summaryrefslogtreecommitdiff
path: root/lib/chef/resource/openssl_x509_certificate.rb
blob: 96a0ec3d6db844439451a6eff4cda050a74fdddb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
#
# License:: Apache License, Version 2.0
# Author:: Julien Huon
# Copyright:: Copyright 2018, Chef Software Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#     http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#

require_relative "../resource"

class Chef
  class Resource
    class OpensslX509Certificate < Chef::Resource
      require_relative "../mixin/openssl_helper"
      include Chef::Mixin::OpenSSLHelper

      resource_name :openssl_x509_certificate
      provides(:openssl_x509) { true } # legacy cookbook name.

      description "Use the openssl_x509_certificate resource to generate signed or self-signed, PEM-formatted x509 certificates. If no existing key is specified, the resource will automatically generate a passwordless key with the certificate. If a CA private key and certificate are provided, the certificate will be signed with them. Note: This resource was renamed from openssl_x509 to openssl_x509_certificate. The legacy name will continue to function, but cookbook code should be updated for the new resource name."
      introduced "14.4"

      property :path, String,
               description: "An optional property for specifying the path to write the file to if it differs from the resource block's name.",
               name_property: true

      property :owner, [String, Integer],
               description: "The owner applied to all files created by the resource."

      property :group, [String, Integer],
               description: "The group ownership applied to all files created by the resource."

      property :expire, Integer,
               description: "Value representing the number of days from now through which the issued certificate cert will remain valid. The certificate will expire after this period.",
               default: 365

      property :mode, [Integer, String],
               description: "The permission mode applied to all files created by the resource."

      property :country, String,
               description: "Value for the C certificate field."

      property :state, String,
               description: "Value for the ST certificate field."

      property :city, String,
               description: "Value for the L certificate field."

      property :org, String,
               description: "Value for the O certificate field."

      property :org_unit, String,
               description: "Value for the OU certificate field."

      property :common_name, String,
               description: "Value for the CN certificate field."

      property :email, String,
               description: "Value for the email certificate field."

      property :extensions, Hash,
               description: "Hash of X509 Extensions entries, in format { 'keyUsage' => { 'values' => %w( keyEncipherment digitalSignature), 'critical' => true } }.",
               default: lazy { Hash.new }

      property :subject_alt_name, Array,
               description: "Array of Subject Alternative Name entries, in format DNS:example.com or IP:1.2.3.4.",
               default: lazy { [] }

      property :key_file, String,
               description: "The path to a certificate key file on the filesystem. If the key_file property is specified, the resource will attempt to source a key from this location. If no key file is found, the resource will generate a new key file at this location. If the key_file property is not specified, the resource will generate a key file in the same directory as the generated certificate, with the same name as the generated certificate."

      property :key_pass, String,
               description: "The passphrase for an existing key's passphrase."

      property :key_type, String,
               equal_to: %w{rsa ec},
               description: "The desired type of the generated key (rsa or ec).",
               default: "rsa"

      property :key_length, Integer,
               equal_to: [1024, 2048, 4096, 8192],
               description: "The desired bit length of the generated key (if key_type is equal to 'rsa').",
               default: 2048

      property :key_curve, String,
               description: "The desired curve of the generated key (if key_type is equal to 'ec'). Run openssl ecparam -list_curves to see available options.",
               equal_to: %w{secp384r1 secp521r1 prime256v1},
               default: "prime256v1"

      property :csr_file, String,
               description: "The path to a X509 Certificate Request (CSR) on the filesystem. If the csr_file property is specified, the resource will attempt to source a CSR from this location. If no CSR file is found, the resource will generate a Self-Signed Certificate and the certificate fields must be specified (common_name at last)."

      property :ca_cert_file, String,
               description: "The path to the CA X509 Certificate on the filesystem. If the ca_cert_file property is specified, the ca_key_file property must also be specified, the certificate will be signed with them."

      property :ca_key_file, String,
               description: "The path to the CA private key on the filesystem. If the ca_key_file property is specified, the 'ca_cert_file' property must also be specified, the certificate will be signed with them."

      property :ca_key_pass, String,
               description: "The passphrase for CA private key's passphrase."

      action :create do
        description "Generate a certificate"

        unless ::File.exist? new_resource.path
          converge_by("Create #{@new_resource}") do
            file new_resource.path do
              action :create_if_missing
              owner new_resource.owner unless new_resource.owner.nil?
              group new_resource.group unless new_resource.group.nil?
              mode new_resource.mode unless new_resource.mode.nil?
              sensitive true
              content cert.to_pem
            end

            if new_resource.csr_file.nil?
              file new_resource.key_file do
                action :create_if_missing
                owner new_resource.owner unless new_resource.owner.nil?
                group new_resource.group unless new_resource.group.nil?
                mode new_resource.mode unless new_resource.mode.nil?
                sensitive true
                content key.to_pem
              end
            end
          end
        end
      end

      action_class do
        def generate_key_file
          unless new_resource.key_file
            path, file = ::File.split(new_resource.path)
            filename = ::File.basename(file, ::File.extname(file))
            new_resource.key_file path + "/" + filename + ".key"
          end
          new_resource.key_file
        end

        def key
          @key ||= if priv_key_file_valid?(generate_key_file, new_resource.key_pass)
                     OpenSSL::PKey.read ::File.read(generate_key_file), new_resource.key_pass
                   elsif new_resource.key_type == "rsa"
                     gen_rsa_priv_key(new_resource.key_length)
                   else
                     gen_ec_priv_key(new_resource.key_curve)
                   end
          @key
        end

        def request
          request = if new_resource.csr_file.nil?
                      gen_x509_request(subject, key)
                    else
                      OpenSSL::X509::Request.new ::File.read(new_resource.csr_file)
                    end
          request
        end

        def subject
          subject = OpenSSL::X509::Name.new()
          subject.add_entry("C", new_resource.country) unless new_resource.country.nil?
          subject.add_entry("ST", new_resource.state) unless new_resource.state.nil?
          subject.add_entry("L", new_resource.city) unless new_resource.city.nil?
          subject.add_entry("O", new_resource.org) unless new_resource.org.nil?
          subject.add_entry("OU", new_resource.org_unit) unless new_resource.org_unit.nil?
          subject.add_entry("CN", new_resource.common_name)
          subject.add_entry("emailAddress", new_resource.email) unless new_resource.email.nil?
          subject
        end

        def ca_private_key
          ca_private_key = if new_resource.csr_file.nil?
                             key
                           else
                             OpenSSL::PKey.read ::File.read(new_resource.ca_key_file), new_resource.ca_key_pass
                           end
          ca_private_key
        end

        def ca_info
          # Will contain issuer (if any) & expiration
          ca_info = {}

          unless new_resource.ca_cert_file.nil?
            ca_info["issuer"] = OpenSSL::X509::Certificate.new ::File.read(new_resource.ca_cert_file)
          end
          ca_info["validity"] = new_resource.expire

          ca_info
        end

        def extensions
          extensions = gen_x509_extensions(new_resource.extensions)

          unless new_resource.subject_alt_name.empty?
            extensions += gen_x509_extensions("subjectAltName" => { "values" => new_resource.subject_alt_name, "critical" => false })
          end

          extensions
        end

        def cert
          cert = gen_x509_cert(request, extensions, ca_info, ca_private_key)
          cert
        end
      end
    end
  end
end