File

mod_checkcerts/mod_checkcerts.lua @ 866:8495dae58d78

Test login for user 'six' This user appears in a deeper LDAP record
author Rob Hoelz <rob@hoelz.ro>
date Mon, 10 Dec 2012 22:04:53 +0100
parent 855:1983d4d51e1a
child 941:a6c2345bcf87
line wrap: on
line source

local ssl = require"ssl";
local load_cert = ssl.x509 and ssl.x509.load
	or ssl.cert_from_pem; -- COMPAT mw/luasec-hg

if not load_cert then
	module:log("error", "This version of LuaSec (%s) does not support certificate checking", ssl._VERSION);
	return
end

local function check_certs_validity()
	-- First, let's find out what certificate this host uses.
	local ssl_config = config.rawget(module.host, "core", "ssl");
	if not ssl_config then
		local base_host = module.host:match("%.(.*)");
		ssl_config = config.get(base_host, "core", "ssl");
	end

	if ssl_config.certificate then
		local certfile = ssl_config.certificate;
		local cert;

		local fh = io.open(certfile); -- Load the file.
		cert = fh and fh:read"*a";
		fh:close();
		cert = cert and load_cert(cert); -- And parse
		if not cert then return end
		-- No error reporting, certmanager should complain already

		local now = os.time();
		local valid_at = cert.valid_at or cert.validat;
		if not valid_at then return end -- Broken or uncommon LuaSec version?

		-- This might be wrong if the certificate has NotBefore in the future.
		-- However this is unlikely to happen in the wild.
		if not valid_at(cert, now) then
			module:log("warn", "The certificate %s has expired", certfile);
		elseif not valid_at(cert, now+86400*7) then
			module:log("warn", "The certificate %s will expire this week", certfile);
		elseif not valid_at(cert, now+86400*30) then
			module:log("info", "The certificate %s will expire later this month", certfile);
		end
		-- TODO Maybe notify admins
	end
end

module.load = check_certs_validity;
module:hook_global("config-reloaded", check_certs_validity);