chef/cookbooks/java/resources/certificate.rb
Greg Karékinian a32f34b408 Vendor the external cookbooks
Knife-Zero doesn't include Berkshelf support, so vendoring everything in
the repo is convenient again
2019-10-13 19:17:42 +02:00

145 lines
6.2 KiB
Ruby

#
# Author:: Mevan Samaratunga (<mevansam@gmail.com>)
# Author:: Michael Goetz (<mpgoetz@gmail.com>)
# Cookbook:: java
# Resource:: certificate
#
# Copyright:: 2013, Mevan Samaratunga
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
property :java_home, String, default: lazy { node['java']['java_home'] }
property :keystore_path, String, default: lazy { node['java']['jdk_version'].to_i < 11 ? "#{node['java']['java_home']}/jre/lib/security/cacerts" : "#{node['java']['java_home']}/lib/security/cacerts" }
property :keystore_passwd, String, default: 'changeit'
property :cert_alias, String, name_property: true
property :cert_data, String
property :cert_file, String
property :ssl_endpoint, String
action :install do
require 'openssl'
java_home = new_resource.java_home
keytool = "#{java_home}/bin/keytool"
truststore = if new_resource.keystore_path.empty?
truststore_default_location
else
new_resource.keystore_path
end
truststore_passwd = new_resource.keystore_passwd
certalias = new_resource.cert_alias
certdata = new_resource.cert_data || fetch_certdata
hash = OpenSSL::Digest::SHA512.hexdigest(certdata)
certfile = "#{node['java']['download_path']}/#{certalias}.cert.#{hash}"
cmd = Mixlib::ShellOut.new("#{keytool} -list -keystore #{truststore} -storepass #{truststore_passwd} -rfc -alias \"#{certalias}\"")
cmd.run_command
keystore_cert = cmd.stdout.match(/^[-]+BEGIN.*END(\s|\w)+[-]+$/m).to_s
keystore_cert_digest = keystore_cert.empty? ? nil : OpenSSL::Digest::SHA512.hexdigest(OpenSSL::X509::Certificate.new(keystore_cert).to_der)
certfile_digest = OpenSSL::Digest::SHA512.hexdigest(OpenSSL::X509::Certificate.new(certdata).to_der)
if keystore_cert_digest == certfile_digest
Chef::Log.debug("Certificate \"#{certalias}\" in keystore \"#{truststore}\" is up-to-date.")
else
cmd = Mixlib::ShellOut.new("#{keytool} -list -keystore #{truststore} -storepass #{truststore_passwd} -v")
cmd.run_command
Chef::Log.debug(cmd.format_for_exception)
Chef::Application.fatal!("Error querying keystore for existing certificate: #{cmd.exitstatus}", cmd.exitstatus) unless cmd.exitstatus == 0
has_key = !cmd.stdout[/Alias name: \b#{certalias}/i].nil?
if has_key
converge_by("delete existing certificate #{certalias} from #{truststore}") do
cmd = Mixlib::ShellOut.new("#{keytool} -delete -alias \"#{certalias}\" -keystore #{truststore} -storepass #{truststore_passwd}")
cmd.run_command
Chef::Log.debug(cmd.format_for_exception)
unless cmd.exitstatus == 0
Chef::Application.fatal!("Error deleting existing certificate \"#{certalias}\" in " \
"keystore so it can be updated: #{cmd.exitstatus}", cmd.exitstatus)
end
end
end
::File.open(certfile, 'w', 0o644) { |f| f.write(certdata) }
converge_by("add certificate #{certalias} to keystore #{truststore}") do
cmd = Mixlib::ShellOut.new("#{keytool} -import -trustcacerts -alias \"#{certalias}\" -file #{certfile} -keystore #{truststore} -storepass #{truststore_passwd} -noprompt")
cmd.run_command
Chef::Log.debug(cmd.format_for_exception)
unless cmd.exitstatus == 0
FileUtils.rm_f(certfile)
Chef::Application.fatal!("Error importing certificate into keystore: #{cmd.exitstatus}", cmd.exitstatus)
end
end
end
end
action :remove do
certalias = new_resource.name
truststore = if new_resource.keystore_path.nil?
truststore_default_location
else
new_resource.keystore_path
end
truststore_passwd = new_resource.keystore_passwd
keytool = "#{node['java']['java_home']}/bin/keytool"
cmd = Mixlib::ShellOut.new("#{keytool} -list -keystore #{truststore} -storepass #{truststore_passwd} -v | grep \"#{certalias}\"")
cmd.run_command
has_key = !cmd.stdout[/Alias name: #{certalias}/].nil?
Chef::Application.fatal!("Error querying keystore for existing certificate: #{cmd.exitstatus}", cmd.exitstatus) unless cmd.exitstatus == 0
if has_key
converge_by("remove certificate #{certalias} from #{truststore}") do
cmd = Mixlib::ShellOut.new("#{keytool} -delete -alias \"#{certalias}\" -keystore #{truststore} -storepass #{truststore_passwd}")
cmd.run_command
unless cmd.exitstatus == 0
Chef::Application.fatal!("Error deleting existing certificate \"#{certalias}\" in " \
"keystore so it can be updated: #{cmd.exitstatus}", cmd.exitstatus)
end
end
end
FileUtils.rm_f("#{node['java']['download_path']}/#{certalias}.cert.*")
end
action_class do
def fetch_certdata
return IO.read(new_resource.cert_file) unless new_resource.cert_file.nil?
certendpoint = new_resource.ssl_endpoint
unless certendpoint.nil?
cmd = Mixlib::ShellOut.new("echo QUIT | openssl s_client -showcerts -servername #{certendpoint.split(':').first} -connect #{certendpoint} 2> /dev/null | openssl x509")
cmd.run_command
Chef::Log.debug(cmd.format_for_exception)
Chef::Application.fatal!("Error returned when attempting to retrieve certificate from remote endpoint #{certendpoint}: #{cmd.exitstatus}", cmd.exitstatus) unless cmd.exitstatus == 0
certout = cmd.stdout
return certout unless certout.empty?
Chef::Application.fatal!("Unable to parse certificate from openssl query of #{certendpoint}.", 999)
end
Chef::Application.fatal!('At least one of cert_data, cert_file or ssl_endpoint attributes must be provided.', 999)
end
def truststore_default_location
if node['java']['jdk_version'].to_i > 8
"#{node['java']['java_home']}/lib/security/cacerts"
else
"#{node['java']['java_home']}/jre/lib/security/cacerts"
end
end
end