Skip to content
This repository has been archived by the owner on Jan 4, 2021. It is now read-only.

(#518) valid_certificate?: use OpenSSL::X509::Store for checking certificates #517

Merged
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions lib/mcollective/util/choria.rb
Original file line number Diff line number Diff line change
Expand Up @@ -343,18 +343,18 @@ def valid_certificate?(pubcert, log=true)
return false unless incoming

begin
ca = OpenSSL::X509::Certificate.new(File.read(ca_path))
rescue OpenSSL::X509::CertificateError
ca = OpenSSL::X509::Store.new.add_file(ca_path)
rescue OpenSSL::X509::StoreError
Log.warn("Failed to load CA from %s: %s: %s" % [ca_path, $!.class, $!.to_s]) if log
raise
end

unless incoming.issuer.to_s == ca.subject.to_s && incoming.verify(ca.public_key)
Log.warn("Failed to verify certificate %s against CA %s in %s" % [incoming.subject.to_s, ca.subject.to_s, ca_path]) if log
unless ca.verify(incoming)
Log.warn("Failed to verify certificate %s against CA %s in %s" % [incoming.subject.to_s, incoming.issuer.to_s, ca_path]) if log
return false
end

Log.debug("Verified certificate %s against CA %s" % [incoming.subject.to_s, ca.subject.to_s]) if log
Log.debug("Verified certificate %s against CA %s" % [incoming.subject.to_s, incoming.issuer.to_s]) if log

cn_parts = incoming.subject.to_a.select {|c| c[0] == "CN"}.flatten

Expand Down