/[gentoo-x86]/eclass/ssl-cert.eclass
Gentoo

Diff of /eclass/ssl-cert.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.8 Revision 1.18
1# Copyright 1999-2004 Gentoo Foundation 1# Copyright 1999-2004 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/ssl-cert.eclass,v 1.8 2005/07/06 21:01:21 agriffis Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/ssl-cert.eclass,v 1.18 2010/02/16 14:23:39 pva Exp $
4# 4#
5# @ECLASS: ssl-cert.eclass
6# @MAINTAINER:
5# Author: Max Kalika <max@gentoo.org> 7# Author: Max Kalika <max@gentoo.org>
6# 8# @BLURB: Eclass for SSL certificates
9# @DESCRIPTION:
7# This eclass implements standard installation procedure for installing 10# This eclass implements a standard installation procedure for installing
8# self-signed SSL certificates. 11# self-signed SSL certificates.
12# @EXAMPLE:
13# "install_cert /foo/bar" installs ${ROOT}/foo/bar.{key,csr,crt,pem}
9 14
10# Conditionally depend on OpenSSL: allows inheretence 15# Conditionally depend on OpenSSL: allows inheretence
11# without pulling extra packages if not needed 16# without pulling extra packages if not needed
12DEPEND="ssl? ( dev-libs/openssl )" 17DEPEND="ssl? ( dev-libs/openssl )"
13IUSE="ssl" 18IUSE="ssl"
14 19
20# @FUNCTION: gen_cnf
21# @USAGE:
22# @DESCRIPTION:
15# Initializes variables and generates the needed 23# Initializes variables and generates the needed
16# OpenSSL configuration file and a CA serial file 24# OpenSSL configuration file and a CA serial file
17# 25#
18# Access: private 26# Access: private
19gen_cnf() { 27gen_cnf() {
20 # Location of the config file 28 # Location of the config file
24 # Location of some random files OpenSSL can use: don't use 32 # Location of some random files OpenSSL can use: don't use
25 # /dev/u?random here -- doesn't work properly on all platforms 33 # /dev/u?random here -- doesn't work properly on all platforms
26 SSL_RANDOM="${T}/environment:${T}/eclass-debug.log:/etc/resolv.conf" 34 SSL_RANDOM="${T}/environment:${T}/eclass-debug.log:/etc/resolv.conf"
27 35
28 # These can be overridden in the ebuild 36 # These can be overridden in the ebuild
29 SSL_DAYS="${SSL_BITS:-730}" 37 SSL_DAYS="${SSL_DAYS:-730}"
30 SSL_BITS="${SSL_BITS:-1024}" 38 SSL_BITS="${SSL_BITS:-1024}"
31 SSL_COUNTRY="${SSL_COUNTRY:-US}" 39 SSL_COUNTRY="${SSL_COUNTRY:-US}"
32 SSL_STATE="${SSL_STATE:-California}" 40 SSL_STATE="${SSL_STATE:-California}"
33 SSL_LOCALITY="${SSL_LOCALITY:-Santa Barbara}" 41 SSL_LOCALITY="${SSL_LOCALITY:-Santa Barbara}"
34 SSL_ORGANIZATION="${SSL_ORGANIZATION:-SSL Server}" 42 SSL_ORGANIZATION="${SSL_ORGANIZATION:-SSL Server}"
38 46
39 # Create the CA serial file 47 # Create the CA serial file
40 echo "01" > "${SSL_SERIAL}" 48 echo "01" > "${SSL_SERIAL}"
41 49
42 # Create the config file 50 # Create the config file
43 ebegin "Generating OpenSSL configuration" 51 ebegin "Generating OpenSSL configuration${1:+ for CA}"
44 cat <<-EOF > "${SSL_CONF}" 52 cat <<-EOF > "${SSL_CONF}"
45 [ req ] 53 [ req ]
46 prompt = no 54 prompt = no
47 default_bits = ${SSL_BITS} 55 default_bits = ${SSL_BITS}
48 distinguished_name = req_dn 56 distinguished_name = req_dn
50 C = ${SSL_COUNTRY} 58 C = ${SSL_COUNTRY}
51 ST = ${SSL_STATE} 59 ST = ${SSL_STATE}
52 L = ${SSL_LOCALITY} 60 L = ${SSL_LOCALITY}
53 O = ${SSL_ORGANIZATION} 61 O = ${SSL_ORGANIZATION}
54 OU = ${SSL_UNIT} 62 OU = ${SSL_UNIT}
55 CN = ${SSL_COMMONNAME} 63 CN = ${SSL_COMMONNAME}${1:+ CA}
56 emailAddress = ${SSL_EMAIL} 64 emailAddress = ${SSL_EMAIL}
57 EOF 65 EOF
58 eend $? 66 eend $?
59
60 return $?
61}
62 67
68 return $?
69}
70
71# @FUNCTION: get_base
72# @USAGE: [if_ca]
73# @RETURN: <base path>
74# @DESCRIPTION:
63# Simple function to determine whether we're creating 75# Simple function to determine whether we're creating
64# a CA (which should only be done once) or final part 76# a CA (which should only be done once) or final part
65# 77#
66# Access: private 78# Access: private
67get_base() { 79get_base() {
70 else 82 else
71 echo "${T}/${$}server" 83 echo "${T}/${$}server"
72 fi 84 fi
73} 85}
74 86
87# @FUNCTION: gen_key
88# @USAGE: <base path>
89# @DESCRIPTION:
75# Generates an RSA key 90# Generates an RSA key
76# 91#
77# Access: private 92# Access: private
78gen_key() { 93gen_key() {
79 local base=`get_base $1` 94 local base=`get_base $1`
83 eend $? 98 eend $?
84 99
85 return $? 100 return $?
86} 101}
87 102
103# @FUNCTION: gen_csr
104# @USAGE: <base path>
105# @DESCRIPTION:
88# Generates a certificate signing request using 106# Generates a certificate signing request using
89# the key made by gen_key() 107# the key made by gen_key()
90# 108#
91# Access: private 109# Access: private
92gen_csr() { 110gen_csr() {
97 eend $? 115 eend $?
98 116
99 return $? 117 return $?
100} 118}
101 119
120# @FUNCTION: gen_crt
121# @USAGE: <base path>
122# @DESCRIPTION:
102# Generates either a self-signed CA certificate using 123# Generates either a self-signed CA certificate using
103# the csr and key made by gen_csr() and gen_key() or 124# the csr and key made by gen_csr() and gen_key() or
104# a signed server certificate using the CA cert previously 125# a signed server certificate using the CA cert previously
105# created by gen_crt() 126# created by gen_crt()
106# 127#
123 eend $? 144 eend $?
124 145
125 return $? 146 return $?
126} 147}
127 148
149# @FUNCTION: gen_pem
150# @USAGE: <base path>
151# @DESCRIPTION:
128# Generates a PEM file by concatinating the key 152# Generates a PEM file by concatinating the key
129# and cert file created by gen_key() and gen_cert() 153# and cert file created by gen_key() and gen_cert()
130# 154#
131# Access: private 155# Access: private
132gen_pem() { 156gen_pem() {
136 eend $? 160 eend $?
137 161
138 return $? 162 return $?
139} 163}
140 164
165# Removed due to bug 174759
166docert() {
167 eerror "Function \"docert\" has been removed for security reasons."
168 eerror "\"install_cert\" should be used instead. See bug 174759."
169 die
170}
171
172# @FUNCTION: install_cert
173# @USAGE: <certificates>
174# @DESCRIPTION:
141# Uses all the private functions above to generate 175# Uses all the private functions above to generate and install the
142# and install the requested certificates 176# requested certificates.
177# <certificates> are full pathnames relative to ROOT, without extension.
178#
179# Example: "install_cert /foo/bar" installs ${ROOT}/foo/bar.{key,csr,crt,pem}
143# 180#
144# Access: public 181# Access: public
145docert() { 182install_cert() {
146 if [ $# -lt 1 ] ; then 183 if [ $# -lt 1 ] ; then
147 eerror "At least one argument needed" 184 eerror "At least one argument needed"
148 return 1; 185 return 1;
149 fi 186 fi
150 187
151 # Initialize configuration 188 case ${EBUILD_PHASE} in
189 unpack|compile|test|install)
190 eerror "install_cert cannot be called in ${EBUILD_PHASE}"
191 return 1 ;;
192 esac
193
194 # Generate a CA environment #164601
152 gen_cnf || return 1 195 gen_cnf 1 || return 1
153 echo
154
155 # Generate a CA environment
156 gen_key 1 || return 1 196 gen_key 1 || return 1
157 gen_csr 1 || return 1 197 gen_csr 1 || return 1
158 gen_crt 1 || return 1 198 gen_crt 1 || return 1
159 echo 199 echo
160 200
201 gen_cnf || return 1
202 echo
203
161 local count=0 204 local count=0
162 for cert in "$@" ; do 205 for cert in "$@" ; do
163 # Sanitize and check the requested certificate 206 # Check the requested certificate
164 cert="`/usr/bin/basename "${cert}"`"
165 if [ -z "${cert}" ] ; then 207 if [ -z "${cert##*/}" ] ; then
166 ewarn "Invalid certification requested, skipping" 208 ewarn "Invalid certification requested, skipping"
167 continue 209 continue
168 fi 210 fi
169 211
170 # Check for previous existence of generated files 212 # Check for previous existence of generated files
171 for type in key crt pem ; do 213 for type in key csr crt pem ; do
172 if [ -e "${D}${INSDESTTREE}/${cert}.${type}" ] ; then 214 if [ -e "${ROOT}${cert}.${type}" ] ; then
173 ewarn "${D}${INSDESTTREE}/${cert}.${type}: exists, skipping" 215 ewarn "${ROOT}${cert}.${type}: exists, skipping"
174 continue 2 216 continue 2
175 fi 217 fi
176 done 218 done
177 219
178 # Generate the requested files 220 # Generate the requested files
181 gen_crt || continue 223 gen_crt || continue
182 gen_pem || continue 224 gen_pem || continue
183 echo 225 echo
184 226
185 # Install the generated files and set sane permissions 227 # Install the generated files and set sane permissions
186 local base=`get_base` 228 local base=$(get_base)
229 install -d "${ROOT}${cert%/*}"
187 newins "${base}.key" "${cert}.key" 230 install -m0400 "${base}.key" "${ROOT}${cert}.key"
188 fperms 0400 "${INSDESTTREE}/${cert}.key"
189 newins "${base}.csr" "${cert}.csr" 231 install -m0444 "${base}.csr" "${ROOT}${cert}.csr"
190 fperms 0444 "${INSDESTTREE}/${cert}.csr"
191 newins "${base}.crt" "${cert}.crt" 232 install -m0444 "${base}.crt" "${ROOT}${cert}.crt"
192 fperms 0444 "${INSDESTTREE}/${cert}.crt"
193 newins "${base}.pem" "${cert}.pem" 233 install -m0400 "${base}.pem" "${ROOT}${cert}.pem"
194 fperms 0400 "${INSDESTTREE}/${cert}.pem"
195 count=$((${count}+1)) 234 count=$((${count}+1))
196 done 235 done
197 236
198 # Resulting status 237 # Resulting status
199 if [ ! ${count} ] ; then 238 if [ ${count} = 0 ] ; then
200 eerror "No certificates were generated" 239 eerror "No certificates were generated"
201 return 1 240 return 1
202 elif [ ${count} != ${#} ] ; then 241 elif [ ${count} != ${#} ] ; then
203 ewarn "Some requested certificates were not generated" 242 ewarn "Some requested certificates were not generated"
204 fi 243 fi

Legend:
Removed from v.1.8  
changed lines
  Added in v.1.18

  ViewVC Help
Powered by ViewVC 1.1.20