acme-pki 0.1.4 → 0.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 0da83256f324b55b404ebe0d3eff8ed8ae5544af
4
- data.tar.gz: 4f023c30afe3e016f6b6d2509c5178f9ac0ef127
3
+ metadata.gz: 199f39943a323bd98c3b300c6fb36cf1502755b9
4
+ data.tar.gz: 0d59e672b06a208dff74d20513b5a635ac722324
5
5
  SHA512:
6
- metadata.gz: 5fb90d0c30c5b57ec68124788bb84cfa51cc48d888465293d3a38f39a98aefe5724813d504d396bcb9a04f61726370f0cbc2cc7edbf9902be63d14f9f94a2061
7
- data.tar.gz: 81a1577b768fcc2bb91d397bbf61156c3282364ec71fc6af0a02e60361e6b4279b23b869317a75dcdb6223779b5401fa4f3ba35ac503e1f9d3f979edffcacbb7
6
+ metadata.gz: 413f3dc9fdcea80c831287d2e12b7ac8addb7b854e0ba99d851e939ab59235f6ba64e8e8bfaca9a88f4a1961e8104ba864bbe7b733f736392a036d8cc5024d36
7
+ data.tar.gz: 301f8476f672f6d994589632755ca4ba4c871c22b44486ec34be5db852c1eaa812052cef582c127febf5b871699e18e2015248d9493be6235aed9715996be5b1
@@ -5,7 +5,19 @@ module Acme
5
5
  module Information
6
6
  def key_info(key, tab: 0)
7
7
  key = open(key, 'r') { |f| OpenSSL::PKey.read f } unless key.is_a? OpenSSL::PKey::PKey
8
- der = key.to_der
8
+
9
+ der = case key
10
+ when OpenSSL::PKey::EC
11
+ puts "\t" * (tab) + "#{'Key'.colorize :red} : ECC #{key.group.curve_name}"
12
+
13
+ point = key.public_key
14
+ pub = OpenSSL::PKey::EC.new point.group
15
+ pub.public_key = point
16
+ pub
17
+ when OpenSSL::PKey::RSA
18
+ puts "\t" * (tab) + "#{'Key'.colorize :red} : RSA #{key.n.num_bits} bits"
19
+ key.public_key
20
+ end.to_der
9
21
 
10
22
  fingerprint der, tab: tab
11
23
 
@@ -61,25 +73,25 @@ module Acme
61
73
  puts "Fetch certificate #{issuer} from #{uri}"
62
74
  file = Digest::MD5.hexdigest uri
63
75
  file = file File.join 'cache', file
64
- dir = File.dirname file
76
+ dir = File.dirname file
65
77
  FileUtils.mkpath dir unless Dir.exist? dir
66
- crt = if File.exist? file
67
- open(file, 'r') { |f| OpenSSL::X509::Certificate.new f }
68
- else
69
- crt = Faraday.get uri
70
- break unless crt.success?
71
- crt = crt.body
72
-
73
- crt = begin
74
- OpenSSL::X509::Certificate.new crt
75
- rescue
76
- pkcs7 = OpenSSL::PKCS7.new crt
77
- pkcs7.certificates.first
78
- end
79
-
80
- File.write file, crt.to_pem
81
- crt
82
- end
78
+ crt = if File.exist? file
79
+ open(file, 'r') { |f| OpenSSL::X509::Certificate.new f }
80
+ else
81
+ crt = Faraday.get uri
82
+ break unless crt.success?
83
+ crt = crt.body
84
+
85
+ crt = begin
86
+ OpenSSL::X509::Certificate.new crt
87
+ rescue
88
+ pkcs7 = OpenSSL::PKCS7.new crt
89
+ pkcs7.certificates.first
90
+ end
91
+
92
+ File.write file, crt.to_pem
93
+ crt
94
+ end
83
95
 
84
96
  subject = crt.subject
85
97
  puts "Warning : expecting #{issuer}, get #{subject}".colorize :magenta unless subject == issuer
@@ -1,5 +1,5 @@
1
1
  module Acme
2
2
  class PKI
3
- VERSION = '0.1.4'
3
+ VERSION = '0.1.5'
4
4
  end
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: acme-pki
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.4
4
+ version: 0.1.5
5
5
  platform: ruby
6
6
  authors:
7
7
  - Aeris
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2017-04-30 00:00:00.000000000 Z
11
+ date: 2017-06-04 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
@@ -118,7 +118,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
118
118
  version: '0'
119
119
  requirements: []
120
120
  rubyforge_project:
121
- rubygems_version: 2.6.8
121
+ rubygems_version: 2.6.11
122
122
  signing_key:
123
123
  specification_version: 4
124
124
  summary: Ruby client for Let's Encrypt