summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorTim Smith <tsmith@chef.io>2018-08-24 17:56:54 -0700
committerGitHub <noreply@github.com>2018-08-24 17:56:54 -0700
commit04bc42618fd476da00ec6e4bc320d57c2585873c (patch)
treefc372b2c3e0caaeaf3ab0617b66be702b3af027e /lib
parentf6f450609ebfbe819856d494bff6fdae92a01d00 (diff)
parentea8d850ca3a44305c143dbd70420f09895132ed7 (diff)
downloadchef-04bc42618fd476da00ec6e4bc320d57c2585873c.tar.gz
Merge pull request #7586 from chef/openssl_updates
Add openssl_x509_crl resource and fix default modes in x509_certificate / x509_request
Diffstat (limited to 'lib')
-rw-r--r--lib/chef/resource/openssl_x509_certificate.rb7
-rw-r--r--lib/chef/resource/openssl_x509_crl.rb130
-rw-r--r--lib/chef/resource/openssl_x509_request.rb8
-rw-r--r--lib/chef/resources.rb1
4 files changed, 138 insertions, 8 deletions
diff --git a/lib/chef/resource/openssl_x509_certificate.rb b/lib/chef/resource/openssl_x509_certificate.rb
index 04641e877b..00058f65d0 100644
--- a/lib/chef/resource/openssl_x509_certificate.rb
+++ b/lib/chef/resource/openssl_x509_certificate.rb
@@ -44,8 +44,7 @@ class Chef
default: 365
property :mode, [Integer, String],
- description: "The permission mode of all files created by the resource.",
- default: "0644"
+ description: "The permission mode of all files created by the resource."
property :country, String,
description: "Value for the C ssl field."
@@ -116,9 +115,9 @@ class Chef
converge_by("Create #{@new_resource}") do
file new_resource.path do
action :create_if_missing
- mode new_resource.mode
owner new_resource.owner unless new_resource.owner.nil?
group new_resource.group unless new_resource.group.nil?
+ mode new_resource.mode unless new_resource.mode.nil?
sensitive true
content cert.to_pem
end
@@ -126,9 +125,9 @@ class Chef
if new_resource.csr_file.nil?
file new_resource.key_file do
action :create_if_missing
- mode new_resource.mode
owner new_resource.owner unless new_resource.owner.nil?
group new_resource.group unless new_resource.group.nil?
+ mode new_resource.mode unless new_resource.mode.nil?
sensitive true
content key.to_pem
end
diff --git a/lib/chef/resource/openssl_x509_crl.rb b/lib/chef/resource/openssl_x509_crl.rb
new file mode 100644
index 0000000000..06c591ac18
--- /dev/null
+++ b/lib/chef/resource/openssl_x509_crl.rb
@@ -0,0 +1,130 @@
+#
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require "chef/resource"
+
+class Chef
+ class Resource
+ class OpensslX509Crl < Chef::Resource
+ require "chef/mixin/openssl_helper"
+ include Chef::Mixin::OpenSSLHelper
+
+ preview_resource true
+ resource_name :openssl_x509_crl
+
+ description "Use the openssl_x509_crl resource to generate PEM-formatted x509 CRL files."
+ introduced "14.4"
+
+ property :path, String,
+ description: "Optional path to write the file to if you'd like to specify it here instead of in the resource name.",
+ name_property: true
+
+ property :serial_to_revoke, [Integer, String],
+ description: "Serial of the X509 Certificate to revoke."
+
+ property :revocation_reason, Integer,
+ description: "Reason for the revokation.",
+ default: 0
+
+ property :expire, Integer,
+ description: "Value representing the number of days from now through which the issued CRL will remain valid. The CRL will expire after this period.",
+ default: 8
+
+ property :renewal_threshold, Integer,
+ description: "Number of days before the expiration. It this threshold is reached, the CRL will be renewed.",
+ default: 1
+
+ property :ca_cert_file, String,
+ description: "The path to the CA X509 Certificate on the filesystem. If the ca_cert_file attribute is specified, the ca_key_file attribute must also be specified, the CRL will be signed with them.",
+ required: true
+
+ property :ca_key_file, String,
+ description: "The path to the CA private key on the filesystem. If the ca_key_file property is specified, the ca_cert_file property must also be specified, the CRL will be signed with them.",
+ required: true
+
+ property :ca_key_pass, String,
+ description: "The passphrase for CA private key's passphrase."
+
+ property :owner, String,
+ description: "The owner permission for the CRL file."
+
+ property :group, String,
+ description: "The group permission for the CRL file."
+
+ property :mode, [Integer, String],
+ description: "The permission mode of the CRL file."
+
+ action :create do
+ description "Create the CRL file."
+
+ file new_resource.path do
+ owner new_resource.owner unless new_resource.owner.nil?
+ group new_resource.group unless new_resource.group.nil?
+ mode new_resource.mode unless new_resource.mode.nil?
+ content crl.to_pem
+ action :create
+ end
+ end
+
+ action_class do
+ def crl_info
+ # Will contain issuer & expiration
+ crl_info = {}
+
+ crl_info["issuer"] = ::OpenSSL::X509::Certificate.new ::File.read(new_resource.ca_cert_file)
+ crl_info["validity"] = new_resource.expire
+
+ crl_info
+ end
+
+ def revoke_info
+ # Will contain Serial to revoke & reason
+ revoke_info = {}
+
+ revoke_info["serial"] = new_resource.serial_to_revoke
+ revoke_info["reason"] = new_resource.revocation_reason
+
+ revoke_info
+ end
+
+ def ca_private_key
+ ca_private_key = ::OpenSSL::PKey.read ::File.read(new_resource.ca_key_file), new_resource.ca_key_pass
+ ca_private_key
+ end
+
+ def crl
+ if crl_file_valid?(new_resource.path)
+ crl = ::OpenSSL::X509::CRL.new ::File.read(new_resource.path)
+ else
+ log "Creating a CRL #{new_resource.path} for CA #{new_resource.ca_cert_file}"
+ crl = gen_x509_crl(ca_private_key, crl_info)
+ end
+
+ if !new_resource.serial_to_revoke.nil? && serial_revoked?(crl, new_resource.serial_to_revoke) == false
+ log "Revoking serial #{new_resource.serial_to_revoke} in CRL #{new_resource.path}"
+ crl = revoke_x509_crl(revoke_info, crl, ca_private_key, crl_info)
+ elsif crl.next_update <= Time.now + 3600 * 24 * new_resource.renewal_threshold
+ log "Renewing CRL for CA #{new_resource.ca_cert_file}"
+ crl = renew_x509_crl(crl, ca_private_key, crl_info)
+ end
+
+ crl
+ end
+ end
+
+ end
+ end
+end
diff --git a/lib/chef/resource/openssl_x509_request.rb b/lib/chef/resource/openssl_x509_request.rb
index a7b989d96d..071978a961 100644
--- a/lib/chef/resource/openssl_x509_request.rb
+++ b/lib/chef/resource/openssl_x509_request.rb
@@ -37,8 +37,8 @@ class Chef
property :group, String,
description: "The group of all files created by the resource."
- property :mode, [Integer, String], default: "0644",
- description: ""
+ property :mode, [Integer, String],
+ description: "The permission mode of all files created by the resource."
property :country, String,
description: "Value for the C ssl field."
@@ -90,15 +90,15 @@ class Chef
file new_resource.name do
owner new_resource.owner unless new_resource.owner.nil?
group new_resource.group unless new_resource.group.nil?
- mode new_resource.mode
+ mode new_resource.mode unless new_resource.mode.nil?
content csr.to_pem
action :create
end
file new_resource.key_file do
- mode new_resource.mode
owner new_resource.owner unless new_resource.owner.nil?
group new_resource.group unless new_resource.group.nil?
+ mode new_resource.mode unless new_resource.mode.nil?
content key.to_pem
sensitive true
action :create_if_missing
diff --git a/lib/chef/resources.rb b/lib/chef/resources.rb
index 3a4822e8f4..614ef74ade 100644
--- a/lib/chef/resources.rb
+++ b/lib/chef/resources.rb
@@ -71,6 +71,7 @@ require "chef/resource/openssl_ec_public_key"
require "chef/resource/openssl_rsa_private_key"
require "chef/resource/openssl_rsa_public_key"
require "chef/resource/openssl_x509_certificate"
+require "chef/resource/openssl_x509_crl"
require "chef/resource/openssl_x509_request"
require "chef/resource/package"
require "chef/resource/pacman_package"