kingsly-certbot 0.1.0 → 0.3.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 596dffc75621b4136f451158543983dab1b10a7a82b0402ec9b14a62d00c382b
4
- data.tar.gz: 6634c53d401ae1b277407912e92990a32998e3d5f4a83fbbe9f44a8c37094679
3
+ metadata.gz: 23bedd90f9a1b26f3cdae7ed108c48e921f0da3ad61c7fec9a012883b7ae35a9
4
+ data.tar.gz: 7bbd7b0d81e17764627c975e00707d0606f989f6a34963b35499c07fabe8ca0e
5
5
  SHA512:
6
- metadata.gz: 9b328a68a442b282c6b7b05d05d5945ebf39180461040de72ec0825c1852be61e32a65c2750d32728da0344830339e58c3d097e37169c3a2201e830727869bad
7
- data.tar.gz: dc62b1bbde9f82afc94c5daec20eea366f542fa8dc9d14aca608c478f431ca1155f913a3772067d9695de816101c0f871990808863702756fe6d19ebd2fc2f15
6
+ metadata.gz: 0ba0c36b11c4bb9e960b17228f137e90d31ecf104d0884ad594ebce29cb442e0cb8761a6a6c137bcf120aaa5a3bc0b897da55622e7df1f44f592f6c7f3d8bca2
7
+ data.tar.gz: 1154ef166dec300600bdb1d3d6a846a41fec646106e6b80ae5f31320411229cc8ebbaca30118a93fdff8ca0041a81e285fbf7d7284a4b56c997f1c860b9afa2d
@@ -0,0 +1,8 @@
1
+ # 0.1.0
2
+
3
+ - initial release
4
+
5
+ # 0.3.0
6
+
7
+ - remove basic auth, fix specs
8
+ - start passing port number for communication with kingsly server
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- kingsly-certbot (0.1.0)
4
+ kingsly-certbot (0.3.0)
5
5
  sentry-raven (~> 2.9, >= 2.9.0)
6
6
 
7
7
  GEM
@@ -2,8 +2,7 @@ SENTRY_DSN:
2
2
  ENVIRONMENT: 'development'
3
3
  TOP_LEVEL_DOMAIN: 'example.com'
4
4
  SUB_DOMAIN: 'subdomain'
5
- KINGSLY_SERVER_HOST: 'kingsly.example.com'
6
- KINGSLY_SERVER_USER: '****'
7
- KINGSLY_SERVER_PASSWORD: '****'
5
+ KINGSLY_SERVER_HOST: 'localhost'
6
+ KINGSLY_SERVER_PORT: 8080
8
7
  SERVER_TYPE: 'ipsec'
9
8
  IPSEC_ROOT: ~/ipsec
@@ -2,7 +2,7 @@
2
2
 
3
3
  module KingslyCertbot
4
4
  class Configuration
5
- VARS = %i[kingsly_server_host kingsly_server_user kingsly_server_password top_level_domain sub_domain
5
+ VARS = %i[kingsly_server_host kingsly_server_port top_level_domain sub_domain
6
6
  kingsly_http_read_timeout kingsly_http_open_timeout sentry_dsn environment server_type ipsec_root].freeze
7
7
  attr_accessor(*VARS)
8
8
 
@@ -14,29 +14,18 @@ module KingslyCertbot
14
14
  @top_level_domain = params['TOP_LEVEL_DOMAIN']
15
15
  @sub_domain = params['SUB_DOMAIN']
16
16
  @kingsly_server_host = params['KINGSLY_SERVER_HOST']
17
- @kingsly_server_user = params['KINGSLY_SERVER_USER']
18
- @kingsly_server_password = params['KINGSLY_SERVER_PASSWORD']
17
+ @kingsly_server_port = params['KINGSLY_SERVER_PORT']
19
18
  @server_type = params['SERVER_TYPE']
20
19
  @ipsec_root = params['IPSEC_ROOT'] || '/'
21
20
  end
22
21
 
23
22
  def validate!
24
- %i[top_level_domain sub_domain kingsly_server_host kingsly_server_user kingsly_server_password server_type].each do |mandatory|
23
+ %i[top_level_domain sub_domain kingsly_server_host kingsly_server_port server_type].each do |mandatory|
25
24
  raise "Missing mandatory config '#{mandatory}'" if send(mandatory).nil? || send(mandatory) == ''
26
25
  end
27
26
  raise "Unsupported server_type '#{server_type}'" unless ['ipsec'].include?(server_type)
28
27
 
29
28
  self
30
29
  end
31
-
32
- def to_s
33
- str = ''
34
- VARS.each do |key|
35
- value = send(key)
36
- value = '****' if key == :kingsly_server_password
37
- str += "#{key}: '#{value}'\n"
38
- end
39
- str
40
- end
41
30
  end
42
31
  end
@@ -7,8 +7,7 @@ require 'base64'
7
7
  module KingslyCertbot
8
8
  class KingslyClient
9
9
  def self.get_cert_bundle(kingsly_server_host:,
10
- kingsly_server_user:,
11
- kingsly_server_password:,
10
+ kingsly_server_port:,
12
11
  top_level_domain:,
13
12
  sub_domain:,
14
13
  kingsly_http_read_timeout: 120,
@@ -18,16 +17,14 @@ module KingslyCertbot
18
17
  'top_level_domain' => top_level_domain,
19
18
  'sub_domain' => sub_domain
20
19
  }
21
- uri = URI.parse("https://#{kingsly_server_host}/v1/cert_bundles")
20
+ uri = URI.parse("http://#{kingsly_server_host}:#{kingsly_server_port}/v1/cert_bundles")
22
21
 
23
22
  http = Net::HTTP.new(uri.host, uri.port)
24
- http.use_ssl = true
25
23
 
26
24
  http.read_timeout = kingsly_http_read_timeout
27
25
  http.open_timeout = kingsly_http_open_timeout
28
26
 
29
27
  headers = {}
30
- headers['Authorization'] = 'Basic ' + Base64.encode64("#{kingsly_server_user}:#{kingsly_server_password}").chop
31
28
  headers['Content-Type'] = 'application/json'
32
29
  resp = http.start do |http_request|
33
30
  http_request.post(uri.path, JSON.dump(body), headers)
@@ -39,8 +39,7 @@ module KingslyCertbot
39
39
  $logger.info("Querying Kingsly server for certificate to domain #{@configuration.sub_domain}.#{@configuration.top_level_domain}")
40
40
  cert_bundle = KingslyClient.get_cert_bundle(
41
41
  kingsly_server_host: @configuration.kingsly_server_host,
42
- kingsly_server_user: @configuration.kingsly_server_user,
43
- kingsly_server_password: @configuration.kingsly_server_password,
42
+ kingsly_server_port: @configuration.kingsly_server_port,
44
43
  top_level_domain: @configuration.top_level_domain,
45
44
  sub_domain: @configuration.sub_domain,
46
45
  kingsly_http_read_timeout: @configuration.kingsly_http_read_timeout,
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module KingslyCertbot
4
- VERSION = '0.1.0'
4
+ VERSION = '0.3.0'
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: kingsly-certbot
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - FOSS at GO-JEK
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2019-02-13 00:00:00.000000000 Z
11
+ date: 2019-02-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler