class Puppetserver::Ca::Action::Generate
Constants
- BANNER
- CERTNAME_BLACKLIST
- SUMMARY
- VALID_CERTNAME
Only allow printing ascii characters, excluding /
Public Class Methods
new(logger)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 50 def initialize(logger) @logger = logger end
parser(parsed = {})
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 54 def self.parser(parsed = {}) parsed['certnames'] = [] parsed['subject-alt-names'] = '' OptionParser.new do |opts| opts.banner = BANNER opts.on('--certname NAME[,NAME]', Array, 'One or more comma separated certnames') do |certs| parsed['certnames'] += certs end opts.on('--help', 'Display this command-specific help output') do |help| parsed['help'] = true end opts.on('--config CONF', 'Path to puppet.conf') do |conf| parsed['config'] = conf end opts.on('--subject-alt-names NAME[,NAME]', 'Subject alternative names for the generated cert') do |sans| parsed['subject-alt-names'] = sans end opts.on('--ca-client', 'Whether this cert will be used to request CA actions.', 'Causes the cert to be generated offline.') do |ca_client| parsed['ca-client'] = true end end end
Public Instance Methods
check_for_existing_ssl_files(certname, settings)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 300 def check_for_existing_ssl_files(certname, settings) files = [ File.join(settings[:certdir], "#{certname}.pem"), File.join(settings[:privatekeydir], "#{certname}.pem"), File.join(settings[:publickeydir], "#{certname}.pem"), File.join(settings[:signeddir], "#{certname}.pem"), ] errors = Puppetserver::Ca::Utils::FileSystem.check_for_existing_files(files) if !errors.empty? errors << "Please delete these files if you really want to generate a new cert for #{certname}." end errors end
check_server_online(settings)
click to toggle source
Queries the simple status endpoint for the status of the CA service. Returns true if it receives back a response of “running”, and false if no connection can be made, or a different response is received.
# File lib/puppetserver/ca/action/generate.rb, line 151 def check_server_online(settings) status_url = HttpClient::URL.new('https', settings[:ca_server], settings[:ca_port], 'status', 'v1', 'simple', 'ca') begin # Generating certs offline is necessary if the master cert has been destroyed # or compromised. Since querying the status endpoint does not require a client cert, and # we commonly won't have one, don't require one for creating the connection. HttpClient.new(settings, with_client_cert: false).with_connection(status_url) do |conn| result = conn.get if result.body == "running" @logger.err "CA service is running. Please stop it before attempting to generate certs offline." true else false end end true rescue Puppetserver::Ca::ConnectionFailed => e if e.wrapped.is_a? Errno::ECONNREFUSED return false else raise e end end end
download_cert(ca, certname, settings)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 253 def download_cert(ca, certname, settings) if result = ca.get_certificate(certname) return false unless save_file(result.body, certname, settings[:certdir], "Certificate") true end end
generate_certs(certnames, alt_names, settings, digest)
click to toggle source
Generate csrs and keys, then submit them to CA, request for the CA to sign them, download the signed certificates from the CA, and finally save the signed certs and associated keys. Returns true if all certs were successfully created and saved.
# File lib/puppetserver/ca/action/generate.rb, line 213 def generate_certs(certnames, alt_names, settings, digest) # Make sure we have all the directories where we will be writing files FileSystem.ensure_dirs([settings[:ssldir], settings[:certdir], settings[:privatekeydir], settings[:publickeydir]]) ca = Puppetserver::Ca::CertificateAuthority.new(@logger, settings) passed = certnames.map do |certname| errors = check_for_existing_ssl_files(certname, settings) next false if Errors.handle_with_usage(@logger, errors) current_alt_names = process_alt_names(alt_names, certname) next false unless submit_csr(certname, ca, settings, digest, current_alt_names) # Check if the CA autosigned the cert if download_cert(ca, certname, settings) @logger.inform "Certificate for #{certname} was autosigned." true else next false unless ca.sign_certs([certname]) download_cert(ca, certname, settings) end end passed.all? end
generate_key_csr(certname, settings, digest, alt_names = '')
click to toggle source
For certs signed offline, any alt names are added directly to the cert, rather than to the CSR.
# File lib/puppetserver/ca/action/generate.rb, line 262 def generate_key_csr(certname, settings, digest, alt_names = '') host = Puppetserver::Ca::Host.new(digest) private_key = host.create_private_key(settings[:keylength]) extensions = [] if !alt_names.empty? ef = OpenSSL::X509::ExtensionFactory.new extensions << ef.create_extension("subjectAltName", alt_names, false) end csr = host.create_csr(name: certname, key: private_key, cli_extensions: extensions, csr_attributes_path: settings[:csr_attributes]) return if Errors.handle_with_usage(@logger, host.errors) return private_key, csr end
parse(args)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 81 def parse(args) results = {} parser = self.class.parser(results) errors = CliParsing.parse_with_errors(parser, args) if results['certnames'].empty? errors << ' At least one certname is required to generate' else results['certnames'].each do |certname| if CERTNAME_BLACKLIST.include?(certname) errors << " Cannot manage cert named `#{certname}` from " + "the CLI, if needed use the HTTP API directly" end if certname.match(/\p{Upper}/) errors << " Certificate names must be lower case" end unless certname =~ VALID_CERTNAME errors << " Certname #{certname} must not contain unprintable or non-ASCII characters" end end end errors_were_handled = Errors.handle_with_usage(@logger, errors, parser.help) exit_code = errors_were_handled ? 1 : nil return results, exit_code end
process_alt_names(alt_names, certname)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 312 def process_alt_names(alt_names, certname) return '' if alt_names.empty? current_alt_names = alt_names.dup # When validating the cert, OpenSSL will ignore the CN field if # altnames are present, so we need to ensure that the certname is # also listed among the alt names. current_alt_names += ",DNS:#{certname}" current_alt_names = Puppetserver::Ca::Utils::Config.munge_alt_names(current_alt_names) end
run(input)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 113 def run(input) certnames = input['certnames'] config_path = input['config'] # Validate config_path provided if config_path errors = FileSystem.validate_file_paths(config_path) return 1 if Errors.handle_with_usage(@logger, errors) end # Load, resolve, and validate puppet config settings settings_overrides = {} puppet = Config::Puppet.new(config_path) puppet.load(settings_overrides) return 1 if Errors.handle_with_usage(@logger, puppet.errors) # We don't want generate to respect the alt names setting, since it is usually # used to generate certs for other nodes alt_names = input['subject-alt-names'] # Load most secure signing digest we can for csr signing. signer = SigningDigest.new return 1 if Errors.handle_with_usage(@logger, signer.errors) # Generate and save certs and associated keys if input['ca-client'] # Refused to generate certs offfline if the CA service is running return 1 if check_server_online(puppet.settings) all_passed = generate_authorized_certs(certnames, alt_names, puppet.settings, signer.digest) else all_passed = generate_certs(certnames, alt_names, puppet.settings, signer.digest) end return all_passed ? 0 : 1 end
save_file(content, certname, dir, type)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 288 def save_file(content, certname, dir, type) location = File.join(dir, "#{certname}.pem") if File.exist?(location) @logger.err "#{type} #{certname}.pem already exists. Please delete it if you really want to regenerate it." false else FileSystem.write_file(location, content, 0640) @logger.inform "Successfully saved #{type.downcase} for #{certname} to #{location}" true end end
save_keys(certname, settings, key)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 281 def save_keys(certname, settings, key) public_key = key.public_key return false unless save_file(key, certname, settings[:privatekeydir], "Private key") return false unless save_file(public_key, certname, settings[:publickeydir], "Public key") true end
submit_csr(certname, ca, settings, digest, alt_names)
click to toggle source
# File lib/puppetserver/ca/action/generate.rb, line 242 def submit_csr(certname, ca, settings, digest, alt_names) key, csr = generate_key_csr(certname, settings, digest, alt_names) return false unless csr # Always save the keys, since soemtimes the server saves the CSR # even when it returns a 400 (e.g. when the CSR contains alt names # but the server isn't configured to sign such certs) return false unless save_keys(certname, settings, key) return false unless ca.submit_certificate_request(certname, csr) true end