1 package club.wpia.gigi.pages.account.certs;
3 import java.io.IOException;
4 import java.io.PrintWriter;
5 import java.security.GeneralSecurityException;
6 import java.util.HashMap;
9 import javax.servlet.http.HttpServletRequest;
11 import club.wpia.gigi.GigiApiException;
12 import club.wpia.gigi.dbObjects.Certificate;
13 import club.wpia.gigi.dbObjects.Certificate.CertificateStatus;
14 import club.wpia.gigi.dbObjects.Certificate.SubjectAlternateName;
15 import club.wpia.gigi.dbObjects.CertificateProfile;
16 import club.wpia.gigi.dbObjects.Domain;
17 import club.wpia.gigi.dbObjects.Organisation;
18 import club.wpia.gigi.dbObjects.User;
19 import club.wpia.gigi.localisation.Language;
20 import club.wpia.gigi.output.CertificateValiditySelector;
21 import club.wpia.gigi.output.HashAlgorithms;
22 import club.wpia.gigi.output.template.Form;
23 import club.wpia.gigi.output.template.IterableDataset;
24 import club.wpia.gigi.output.template.Outputable;
25 import club.wpia.gigi.output.template.Template;
26 import club.wpia.gigi.pages.LoginPage;
27 import club.wpia.gigi.util.AuthorizationContext;
28 import club.wpia.gigi.util.HTMLEncoder;
29 import club.wpia.gigi.util.ServerConstants;
30 import club.wpia.gigi.util.ServerConstants.Host;
33 * This class represents a form that is used for issuing certificates. This
34 * class uses "sun.security" and therefore needs "-XDignore.symbol.file"
36 public class CertificateIssueForm extends Form {
38 private final static Template t = new Template(CertificateIssueForm.class.getResource("CertificateIssueForm.templ"));
40 private final static Template tIni = new Template(CertificateAdd.class.getResource("RequestCertificate.templ"));
42 private AuthorizationContext c;
44 private boolean login;
46 public CertificateIssueForm(HttpServletRequest hsr) {
48 c = LoginPage.getAuthorizationContext(hsr);
51 private Certificate result;
53 public Certificate getResult() {
57 private CertificateRequest cr;
59 CertificateValiditySelector issueDate = new CertificateValiditySelector();
62 public SubmissionResult submit(HttpServletRequest req) throws GigiApiException {
63 String csr = req.getParameter("CSR");
66 cr = new CertificateRequest(c, csr);
67 // TODO cr.checkKeyStrength(out);
68 return new FormContinue();
69 } else if (cr != null) {
70 login = "1".equals(req.getParameter("login"));
71 issueDate.update(req);
72 GigiApiException error = new GigiApiException();
75 cr.update(req.getParameter("CN"), req.getParameter("hash_alg"), req.getParameter("profile"), //
76 req.getParameter("org"), req.getParameter("OU"), req.getParameter("SANs"));
77 } catch (GigiApiException e) {
81 Certificate result = null;
84 } catch (GigiApiException e) {
87 if ( !error.isEmpty() || result == null) {
91 result.setLoginEnabled(true);
93 if (req.getParameter("description") != null) {
94 String description = req.getParameter("description").trim();
95 if (description.length() > 100) {
96 throw new GigiApiException("Submitted description is longer than 100 characters.");
98 result.setDescription(description);
100 result.issue(issueDate.getFrom(), issueDate.getTo(), c.getActor()).waitFor(60000);
101 this.result = result;
102 Certificate c = result;
103 if (c.getStatus() != CertificateStatus.ISSUED) {
104 throw new PermamentFormException(new GigiApiException("Timeout while waiting for certificate."));
106 String ser = c.getSerial();
108 throw new PermamentFormException(new GigiApiException("Timeout while waiting for certificate."));
110 return new RedirectResult(Certificates.PATH + "/" + ser);
112 throw new GigiApiException("Error no action.");
114 } catch (IOException e) {
116 throw new GigiApiException("Certificate Request format is invalid.");
117 } catch (IllegalArgumentException e) {
119 throw new GigiApiException("Certificate Request format is invalid.");
120 } catch (GeneralSecurityException e) {
122 throw new GigiApiException("Certificate Request format is invalid.");
127 public void output(PrintWriter out, Language l, Map<String, Object> vars) {
129 HashMap<String, Object> vars2 = new HashMap<String, Object>(vars);
130 vars2.put("csrf", getCSRFToken());
131 vars2.put("csrf_name", getCsrfFieldName());
132 tIni.output(out, l, vars2);
135 super.output(out, l, vars);
140 protected void outputContent(PrintWriter out, Language l, Map<String, Object> vars) {
141 HashMap<String, Object> vars2 = new HashMap<String, Object>(vars);
142 StringBuffer content = new StringBuffer();
143 for (SubjectAlternateName SAN : cr.getSANs()) {
144 content.append(SAN.getType().toString().toLowerCase());
146 content.append(SAN.getName());
147 content.append('\n');
149 vars2.put("placeholderName", CertificateRequest.DEFAULT_CN);
150 if (c.getTarget() instanceof User) {
151 User target = (User) c.getTarget();
152 vars2.put("defaultName", target.getPreferredName().toString());
153 vars2.put("defaultEmail", target.getEmail());
154 Domain[] domains = target.getDomains();
155 if (domains.length > 0) {
156 vars2.put("defaultDomain", domains[0].getSuffix());
159 vars2.put("CN", cr.getName());
160 if (c.getTarget() instanceof Organisation) {
161 vars2.put("orga", "true");
162 vars2.put("department", cr.getOu());
164 vars2.put("secureHostname", new Outputable() {
167 public void output(PrintWriter out, Language l, Map<String, Object> vars) {
169 out.print(HTMLEncoder.encodeHTML("https://" + ServerConstants.getHostNamePortSecure(Host.SECURE)));
170 out.print("</code>");
173 vars2.put("validity", issueDate);
174 vars2.put("emails", content.toString());
175 vars2.put("hashs", new HashAlgorithms(cr.getSelectedDigest()));
176 vars2.put("profiles", new IterableDataset() {
178 CertificateProfile[] cps = CertificateProfile.getAll();
183 public boolean next(Language l, Map<String, Object> vars) {
184 CertificateProfile cp;
186 if (i >= cps.length) {
191 } while ( !cp.canBeIssuedBy(c.getTarget(), c.getActor()));
193 if (cp.getId() == cr.getProfile().getId()) {
194 vars.put("selected", " selected");
196 vars.put("selected", "");
198 vars.put("key", cp.getKeyName());
199 vars.put("name", cp.getVisibleName());
204 t.output(out, l, vars2);