Merge branch 'master' of github.com:domify/registry

This commit is contained in:
Priit Tark 2015-05-22 14:12:56 +03:00
commit 75630e89c2
12 changed files with 214 additions and 103 deletions

View file

@ -1,19 +1,21 @@
class Admin::CertificatesController < AdminController class Admin::CertificatesController < AdminController
load_and_authorize_resource load_and_authorize_resource
before_action :set_api_user, only: [:new, :show, :destroy, :edit, :update] before_action :set_certificate, :set_api_user, only: [:sign, :show, :download_csr, :download_crt, :revoke, :destroy]
def show; end def show; end
def edit; end
def new def new
@api_user = ApiUser.find(params[:api_user_id])
@certificate = Certificate.new(api_user: @api_user) @certificate = Certificate.new(api_user: @api_user)
end end
def create def create
@api_user = ApiUser.find(params[:api_user_id]) @api_user = ApiUser.find(params[:api_user_id])
@certificate = @api_user.certificates.build(certificate_params) crt = certificate_params[:crt].open.read if certificate_params[:crt]
csr = certificate_params[:csr].open.read if certificate_params[:csr]
@certificate = @api_user.certificates.build(csr: csr, crt: crt)
if @api_user.save if @api_user.save
flash[:notice] = I18n.t('record_created') flash[:notice] = I18n.t('record_created')
redirect_to [:admin, @api_user, @certificate] redirect_to [:admin, @api_user, @certificate]
@ -23,16 +25,6 @@ class Admin::CertificatesController < AdminController
end end
end end
def update
if @certificate.update(certificate_params)
flash[:notice] = I18n.t('record_updated')
redirect_to [:admin, @api_user, @certificate]
else
flash.now[:alert] = I18n.t('failed_to_update_record')
render 'edit'
end
end
def destroy def destroy
if @certificate.destroy if @certificate.destroy
flash[:notice] = I18n.t('record_deleted') flash[:notice] = I18n.t('record_deleted')
@ -43,48 +35,50 @@ class Admin::CertificatesController < AdminController
end end
end end
# DEPRECATED FOR NOW def sign
# def sign if @certificate.sign!
# if @certificate.sign! flash[:notice] = I18n.t('record_updated')
# flash[:notice] = I18n.t('record_updated') redirect_to [:admin, @api_user, @certificate]
# redirect_to [:admin, @api_user, @certificate] else
# else flash.now[:alert] = I18n.t('failed_to_update_record')
# flash.now[:alert] = I18n.t('failed_to_update_record') render 'show'
# render 'show' end
# end end
# end
# def revoke def revoke
# if @certificate.revoke! if @certificate.revoke!
# flash[:notice] = I18n.t('record_updated') flash[:notice] = I18n.t('record_updated')
# else else
# flash[:alert] = I18n.t('failed_to_update_record') flash[:alert] = I18n.t('failed_to_update_record')
# end end
# redirect_to [:admin, @api_user, @certificate] redirect_to [:admin, @api_user, @certificate]
# end end
# def download_csr def download_csr
# send_data @certificate.csr, filename: "#{@api_user.username}.csr.pem" send_data @certificate.csr, filename: "#{@api_user.username}.csr.pem"
# end end
# def download_crt def download_crt
# send_data @certificate.crt, filename: "#{@api_user.username}.crt.pem" send_data @certificate.crt, filename: "#{@api_user.username}.crt.pem"
# end end
private private
# DEPRECATED FOR NOW def set_certificate
# def set_certificate @certificate = Certificate.find(params[:id])
# @certificate = Certificate.find(params[:id]) @csr = OpenSSL::X509::Request.new(@certificate.csr) if @certificate.csr
# @csr = OpenSSL::X509::Request.new(@certificate.csr) if @certificate.csr @crt = OpenSSL::X509::Certificate.new(@certificate.crt) if @certificate.crt
# @crt = OpenSSL::X509::Certificate.new(@certificate.crt) if @certificate.crt end
# end
def set_api_user def set_api_user
@api_user = ApiUser.find(params[:api_user_id]) @api_user = ApiUser.find(params[:api_user_id])
end end
def certificate_params def certificate_params
params.require(:certificate).permit(:common_name, :md5, :interface) if params[:certificate]
params.require(:certificate).permit(:crt, :csr)
else
{}
end
end end
end end

View file

@ -13,6 +13,7 @@ class Registrar::SessionsController < Devise::SessionsController
# rubocop:disable Metrics/PerceivedComplexity # rubocop:disable Metrics/PerceivedComplexity
# rubocop:disable Metrics/CyclomaticComplexity # rubocop:disable Metrics/CyclomaticComplexity
# rubocop:disable Metrics/MethodLength
def create def create
@depp_user = Depp::User.new(params[:depp_user].merge( @depp_user = Depp::User.new(params[:depp_user].merge(
pki: !(Rails.env.development? || Rails.env.test?) pki: !(Rails.env.development? || Rails.env.test?)
@ -23,17 +24,32 @@ class Registrar::SessionsController < Devise::SessionsController
@depp_user.errors.add(:base, :webserver_missing_user_name_directive) @depp_user.errors.add(:base, :webserver_missing_user_name_directive)
end end
if @depp_user.pki && request.env['HTTP_SSL_CLIENT_CERT'].blank?
@depp_user.errors.add(:base, :webserver_missing_client_cert_directive)
end
if @depp_user.pki && request.env['HTTP_SSL_CLIENT_S_DN_CN'] == '(null)' if @depp_user.pki && request.env['HTTP_SSL_CLIENT_S_DN_CN'] == '(null)'
@depp_user.errors.add(:base, :webserver_user_name_directive_should_be_required) @depp_user.errors.add(:base, :webserver_user_name_directive_should_be_required)
end end
logger.error request.env if @depp_user.pki && request.env['HTTP_SSL_CLIENT_CERT'] == '(null)'
if @depp_user.pki && request.env['HTTP_SSL_CLIENT_S_DN_CN'] != params[:depp_user][:tag] @depp_user.errors.add(:base, :webserver_client_cert_directive_should_be_required)
@depp_user.errors.add(:base, :invalid_cert) end
@api_user = ApiUser.find_by(username: params[:depp_user][:tag], password: params[:depp_user][:password])
unless @api_user
@depp_user.errors.add(:base, t(:no_such_user))
render 'login' and return
end
if @depp_user.pki
unless @api_user.registrar_pki_ok?(request.env['HTTP_SSL_CLIENT_CERT'])
@depp_user.errors.add(:base, :invalid_cert)
end
end end
if @depp_user.errors.none? && @depp_user.valid? if @depp_user.errors.none? && @depp_user.valid?
@api_user = ApiUser.find_by(username: params[:depp_user][:tag])
if @api_user.active? if @api_user.active?
sign_in @api_user sign_in @api_user
redirect_to role_base_root_url(@api_user) redirect_to role_base_root_url(@api_user)
@ -47,6 +63,7 @@ class Registrar::SessionsController < Devise::SessionsController
end end
# rubocop:enable Metrics/CyclomaticComplexity # rubocop:enable Metrics/CyclomaticComplexity
# rubocop:enable Metrics/PerceivedComplexity # rubocop:enable Metrics/PerceivedComplexity
# rubocop:enable Metrics/MethodLength
def id def id
@user = ApiUser.find_by_idc_data(request.env['SSL_CLIENT_S_DN']) @user = ApiUser.find_by_idc_data(request.env['SSL_CLIENT_S_DN'])

View file

@ -45,6 +45,14 @@ class ApiUser < User
registrar.messages.queued registrar.messages.queued
end end
def registrar_pki_ok?(crt)
certificates.registrar.exists?(crt: crt)
end
def api_pki_ok?(crt)
certificates.api.exists?(crt: crt)
end
class << self class << self
def find_by_idc_data(idc_data) def find_by_idc_data(idc_data)
return false if idc_data.blank? return false if idc_data.blank?

View file

@ -11,9 +11,43 @@ class Certificate < ActiveRecord::Base
REVOKED = 'revoked' REVOKED = 'revoked'
VALID = 'valid' VALID = 'valid'
INTERFACES = ['api', 'registrar'] API = 'api'
REGISTRAR = 'registrar'
INTERFACES = [API, REGISTRAR]
validates :common_name, :md5, :interface, presence: true scope 'api', -> { where(interface: API) }
scope 'registrar', -> { where(interface: REGISTRAR) }
validate :validate_csr_and_crt_presence
def validate_csr_and_crt_presence
return if csr.try(:scrub).present? || crt.try(:scrub).present?
errors.add(:base, I18n.t(:crt_or_csr_must_be_present))
end
validate :validate_csr_and_crt
def validate_csr_and_crt
parsed_crt
parsed_csr
rescue OpenSSL::X509::RequestError, OpenSSL::X509::CertificateError
errors.add(:base, I18n.t(:invalid_csr_or_crt))
end
before_create :parse_metadata
def parse_metadata
if crt
pc = parsed_crt.try(:subject).try(:to_s) || ''
cn = pc.scan(/\/CN=(.+)/).flatten.first
self.common_name = cn.split('/').first
self.md5 = Digest::MD5.hexdigest(crt)
self.interface = API
elsif csr
pc = parsed_csr.try(:subject).try(:to_s) || ''
cn = pc.scan(/\/CN=(.+)/).flatten.first
self.common_name = cn.split('/').first
self.md5 = Digest::MD5.hexdigest(csr)
self.interface = REGISTRAR
end
end
def parsed_crt def parsed_crt
@p_crt ||= OpenSSL::X509::Certificate.new(crt) if crt @p_crt ||= OpenSSL::X509::Certificate.new(crt) if crt

View file

@ -38,19 +38,24 @@
.pull-left .pull-left
= t(:certificates) = t(:certificates)
.pull-right .pull-right
= link_to(t(:add), = link_to(t(:upload_crt),
new_admin_api_user_certificate_path(@api_user), class: 'btn btn-default btn-xs') new_admin_api_user_certificate_path(@api_user, crt: true), class: 'btn btn-primary btn-xs')
= link_to(t(:upload_csr),
new_admin_api_user_certificate_path(@api_user), class: 'btn btn-primary btn-xs')
.table-responsive .table-responsive
%table.table.table-hover.table-bordered.table-condensed %table.table.table-hover.table-bordered.table-condensed
%thead %thead
%tr %tr
%th{class: 'col-xs-4'}= t(:common_name) %th{class: 'col-xs-10'}= t(:subject)
%th{class: 'col-xs-4'}= t(:md5) %th{class: 'col-xs-2'}= t(:status)
%th{class: 'col-xs-4'}= t(:interface)
%tbody %tbody
- @api_user.certificates.each do |x| - @api_user.certificates.each do |x|
%tr - if x.csr
%td= link_to(x.common_name, admin_api_user_certificate_path(@api_user, x)) %tr
%td= x.md5 %td= link_to(x.parsed_csr.try(:subject), admin_api_user_certificate_path(@api_user, x))
%td= x.interface %td= x.status
- elsif x.crt
%tr
%td= link_to(x.parsed_crt.try(:subject), admin_api_user_certificate_path(@api_user, x))
%td= x.status

View file

@ -1,29 +0,0 @@
= form_for([:admin, @api_user, @certificate], html: {class: 'form-horizontal'}) do |f|
= render 'shared/full_errors', object: f.object
.row
.col-md-8
.form-group
.col-md-4.control-label
= f.label :api_user
.col-md-7
= f.text_field(:api_user, class: 'form-control', disabled: :disabled)
.form-group
.col-md-4.control-label
= f.label :common_name
.col-md-7
= f.text_field(:common_name, class: 'form-control', autocomplete: 'off')
.form-group
.col-md-4.control-label
= f.label :md5
.col-md-7
= f.text_field(:md5, class: 'form-control', autocomplete: 'off')
.form-group
.col-md-4.control-label
= f.label :interface
.col-md-7
= f.select :interface, Certificate::INTERFACES.map {|x| [x.upcase, x]}, {}, class: 'form-control selectize'
%hr
.row
.col-md-8.text-right
= button_tag(t(:save), class: 'btn btn-primary')

View file

@ -1,5 +0,0 @@
- content_for :actions do
= link_to(t(:back_to_api_user), admin_api_user_path(@api_user), class: 'btn btn-default')
= render 'shared/title', name: t(:edit_certificate)
= render 'form'

View file

@ -1,5 +1,22 @@
- content_for :actions do = render 'shared/title', name: params[:crt] ? t(:upload_crt) : t(:upload_csr)
= link_to(t(:back_to_api_user), admin_api_user_path(@api_user), class: 'btn btn-default')
= render 'shared/title', name: t(:add_certificate) = form_for([:admin, @api_user, @certificate], multipart: true) do |f|
= render 'form' = render 'shared/full_errors', object: f.object
.row
.col-md-8
.form-group
- if params[:crt]
.col-md-4.control-label
= f.label :crt, t(:certificate)
.col-md-8
= f.file_field :crt
- else
.col-md-4.control-label
= f.label :csr, t(:certificate_signing_req)
.col-md-8
= f.file_field :csr
%hr
.row
.col-md-8.text-right
= button_tag(t(:save), class: 'btn btn-primary')

View file

@ -1,5 +1,4 @@
- content_for :actions do - content_for :actions do
= link_to(t(:edit), edit_admin_api_user_certificate_path(@api_user, @certificate), class: 'btn btn-default')
= link_to(t(:delete), admin_api_user_certificate_path(@api_user, @certificate), = link_to(t(:delete), admin_api_user_certificate_path(@api_user, @certificate),
method: :delete, data: { confirm: t(:are_you_sure) }, class: 'btn btn-danger') method: :delete, data: { confirm: t(:are_you_sure) }, class: 'btn btn-danger')
= render 'shared/title', name: t(:certificates) = render 'shared/title', name: t(:certificates)
@ -30,10 +29,72 @@
%dd= @certificate.md5 %dd= @certificate.md5
%dt= t(:interface) %dt= t(:interface)
%dd= @certificate.interface %dd= @certificate.interface.try(:upcase)
%dt= t(:updated_at) %dt= t(:updated_at)
%dd= l(@certificate.updated_at) %dd= l(@certificate.updated_at)
%dt= t(:created_at) %dt= t(:created_at)
%dd= l(@certificate.created_at) %dd= l(@certificate.created_at)
- if @csr
.row
.col-md-12
.panel.panel-default
.panel-heading.clearfix
.pull-left
= t(:csr)
.pull-right
= link_to(t(:download), download_csr_admin_api_user_certificate_path(@api_user, @certificate), class: 'btn btn-default btn-xs')
- unless @crt
= link_to(t(:sign_this_request), sign_admin_api_user_certificate_path(@api_user, @certificate), method: :post, class: 'btn btn-primary btn-xs')
.panel-body
%dl.dl-horizontal
%dt= t(:version)
%dd= @csr.version
%dt= t(:subject)
%dd= @csr.subject
%dt= t(:signature_algorithm)
%dd= @csr.signature_algorithm
- if @crt
.row
.col-md-12
.panel.panel-default
.panel-heading.clearfix
.pull-left
= t('crt') unless @certificate.revoked?
= t('crt_revoked') if @certificate.revoked?
.pull-right
= link_to(t(:download), download_crt_admin_api_user_certificate_path(@api_user, @certificate), class: 'btn btn-default btn-xs')
- if !@certificate.revoked? && @certificate.csr
= link_to(t(:revoke_this_certificate), revoke_admin_api_user_certificate_path(@api_user, @certificate), method: :post, class: 'btn btn-primary btn-xs')
- if @crt
.panel-body
%dl.dl-horizontal
%dt= t(:version)
%dd= @crt.version
%dt= t(:serial_number)
%dd= @crt.serial
%dt= t(:signature_algorithm)
%dd= @crt.signature_algorithm
%dt= t(:issuer)
%dd= @crt.issuer
%dt= t(:valid_from)
%dd= @crt.not_before
%dt= t(:valid_to)
%dd= @crt.not_after
%dt= t(:subject)
%dd= @crt.subject
%dt= t(:extensions)
%dd= @crt.extensions.map(&:to_s).join('<br>').html_safe

View file

@ -804,3 +804,6 @@ en:
interface: 'Interface' interface: 'Interface'
add_certificate: 'Add certificate' add_certificate: 'Add certificate'
edit_certificate: 'Edit certificate' edit_certificate: 'Edit certificate'
invalid_csr_or_crt: 'Invalid CSR or CRT'
webserver_missing_client_cert_directive: 'Webserver missing client cert directive'
webserver_client_cert_directive_should_be_required: 'Webserver client cert directive should be required'

View file

@ -25,6 +25,14 @@ feature 'Sessions', type: :feature do
click_button 'Log in' click_button 'Log in'
page.should have_text('Access denied') page.should have_text('Access denied')
end end
it 'should not get in with invalid user' do
visit registrar_login_path
fill_in 'depp_user_tag', with: 'bla'
fill_in 'depp_user_password', with: 'bla'
click_button 'Log in'
page.should have_text('No such user')
end
end end
context 'as unknown user' do context 'as unknown user' do

View file

@ -11,9 +11,7 @@ describe Certificate do
it 'should not be valid' do it 'should not be valid' do
@certificate.valid? @certificate.valid?
@certificate.errors.full_messages.should match_array([ @certificate.errors.full_messages.should match_array([
"Common name is missing", "CRT or CSR must be present"
"Interface is missing",
"Md5 is missing"
]) ])
end end