vagrant-ca-certificates 1.2.0 → 1.3.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 20eece05031ff3723251042e5693c0551eb3c893
4
- data.tar.gz: 4121da9c5a9cbe9682280f6090dc348807a6161c
3
+ metadata.gz: f9d7d798c51d365048628fa1aa14cfc51dc6bfb0
4
+ data.tar.gz: 29e56196b66cf38e7d4d1683304579bcf18ea8c4
5
5
  SHA512:
6
- metadata.gz: 103fce46d7a5a4580169166c41711cbdab2db29c1ba596caef56d286e7f68a27a4ddcc63086604bba2ff4272c5802593b1cf504eec629c7568b313812c3c34fc
7
- data.tar.gz: 0adbbc25cff2fbadfd859a5031436b7414d2abc2f9fefe0db8b42af653a355eb89c661fcc020db9ccfe909642d7bf8d071f6afa9dd94b7df42018a1ab9b9f797
6
+ metadata.gz: '00996b3bdc60ff2fb5538df82096f0e7a94c91b8000a32373d97b20bafea7a9e858a3bab56787d995387196d918451cf8289f7a0eb2d5996dbb0ac8f45d5d683'
7
+ data.tar.gz: 4237733f186a6d8779073f783b1b54139e6f10108a749a7a70be2c42aba38f981d1cef744486385284152122362b846a251181fda8ae35e714f4aae2ab82d70f
Binary file
data.tar.gz.sig CHANGED
Binary file
@@ -0,0 +1,8 @@
1
+ # Changelog
2
+ All notable changes to this project will be documented in this file.
3
+
4
+ The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/)
5
+ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html).
6
+
7
+ ## [1.3.0] 2017-09-25
8
+ - Adds support for managing Windows guest certificates.
data/Gemfile CHANGED
@@ -2,6 +2,6 @@ source 'https://rubygems.org'
2
2
  gemspec
3
3
 
4
4
  group :development, :test do
5
+ gem 'rake'
5
6
  gem 'rspec'
6
- gem 'vagrant', git: 'https://github.com/mitchellh/vagrant.git'
7
7
  end
data/LICENSE CHANGED
@@ -1,6 +1,6 @@
1
1
  The MIT License (MIT)
2
2
 
3
- Copyright 2014-2016, Bloomberg Finance L.P.
3
+ Copyright 2014-2017, Bloomberg Finance L.P.
4
4
 
5
5
  Permission is hereby granted, free of charge, to any person obtaining a copy
6
6
  of this software and associated documentation files (the "Software"), to deal
data/bin/rspec CHANGED
@@ -1,4 +1,5 @@
1
1
  #!/usr/bin/env ruby
2
+ # frozen_string_literal: true
2
3
  #
3
4
  # This file was generated by Bundler.
4
5
  #
@@ -6,11 +7,11 @@
6
7
  # this file is here to facilitate running it.
7
8
  #
8
9
 
9
- require 'pathname'
10
- ENV['BUNDLE_GEMFILE'] ||= File.expand_path("../../Gemfile",
10
+ require "pathname"
11
+ ENV["BUNDLE_GEMFILE"] ||= File.expand_path("../../Gemfile",
11
12
  Pathname.new(__FILE__).realpath)
12
13
 
13
- require 'rubygems'
14
- require 'bundler/setup'
14
+ require "rubygems"
15
+ require "bundler/setup"
15
16
 
16
- load Gem.bin_path('rspec-core', 'rspec')
17
+ load Gem.bin_path("rspec-core", "rspec")
@@ -1,21 +1,32 @@
1
1
  -----BEGIN CERTIFICATE-----
2
- MIIDgDCCAmigAwIBAgIBATANBgkqhkiG9w0BAQUFADBDMREwDwYDVQQDDAhqYmVs
2
+ MIIFgDCCA2igAwIBAgIBATANBgkqhkiG9w0BAQUFADBDMREwDwYDVQQDDAhqYmVs
3
3
  bG9uZTEZMBcGCgmSJomT8ixkARkWCWJsb29tYmVyZzETMBEGCgmSJomT8ixkARkW
4
- A25ldDAeFw0xNjAzMjUxNTE3MDBaFw0xNzAzMjUxNTE3MDBaMEMxETAPBgNVBAMM
4
+ A25ldDAeFw0xNzA5MjUxMjA0NDVaFw0xODA5MjUxMjA0NDVaMEMxETAPBgNVBAMM
5
5
  CGpiZWxsb25lMRkwFwYKCZImiZPyLGQBGRYJYmxvb21iZXJnMRMwEQYKCZImiZPy
6
- LGQBGRYDbmV0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyDwDDHlv
7
- /vbyDlq/oYcNre6qfpr58Qos9T4n8ABVBectWagwrF6ri3FD+bw4p2z+jM23juEI
8
- sZlZzIe0BR8bcZ4W2mBgBG1dEx68wp2F1daiYDHDsVG5QyInIl6rL+v2bluyQe2x
9
- iZsWmBq6Q+6LIzaXHJW3SolNjmjptIgLl23+cVHAhdhUIbhP6bplN59rSkuLuW89
10
- M5oipDLxEUeKJcG39zhfyd15zitVzYK1bDaej87CmdRfjjrygHHtoubqMSQ2KEBl
11
- auz3tAj1xaGJ+q+HnSe0fRmZ6kCrpisbb9qYj3CbNMc67+kiSbtnGLiODU0I8m2c
12
- 9Azk4af90dtVawIDAQABo38wfTAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNV
13
- HQ4EFgQU9m/oCgBsK/LiEnJergG4+zrzAi4wIQYDVR0RBBowGIEWamJlbGxvbmVA
14
- Ymxvb21iZXJnLm5ldDAhBgNVHRIEGjAYgRZqYmVsbG9uZUBibG9vbWJlcmcubmV0
15
- MA0GCSqGSIb3DQEBBQUAA4IBAQBHzDpoIdfVZIavF0uJjG4dW47HvXBmOSC0n5Zf
16
- FjXJ47as6U+ynNRlFvpFFytTRcO2jEPohGAmO65IXQYb2SEWlMaB6vaunqvi0BZN
17
- qCfkC6g4qimHOo9JUsQ88skOXkpGx5dM+ycTr53OhLLlludTXj7CUrXEEs0Ds1H/
18
- afxF46lNt1TGfyd1NVgDbjQ1QnBno0thcnCCiWPGy9/qk9ZLqa8UlsbKyVjLJTKX
19
- +0r315TUT0v4D2npGY965XWSB39BXVqK3AOzHACU/bSVSN/6vnUOgaigSMz1x9tl
20
- tH/pmY+pJ/jAXtK2qBNffivjLiKv4y3nYcLrxdmENe3gBt6A
6
+ LGQBGRYDbmV0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzRdyupn5
7
+ 5gpXivhSDi+lnepuxf4ila+9FDW5znNxbwDLFsfzYFiPecJFLylWyHtJSe9fq8gW
8
+ 1G1qWU6wCaw4Jw6fU9wdh+g4GMRdcbbH6EJPNJjV3Z0/E0XAXOzC1AHUpYc/o0Wq
9
+ wS/MmfPHuZnH9IPS0moWDoifKBrNIyPBMRxNTkDnOMo/FtvFmLIN8f0PWF4RW0yr
10
+ KthpgcvpulUZImZEplKYTeGe3P3OmfiddWao5VNbuB/srTcW/yTuHT3lV5jsqMF9
11
+ lvw3jdUfHcZLagKP8xpBnrS/mlfGgA0cnIrdaDFOaJVGZFpCOd1+usen4EmsT6mN
12
+ X5+m7fmvm+aHu8frEsiBG3k5WT+0rHnBIRbdobpLbjcxeFOxa99JXId0fTUiwCOG
13
+ MrZnI/ItsqlxqMXy4RKpTwoB9Ypgejs6FDJA0DH8czJTQ4Y1ePXjgF3VVyXFNxn+
14
+ NeV3s8DF4wgRrLeJb4+kTFZzigp/6IEBgwUKdBOJ5Su1APMsBHNeR2xcY3OMme1Y
15
+ yjq2//uAUZ4CUlhgJzRiHSkuYz9iFJcBUU4QlpRTOwsroeOibEzIoykcoWLEYCAA
16
+ 57Gc6myaOt18RElJDoGp3N7HkBBBV5ojfyTWVkNKLlaA9AV+Vvvdw39pH2VylQpz
17
+ sZVuQwW8HYG8smqtxAa3CGnavEnA/rE5HrUCAwEAAaN/MH0wCQYDVR0TBAIwADAL
18
+ BgNVHQ8EBAMCBLAwHQYDVR0OBBYEFNMsCmYsjoVDz/Jma5XJFyXB+5FzMCEGA1Ud
19
+ EQQaMBiBFmpiZWxsb25lQGJsb29tYmVyZy5uZXQwIQYDVR0SBBowGIEWamJlbGxv
20
+ bmVAYmxvb21iZXJnLm5ldDANBgkqhkiG9w0BAQUFAAOCAgEAZ1RNgzHYRQmTUMUL
21
+ DI9l9DCrL01ygTVnfeeuf3CWE4C0alkMgU/V/lC6tgDre4Ya6HA7vPZtgirnXiwM
22
+ wr6HhzmHJHhKUXyY3Nh2yW7lKl/P6Ctt8xyqwEDBodmm0FbOSYatU0PkTgtbKeau
23
+ YgUSw63i3+3SbSkFOsulA6ZAB+3J4oo3l9JFW/hfA9CLFTJnDDwnoaUcxuwmb4n6
24
+ AeKA3Y07jXvVMXMDHfTWIt3hHnkkl2v5U0/FV+hT1RHjmafURNVKln4NYhvEsdpR
25
+ cSKBcJjW+jrCotEDQfquHf5qxxWT9b0+ezExNcY/uzrLQ2m86G8k4zCa8gGrkkDC
26
+ 0QrVflrJdCfqHX+nH49SFCOrsbHa9YHE308Bw590rmLOtFoKeHBGmNX8rrfWpjuS
27
+ QRhyoyIAdmFR5py2pEZWpqmQnRNi+6jqYt+X04HKdNgwfzq3J0RuGBZwDvdi+fKT
28
+ UdBgSzKlHRSnwHB21VU8h09M38Mx4LfH9Tnm2nSYH4olf3hAeV8u6R2Wm2CQ7SuO
29
+ C5QSlmvkZgKvBhBVoXKAinNPHzoggayZFXYNfeneBSexPabaC3KX38StLNYOpGtr
30
+ S4nILagJ/gtL67ynCgTIj1xORHEq0H6Lx+p3An8aRHRkCzjFihBqzvtsQ8vlIB+1
31
+ fcoiS9/Mf0US6o3RBgfa+KPVAsE=
21
32
  -----END CERTIFICATE-----
@@ -36,10 +36,15 @@ module VagrantPlugins
36
36
  bundle_path = @machine.guest.capability(:certificate_file_bundle)
37
37
  @logger.debug("Private certificate path: <#{bundle_path}>")
38
38
  @machine.communicate.tap do |sh|
39
- if sh.test("grep -q 'SSL_CERT_FILE' /etc/environment", shell: '/bin/bash')
40
- sh.sudo(%{sed "s#^SSL_CERT_FILE=.*#SSL_CERT_FILE=#{bundle_path}#" -i /etc/environment})
39
+ case @machine.guest.name
40
+ when :windows
41
+ sh.sudo("[Environment]::SetEnvironmentVariable('SSL_CERT_FILE','#{bundle_path}','Machine')")
41
42
  else
42
- sh.sudo(%{echo "SSL_CERT_FILE=#{bundle_path}" >> /etc/environment})
43
+ if sh.test("grep -q 'SSL_CERT_FILE' /etc/environment", shell: '/bin/bash')
44
+ sh.sudo(%{sed "s#^SSL_CERT_FILE=.*#SSL_CERT_FILE=#{bundle_path}#" -i /etc/environment})
45
+ else
46
+ sh.sudo(%{echo "SSL_CERT_FILE=#{bundle_path}" >> /etc/environment})
47
+ end
43
48
  end
44
49
  end
45
50
  end
@@ -47,9 +52,16 @@ module VagrantPlugins
47
52
  def create_certificates_directory
48
53
  @logger.debug('Checking if private certificate directory is created...')
49
54
  @machine.communicate.tap do |sh|
50
- return if sh.test("test -d #{certs_path}")
51
- @logger.info("Creating #{certs_path} for private certificates.")
52
- sh.sudo("mkdir -p #{certs_path} && chmod 0744 #{certs_path}")
55
+ case @machine.guest.name
56
+ when :windows
57
+ return if sh.test("$ProgressPreference=\"SilentlyContinue\";if(-not(Test-Path -Path #{certs_path})){Exit 1}")
58
+ @logger.info("Creating Windows #{certs_path} for private certificates.")
59
+ sh.sudo("New-Item -Path #{certs_path} -ItemType Directory")
60
+ else
61
+ return if sh.test("test -d #{certs_path}")
62
+ @logger.info("Creating #{certs_path} for private certificates.")
63
+ sh.sudo("mkdir -p #{certs_path} && chmod 0744 #{certs_path}")
64
+ end
53
65
  end
54
66
  end
55
67
 
@@ -65,8 +77,13 @@ module VagrantPlugins
65
77
  unless certificate_matches?(from, to)
66
78
  tmp_to = Pathname.new(Tempfile.new('vagrant').path).basename
67
79
  @machine.ui.info(I18n.t('vagrant_ca_certificates.certificate.upload.file', from: from, to: to))
68
- sh.upload(from, tmp_to) # remote.path will build a "C:\" URI on windows, cp to ~ and move
69
- sh.sudo("mv #{tmp_to} #{to} && chown root: #{to} && chmod 0644 #{to}")
80
+ sh.upload(from, tmp_to) # remote.path will build a "C:\" URI on windows, cp to ~ and move.
81
+ case @machine.guest.name
82
+ when :windows
83
+ sh.sudo("Move-Item -path #{tmp_to}/* -Destination #{to} -Force")
84
+ else
85
+ sh.sudo("mv #{tmp_to} #{to} && chown root: #{to} && chmod 0644 #{to}")
86
+ end
70
87
  end
71
88
  end
72
89
  end
@@ -75,10 +92,18 @@ module VagrantPlugins
75
92
  md5sum = Digest::MD5.file(from)
76
93
  @logger.debug("Verifying #{from} md5sum in guest...")
77
94
  @machine.communicate.tap do |sh|
78
- return false unless sh.test("test -f #{from}")
79
- if sh.test(%{test '#{md5sum}' = '$(md5sum "#{to}")'}, shell: '/bin/bash')
80
- @logger.debug('Certificate md5sum in guest matches!')
81
- return true
95
+ case @machine.guest.name
96
+ when :windows
97
+ if sh.test("if(-not((Get-Filehash -path '#{to}' -Algorithm MD5) | Select-Object -ExpandProperty Hash) -eq '#{md5sum}'){Exit 1}")
98
+ @logger.debug('Certificate md5sum in guest matches!')
99
+ return true
100
+ end
101
+ else
102
+ return false unless sh.test("test -f #{from}")
103
+ if sh.test(%{test '#{md5sum}' = '$(md5sum "#{to}")'}, shell: '/bin/bash')
104
+ @logger.debug('Certificate md5sum in guest matches!')
105
+ return true
106
+ end
82
107
  end
83
108
  end
84
109
  false
@@ -0,0 +1,13 @@
1
+ module VagrantPlugins
2
+ module CaCertificates
3
+ module Cap
4
+ module Windows
5
+ module CertificateFileBundle
6
+ def self.certificate_file_bundle(m)
7
+ 'C:/ssl/cacert.pem'
8
+ end
9
+ end
10
+ end
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,13 @@
1
+ module VagrantPlugins
2
+ module CaCertificates
3
+ module Cap
4
+ module Windows
5
+ module CertificateUploadPath
6
+ def self.certificate_upload_path(m)
7
+ 'C:/ssl/certs'
8
+ end
9
+ end
10
+ end
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,19 @@
1
+ module VagrantPlugins
2
+ module CaCertificates
3
+ module Cap
4
+ module Windows
5
+ # Capability for configuring the certificate bundle on CoreOS.
6
+ module UpdateCertificateBundle
7
+ def self.update_certificate_bundle(m)
8
+ # Import the certificates into the local machine root store
9
+ m.communicate.sudo("Get-ChildItem -Path C:/ssl/certs | Foreach-Object {certutil -addstore -enterprise -f 'Root' $_.FullName}")
10
+ # Also import the certificates into a bundle to be referenced by SSL_CERT_FILE
11
+ m.communicate.sudo("Remove-Item -Path C:/ssl/cacert.pem; Get-ChildItem -Path C:/ssl/certs | Get-Content | Out-File -FilePath C:/ssl/cacert.pem -Encoding utf8 -Append")
12
+ # Convert the cacerts.pem with Windows line endings ('\r\n') to Unix line endings ('\n')
13
+ m.communicate.sudo("$cacertContents = [io.file]::ReadAllText('C:/ssl/cacert.pem') -replace \"`r`n\",\"`n\"; [io.file]::WriteAllText('C:/ssl/cacert_unix.pem', $cacertContents)")
14
+ end
15
+ end
16
+ end
17
+ end
18
+ end
19
+ end
@@ -39,6 +39,11 @@ module VagrantPlugins
39
39
  Cap::CoreOS::UpdateCertificateBundle
40
40
  end
41
41
 
42
+ guest_capability('windows', 'update_certificate_bundle') do
43
+ require_relative 'cap/windows/update_certificate_bundle'
44
+ Cap::Windows::UpdateCertificateBundle
45
+ end
46
+
42
47
  guest_capability('debian', 'certificate_upload_path') do
43
48
  require_relative 'cap/debian/certificate_upload_path'
44
49
  Cap::Debian::CertificateUploadPath
@@ -54,6 +59,11 @@ module VagrantPlugins
54
59
  Cap::CoreOS::CertificateUploadPath
55
60
  end
56
61
 
62
+ guest_capability('windows', 'certificate_upload_path') do
63
+ require_relative 'cap/windows/certificate_upload_path'
64
+ Cap::Windows::CertificateUploadPath
65
+ end
66
+
57
67
  guest_capability('debian', 'certificate_file_bundle') do
58
68
  require_relative 'cap/debian/certificate_file_bundle'
59
69
  Cap::Debian::CertificateFileBundle
@@ -68,6 +78,11 @@ module VagrantPlugins
68
78
  require_relative 'cap/coreos/certificate_file_bundle'
69
79
  Cap::CoreOS::CertificateFileBundle
70
80
  end
81
+
82
+ guest_capability('windows', 'certificate_file_bundle') do
83
+ require_relative 'cap/windows/certificate_file_bundle'
84
+ Cap::Windows::CertificateFileBundle
85
+ end
71
86
  end
72
87
  end
73
88
  end
@@ -1,5 +1,5 @@
1
1
  module VagrantPlugins
2
2
  module CaCertificates
3
- VERSION = '1.2.0'
3
+ VERSION = '1.3.0'
4
4
  end
5
5
  end
@@ -0,0 +1,5 @@
1
+ require 'vagrant-ca-certificates/cap/windows/certificate_upload_path'
2
+ require 'spec_helper'
3
+
4
+ describe VagrantPlugins::CaCertificates::Cap::Windows::CertificateUploadPath do
5
+ end
@@ -0,0 +1,5 @@
1
+ require 'vagrant-ca-certificates/cap/windows/update_certificate_bundle'
2
+ require 'spec_helper'
3
+
4
+ describe VagrantPlugins::CaCertificates::Cap::Windows::UpdateCertificateBundle do
5
+ end
@@ -22,7 +22,7 @@ Gem::Specification.new do |spec|
22
22
  spec.require_paths = %w(lib)
23
23
 
24
24
  spec.cert_chain = ['certs/jbellone.pem']
25
- spec.signing_key = File.expand_path(File.join(Dir.home, '.gem', 'gem-private_key.pem')) if $0 =~ /gem\z/
25
+ spec.signing_key = File.expand_path(File.join(Dir.home, '.ssh', 'gem-private_key.pem')) if $0 =~ /gem\z/
26
26
 
27
27
  spec.add_development_dependency 'bundler', '~> 1.7'
28
28
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: vagrant-ca-certificates
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.2.0
4
+ version: 1.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - William Bailey
@@ -11,27 +11,38 @@ bindir: bin
11
11
  cert_chain:
12
12
  - |
13
13
  -----BEGIN CERTIFICATE-----
14
- MIIDgDCCAmigAwIBAgIBATANBgkqhkiG9w0BAQUFADBDMREwDwYDVQQDDAhqYmVs
14
+ MIIFgDCCA2igAwIBAgIBATANBgkqhkiG9w0BAQUFADBDMREwDwYDVQQDDAhqYmVs
15
15
  bG9uZTEZMBcGCgmSJomT8ixkARkWCWJsb29tYmVyZzETMBEGCgmSJomT8ixkARkW
16
- A25ldDAeFw0xNjAzMjUxNTE3MDBaFw0xNzAzMjUxNTE3MDBaMEMxETAPBgNVBAMM
16
+ A25ldDAeFw0xNzA5MjUxMjA0NDVaFw0xODA5MjUxMjA0NDVaMEMxETAPBgNVBAMM
17
17
  CGpiZWxsb25lMRkwFwYKCZImiZPyLGQBGRYJYmxvb21iZXJnMRMwEQYKCZImiZPy
18
- LGQBGRYDbmV0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyDwDDHlv
19
- /vbyDlq/oYcNre6qfpr58Qos9T4n8ABVBectWagwrF6ri3FD+bw4p2z+jM23juEI
20
- sZlZzIe0BR8bcZ4W2mBgBG1dEx68wp2F1daiYDHDsVG5QyInIl6rL+v2bluyQe2x
21
- iZsWmBq6Q+6LIzaXHJW3SolNjmjptIgLl23+cVHAhdhUIbhP6bplN59rSkuLuW89
22
- M5oipDLxEUeKJcG39zhfyd15zitVzYK1bDaej87CmdRfjjrygHHtoubqMSQ2KEBl
23
- auz3tAj1xaGJ+q+HnSe0fRmZ6kCrpisbb9qYj3CbNMc67+kiSbtnGLiODU0I8m2c
24
- 9Azk4af90dtVawIDAQABo38wfTAJBgNVHRMEAjAAMAsGA1UdDwQEAwIEsDAdBgNV
25
- HQ4EFgQU9m/oCgBsK/LiEnJergG4+zrzAi4wIQYDVR0RBBowGIEWamJlbGxvbmVA
26
- Ymxvb21iZXJnLm5ldDAhBgNVHRIEGjAYgRZqYmVsbG9uZUBibG9vbWJlcmcubmV0
27
- MA0GCSqGSIb3DQEBBQUAA4IBAQBHzDpoIdfVZIavF0uJjG4dW47HvXBmOSC0n5Zf
28
- FjXJ47as6U+ynNRlFvpFFytTRcO2jEPohGAmO65IXQYb2SEWlMaB6vaunqvi0BZN
29
- qCfkC6g4qimHOo9JUsQ88skOXkpGx5dM+ycTr53OhLLlludTXj7CUrXEEs0Ds1H/
30
- afxF46lNt1TGfyd1NVgDbjQ1QnBno0thcnCCiWPGy9/qk9ZLqa8UlsbKyVjLJTKX
31
- +0r315TUT0v4D2npGY965XWSB39BXVqK3AOzHACU/bSVSN/6vnUOgaigSMz1x9tl
32
- tH/pmY+pJ/jAXtK2qBNffivjLiKv4y3nYcLrxdmENe3gBt6A
18
+ LGQBGRYDbmV0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAzRdyupn5
19
+ 5gpXivhSDi+lnepuxf4ila+9FDW5znNxbwDLFsfzYFiPecJFLylWyHtJSe9fq8gW
20
+ 1G1qWU6wCaw4Jw6fU9wdh+g4GMRdcbbH6EJPNJjV3Z0/E0XAXOzC1AHUpYc/o0Wq
21
+ wS/MmfPHuZnH9IPS0moWDoifKBrNIyPBMRxNTkDnOMo/FtvFmLIN8f0PWF4RW0yr
22
+ KthpgcvpulUZImZEplKYTeGe3P3OmfiddWao5VNbuB/srTcW/yTuHT3lV5jsqMF9
23
+ lvw3jdUfHcZLagKP8xpBnrS/mlfGgA0cnIrdaDFOaJVGZFpCOd1+usen4EmsT6mN
24
+ X5+m7fmvm+aHu8frEsiBG3k5WT+0rHnBIRbdobpLbjcxeFOxa99JXId0fTUiwCOG
25
+ MrZnI/ItsqlxqMXy4RKpTwoB9Ypgejs6FDJA0DH8czJTQ4Y1ePXjgF3VVyXFNxn+
26
+ NeV3s8DF4wgRrLeJb4+kTFZzigp/6IEBgwUKdBOJ5Su1APMsBHNeR2xcY3OMme1Y
27
+ yjq2//uAUZ4CUlhgJzRiHSkuYz9iFJcBUU4QlpRTOwsroeOibEzIoykcoWLEYCAA
28
+ 57Gc6myaOt18RElJDoGp3N7HkBBBV5ojfyTWVkNKLlaA9AV+Vvvdw39pH2VylQpz
29
+ sZVuQwW8HYG8smqtxAa3CGnavEnA/rE5HrUCAwEAAaN/MH0wCQYDVR0TBAIwADAL
30
+ BgNVHQ8EBAMCBLAwHQYDVR0OBBYEFNMsCmYsjoVDz/Jma5XJFyXB+5FzMCEGA1Ud
31
+ EQQaMBiBFmpiZWxsb25lQGJsb29tYmVyZy5uZXQwIQYDVR0SBBowGIEWamJlbGxv
32
+ bmVAYmxvb21iZXJnLm5ldDANBgkqhkiG9w0BAQUFAAOCAgEAZ1RNgzHYRQmTUMUL
33
+ DI9l9DCrL01ygTVnfeeuf3CWE4C0alkMgU/V/lC6tgDre4Ya6HA7vPZtgirnXiwM
34
+ wr6HhzmHJHhKUXyY3Nh2yW7lKl/P6Ctt8xyqwEDBodmm0FbOSYatU0PkTgtbKeau
35
+ YgUSw63i3+3SbSkFOsulA6ZAB+3J4oo3l9JFW/hfA9CLFTJnDDwnoaUcxuwmb4n6
36
+ AeKA3Y07jXvVMXMDHfTWIt3hHnkkl2v5U0/FV+hT1RHjmafURNVKln4NYhvEsdpR
37
+ cSKBcJjW+jrCotEDQfquHf5qxxWT9b0+ezExNcY/uzrLQ2m86G8k4zCa8gGrkkDC
38
+ 0QrVflrJdCfqHX+nH49SFCOrsbHa9YHE308Bw590rmLOtFoKeHBGmNX8rrfWpjuS
39
+ QRhyoyIAdmFR5py2pEZWpqmQnRNi+6jqYt+X04HKdNgwfzq3J0RuGBZwDvdi+fKT
40
+ UdBgSzKlHRSnwHB21VU8h09M38Mx4LfH9Tnm2nSYH4olf3hAeV8u6R2Wm2CQ7SuO
41
+ C5QSlmvkZgKvBhBVoXKAinNPHzoggayZFXYNfeneBSexPabaC3KX38StLNYOpGtr
42
+ S4nILagJ/gtL67ynCgTIj1xORHEq0H6Lx+p3An8aRHRkCzjFihBqzvtsQ8vlIB+1
43
+ fcoiS9/Mf0US6o3RBgfa+KPVAsE=
33
44
  -----END CERTIFICATE-----
34
- date: 2016-03-25 00:00:00.000000000 Z
45
+ date: 2017-09-25 00:00:00.000000000 Z
35
46
  dependencies:
36
47
  - !ruby/object:Gem::Dependency
37
48
  name: bundler
@@ -58,9 +69,10 @@ executables: []
58
69
  extensions: []
59
70
  extra_rdoc_files: []
60
71
  files:
72
+ - ".github/CONTRIBUTING.md"
61
73
  - ".gitignore"
62
74
  - ".rspec"
63
- - CONTRIBUTING.md
75
+ - CHANGELOG.md
64
76
  - Gemfile
65
77
  - LICENSE
66
78
  - README.md
@@ -79,6 +91,9 @@ files:
79
91
  - lib/vagrant-ca-certificates/cap/redhat/certificate_upload_path.rb
80
92
  - lib/vagrant-ca-certificates/cap/redhat/helpers.rb
81
93
  - lib/vagrant-ca-certificates/cap/redhat/update_certificate_bundle.rb
94
+ - lib/vagrant-ca-certificates/cap/windows/certificate_file_bundle.rb
95
+ - lib/vagrant-ca-certificates/cap/windows/certificate_upload_path.rb
96
+ - lib/vagrant-ca-certificates/cap/windows/update_certificate_bundle.rb
82
97
  - lib/vagrant-ca-certificates/config.rb
83
98
  - lib/vagrant-ca-certificates/plugin.rb
84
99
  - lib/vagrant-ca-certificates/version.rb
@@ -91,6 +106,8 @@ files:
91
106
  - spec/unit/vagrant-ca-certificates/cap/debian/update_certificate_bundle_spec.rb
92
107
  - spec/unit/vagrant-ca-certificates/cap/redhat/certificate_upload_path_spec.rb
93
108
  - spec/unit/vagrant-ca-certificates/cap/redhat/update_certificate_bundle_spec.rb
109
+ - spec/unit/vagrant-ca-certificates/cap/windows/certificate_upload_path_spec.rb
110
+ - spec/unit/vagrant-ca-certificates/cap/windows/update_certificate_bundle_spec.rb
94
111
  - spec/unit/vagrant-ca-certificates/config_spec.rb
95
112
  - vagrant-ca-certificates.gemspec
96
113
  homepage: https://github.com/williambailey/vagrant-ca-certificates
@@ -113,7 +130,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
113
130
  version: '0'
114
131
  requirements: []
115
132
  rubyforge_project:
116
- rubygems_version: 2.4.5
133
+ rubygems_version: 2.6.13
117
134
  signing_key:
118
135
  specification_version: 4
119
136
  summary: A Vagrant plugin that installs CA certificates onto the virtual machine.
@@ -126,5 +143,6 @@ test_files:
126
143
  - spec/unit/vagrant-ca-certificates/cap/debian/update_certificate_bundle_spec.rb
127
144
  - spec/unit/vagrant-ca-certificates/cap/redhat/certificate_upload_path_spec.rb
128
145
  - spec/unit/vagrant-ca-certificates/cap/redhat/update_certificate_bundle_spec.rb
146
+ - spec/unit/vagrant-ca-certificates/cap/windows/certificate_upload_path_spec.rb
147
+ - spec/unit/vagrant-ca-certificates/cap/windows/update_certificate_bundle_spec.rb
129
148
  - spec/unit/vagrant-ca-certificates/config_spec.rb
130
- has_rdoc:
metadata.gz.sig CHANGED
Binary file