_key
 | 
						|
  end
 | 
						|
 | 
						|
  def ca_info
 | 
						|
    # Will contain issuer (if any) & expiration
 | 
						|
    ca_info = {}
 | 
						|
 | 
						|
    unless new_resource.ca_cert_file.nil?
 | 
						|
      ca_info['issuer'] = ::OpenSSL::X509::Certificate.new ::File.read(new_resource.ca_cert_file)
 | 
						|
    end
 | 
						|
    ca_info['validity'] = new_resource.expire
 | 
						|
 | 
						|
    ca_info
 | 
						|
  end
 | 
						|
 | 
						|
  def extensions
 | 
						|
    extensions = gen_x509_extensions(new_resource.extensions)
 | 
						|
 | 
						|
    unless new_resource.subject_alt_name.empty?
 | 
						|
      extensions += gen_x509_extensions('subjectAltName' => { 'values' => new_resource.subject_alt_name, 'critical' => false })
 | 
						|
    end
 | 
						|
 | 
						|
    extensions
 | 
						|
  end
 | 
						|
 | 
						|
  def cert
 | 
						|
    cert = gen_x509_cert(request, extensions, ca_info, ca_private_key)
 | 
						|
    cert
 | 
						|
  end
 | 
						|
end
 |