Module: EncryptionHelper
- Defined in:
- lib/encryption_helper.rb
Class Method Summary collapse
- .generate_pem_files(keyname) ⇒ Object
- .generate_secret_key(keyname = "appscale") ⇒ Object
- .generate_ssh_key(verbose, outputLocation, name, infrastructure, force) ⇒ Object
Class Method Details
.generate_pem_files(keyname) ⇒ Object
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 |
# File 'lib/encryption_helper.rb', line 65 def self.generate_pem_files(keyname) key_loc = File.("~/.appscale/#{keyname}-key.pem") cert_loc = File.("~/.appscale/#{keyname}-cert.pem") key = OpenSSL::PKey::RSA.generate(2048) pub = key.public_key ca = OpenSSL::X509::Name.parse("/C=US/ST=Foo/L=Bar/O=AppScale/OU=User/CN=appscale.cs.ucsb.edu/[email protected]") cert = OpenSSL::X509::Certificate.new cert.version = 2 cert.serial = Time.now.to_i cert.subject = ca cert.issuer = ca cert.public_key = pub cert.not_before = Time.now cert.not_after = Time.now + 3600 cert.sign(key, OpenSSL::Digest::SHA1.new) File.open(key_loc, "w") { |f| f.write key.to_pem } File.open(cert_loc, "w") { |f| f.write cert.to_pem } return key_loc, cert_loc end |
.generate_secret_key(keyname = "appscale") ⇒ Object
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 |
# File 'lib/encryption_helper.rb', line 10 def self.generate_secret_key(keyname="appscale") path="~/.appscale/#{keyname}.secret" secret_key = "" possible = "0123456789abcdefghijklmnopqrstuvxwyzABCDEFGHIJKLMNOPQRSTUVWXYZ" possibleLength = possible.length 32.times { |index| secret_key << possible[rand(possibleLength)] } full_path = File.(path) File.open(full_path, "w") { |file| file.puts(secret_key) } return secret_key, path end |
.generate_ssh_key(verbose, outputLocation, name, infrastructure, force) ⇒ Object
28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 |
# File 'lib/encryption_helper.rb', line 28 def self.generate_ssh_key(verbose, outputLocation, name, infrastructure, force) ec2_output = "" loop { sleep(10) # to avoid euca replay error message ec2_output = CommonFunctions.shell("#{infrastructure}-add-keypair #{name} 2>&1") break if ec2_output.include?("BEGIN RSA PRIVATE KEY") if force puts "Trying again. Saw this from #{infrastructure}-add-keypair: #{ec2_output}" if verbose sleep(10) delete_output = CommonFunctions.shell("#{infrastructure}-delete-keypair #{name} 2>&1") puts "Saw this from #{infrastructure}-delete-keypair: #{delete_output}" if verbose else abort("The keyname you chose is already in the system. Please either run this tool again with the --force flag or run the following:\n#{infrastructure}-delete-keypair #{name}") end } # output is the ssh private key prepended with info we don't need # delimited by the first \n, so rip it off first to get just the key #first_newline = ec2_output.index("\n") #ssh_private_key = ec2_output[first_newline+1, ec2_output.length-1] if outputLocation.class == String outputLocation = [outputLocation] end outputLocation.each { |path| fullPath = File.(path) File.open(fullPath, "w") { |file| file.puts(ec2_output) } FileUtils.chmod(0600, fullPath) # else ssh won't use the key } return end |