Class: CfnVpn::Certificates
- Inherits:
-
Object
- Object
- CfnVpn::Certificates
- Defined in:
- lib/cfnvpn/certificates.rb
Instance Method Summary collapse
- #extract_certificate(client_cn) ⇒ Object
- #generate_ca(server_cn, client_cn, expiry = nil) ⇒ Object
- #generate_client(client_cn, expiry = nil) ⇒ Object
-
#initialize(build_dir, cfnvpn_name, easyrsa_local = false) ⇒ Certificates
constructor
A new instance of Certificates.
- #rebuild(server_cn, client_cn, expiry = nil) ⇒ Object
- #renew(server_cn, client_cn, expiry = nil) ⇒ Object
- #retrieve_certificate(bucket, bundle) ⇒ Object
- #revoke_client(client_cn) ⇒ Object
- #store_certificate(bucket, bundle) ⇒ Object
- #upload_certificates(region, cert, type, cn = nil) ⇒ Object
- #which(cmd) ⇒ Object
Constructor Details
#initialize(build_dir, cfnvpn_name, easyrsa_local = false) ⇒ Certificates
Returns a new instance of Certificates.
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 |
# File 'lib/cfnvpn/certificates.rb', line 11 def initialize(build_dir, cfnvpn_name, easyrsa_local = false) @cfnvpn_name = cfnvpn_name @easyrsa_local = easyrsa_local if @easyrsa_local unless which('easyrsa') raise "Unable to find `easyrsa` in your path. Check your path or remove the `--easyrsa-local` flag to run from docker" end end @build_dir = build_dir @config_dir = "#{build_dir}/config" @cert_dir = "#{build_dir}/certificates" @pki_dir = "#{build_dir}/pki" @docker_cmd = %w(docker run -it --rm) @easyrsa_image = " base2/aws-client-vpn" FileUtils.mkdir_p(@cert_dir) FileUtils.mkdir_p(@pki_dir) end |
Instance Method Details
#extract_certificate(client_cn) ⇒ Object
173 174 175 176 177 |
# File 'lib/cfnvpn/certificates.rb', line 173 def extract_certificate(client_cn) tar = "#{@config_dir}/#{client_cn}.tar.gz" `tar xzfv #{tar} -C #{@config_dir} --strip 2` File.delete(tar) if File.exist?(tar) end |
#generate_ca(server_cn, client_cn, expiry = nil) ⇒ Object
31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 |
# File 'lib/cfnvpn/certificates.rb', line 31 def generate_ca(server_cn,client_cn,expiry=nil) opts = "" unless expiry.nil? opts += "--days=#{expiry}" end if @easyrsa_local ENV["EASYRSA_REQ_CN"] = server_cn ENV["EASYRSA_PKI"] = @pki_dir system("easyrsa init-pki") system("easyrsa build-ca nopass") system("easyrsa #{opts} build-server-full server nopass") system("easyrsa #{opts} build-client-full #{client_cn} nopass") FileUtils.cp(["#{@pki_dir}/ca.crt", "#{@pki_dir}/issued/server.crt", "#{@pki_dir}/private/server.key", "#{@pki_dir}/issued/#{client_cn}.crt", "#{@pki_dir}/private/#{client_cn}.key"], @cert_dir) system("tar czfv #{@cert_dir}/ca.tar.gz -C #{@build_dir} pki/") else @docker_cmd << "-e EASYRSA_REQ_CN=#{server_cn}" @docker_cmd << "-e EASYRSA_CLIENT_CN=#{client_cn}" @docker_cmd << "-e EASYRSA_OPTS=\"#{opts}\"" @docker_cmd << "-v #{@cert_dir}:/easy-rsa/output" @docker_cmd << @easyrsa_image @docker_cmd << "sh -c 'create-ca'" CfnVpn::Log.logger.debug `#{@docker_cmd.join(' ')}` end end |
#generate_client(client_cn, expiry = nil) ⇒ Object
57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 |
# File 'lib/cfnvpn/certificates.rb', line 57 def generate_client(client_cn,expiry=nil) opts = "" unless expiry.nil? opts += "--days=#{expiry}" end if @easyrsa_local ENV["EASYRSA_PKI"] = @pki_dir system("tar xzfv #{@cert_dir}/ca.tar.gz --directory #{@build_dir}") system("easyrsa #{opts} build-client-full #{client_cn} nopass") system("tar czfv #{@cert_dir}/#{client_cn}.tar.gz -C #{@build_dir} pki/issued/#{client_cn}.crt pki/private/#{client_cn}.key pki/reqs/#{client_cn}.req") else @docker_cmd << "-e EASYRSA_CLIENT_CN=#{client_cn}" @docker_cmd << "-e EASYRSA_OPTS=\"#{opts}\"" @docker_cmd << "-v #{@cert_dir}:/easy-rsa/output" @docker_cmd << @easyrsa_image @docker_cmd << "sh -c 'create-client'" CfnVpn::Log.logger.debug `#{@docker_cmd.join(' ')}` end end |
#rebuild(server_cn, client_cn, expiry = nil) ⇒ Object
103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 |
# File 'lib/cfnvpn/certificates.rb', line 103 def rebuild(server_cn,client_cn,expiry=nil) = Time.now.getutc.to_i opts = "" unless expiry.nil? opts += "--days=#{expiry}" end if @easyrsa_local ENV["EASYRSA_REQ_CN"] = server_cn ENV["EASYRSA_PKI"] = @pki_dir system("tar xzfv #{@cert_dir}/ca.tar.gz --directory #{@build_dir}") FileUtils.mv("#{@pki_dir}/reqs/server.req", "#{@pki_dir}/reqs/server.req.bak-#{}") FileUtils.mv("#{@pki_dir}/issued/server.crt", "#{@pki_dir}/issued/server.req.bak-#{}") FileUtils.mv("#{@pki_dir}/private/server.key", "#{@pki_dir}/private/server.req.bak-#{}") FileUtils.mv("#{@pki_dir}/reqs/#{client_cn}.req", "#{@pki_dir}/reqs/#{client_cn}.req.bak-#{}") FileUtils.mv("#{@pki_dir}/issued/#{client_cn}.crt", "#{@pki_dir}/issued/#{client_cn}.req.bak-#{}") FileUtils.mv("#{@pki_dir}/private/#{client_cn}.key", "#{@pki_dir}/private/#{client_cn}.req.bak-#{}") system("easyrsa #{opts} build-server-full server nopass") system("easyrsa #{opts} build-client-full #{client_cn} nopass") FileUtils.cp(["#{@pki_dir}/ca.crt", "#{@pki_dir}/issued/server.crt", "#{@pki_dir}/private/server.key", "#{@pki_dir}/issued/#{client_cn}.crt", "#{@pki_dir}/private/#{client_cn}.key"], @cert_dir) system("tar czfv #{@cert_dir}/ca.tar.gz -C #{@build_dir} pki/") else @docker_cmd << "-e EASYRSA_REQ_CN=#{server_cn}" @docker_cmd << "-e EASYRSA_CLIENT_CN=#{client_cn}" @docker_cmd << "-e EASYRSA_OPTS=\"#{opts}\"" @docker_cmd << "-v #{@cert_dir}:/easy-rsa/output" @docker_cmd << @easyrsa_image @docker_cmd << "sh -c 'rebuild'" CfnVpn::Log.logger.debug `#{@docker_cmd.join(' ')}` end end |
#renew(server_cn, client_cn, expiry = nil) ⇒ Object
78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 |
# File 'lib/cfnvpn/certificates.rb', line 78 def renew(server_cn,client_cn,expiry=nil) opts = "" unless expiry.nil? opts += "--days=#{expiry}" end if @easyrsa_local ENV["EASYRSA_REQ_CN"] = server_cn ENV["EASYRSA_PKI"] = @pki_dir system("tar xzfv #{@cert_dir}/ca.tar.gz --directory #{@build_dir}") system("easyrsa #{opts} renew server nopass") system("easyrsa #{opts} renew #{client_cn} nopass") FileUtils.cp(["#{@pki_dir}/ca.crt", "#{@pki_dir}/issued/server.crt", "#{@pki_dir}/private/server.key", "#{@pki_dir}/issued/#{client_cn}.crt", "#{@pki_dir}/private/#{client_cn}.key"], @cert_dir) system("tar czfv #{@cert_dir}/ca.tar.gz -C #{@build_dir} pki/") else @docker_cmd << "-e EASYRSA_REQ_CN=#{server_cn}" @docker_cmd << "-e EASYRSA_CLIENT_CN=#{client_cn}" @docker_cmd << "-e EASYRSA_OPTS=\"#{opts}\"" @docker_cmd << "-v #{@cert_dir}:/easy-rsa/output" @docker_cmd << @easyrsa_image @docker_cmd << "sh -c 'renew'" CfnVpn::Log.logger.debug `#{@docker_cmd.join(' ')}` end end |
#retrieve_certificate(bucket, bundle) ⇒ Object
168 169 170 171 |
# File 'lib/cfnvpn/certificates.rb', line 168 def retrieve_certificate(bucket,bundle) s3 = CfnVpn::S3.new(@region,bucket,@name) s3.get_object("#{@cert_dir}/#{bundle}") end |
#revoke_client(client_cn) ⇒ Object
137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 |
# File 'lib/cfnvpn/certificates.rb', line 137 def revoke_client(client_cn) if @easyrsa_local ENV["EASYRSA_PKI"] = @pki_dir system("tar xzfv #{@cert_dir}/ca.tar.gz --directory #{@build_dir}") system("tar xzfv #{@cert_dir}/#{client_cn}.tar.gz --directory #{@build_dir}") system("easyrsa revoke #{client_cn}") system("easyrsa gen-crl") FileUtils.cp("#{@pki_dir}/crl.pem", @cert_dir) else @docker_cmd << "-e EASYRSA_CLIENT_CN=#{client_cn}" @docker_cmd << "-v #{@cert_dir}:/easy-rsa/output" @docker_cmd << @easyrsa_image @docker_cmd << "sh -c 'revoke-client'" CfnVpn::Log.logger.debug `#{@docker_cmd.join(' ')}` end end |
#store_certificate(bucket, bundle) ⇒ Object
163 164 165 166 |
# File 'lib/cfnvpn/certificates.rb', line 163 def store_certificate(bucket,bundle) s3 = CfnVpn::S3.new(@region,bucket,@name) s3.store_object("#{@cert_dir}/#{bundle}") end |
#upload_certificates(region, cert, type, cn = nil) ⇒ Object
154 155 156 157 158 159 160 161 |
# File 'lib/cfnvpn/certificates.rb', line 154 def upload_certificates(region,cert,type,cn=nil) cn = cn.nil? ? cert : cn acm = CfnVpn::Acm.new(region, @cert_dir) arn = acm.import_certificate("#{cert}.crt", "#{cert}.key", "ca.crt") CfnVpn::Log.logger.debug "Uploaded #{type} certificate to ACM #{arn}" acm.tag_certificate(arn,cn,type,@cfnvpn_name) return arn end |
#which(cmd) ⇒ Object
179 180 181 182 183 184 185 186 187 188 |
# File 'lib/cfnvpn/certificates.rb', line 179 def which(cmd) exts = ENV['PATHEXT'] ? ENV['PATHEXT'].split(';') : [''] ENV['PATH'].split(File::PATH_SEPARATOR).each do |path| exts.each do |ext| exe = File.join(path, "#{cmd}#{ext}") return exe if File.executable?(exe) && !File.directory?(exe) end end nil end |