summaryrefslogtreecommitdiff
path: root/lib/leap_cli/config/node_cert.rb
blob: da63d621560af960b151c79fa48ce7e2d408dca3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
#
# x509 related methods for Config::Node
#
module LeapCli; module Config

  class Node < Object

    #
    # creates a new server certificate file for this node
    #
    def generate_cert
      require 'leap_cli/x509'

      if self['x509.use'] == false ||
         !Util.file_exists?(:ca_cert, :ca_key) ||
         !self.cert_needs_updating?
        return false
      end

      cert = CertificateAuthority::Certificate.new
      provider = env.provider

      # set subject
      cert.subject.common_name = self.domain.full
      cert.serial_number.number = X509.cert_serial_number(self.domain.full)

      # set expiration
      cert.not_before = X509.yesterday
      cert.not_after  = X509.yesterday_advance(provider.ca.server_certificates.life_span)

      # generate key
      cert.key_material.generate_key(provider.ca.server_certificates.bit_size)

      # sign
      cert.parent = X509.ca_root
      cert.sign!(X509.server_signing_profile(self))

      # save
      Util.write_file!([:node_x509_key, self.name], cert.key_material.private_key.to_pem)
      Util.write_file!([:node_x509_cert, self.name], cert.to_pem)
    end

    #
    # returns true if the certs associated with +node+ need to be regenerated.
    #
    def cert_needs_updating?(log_comments=true)
      require 'leap_cli/x509'

      if log_comments
        def log(*args, &block)
          Util.log(*args, &block)
        end
      else
        def log(*args); end
      end

      node = self
      if !Util.file_exists?([:node_x509_cert, node.name], [:node_x509_key, node.name])
        return true
      else
        cert = X509.load_certificate_file([:node_x509_cert, node.name])
        if !X509.created_by_authority?(cert)
          log :updating, "cert for node '#{node.name}' because it was signed by an old CA root cert."
          return true
        end
        if cert.not_after < Time.now.advance(:months => 2)
          log :updating, "cert for node '#{node.name}' because it will expire soon"
          return true
        end
        if cert.subject.common_name != node.domain.full
          log :updating, "cert for node '#{node.name}' because domain.full has changed (was #{cert.subject.common_name}, now #{node.domain.full})"
          return true
        end
        cert.openssl_body.extensions.each do |ext|
          if ext.oid == "subjectAltName"
            ips = []
            dns_names = []
            ext.value.split(",").each do |value|
              value.strip!
              ips << $1          if value =~ /^IP Address:(.*)$/
              dns_names << $1    if value =~ /^DNS:(.*)$/
            end
            dns_names.sort!
            if ips.first != node.ip_address
              log :updating, "cert for node '#{node.name}' because ip_address has changed (from #{ips.first} to #{node.ip_address})"
              return true
            elsif dns_names != node.all_dns_names
              log :updating, "cert for node '#{node.name}' because domain name aliases have changed" do
                log "from: #{dns_names.inspect}"
                log "to: #{node.all_dns_names.inspect})"
              end
              return true
            end
          end
        end
      end
      return false
    end

    #
    # check the expiration of commercial certs, if any.
    #
    def warn_if_commercial_cert_will_soon_expire
      require 'leap_cli/x509'

      self.all_dns_names.each do |domain|
        if Util.file_exists?([:commercial_cert, domain])
          cert = X509.load_certificate_file([:commercial_cert, domain])
          path = Path.relative_path([:commercial_cert, domain])
          if cert.not_after < Time.now.utc
            Util.log :error, "the commercial certificate '#{path}' has EXPIRED! " +
              "You should renew it with `leap cert renew #{domain}`."
          elsif cert.not_after < Time.now.advance(:months => 2)
            Util.log :warning, "the commercial certificate '#{path}' will expire soon (#{cert.not_after}). "+
              "You should renew it with `leap cert renew #{domain}`."
          end
        end
      end
    end

  end

end; end