]> WPIA git - gigi.git/blob - src/org/cacert/gigi/pages/account/certs/Certificates.java
4db201cc38fcf4b1be4381283514a84b977dcd1c
[gigi.git] / src / org / cacert / gigi / pages / account / certs / Certificates.java
1 package org.cacert.gigi.pages.account.certs;
2
3 import java.io.IOException;
4 import java.io.PrintWriter;
5 import java.net.URLEncoder;
6 import java.security.GeneralSecurityException;
7 import java.security.cert.X509Certificate;
8 import java.util.HashMap;
9 import java.util.List;
10 import java.util.Map;
11
12 import javax.servlet.ServletOutputStream;
13 import javax.servlet.http.HttpServletRequest;
14 import javax.servlet.http.HttpServletResponse;
15
16 import org.cacert.gigi.dbObjects.Certificate;
17 import org.cacert.gigi.dbObjects.Certificate.CertificateStatus;
18 import org.cacert.gigi.dbObjects.Certificate.SubjectAlternateName;
19 import org.cacert.gigi.dbObjects.CertificateOwner;
20 import org.cacert.gigi.dbObjects.Organisation;
21 import org.cacert.gigi.dbObjects.SupportedUser;
22 import org.cacert.gigi.dbObjects.User;
23 import org.cacert.gigi.localisation.Language;
24 import org.cacert.gigi.output.TrustchainIterable;
25 import org.cacert.gigi.output.template.Form;
26 import org.cacert.gigi.output.template.IterableDataset;
27 import org.cacert.gigi.output.template.Template;
28 import org.cacert.gigi.pages.HandlesMixedRequest;
29 import org.cacert.gigi.pages.LoginPage;
30 import org.cacert.gigi.pages.Page;
31 import org.cacert.gigi.util.AuthorizationContext;
32 import org.cacert.gigi.util.CertExporter;
33 import org.cacert.gigi.util.PEM;
34
35 public class Certificates extends Page implements HandlesMixedRequest {
36
37     private static final Template certDisplay = new Template(Certificates.class.getResource("CertificateDisplay.templ"));
38
39     public static final String PATH = "/account/certs";
40
41     public static final String SUPPORT_PATH = "/support/certs";
42
43     private final boolean support;
44
45     public Certificates(boolean support) {
46         super(support ? "Support Certificates" : "Certificates");
47         this.support = support;
48     }
49
50     @Override
51     public boolean beforeTemplate(HttpServletRequest req, HttpServletResponse resp) throws IOException {
52
53         String pi = req.getPathInfo().substring(PATH.length());
54         if (pi.length() == 0) {
55             return false;
56         }
57         pi = pi.substring(1);
58         boolean crt = false;
59         boolean cer = false;
60         resp.setContentType("application/pkix-cert");
61         if (req.getParameter("install") != null) {
62             resp.setContentType("application/x-x509-user-cert");
63         }
64         if (pi.endsWith(".crt")) {
65             crt = true;
66             pi = pi.substring(0, pi.length() - 4);
67         } else if (pi.endsWith(".cer")) {
68             cer = true;
69             pi = pi.substring(0, pi.length() - 4);
70         }
71         String serial = pi;
72         try {
73             Certificate c = Certificate.getBySerial(serial);
74             if (c == null || LoginPage.getAuthorizationContext(req).getTarget().getId() != c.getOwner().getId()) {
75                 resp.sendError(404);
76                 return true;
77             }
78             if ( !crt && !cer) {
79                 return false;
80             }
81             ServletOutputStream out = resp.getOutputStream();
82             boolean doChain = req.getParameter("chain") != null;
83             boolean includeAnchor = req.getParameter("noAnchor") == null;
84             boolean includeLeaf = req.getParameter("noLeaf") == null;
85             if (crt) {
86                 CertExporter.writeCertCrt(c, out, doChain, includeAnchor, includeLeaf);
87             } else if (cer) {
88                 CertExporter.writeCertCer(c, out, doChain, includeAnchor);
89             }
90         } catch (IllegalArgumentException e) {
91             resp.sendError(404);
92             return true;
93         } catch (GeneralSecurityException e) {
94             resp.sendError(404);
95             return true;
96         }
97
98         return true;
99     }
100
101     @Override
102     public void doPost(HttpServletRequest req, HttpServletResponse resp) throws IOException {
103         if (req.getQueryString() != null && !req.getQueryString().equals("") && !req.getQueryString().equals("withRevoked")) {
104             return;// Block actions by get parameters.
105         }
106         if (support && "revoke".equals(req.getParameter("action"))) {
107             if (Form.getForm(req, RevokeSingleCertForm.class).submitProtected(resp.getWriter(), req)) {
108                 resp.sendRedirect(req.getPathInfo());
109                 return;
110             }
111         }
112         if ( !req.getPathInfo().equals(PATH)) {
113             resp.sendError(500);
114             return;
115         }
116         Form.getForm(req, CertificateModificationForm.class).submit(resp.getWriter(), req);
117
118         doGet(req, resp);
119     }
120
121     @Override
122     public void doGet(HttpServletRequest req, HttpServletResponse resp) throws IOException {
123         PrintWriter out = resp.getWriter();
124         String pi = req.getPathInfo().substring(PATH.length());
125         if (pi.length() != 0) {
126             pi = pi.substring(1);
127
128             String serial = pi;
129             Certificate c = Certificate.getBySerial(serial);
130             Language l = LoginPage.getLanguage(req);
131
132             if ( !support && (c == null || LoginPage.getAuthorizationContext(req).getTarget().getId() != c.getOwner().getId())) {
133                 resp.sendError(404);
134                 return;
135             }
136             HashMap<String, Object> vars = new HashMap<>();
137             vars.put("serial", URLEncoder.encode(serial, "UTF-8"));
138
139             CertificateStatus st = c.getStatus();
140
141             if (support) {
142                 vars.put("support", "support");
143                 CertificateOwner user = c.getOwner();
144                 if (st == CertificateStatus.ISSUED) {
145                     if (user instanceof User) {
146                         vars.put("revokeForm", new RevokeSingleCertForm(req, c, new SupportedUser((User) user, getUser(req), LoginPage.getAuthorizationContext(req).getSupporterTicketId())));
147                     }
148                 }
149             }
150
151             CertificateOwner co = c.getOwner();
152             int ownerId = co.getId();
153             vars.put("certid", c.getStatus());
154             if (co instanceof Organisation) {
155                 vars.put("type", l.getTranslation("Organisation Acount"));
156                 vars.put("name", Organisation.getById(ownerId).getName());
157                 vars.put("link", ""); // TODO
158             } else {
159                 vars.put("type", l.getTranslation("Personal Account"));
160                 vars.put("name", User.getById(ownerId).getPreferredName());
161                 vars.put("link", "/support/user/" + ownerId + "/");
162             }
163             vars.put("status", c.getStatus());
164             vars.put("DN", c.getDistinguishedName());
165             vars.put("digest", c.getMessageDigest());
166             vars.put("profile", c.getProfile().getVisibleName());
167             vars.put("fingerprint", "TBD"); // TODO function needs to be
168                                             // implemented in Certificate.java
169             try {
170
171                 if (st == CertificateStatus.ISSUED || st == CertificateStatus.REVOKED) {
172                     X509Certificate certx = c.cert();
173                     vars.put("issued", certx.getNotBefore());
174                     vars.put("expire", certx.getNotAfter());
175                     vars.put("cert", PEM.encode("CERTIFICATE", c.cert().getEncoded()));
176                 } else {
177                     vars.put("issued", l.getTranslation("N/A"));
178                     vars.put("expire", l.getTranslation("N/A"));
179                     vars.put("cert", l.getTranslation("N/A"));
180                 }
181                 if (st == CertificateStatus.REVOKED) {
182                     vars.put("revoked", c.getRevocationDate());
183                 } else {
184                     vars.put("revoked", l.getTranslation("N/A"));
185                 }
186                 if (st == CertificateStatus.ISSUED || st == CertificateStatus.REVOKED) {
187                     vars.put("trustchain", new TrustchainIterable(c.getParent()));
188                     try {
189                         vars.put("cert", PEM.encode("CERTIFICATE", c.cert().getEncoded()));
190                     } catch (GeneralSecurityException e) {
191                         e.printStackTrace();
192                     }
193                 } else {
194                     vars.put("trustchain", l.getTranslation("N/A"));
195                     vars.put("cert", l.getTranslation("N/A"));
196                 }
197                 final List<SubjectAlternateName> san = c.getSANs();
198                 vars.put("san", new IterableDataset() {
199
200                     int j = 0;
201
202                     @Override
203                     public boolean next(Language l, Map<String, Object> vars) {
204                         if (j == san.size()) {
205                             return false;
206                         }
207                         vars.put("entry", san.get(j).getName() + (j < san.size() - 1 ? ", " : ""));
208                         j++;
209                         return true;
210                     }
211                 });
212                 vars.put("login", c.isLoginEnabled());
213             } catch (GeneralSecurityException e) {
214                 e.printStackTrace();
215             }
216             certDisplay.output(out, getLanguage(req), vars);
217
218             return;
219         }
220
221         HashMap<String, Object> vars = new HashMap<String, Object>();
222         new CertificateModificationForm(req, req.getParameter("withRevoked") != null).output(out, getLanguage(req), vars);
223     }
224
225     @Override
226     public boolean isPermitted(AuthorizationContext ac) {
227         if (ac == null) {
228             return false;
229         }
230         if (support) {
231             return ac.canSupport();
232         } else {
233             return true;
234         }
235     }
236 }