summaryrefslogtreecommitdiffstats
path: root/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
diff options
context:
space:
mode:
authorEndi S. Dewata <edewata@redhat.com>2016-02-19 08:42:30 +0100
committerAde Lee <alee@redhat.com>2016-02-26 13:12:01 -0500
commit1d58b883ff9d0056d89d74d30f1375ab12d01f03 (patch)
treea91fabd83ddfb0e3424badb49a883acab5c71f72 /base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
parent1f2d7dbab0e6a7b26f7aa12b8a58fb4c3a6da825 (diff)
downloadpki-1d58b883ff9d0056d89d74d30f1375ab12d01f03.tar.gz
pki-1d58b883ff9d0056d89d74d30f1375ab12d01f03.tar.xz
pki-1d58b883ff9d0056d89d74d30f1375ab12d01f03.zip
Added mechanism to import system certs via PKCS #12 file.
The installation tool has been modified to provide an optional pki_server_pkcs12_path property to specify a PKCS #12 file containing certificate chain, system certificates, and third-party certificates needed by the subsystem being installed. If the pki_server_pkcs12_path is specified the installation tool will no longer download the certificate chain from the security domain directly, and it will no longer import the PKCS #12 containing the entire master NSS database specified in pki_clone_pkcs12_path. For backward compatibility, if the pki_server_pkcs12_path is not specified the installation tool will use the old mechanism to import the system certificates. The ConfigurationUtils.verifySystemCertificates() has been modified not to catch the exception to help troubleshooting. https://fedorahosted.org/pki/ticket/1742
Diffstat (limited to 'base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java')
-rw-r--r--base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java76
1 files changed, 39 insertions, 37 deletions
diff --git a/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java b/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
index 91dad159b..3c69fa75f 100644
--- a/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
+++ b/base/server/cms/src/com/netscape/cms/servlet/csadmin/ConfigurationUtils.java
@@ -252,6 +252,8 @@ public class ConfigurationUtils {
public static void importCertChain(String host, int port, String serverPath, String tag)
throws Exception {
+ CMS.debug("ConfigurationUtils.importCertChain()");
+
IConfigStore cs = CMS.getConfigStore();
ConfigCertApprovalCallback certApprovalCallback = new ConfigCertApprovalCallback();
String c = get(host, port, true, serverPath, null, certApprovalCallback);
@@ -932,44 +934,42 @@ public class ConfigurationUtils {
importKeyCert(pkeyinfo_collection, cert_collection);
}
- public static boolean isCertdbCloned() {
+ public static void verifySystemCertificates() throws Exception {
+
IConfigStore cs = CMS.getConfigStore();
- try {
- CryptoManager cm = CryptoManager.getInstance();
- String certList = cs.getString("preop.cert.list");
- String cstype = cs.getString("cs.type").toLowerCase();
- StringTokenizer st = new StringTokenizer(certList, ",");
- while (st.hasMoreTokens()) {
- String tag = st.nextToken();
- if (tag.equals("sslserver"))
- continue;
- String tokenname = cs.getString("preop.module.token", "");
- cm.getTokenByName(tokenname); // throw exception if token doesn't exist
- String name1 = "preop.master." + tag + ".nickname";
- String nickname = cs.getString(name1, "");
- if (!tokenname.equals("Internal Key Storage Token") &&
- !tokenname.equals("internal"))
- nickname = tokenname + ":" + nickname;
-
- CMS.debug("ConfigurationUtils.isCertdbCloned(): checking system certificate " + nickname);
-
- // TODO : remove this when we eliminate the extraneous nicknames
- // needed for self tests
- cs.putString(cstype + ".cert." + tag + ".nickname", nickname);
-
- X509Certificate cert = cm.findCertByNickname(nickname);
- if (cert == null) {
- CMS.debug("Missing system certificate: " + nickname);
- return false;
- }
- }
- } catch (Exception e) {
- CMS.debug(e);
- return false;
- }
+ CryptoManager cm = CryptoManager.getInstance();
+ String certList = cs.getString("preop.cert.list");
+ String cstype = cs.getString("cs.type").toLowerCase();
+ StringTokenizer st = new StringTokenizer(certList, ",");
- return true;
+ while (st.hasMoreTokens()) {
+ String tag = st.nextToken();
+ if (tag.equals("sslserver"))
+ continue;
+
+ String tokenname = cs.getString("preop.module.token", "");
+ cm.getTokenByName(tokenname); // throw exception if token doesn't exist
+
+ String name1 = "preop.master." + tag + ".nickname";
+ String nickname = cs.getString(name1, "");
+ if (!tokenname.equals("Internal Key Storage Token") &&
+ !tokenname.equals("internal"))
+ nickname = tokenname + ":" + nickname;
+
+ CMS.debug("ConfigurationUtils.verifySystemCertificates(): checking certificate " + nickname);
+
+ // TODO : remove this when we eliminate the extraneous nicknames
+ // needed for self tests
+ cs.putString(cstype + ".cert." + tag + ".nickname", nickname);
+
+ try {
+ cm.findCertByNickname(nickname);
+
+ } catch (ObjectNotFoundException e) {
+ throw new Exception("Missing system certificate: " + nickname);
+ }
+ }
}
public static void importKeyCert(
@@ -3666,10 +3666,12 @@ public class ConfigurationUtils {
String status = parser.getValue("Status");
CMS.debug("submitAdminXertRequest: status=" + status);
if (status.equals(AUTH_FAILURE)) {
- throw new EAuthException(AUTH_FAILURE);
+ throw new EAuthException("Unable to generate admin certificate: authentication failure");
+
} else if (!status.equals(SUCCESS)) {
String error = parser.getValue("Error");
- throw new IOException(error);
+ CMS.debug("Error: " + error);
+ throw new IOException("Unable to generate admin certificate: " + error);
}
IConfigStore cs = CMS.getConfigStore();