summaryrefslogtreecommitdiffstats
path: root/base/common/src/com/netscape/certsrv
Commit message (Collapse)AuthorAgeFilesLines
...
* Allow use of secure LDAPS connectionMatthew Harmsen2015-03-131-1/+1
| | | | - PKI TRAC Ticket #1144 - pkispawn needs option to specify ca cert for ldap
* Refactored CRMFPopClient.Endi S. Dewata2015-01-281-0/+22
| | | | | | | | | | | | | | | | | | The CRMFPopClient has been refactored such that it is easier to understand and reuse. The code has been fixed such that it can read a normal PEM transport certificate. It also has been fixed to parse the request submission result properly. The client-cert-request CLI command was modified to support CRMF requests. The MainCLI and ClientConfig were modified to accept a security token name. The pki_java_command_wrapper.in was modified to include the Apache Commons IO library. https://fedorahosted.org/pki/ticket/1074
* Added support for exception chains in EBaseException.Endi S. Dewata2015-01-212-23/+51
| | | | | | | | | | | The EBaseException has been modified to provide constructors that can be used to chain the cause of the exception. This way the root cause of the exception can be traced back to help troubleshooting. Some codes have been modified to utilize the proper exception chaining as examples. https://fedorahosted.org/pki/ticket/915
* Removed unnecessary EBaseException constructor.Endi S. Dewata2015-01-2114-143/+0
| | | | | | | | | The EBaseException(String msgFormat, String param) constructor has been removed because it's only used once and can be substituted with another constructor. All subclasses of EBaseException have been updated accordingly. https://fedorahosted.org/pki/ticket/915
* Removed profile input/output IDs from CLI output.Endi S. Dewata2014-11-251-0/+26
| | | | | | | | | | | | The current profile inputs/outputs do not have meaningful IDs (e.g. i1, i2, o1) and are not used by the client so they should not be displayed in the CLI output. In the future the IDs should be renamed into something meaningful (e.g. keygen, sn, cert) and the inputs/outputs should be retrieved by ID. New methods have been added to retrieve by ID. https://fedorahosted.org/pki/ticket/1147
* bugzilla 871171 (client-side code) Provide Tomcat support for TLS v1.1 and ↵Christina Fu2014-11-211-0/+19
| | | | TLS v1.2
* Bug1151147 issuerDN encoding correctionChristina Fu2014-10-231-0/+5
|
* Added CLI to import/export certificates with private keys.Endi S. Dewata2014-10-091-0/+6
| | | | | | | New CLI commands have been added to import/export certificates and private keys into/from the client security database. The CLI can also be used to generate the file needed by Python client library for client certificate authentication.
* Fix sub-CA installation with own security domainAde Lee2014-10-011-0/+15
| | | | | | | | | Installation code failed to anticipate installation of a subordinate CA that would host its own security domain. This patch includes changes to python installation code, java configuration servlet and changes to man pages. Ticket 1132
* ticket #1110 pkispawn (configuration) does not provide CA extensions in ↵Christina Fu2014-09-251-0/+40
| | | | subordinate certificate signing requests (CSR)
* Added option to import client cert from CA.Endi S. Dewata2014-09-191-0/+13
| | | | | | | | | | | | A new option has been added to the client-cert-import command to import a certificate from CA by specifying the serial number. The client-cert-import has also been modified to get the nickname of the certificate to import from the CLI argument. For backward compatibility, if no argument is specified the CLI will try to get the nickname from the authentication option (-n). Ticket #1152
* Fix kra-connector-removeAde Lee2014-09-022-8/+12
| | | | | | | | | | | | | | | | | | | | The code to remove the connector from the pki CLI was found to be broken because of invalid message type (partly due to void returns). On uninstall, we need to remove the kra-connector from all relevant CA's in the security domain. The best way to do this is to keep kra-connector info in LDAP, so that only one call is needed. Until that change has been made, we are adding a hack to remove the connector from all CA's in the secutrity domain (if it exists). Due to issues with proxy configurations, we will continue to use sslget and a url-encoded-form version of the servlet. In addition, it was found that when removing a KRA from a shared subsystem, the updateDomainXML servlet was erroneously returning failure when it was unsuccessful in removing a non-existent user from a group. Ticket 1113
* Recovery and Renewal feature:Jack Magne2014-09-021-0/+4
| | | | | | | | | | | | | | | | | | 1. Basic token key recovery functionality is there. 2. Tested with mostly the "damaged" scenerio. The low level code that writes the recovered certs to the token works and has been tested with a real token. Some of the other more obscure cases need some more testing, for instance, the temporary on hold scenario. 3. Renewal has been tested with a real token to work. 4. Much of the complex code to write cert objects and key objects, as well as importing recovered keys, has been centralized to a method. This leaves the calling code simpler and easier to trouble shoot. 5. Added a method to check token operation transition states. 6. Fixed an issue with formatting a blank token I introduced. 7. Fixed a few issues with updating certificate records for a token that were discovered. 8. Added tps code to retrieve a certificate for the recovery case. 9. Minor Review fixes.
* Makes output of secrets consistent for all clients.Abhishek Koneru2014-08-292-6/+27
| | | | | | All the secrets/keys retrieved using the client API's using Java/python clients will be of the type - byte array. This applies to output of the retrieveKey method and the public key attribute of the KeyInfo object.
* Fixes for tickets 1087, 1089, 1090, 1091.Abhishek Koneru2014-08-291-1/+1
| | | | | Addresses upstream issues in the pki key-* CLI commands. Updates the man page in all the required cases.
* Generate asymmetric keys in the DRM.Abhishek Koneru2014-08-278-100/+339
| | | | | | | | | | | | Adds methods to key client to generate asymmetric keys using algorithms RSA and DSA for a valid key sizes of 512, 1024, 2048,4096. The generated keys are archived in the database. Using the CLI, the public key(base64 encoded) can be retrieved by using the key-show command. The private key(base64 encoded) can be retrieved using the key-retrieve command. Ticket #1023
* Fixed problem emptying a field in TPS UI.Endi S. Dewata2014-08-261-2/+2
| | | | | | | | | | | | Previously emptying a field in TPS UI could not be saved because the change was not saved and sent to the server. The UI framework now has been fixed to save and send the empty field to the server such that the database can be updated properly. Additional parameters have been added to the tps-token-mod command to modify all editable fields. Ticket #1085
* Fixed missing TPS token attributes.Endi S. Dewata2014-08-151-0/+17
| | | | | | | | The missing token policy attribute has been added to token database. The REST services, CLI, and UI have been fixed accordingly. Other missing attributes in tokenRecord object class are unused. Ticket #1085
* Adds a new CLI command pki ca-kraconnector-show.Abhishek Koneru2014-08-143-0/+45
| | | | | | | The new command allows users to view the information about kra connectors registered with the CA. Ticket #479
* Add ability to create database as subtree of existing treeAde Lee2014-07-171-3/+39
| | | | | | | | | | | | | | | | This patch adds the ability to create a subsystem that uses an existing subtree to create the internal basedn. This is useful for instance, for IPA which will use the original o=ipaca as the top level DN for a KRA, which will be situated at o=ipadrm, o=ipaca. The patch also allows such a system to be cloned, but not to setup the replication agreements, on the assumption that the data is already being replicated at the top-level DN or some higher level. The patch also contains some minor cleanups - removing unused imports and removal of an invalid reference in the python code. Ticket 1051
* Fixed transport certificate delimiters.Endi S. Dewata2014-07-091-2/+2
| | | | | | | | | | The REST service and client library have been fixed to use the correct delimiters for transport certificate. The REST service was also modified to insert a new line between the header and the certificate data. Ticket #1063
* Swap numeric values of OBNOXIOUS and INFO debug logging for correctnessMatthew Harmsen2014-06-251-2/+2
| | | | * PKI TRAC Ticket #898 - Giant /var/log/pki-ca/debug
* Fixed missing TPS activity attributes.Endi S. Dewata2014-06-241-3/+50
| | | | | | | | The ActivityService has been fixed to return the missing TPS activity attributes including IP, operation, result, and message. The TPS CLI and UI has been fixed to display the activity date in UTC format. Ticket #1050
* Fixed NumberFormatException in key-request-find.Endi S. Dewata2014-06-201-0/+1
| | | | | | | | | | | Previously if a key archival failed, the REST service would return an invalid key URL, which would cause an exception when the CLI tried to parse it. The service has been fixed to return a null URL which can be detected to avoid parsing invalid value. The Python library has been modified to handle missing key URL. Ticket #1043
* Fix identities for security data storage, retrieval and generationAde Lee2014-06-131-0/+3
| | | | | | | | | | | | For the new security data storage and retrieval, and for symmetric key generation, we need to store the identity of the agent that is requesting and approving each operation, both in the ldap record and in the audit logs. (Tickets 806 and 807) This patch also adds required logic to check that the owner of the recovery request is the same agent that retrieves the key. It also adds missing audit log constants for symmmetric key generation so that they will show up in the audit log.
* Removed requestID parameter usage in [un]revoke request.Abhishek Koneru2014-05-164-148/+3
| | | | | | | | | | | | | | | | There seems to be no use of the requestID parameter in both revoke and unrevoke request. Removed requestID attribute in CertRevokeRequest remove the class CertUnrevokeRequest. Also made changes in RevocationProcesor to use the requestID of the request created in it. The setRequestID() is being called in the DoRevoke and DoUnRevoke servlets. Removed the call and a function auditRequesterId in both the classes. The auditRequestorId method tries to get a "requestID" stored as a INPUT field in the reasonToRequest page. The ReasonToRevoke class which generates this page does not set the value.
* Renamed TPS connection to TPS connector (part 4).Endi S. Dewata2014-05-082-28/+28
| | | | | | The TPS connection REST service has been renamed to TPS connector. Ticket #977
* Renamed TPS connection to TPS connector (part 3).Endi S. Dewata2014-05-085-45/+45
| | | | | | The TPS connection client library has been renamed to TPS connector. Ticket #977
* Added filter to UserService.findUserMemberships().Endi S. Dewata2014-05-083-3/+5
| | | | | | | | The UserService.findUserMemberships() has been modified to accept an additional parameter to filter the groups in which the user is a member. The CLI has been updated accordingly. Ticket #920
* Added filter to GroupService.findGroupMembers().Endi S. Dewata2014-05-082-2/+7
| | | | | | | | The GroupService.findGroupMembers() has been modified to accept an additional parameter to filter the group members to be returned. The CLI has been modified accordingly. Ticket #920
* Fixed message format for PKIException.Endi S. Dewata2014-05-071-14/+0
| | | | | | | | | | | Previously PKIException was not displayed properly in browser because it doesn't have a writer for HTML. Now the exception mapper will compute the message format properly, and will default to XML. The exception mapper itself has been moved into a server package due to class dependency. The REST application classes have been updated accordingly. Ticket #554
* Fixed UGSubsystem.getUser().Endi S. Dewata2014-05-051-3/+3
| | | | | | | | | | Previously the getUser() method in UGSubsystem was using findUsers() which uses a subtree search to find users. It has been replaced with a base search which is more accurate since the user DN is known. The code has also been simplified to merge the two cases where the input parameter could be a user ID or a DN. Ticket #920
* Fixed TPS connector configuration.Endi S. Dewata2014-04-302-14/+44
| | | | | | | | | | | | | | | | | | | | The code that configures the TPS connectors during installation has been modified to use the ConnectionDatabase, which is also used by the CLI/UI after the installation. The code has also been fixed to configure the correct properties as defined in CS.cfg. The static properties have been removed from CS.cfg because now they will be generated dynamically by the ConnectionDatabase. Due to class dependency issue, the methods for configuring the TPS connectors have been moved from ConfigurationUtils into a new TPSInstaller class. The URI's in ConfigurationRequest have been converted from String into URI to simplify validation. Ticket #890
* Updated REST interface for security domain.Endi S. Dewata2014-04-282-4/+13
| | | | | | | The REST interface for security domain has been modified to return Response objects to allow better handling of server responses. Ticket #554
* Added group members table in TPS UI.Endi S. Dewata2014-04-222-2/+4
| | | | | | | | | | A new table has been added to the group page in TPS UI for managing the group members. The addGroupMember() method in group REST interface has been fixed to accept JSON request properly. Ticket #654
* Fixed user's name in TPS UI.Endi S. Dewata2014-04-213-3/+220
| | | | | | | | | | | | | | | | Previously the user's name displayed in the top right corner of the TPS UI was hardcoded to Administrator. It has been fixed to display the full name of the authenticated user obtained from the server. The login() method in the account REST service has been modified to return the account information about the user and the roles in which the user belongs. This information can later be used to further customize the behavior of the UI based on the authorization data. The PKIRealm has been modified to store the authenticated user info in the PKI principal. Ticket #654
* Fixes for comments on patches 87 and 89Abhishek Koneru2014-04-166-28/+80
|
* Added new CLI commands for Key resource.Abhishek Koneru2014-04-161-0/+21
| | | | | key-archive, key-retrieve, key-recover, key-generate, key-request-review, key-template-show, key-template-find
* New CLI commands for Key and KeyRequest resources.Abhishek Koneru2014-04-161-1/+1
| | | | | This patch adds three new CLI commands - KeyShowCLI, KeyRequestShowCLI, KeyModifyCLI
* Added enable/disable functionality for TPS audit.Endi S. Dewata2014-04-153-11/+29
| | | | | | | | | A new method has been added to TPS audit REST service to enable or disable audit logging. The CLI and UI have been modified to provide a way to acces this functionality. Also, new ACL entries have been added for audit. Ticket #955
* Added change token status dialog.Endi S. Dewata2014-04-153-24/+83
| | | | | | | | | | | | | | | | | A new dialog has been added to change the token status. The status can be changed by clicking the Status value in the tokens table. Initially the status is Uninitialized. The status can be changed according to the allowed status transitions defined in the CS.cfg. The status and reason fields in TokenRecord is now translated into a single status field in TokenData. This way the UI only needs to handle a single status field. A new field has also been added to the database for token type. Some issues displaying and updating some token attributes have been fixed as well. Ticket #654
* Added general configuration page.Endi S. Dewata2014-04-082-24/+13
| | | | | | | | | | | | | | | | | | | A new page has been added to manage general TPS configuration properties. The properties are read-only by default. In edit mode the property name will become a link which will show a dialog to edit the property value. The config REST service has been updated to use PATCH for update operation and handle possible null collection of properties. Fixed a bug in TableItem.reset() where the code didn't clear the table cell properly. Fixed a bug in ConfigDatabase.getProperties() where the code didn't handle null property key properly. Ticket #654
* Added audit page.Endi S. Dewata2014-04-082-100/+40
| | | | | | | | | | A new page has been added to the TPS UI to manage audit configuration. The audit REST service has been modified to use PATCH like the other services. The audit events will now have 3 possible values: mandatory, enabled, disabled. Mandatory events cannot be edited. Optional events can be edited in edit mode. Ticket #654
* Added profile mapping page.Endi S. Dewata2014-04-082-24/+9
| | | | | | | | A new profile mapping page has been added to TPS UI. The page is fully functional like other existing pages. The REST service for profile mappings has been updated to be more consistent with other resources. Ticket #654
* Share subsystem cert in shared tomcat instancesAde Lee2014-03-311-0/+45
| | | | | | | | | | In shared tomcat instances, we need to share the subsystem cert and not create a new one for each additional subsystem added to the instance. In addition, if the instances share the same database, then only one pkidbuser should be created with the relevant subsystem cert and seeAlso attribute. Ticket 893
* Refactoring KeyClient class and crypto classes.Abhishek Koneru2014-03-314-74/+209
|
* Refactored TPS authenticators.Endi S. Dewata2014-03-292-24/+9
| | | | | | | | | | The TPS authenticators has been modified to use PATCH for update operation as required by Backbone. The AuthenticatorData class has been modified to accept null properties to indicate that the properties are not being updated. The AuthenticatorModel class has been modified to use JSON data type for enable and disable operations. Ticket #654
* Refactored TPS connections.Endi S. Dewata2014-03-292-24/+9
| | | | | | | | | | The TPS connections has been modified to use PATCH for update operation as required by Backbone. The ConnectionData class has been modified to accept null properties to indicate that the properties are not being updated. The ConnectionModel class has been modified to use JSON data type for enable and disable operations. Ticket #654
* Refactored TPS profiles.Endi S. Dewata2014-03-292-24/+9
| | | | | | | | | | The TPS profile has been modified to use PATCH for update operation as required by Backbone. The ProfileData class has been modified to accept null properties to indicate that the properties are not being updated. The ProfileModel class has been modified to use JSON data type for enable and disable operations. Ticket #654
* Added details page for TPS authenticators.Endi S. Dewata2014-03-291-0/+3
| | | | | | | | | | | | | | A new page has been added to view TPS authenticator details. The properties are displayed in a table which provides pagination and search functionality. Currently the page is read-only. The edit functionality will be added separately later. Previously the AuthenticatorData had a problem with JSON mapping because it incorrectly included a PropertyNames attribute. To fix the problem the class has been modified to require explicit JAXB mapping by setting the @XmlAccessorType to NONE. Ticket #654