1 package org.cacert.gigi.pages.account.certs;
3 import java.io.IOException;
4 import java.io.PrintWriter;
5 import java.net.URLEncoder;
6 import java.security.GeneralSecurityException;
7 import java.security.cert.X509Certificate;
8 import java.util.HashMap;
12 import javax.servlet.ServletOutputStream;
13 import javax.servlet.http.HttpServletRequest;
14 import javax.servlet.http.HttpServletResponse;
16 import org.cacert.gigi.dbObjects.Certificate;
17 import org.cacert.gigi.dbObjects.Certificate.CertificateStatus;
18 import org.cacert.gigi.dbObjects.Certificate.SubjectAlternateName;
19 import org.cacert.gigi.dbObjects.CertificateOwner;
20 import org.cacert.gigi.dbObjects.Organisation;
21 import org.cacert.gigi.dbObjects.SupportedUser;
22 import org.cacert.gigi.dbObjects.User;
23 import org.cacert.gigi.localisation.Language;
24 import org.cacert.gigi.output.TrustchainIterable;
25 import org.cacert.gigi.output.template.Form;
26 import org.cacert.gigi.output.template.IterableDataset;
27 import org.cacert.gigi.output.template.Template;
28 import org.cacert.gigi.pages.HandlesMixedRequest;
29 import org.cacert.gigi.pages.LoginPage;
30 import org.cacert.gigi.pages.Page;
31 import org.cacert.gigi.util.AuthorizationContext;
32 import org.cacert.gigi.util.CertExporter;
33 import org.cacert.gigi.util.PEM;
35 public class Certificates extends Page implements HandlesMixedRequest {
37 private static final Template certDisplay = new Template(Certificates.class.getResource("CertificateDisplay.templ"));
39 public static final String PATH = "/account/certs";
41 public static final String SUPPORT_PATH = "/support/certs";
43 private final boolean support;
45 public Certificates(boolean support) {
46 super(support ? "Support Certificates" : "Certificates");
47 this.support = support;
51 public boolean beforeTemplate(HttpServletRequest req, HttpServletResponse resp) throws IOException {
52 if ("POST".equals(req.getMethod())) {
53 return beforePost(req, resp);
56 String pi = req.getPathInfo().substring(PATH.length());
57 if (pi.length() == 0) {
63 resp.setContentType("application/pkix-cert");
64 if (req.getParameter("install") != null) {
65 resp.setContentType("application/x-x509-user-cert");
67 if (pi.endsWith(".crt")) {
69 pi = pi.substring(0, pi.length() - 4);
70 } else if (pi.endsWith(".cer")) {
72 pi = pi.substring(0, pi.length() - 4);
76 Certificate c = Certificate.getBySerial(serial);
77 if (c == null || LoginPage.getAuthorizationContext(req).getTarget().getId() != c.getOwner().getId()) {
84 ServletOutputStream out = resp.getOutputStream();
85 boolean doChain = req.getParameter("chain") != null;
86 boolean includeAnchor = req.getParameter("noAnchor") == null;
87 boolean includeLeaf = req.getParameter("noLeaf") == null;
89 CertExporter.writeCertCrt(c, out, doChain, includeAnchor, includeLeaf);
91 CertExporter.writeCertCer(c, out, doChain, includeAnchor);
93 } catch (IllegalArgumentException e) {
96 } catch (GeneralSecurityException e) {
105 public boolean beforePost(HttpServletRequest req, HttpServletResponse resp) throws IOException {
106 if (support && "revoke".equals(req.getParameter("action"))) {
107 if (Form.getForm(req, RevokeSingleCertForm.class).submitExceptionProtected(req)) {
108 resp.sendRedirect(req.getPathInfo());
113 if ( !req.getPathInfo().equals(PATH)) {
117 if (Form.getForm(req, CertificateModificationForm.class).submitExceptionProtected(req)) {
118 resp.sendRedirect(PATH);
125 public void doPost(HttpServletRequest req, HttpServletResponse resp) throws IOException {
126 if (req.getQueryString() != null && !req.getQueryString().equals("") && !req.getQueryString().equals("withRevoked")) {
127 return;// Block actions by get parameters.
130 if (support && "revoke".equals(req.getParameter("action"))) {
131 if (Form.printFormErrors(req, resp.getWriter())) {
132 Form.getForm(req, RevokeSingleCertForm.class).output(resp.getWriter(), getLanguage(req), new HashMap<String, Object>());
136 if ( !req.getPathInfo().equals(PATH)) {
140 Form.getForm(req, CertificateModificationForm.class).output(resp.getWriter(), getLanguage(req), new HashMap<String, Object>());
144 public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException {
145 PrintWriter out = resp.getWriter();
146 String pi = req.getPathInfo().substring(PATH.length());
147 if (pi.length() != 0) {
148 pi = pi.substring(1);
151 Certificate c = Certificate.getBySerial(serial);
152 Language l = LoginPage.getLanguage(req);
154 if ( !support && (c == null || LoginPage.getAuthorizationContext(req).getTarget().getId() != c.getOwner().getId())) {
158 HashMap<String, Object> vars = new HashMap<>();
159 vars.put("serial", URLEncoder.encode(serial, "UTF-8"));
161 CertificateStatus st = c.getStatus();
164 vars.put("support", "support");
165 CertificateOwner user = c.getOwner();
166 if (st == CertificateStatus.ISSUED) {
167 if (user instanceof User) {
168 vars.put("revokeForm", new RevokeSingleCertForm(req, c, new SupportedUser((User) user, getUser(req), LoginPage.getAuthorizationContext(req).getSupporterTicketId())));
173 CertificateOwner co = c.getOwner();
174 int ownerId = co.getId();
175 vars.put("certid", c.getStatus());
176 if (co instanceof Organisation) {
177 vars.put("type", l.getTranslation("Organisation Acount"));
178 vars.put("name", Organisation.getById(ownerId).getName());
179 vars.put("link", ""); // TODO
181 vars.put("type", l.getTranslation("Personal Account"));
182 vars.put("name", User.getById(ownerId).getPreferredName());
183 vars.put("link", "/support/user/" + ownerId + "/");
185 vars.put("status", c.getStatus());
186 vars.put("DN", c.getDistinguishedName());
187 vars.put("digest", c.getMessageDigest());
188 vars.put("profile", c.getProfile().getVisibleName());
189 vars.put("fingerprint", "TBD"); // TODO function needs to be
190 // implemented in Certificate.java
193 if (st == CertificateStatus.ISSUED || st == CertificateStatus.REVOKED) {
194 X509Certificate certx = c.cert();
195 vars.put("issued", certx.getNotBefore());
196 vars.put("expire", certx.getNotAfter());
197 vars.put("cert", PEM.encode("CERTIFICATE", c.cert().getEncoded()));
199 vars.put("issued", l.getTranslation("N/A"));
200 vars.put("expire", l.getTranslation("N/A"));
201 vars.put("cert", l.getTranslation("N/A"));
203 if (st == CertificateStatus.REVOKED) {
204 vars.put("revoked", c.getRevocationDate());
206 vars.put("revoked", l.getTranslation("N/A"));
208 if (st == CertificateStatus.ISSUED || st == CertificateStatus.REVOKED) {
209 vars.put("trustchain", new TrustchainIterable(c.getParent()));
211 vars.put("cert", PEM.encode("CERTIFICATE", c.cert().getEncoded()));
212 } catch (GeneralSecurityException e) {
216 vars.put("trustchain", l.getTranslation("N/A"));
217 vars.put("cert", l.getTranslation("N/A"));
219 final List<SubjectAlternateName> san = c.getSANs();
220 vars.put("san", new IterableDataset() {
225 public boolean next(Language l, Map<String, Object> vars) {
226 if (j == san.size()) {
229 vars.put("entry", san.get(j).getName() + (j < san.size() - 1 ? ", " : ""));
234 vars.put("login", c.isLoginEnabled());
235 } catch (GeneralSecurityException e) {
238 certDisplay.output(out, getLanguage(req), vars);
243 HashMap<String, Object> vars = new HashMap<String, Object>();
244 new CertificateModificationForm(req, req.getParameter("withRevoked") != null).output(out, getLanguage(req), vars);
248 public boolean isPermitted(AuthorizationContext ac) {
253 return ac.canSupport();