def Certificate_Dump(self): """Dump of the certificate""" if self.pk and self.active: a = Openssl(self) return "<textarea id=\"certdump\">%s</textarea>" % a.dump_certificate() else: return "Nothing to display"
def delete(self, passphrase, *args, **kwargs): """Delete the CertificateAuthority object""" logger.info( "Certificate %s is going to be deleted" % self.name ) ## Container for CA folders to delete self.remove_chain = [] ## Is a revoke required? revoke_required = True ## Helper function for recusion def chain_recursion(r_id): ca = CertificateAuthority.objects.get(pk=r_id) self.remove_chain.append(ca.pk) ## Search for related CA's child_cas = CertificateAuthority.objects.filter(parent=r_id) if child_cas: for ca in child_cas: chain_recursion(ca.pk) if not self.parent: logger.info( "No revoking of certitifcates. %s is a toplevel CA" % self.name ) revoke_required = False ## Collect child CA's and certificates chain_recursion(self.pk) logger.info( "Full chain is %s and pf is %s" % (self.remove_chain, self.passphrase)) ## Remoke first ca in the chain if revoke_required: a = Openssl(CertificateAuthority.objects.get(pk=self.pk)) a.revoke_certificate(passphrase) a.generate_crl(ca=self.parent.name, pf=passphrase) ## Rebuild the ca metadata self.rebuild_ca_metadata(modify=True, task='exclude', skip_list=self.remove_chain) ## Remove object history self.Delete_Changelog(obj=self) ## Call the "real" delete function super(CertificateAuthority, self).delete(*args, **kwargs)
def delete(self, passphrase, *args, **kwargs): """Delete the Certificate object""" ## Time for some rm action a = Openssl(self) if self.parent: a.revoke_certificate(passphrase) a.generate_crl(ca=self.parent.name, pf=passphrase) a.remove_complete_certificate() ## Remove object history self.Delete_Changelog(obj=self) ## Call the "real" delete function super(Certificate, self).delete(*args, **kwargs)
def save(self, *args, **kwargs): """Save the Certificate object""" ## Set user to None if it's missing c_user = getattr(self, 'user', None) ## Variables to track changes c_action = self.action c_list = [] if self.pk: if self.action in ('update', 'revoke', 'renew'): action = Openssl(self) prev = Certificate.objects.get(pk=self.pk) if self.action == 'revoke': if not self.parent: raise Exception( "You cannot revoke a self-signed certificate! No parent => No revoke" ) ## Revoke and generate CRL action.revoke_certificate(self.parent_passphrase) action.generate_crl(self.parent.name, self.parent_passphrase) ## Modify fields prev.active = False prev.der_encoded = False prev.pkcs12_encoded = False prev.revoked = datetime.datetime.now() c_list.append('Revoked certificate "%s"' % self.common_name) elif self.action == 'renew': c_list.append('Renewed certificate "%s"' % self.common_name) ## Revoke if certificate is active if self.parent and not action.get_revoke_status_from_cert(): action.revoke_certificate(self.parent_passphrase) action.generate_crl(self.parent.name, self.parent_passphrase) ## Renew certificate and update CRL if self.parent == None: action.generate_self_signed_cert() else: action.generate_csr() action.sign_csr() action.generate_crl(self.parent.name, self.parent_passphrase) ## Modify fields prev.created = datetime.datetime.now() delta = datetime.timedelta(self.valid_days) prev.expiry_date = datetime.datetime.now() + delta if prev.valid_days != self.valid_days: c_list.append("Changed valid days to %d" % (prev.valid_days, self.valid_days)) prev.valid_days = self.valid_days prev.active = True prev.revoked = None ## Make sure possibly updated fields are saved to DB if prev.country != self.country: c_list.append('Updated country to "%s"' % self.country) if prev.locality != self.locality: c_list.append('Updated locality to "%s"' % self.locality) if prev.organization != self.organization: c_list.append('Updated organization to "%s"' % self.organization) if prev.email != self.email: c_list.append('Updated email to "%s"' % self.email) if prev.OU != self.OU: c_list.append('Updated OU to "%s"' % self.OU) prev.country = self.country prev.locality = self.locality prev.organization = self.organization prev.email = self.email prev.OU = self.OU ## Get the new serial prev.serial = action.get_serial_from_cert() c_list.append("Serial number changed to %s" % prev.serial) if self.action != 'revoke': if prev.pkcs12_encoded != self.pkcs12_encoded: c_list.append("PKCS12 encoding set to %s" % self.der_encoded) if self.pkcs12_encoded: if prev.pkcs12_encoded and prev.pkcs12_passphrase == self.pkcs12_passphrase: logger.debug( 'PKCS12 passphrase is unchanged. Nothing to do' ) else: action.generate_pkcs12_encoded() else: action.remove_pkcs12_encoded() self.pkcs12_passphrase = prev.pkcs12_passphrase = None if self.pkcs12_passphrase: prev.pkcs12_passphrase = md5_constructor(self.pkcs12_passphrase).hexdigest() else: prev.pkcs12_passphrase = None if prev.der_encoded is not self.der_encoded: c_list.append("DER encoding set to %s" % self.der_encoded) if self.der_encoded: action.generate_der_encoded() else: action.remove_der_encoded() ## Update description. This is always allowed if prev.description != self.description: c_list.append('Updated description to "%s"' % self.description) prev.description = self.description ## Save the data self = prev self.action = 'update' else: raise Exception( 'Invalid action %s supplied' % self.action ) else: ## Set creation data self.created = datetime.datetime.now() delta = datetime.timedelta(self.valid_days) self.expiry_date = datetime.datetime.now() + delta ## Force instance to be active self.active = True logger.info( "***** { New certificate generation: %s } *****" % self.name ) ## Generate key and certificate action = Openssl(self) action.generate_key() if self.parent: action.generate_csr() action.sign_csr() self.ca_chain = self.parent.ca_chain if self.ca_chain == 'self-signed': self.ca_chain = self.parent.name else: action.generate_self_signed_cert() self.ca_chain = "self-signed" ## Get the serial from certificate self.serial = action.get_serial_from_cert() ## Encoding if self.der_encoded: action.generate_der_encoded() if self.pkcs12_encoded: action.generate_pkcs12_encoded() ## Encrypt passphrase and blank parent's passphrase if self.passphrase: self.passphrase = md5_constructor(self.passphrase).hexdigest() ## Set change text to fixed value c_list.append('Created certificate "%s"' % action.subj) ## Blank parent passphrase self.parent_passphrase = None ## Save the data super(Certificate, self).save(*args, **kwargs) ## Update changelog self.Update_Changelog(obj=self, user=c_user, action=c_action, changes=c_list)
def save(self, *args, **kwargs): """Save the CertificateAuthority object""" ## Set user to None if it's missing c_user = getattr(self, 'user', None) ## Variables to track changes c_action = self.action c_list = [] if self.pk: if self.action in ('update', 'revoke', 'renew'): action = Openssl(self) prev = CertificateAuthority.objects.get(pk=self.pk) if self.action in ('revoke', 'renew'): if self.action == 'revoke': if not self.parent: raise Exception( "You cannot revoke a self-signed certificate! No parent => No revoke" ) ## Revoke and generate CRL action.revoke_certificate(self.parent_passphrase) action.generate_crl(self.parent.name, self.parent_passphrase) ## Modify fields prev.active = False prev.der_encoded = False prev.revoked = datetime.datetime.now() c_list.append('Revoked certificate "%s"' % self.common_name) elif self.action == 'renew': c_list.append('Renewed certificate "%s"' % self.common_name) ## Revoke if certificate is active if self.parent and not action.get_revoke_status_from_cert(): action.revoke_certificate(self.parent_passphrase) action.generate_crl(self.parent.name, self.parent_passphrase) ## Rebuild the ca metadata self.rebuild_ca_metadata(modify=True, task='replace') ## Renew certificate and update CRL if self.parent == None: action.generate_self_signed_cert() action.generate_crl(self.name, self.passphrase) else: action.generate_csr() action.sign_csr() action.generate_crl(self.parent.name, self.parent_passphrase) action.update_ca_chain_file() ## Modify fields prev.created = datetime.datetime.now() delta = datetime.timedelta(self.valid_days) prev.expiry_date = datetime.datetime.now() + delta if prev.valid_days != self.valid_days: c_list.append("Changed valid days to %d" % (prev.valid_days, self.valid_days)) prev.valid_days = self.valid_days prev.active = True prev.revoked = None ## Make sure possibly updated fields are saved to DB if prev.country != self.country: c_list.append('Updated country to "%s"' % self.country) if prev.locality != self.locality: c_list.append('Updated locality to "%s"' % self.locality) if prev.organization != self.organization: c_list.append('Updated organization to "%s"' % self.organization) if prev.email != self.email: c_list.append('Updated email to "%s"' % self.email) if prev.OU != self.OU: c_list.append('Updated OU to "%s"' % self.OU) prev.country = self.country prev.locality = self.locality prev.organization = self.organization prev.email = self.email prev.OU = self.OU ## Get the new serial prev.serial = action.get_serial_from_cert() c_list.append("Serial number changed to %s" % prev.serial) ## DB-revoke all related certs garbage = [] id_dict = { 'cert': [], 'ca': [], } from pki.views import chain_recursion as r_chain_recursion r_chain_recursion(self.id, garbage, id_dict) for i in id_dict['cert']: x = Certificate.objects.get(pk=i) x.active = False x.der_encoded = False x.pkcs12_encoded = False x.revoked = datetime.datetime.now() super(Certificate, x).save(*args, **kwargs) self.Update_Changelog(obj=x, user=c_user, action='broken', changes=(['Broken by %s of CA "%s"' % (c_action, self.common_name),])) for i in id_dict['ca']: x = CertificateAuthority.objects.get(pk=i) x.active = False x.der_encoded = False x.revoked = datetime.datetime.now() super(CertificateAuthority, x).save(*args, **kwargs) if x.pk != self.pk: self.Update_Changelog(obj=x, user=c_user, action='broken', changes=(['Broken by %s of CA "%s"' % (c_action, self.common_name),])) ## Update description. This is always allowed if prev.description != self.description: c_list.append('Updated description to "%s"' % self.description) prev.description = self.description if prev.der_encoded is not self.der_encoded: c_list.append("DER encoding set to %s" % self.der_encoded) if self.der_encoded and self.action != "revoke": action.generate_der_encoded() else: action.remove_der_encoded() self = prev self.action = 'update' else: raise Exception( 'Invalid action %s supplied' % self.action ) else: ## Set creation data self.created = datetime.datetime.now() delta = datetime.timedelta(self.valid_days) self.expiry_date = datetime.datetime.now() + delta ## Force instance to be active self.active = True ## Reset the action self.action = 'update' ## Rebuild the ca metadata self.rebuild_ca_metadata(modify=True, task='append') ## Generate keys and certificates action = Openssl(self) action.generate_key() if not self.parent: action.generate_self_signed_cert() else: action.generate_csr() action.sign_csr() if self.der_encoded: action.generate_der_encoded() ## Generate CRL action.generate_crl(self.name, self.passphrase) ## Get the serial from certificate self.serial = action.get_serial_from_cert() ## Generate ca chain (db field and chain file) chain = [] chain_str = '' p = self.parent if self.parent == None: chain.append('self-signed') else: chain.append( self.common_name ) while p != None: chain.append(p.common_name) p = p.parent chain.reverse() ## Build chain string and file for i in chain: if chain_str == '': chain_str += '%s' % i else: chain_str += ' → %s' % i self.ca_chain = chain_str action.update_ca_chain_file() ## Encrypt passphrase and blank parent's passphrase self.passphrase = md5_constructor(self.passphrase).hexdigest() ## Set change text to fixed value c_list.append('Created certificate "%s"' % self.common_name) ## Blank parent passphrase self.parent_passphrase = None ## Save the data super(CertificateAuthority, self).save(*args, **kwargs) ## Update changelog self.Update_Changelog(obj=self, user=c_user, action=c_action, changes=c_list)