mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
openssl_csr: fix SAN handling for cryptography backend (#53927)
* Fix IP address support for openssl_csr. * Remove DirName support, which doesn't work as this and seems harder to fix. Also, I don't know of an example of how it actually works.
This commit is contained in:
parent
29d6418822
commit
96925a09b6
1 changed files with 12 additions and 10 deletions
|
@ -353,6 +353,7 @@ try:
|
||||||
import cryptography.hazmat.backends
|
import cryptography.hazmat.backends
|
||||||
import cryptography.hazmat.primitives.serialization
|
import cryptography.hazmat.primitives.serialization
|
||||||
import cryptography.hazmat.primitives.hashes
|
import cryptography.hazmat.primitives.hashes
|
||||||
|
import ipaddress
|
||||||
CRYPTOGRAPHY_VERSION = LooseVersion(cryptography.__version__)
|
CRYPTOGRAPHY_VERSION = LooseVersion(cryptography.__version__)
|
||||||
except ImportError:
|
except ImportError:
|
||||||
CRYPTOGRAPHY_IMP_ERR = traceback.format_exc()
|
CRYPTOGRAPHY_IMP_ERR = traceback.format_exc()
|
||||||
|
@ -673,16 +674,17 @@ class CertificateSigningRequestCryptography(CertificateSigningRequestBase):
|
||||||
raise CertificateSigningRequestError('Unknown subject field identifier "{0}"'.format(id))
|
raise CertificateSigningRequestError('Unknown subject field identifier "{0}"'.format(id))
|
||||||
|
|
||||||
def _get_san(self, name):
|
def _get_san(self, name):
|
||||||
if name.startswith('DNS:'):
|
try:
|
||||||
return cryptography.x509.DNSName(to_text(name[4:]))
|
if name.startswith('DNS:'):
|
||||||
if name.startswith('IP:'):
|
return cryptography.x509.DNSName(to_text(name[4:]))
|
||||||
return cryptography.x509.IPAddress(to_text(name[3:]))
|
if name.startswith('IP:'):
|
||||||
if name.startswith('email:'):
|
return cryptography.x509.IPAddress(ipaddress.ip_address(to_text(name[3:])))
|
||||||
return cryptography.x509.RFC822Name(to_text(name[6:]))
|
if name.startswith('email:'):
|
||||||
if name.startswith('URI:'):
|
return cryptography.x509.RFC822Name(to_text(name[6:]))
|
||||||
return cryptography.x509.UniformResourceIdentifier(to_text(name[4:]))
|
if name.startswith('URI:'):
|
||||||
if name.startswith('DirName:'):
|
return cryptography.x509.UniformResourceIdentifier(to_text(name[4:]))
|
||||||
return cryptography.x509.DirectoryName(to_text(name[8:]))
|
except Exception as e:
|
||||||
|
raise CertificateSigningRequestError('Cannot parse Subject Alternative Name "{0}": {1}'.format(name, e))
|
||||||
if ':' not in name:
|
if ':' not in name:
|
||||||
raise CertificateSigningRequestError('Cannot parse Subject Alternative Name "{0}" (forgot "DNS:" prefix?)'.format(name))
|
raise CertificateSigningRequestError('Cannot parse Subject Alternative Name "{0}" (forgot "DNS:" prefix?)'.format(name))
|
||||||
raise CertificateSigningRequestError('Cannot parse Subject Alternative Name "{0}" (potentially unsupported by cryptography backend)'.format(name))
|
raise CertificateSigningRequestError('Cannot parse Subject Alternative Name "{0}" (potentially unsupported by cryptography backend)'.format(name))
|
||||||
|
|
Loading…
Reference in a new issue