Class: Inspec::Resources::X509CertificateResource

Inherits:
Object
  • Object
show all
Includes:
FileReader
Defined in:
lib/resources/x509_certificate.rb

Instance Method Summary collapse

Methods included from FileReader

#read_file_content

Constructor Details

#initialize(filename) ⇒ X509CertificateResource

Returns a new instance of X509CertificateResource.



39
40
41
42
43
44
45
46
# File 'lib/resources/x509_certificate.rb', line 39

def initialize(filename)
  @certpath = filename
  @issuer = nil
  @parsed_subject = nil
  @parsed_issuer = nil
  @extensions = nil
  @cert = OpenSSL::X509::Certificate.new read_file_content(@certpath)
end

Instance Method Details

#certificate?Boolean

Returns:

  • (Boolean)


55
56
57
# File 'lib/resources/x509_certificate.rb', line 55

def certificate?
  !@cert.nil?
end

#extensionsObject



109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
# File 'lib/resources/x509_certificate.rb', line 109

def extensions
  # Return cached Mash if we already parsed the certificate extensions
  return @extensions if @extensions
  # Return the exception class if we failed to instantiate a Cert from file
  return @cert unless @cert.respond_to? :extensions
  # Use a Mash to make it easier to access hash elements in "its('entensions') {should ...}"
  @extensions = Hashie::Mash.new({})
  # Make sure standard extensions exist so we don't get nil for nil:NilClass
  # when the user tests for extensions which aren't present
  %w{
    keyUsage extendedKeyUsage basicConstraints subjectKeyIdentifier
    authorityKeyIdentifier subjectAltName issuerAltName authorityInfoAccess
    crlDistributionPoints issuingDistributionPoint certificatePolicies
    policyConstraints nameConstraints noCheck tlsfeature nsComment
  }.each { |extension| @extensions[extension] ||= [] }
  # Now parse the extensions into the Mash
  extension_array = @cert.extensions.map(&:to_s)
  extension_array.each do |extension|
    kv = extension.split(/ *= */, 2)
    @extensions[kv.first] = kv.last.split(/ *, */)
  end
  @extensions
end

#fingerprintObject



59
60
61
62
# File 'lib/resources/x509_certificate.rb', line 59

def fingerprint
  return if @cert.nil?
  OpenSSL::Digest::SHA1.new(@cert.to_der).to_s
end

#issuerObject



87
88
89
90
91
92
93
# File 'lib/resources/x509_certificate.rb', line 87

def issuer
  return if @cert.nil?
  # Return cached subject if we have already parsed it
  return @parsed_issuer if @parsed_issuer
  # Use a Mash to make it easier to access hash elements in "its('issuer') {should ...}"
  @parsed_issuer = Hashie::Mash.new(Hash[@cert.issuer.to_a.map { |k, v, _| [k, v] }])
end

#issuer_dnObject



82
83
84
85
# File 'lib/resources/x509_certificate.rb', line 82

def issuer_dn
  return if @cert.nil?
  @cert.issuer.to_s
end

#key_lengthObject



95
96
97
98
# File 'lib/resources/x509_certificate.rb', line 95

def key_length
  return if @cert.nil?
  @cert.public_key.n.num_bytes * 8
end

#serialObject



64
65
66
67
# File 'lib/resources/x509_certificate.rb', line 64

def serial
  return if @cert.nil?
  @cert.serial.to_i
end

#subjectObject



74
75
76
77
78
79
80
# File 'lib/resources/x509_certificate.rb', line 74

def subject
  return if @cert.nil?
  # Return cached subject if we have already parsed it
  return @parsed_subject if @parsed_subject
  # Use a Mash to make it easier to access hash elements in "its('subject') {should ...}"
  @parsed_subject = Hashie::Mash.new(Hash[@cert.subject.to_a.map { |k, v, _| [k, v] }])
end

#subject_dnObject



69
70
71
72
# File 'lib/resources/x509_certificate.rb', line 69

def subject_dn
  return if @cert.nil?
  @cert.subject.to_s
end

#to_sObject



133
134
135
# File 'lib/resources/x509_certificate.rb', line 133

def to_s
  "x509_certificate #{@certpath}"
end

#valid?Boolean

Returns:

  • (Boolean)


104
105
106
107
# File 'lib/resources/x509_certificate.rb', line 104

def valid?
  now = Time.now
  certificate? && (now >= not_before && now <= not_after)
end

#validity_in_daysObject



100
101
102
# File 'lib/resources/x509_certificate.rb', line 100

def validity_in_days
  (not_after - Time.now.utc) / 86400
end