#include "io/slipBio.h"
#include "config.h"
#include <internal/bio.h>
+#include <dirent.h>
+#include <crypto/X509.h>
#ifdef NO_DAEMON
#define DAEMON false
logger::note( "Signing CRLs" );
for( auto& x : CAs ) {
- logger::notef( "Checking: %s ...", x.first );
-
if( !x.second->crlNeedsResign() ) {
- logger::warnf( "Skipping Resigning CRL: %s ...", x.second->name );
continue;
}
}
}
+bool pathExists( const std::string& name ) {
+ struct stat buffer;
+ return stat( name.c_str(), &buffer ) == 0;
+}
+
+void signOCSP( std::shared_ptr<Signer> sign, std::string profileName, std::string req, std::string crtName, std::string failName ) {
+ auto cert = std::make_shared<TBSCertificate>();
+ cert->ocspCA = profileName;
+ cert->wishFrom = "now";
+ cert->wishTo = "1y";
+ cert->md = "sha512";
+
+ logger::note( "INFO: Message Digest: ", cert->md );
+
+ cert->csr_content = req;
+ cert->csr_type = "CSR";
+ auto nAVA = std::make_shared<AVA>();
+ nAVA->name = "CN";
+ nAVA->value = "OCSP Responder";
+ cert->AVAs.push_back( nAVA );
+
+ std::shared_ptr<SignedCertificate> res = sign->sign( cert );
+
+ if( !res ) {
+ writeFile( failName, "failed" );
+ logger::error( "OCSP Cert signing failed." );
+ return;
+ }
+
+ writeFile( crtName, res->certificate );
+ logger::notef( "Cert log: %s", res->log );
+}
+
+void checkOCSP( std::shared_ptr<Signer> sign ) {
+ std::unique_ptr<DIR, std::function<void( DIR * )>> dp( opendir( "ca" ), []( DIR * d ) {
+ closedir( d );
+ } );
+
+ // When opendir fails and returns 0 the unique_ptr will be considered unintialized and will not call closedir.
+ // Even if closedir would be called, according to POSIX it MAY handle nullptr properly (for glibc it does).
+ if( !dp ) {
+ logger::error( "CA directory not found" );
+ return;
+ }
+
+ struct dirent *ep;
+
+ while( ( ep = readdir( dp.get() ) ) ) {
+ if( ep->d_name[0] == '.' ) {
+ continue;
+ }
+
+ std::string profileName( ep->d_name );
+ std::string csr = "ca/" + profileName + "/ocsp.csr";
+
+ if( ! pathExists( csr ) ) {
+ continue;
+ }
+
+ std::string crtName = "ca/" + profileName + "/ocsp.crt";
+
+ if( pathExists( crtName ) ) {
+ continue;
+ }
+
+ std::string failName = "ca/" + profileName + "/ocsp.fail";
+
+ if( pathExists( failName ) ) {
+ continue;
+ }
+
+ logger::notef( "Discovered OCSP CSR that needs action: %s", csr );
+ std::string req = readFile( csr );
+ std::shared_ptr<X509Req> parsed = X509Req::parseCSR( req );
+
+ if( parsed->verify() <= 0 ) {
+ logger::errorf( "Invalid CSR for %s", profileName );
+ continue;
+ }
+
+ signOCSP( sign, profileName, req, crtName, failName );
+ }
+}
+
+
int main( int argc, const char *argv[] ) {
bool once = false;
bool resetOnly = false;
if( lastCRLCheck + 30 * 60 < current ) {
// todo set good log TODO FIXME
- sign->setLog( std::shared_ptr<std::ostream>(
- &std::cout,
- []( std::ostream* o ) {
- ( void ) o;
- } ) );
+ auto ostreamFree = []( std::ostream * o ) {
+ ( void ) o;
+ };
+ sign->setLog( std::shared_ptr<std::ostream>( &std::cout, ostreamFree ) );
checkCRLs( sign );
lastCRLCheck = current;
}
+ checkOCSP( sign );
+
std::shared_ptr<Job> job;
try {
continue;
}
- std::shared_ptr<std::ofstream> logPtr = openLogfile( std::string( "logs/" ) + job->id + std::string( "_" ) + job->warning + std::string( ".log" ) );
-
- logger::logger_set log_set( {logger::log_target( *logPtr, logger::level::debug )}, logger::auto_register::on );
+ logger::logger_set log_set( {logger::log_target( job->log, logger::level::debug )}, logger::auto_register::on );
logger::note( "TASK ID: ", job->id );
- logger::note( "TRY: ", job->warning );
+ logger::note( "TRY: ", job->attempt );
logger::note( "TARGET: ", job->target );
logger::note( "TASK: ", job->task );
logger::notef( "INFO: AVA %s: %s", AVA->name, AVA->value );
}
- logger::notef( "FINE: Found the CSR at '%s'", cert->csr );
- cert->csr_content = readFile( keyDir + "/../" + cert->csr );
logger::note( "FINE: CSR content:\n", cert->csr_content );
std::shared_ptr<SignedCertificate> res = sign->sign( cert );
logger::note( "FINE: CERTIFICATE LOG:\n", res->log,
"FINE: CERTIFICATE:\n", res->certificate );
- std::string fn = writeBackFile( job->target.c_str(), res->certificate, keyDir );
-
- if( fn.empty() ) {
- logger::error( "ERROR: Writeback of the certificate failed." );
- jp->failJob( job );
- continue;
- }
-
- res->crt_name = fn;
jp->writeBack( job, res ); //! \FIXME: Check return value
logger::note( "FINE: signing done." );
if( DAEMON ) {
jp->finishJob( job );
}
-
- continue;
} catch( std::exception& c ) {
- logger::error( "ERROR: ", c.what() );
- }
-
- try {
jp->failJob( job );
- } catch( std::exception& c ) {
logger::error( "ERROR: ", c.what() );
}
} else if( job->task == "revoke" ) {
jp->writeBackRevocation( job, timeToString( time ) );
jp->finishJob( job );
+ continue;
} catch( const std::exception& c ) {
+ jp->failJob( job );
logger::error( "Exception: ", c.what() );
}
} else {