summaryrefslogtreecommitdiffstats
path: root/base/common
Commit message (Collapse)AuthorAgeFilesLines
...
* ticket#882 tokendb management, policy, and activities, 1st cutChristina Fu2014-08-041-0/+19
|
* Updated man page for pki key commandsAbhishek Koneru2014-07-281-1/+1
| | | | | | | | | | Updated man page for all the new CLI commands added for the Key and KeyRequest resources. Also added missing code to retrieve a secret wrapped in a user specified passphrase. Ticket #945
* First cut of end to end enrollment feature.Jack Magne2014-07-237-11/+55
| | | | | | | | | | | | | | | | | The following features implemented for enrollment. 1. Standard enrollment of a list of RSA certificates. 2. Certificates are only done with token side keygen. 3. Minimual enrollment based pin reset functionality implemented to create a pin for the enrolled token. 4. Much work done to the PKCS11 object code, which allows us to write the compressed object blob to the token, allowing coolkey to access it and use the certs and keys on the token. 5. Tested with Bob Relyea's "smartcard" utility to prove that signing and encryption operations worked as expected. 6. Some work done to get authentication working with esc. 7. Added stub for stand alone Pin Reset processor. 8. CFU review fixes.
* Add ability to create database as subtree of existing treeAde Lee2014-07-172-11/+47
| | | | | | | | | | | | | | | | This patch adds the ability to create a subsystem that uses an existing subtree to create the internal basedn. This is useful for instance, for IPA which will use the original o=ipaca as the top level DN for a KRA, which will be situated at o=ipadrm, o=ipaca. The patch also allows such a system to be cloned, but not to setup the replication agreements, on the assumption that the data is already being replicated at the top-level DN or some higher level. The patch also contains some minor cleanups - removing unused imports and removal of an invalid reference in the python code. Ticket 1051
* Refactoring ProfileClient to remove the property fields.Abhishek Koneru2014-07-114-347/+147
| | | | | | | | | | | | | Replaced the usage of python property feature with a dict for attribute name conversion. Fixed an issue caused to traversing the NOTYPES dict in encoder.py to find the instance of an object. The traversal causes an issue in the presence of subclassing. Modified method attr_name_conversion to return a new dictionary with modified attribute names rather than making changes to the object's __dict__.
* Fixed transport certificate delimiters.Endi S. Dewata2014-07-092-4/+4
| | | | | | | | | | The REST service and client library have been fixed to use the correct delimiters for transport certificate. The REST service was also modified to insert a new line between the header and the certificate data. Ticket #1063
* Refactored SystemCertClient.get_transport_cert().Endi S. Dewata2014-07-073-3/+10
| | | | | | | | | | | | | | | To simplify the usage, the SystemCertClient.get_transport_cert() has been modified to parse and decode the PEM certificate in CertData object, store the DER certificate back into the object, and return the CertData object to the client. This way the client will have access to the certificate attributes and both PEM and DER certificates. The PKIService.sendConditionalGetResponse() has been fixed to use the requested format. This is needed to display the transport certificate properly in the browser. Ticket #1062
* Renamed CryptoUtil to CryptoProvider.Endi S. Dewata2014-07-033-9/+9
| | | | | | | | The CryptoUtil classes in the Python client library has been renamed to CryptoProvider for consistency with the Java client library. The cryptoutil.py module has been renamed to crypto.py. Ticket #1042
* Added methods for providing file input for profile request.Abhishek Koneru2014-07-012-102/+541
| | | | | | Added new methods to allow user to provide file input to perform operations like create profile/modify profile. The supported file formats a re xml and json.
* Implemented remaining of the ProfileClient API.Abhishek Koneru2014-07-013-20/+225
| | | | | Provides methods to create/modify/delete a profile. Also adds put and delete methods to the PKIConnection object.
* Fixes for #1040 and #1041 in cert and key python modulesAbhishek Koneru2014-06-274-286/+175
| | | | | | | | | | Ticket 1040 - Perform null checks on JSON attributes. Ticket 1041 - Rename module kraclient to kra. Also refactored the code in cert module removing the usage of property. Achieved the conversion of names(camelCase to '_' separated ) using a dictionaries in the objects. The default method in encoder module has also been modified to perform the reverse conversion.
* Swap numeric values of OBNOXIOUS and INFO debug logging for correctnessMatthew Harmsen2014-06-251-2/+2
| | | | * PKI TRAC Ticket #898 - Giant /var/log/pki-ca/debug
* Fixed missing TPS activity attributes.Endi S. Dewata2014-06-241-3/+50
| | | | | | | | The ActivityService has been fixed to return the missing TPS activity attributes including IP, operation, result, and message. The TPS CLI and UI has been fixed to display the activity date in UTC format. Ticket #1050
* Fixed NumberFormatException in key-request-find.Endi S. Dewata2014-06-202-1/+5
| | | | | | | | | | | Previously if a key archival failed, the REST service would return an invalid key URL, which would cause an exception when the CLI tried to parse it. The service has been fixed to return a null URL which can be detected to avoid parsing invalid value. The Python library has been modified to handle missing key URL. Ticket #1043
* ticket #941 Part1 TPS Rewrite: Enrollment, Recovery, KeyRecovery, ↵Christina Fu2014-06-161-1/+3
| | | | revoke/unrevoke processor
* Fix identities for security data storage, retrieval and generationAde Lee2014-06-131-0/+3
| | | | | | | | | | | | For the new security data storage and retrieval, and for symmetric key generation, we need to store the identity of the agent that is requesting and approving each operation, both in the ldap record and in the audit logs. (Tickets 806 and 807) This patch also adds required logic to check that the owner of the recovery request is the same agent that retrieves the key. It also adds missing audit log constants for symmmetric key generation so that they will show up in the audit log.
* Initial enrollment progress.Jack Magne2014-06-0621-52/+123
| | | | | | | | | | | | 1. Changed the names of some message classes. 2. Did some minor refactoring of methods needed by both the enroll and tps processor. 3. Created classes to handle the parsing and archival of PKCS#11 token data. 4. Created prep code for enrollment that reads in a bunch of config params and creates convenience objects to carry the data instead of lengthy parameter lists we have had before. 5. Code to generate key on token, tested tpsclient so far. 6. Additional review changes, and merging. Review changes.
* Addressed comments given for patches 92-2, 93, 94.Abhishek Koneru2014-06-034-230/+417
| | | | | | | Addressed review comments for the patches that implement the CertClient and a part of ProfileClient. Also includes the pycharm project files in pki/.idea.
* Initial patch for ProfileClient implementationAbhishek Koneru2014-06-031-1/+356
| | | | | | | This patch adds methods for listing profiles, retrieving aprofile, enabling a profile and disabling a profile. It also contains few cosmetic changes in account.py and client.py(pycharm PEP8 warnings addressed)
* Added methods in CertClient for CertRequestResourceAbhishek Koneru2014-06-032-10/+1261
| | | | | | | | | Adds the methods for fetching the enrollment templates, creating the enrollment requests, submitting the requests, performing actions(approve, reject, cancel etc.) on the requests. Also defined the classes needed for representing data used to perform the above mentioned operations.
* formatting fixes in python client code for pycharmAde Lee2014-05-2911-303/+427
|
* latest changes for code reviewAde Lee2014-05-292-37/+56
|
* Added security domain functionality to python APIAde Lee2014-05-291-5/+44
| | | | | | | | | Currently the security domain python API just extracts the security domain name from the json returned by the server. This patch allows it to extract and use all the information in the response. This info is needed to determine the state of the security domain for the IPA vault case.
* fix issues identified by pycharm for system.pyAde Lee2014-05-291-15/+15
|
* Fix formatting issues identified by pycharm in key.pyAde Lee2014-05-291-141/+161
|
* Implemented CertResource methods in CertClient on the python side.Abhishek Koneru2014-05-294-139/+424
| | | | | | | | The methods currently implemented in the CertClient are: get_cert(), review_cert(), list_certs(), revoke_cert(), revoke_ca_cert(), hold_cert(), unrevoke_cert() Also included some test code in main method.
* Removed requestID parameter usage in [un]revoke request.Abhishek Koneru2014-05-164-148/+3
| | | | | | | | | | | | | | | | There seems to be no use of the requestID parameter in both revoke and unrevoke request. Removed requestID attribute in CertRevokeRequest remove the class CertUnrevokeRequest. Also made changes in RevocationProcesor to use the requestID of the request created in it. The setRequestID() is being called in the DoRevoke and DoUnRevoke servlets. Removed the call and a function auditRequesterId in both the classes. The auditRequestorId method tries to get a "requestID" stored as a INPUT field in the reasonToRequest page. The ReasonToRevoke class which generates this page does not set the value.
* Ticket #879 TPS Rewrite: User Authentication FrameworkChristina Fu2014-05-133-0/+22
| | | | | | | | | This patch provides the framework that allows people to 1. write their own authentication plugins using the authentication plugin framework 2. map the authenticaiton credential from client side (e.g. ESC or alike) in both display language characters and numbers of credential parameters to the specified authentication plugin required parameters.
* Renamed TPS connection to TPS connector (part 4).Endi S. Dewata2014-05-082-28/+28
| | | | | | The TPS connection REST service has been renamed to TPS connector. Ticket #977
* Renamed TPS connection to TPS connector (part 3).Endi S. Dewata2014-05-085-45/+45
| | | | | | The TPS connection client library has been renamed to TPS connector. Ticket #977
* Added filter to UserService.findUserMemberships().Endi S. Dewata2014-05-083-3/+5
| | | | | | | | The UserService.findUserMemberships() has been modified to accept an additional parameter to filter the groups in which the user is a member. The CLI has been updated accordingly. Ticket #920
* Added filter to GroupService.findGroupMembers().Endi S. Dewata2014-05-082-2/+7
| | | | | | | | The GroupService.findGroupMembers() has been modified to accept an additional parameter to filter the group members to be returned. The CLI has been modified accordingly. Ticket #920
* Fixed message format for PKIException.Endi S. Dewata2014-05-071-14/+0
| | | | | | | | | | | Previously PKIException was not displayed properly in browser because it doesn't have a writer for HTML. Now the exception mapper will compute the message format properly, and will default to XML. The exception mapper itself has been moved into a server package due to class dependency. The REST application classes have been updated accordingly. Ticket #554
* Fixed UGSubsystem.getUser().Endi S. Dewata2014-05-051-3/+3
| | | | | | | | | | Previously the getUser() method in UGSubsystem was using findUsers() which uses a subtree search to find users. It has been replaced with a base search which is more accurate since the user DN is known. The code has also been simplified to merge the two cases where the input parameter could be a user ID or a DN. Ticket #920
* Support for Applet Upgrade and Format.Jack Magne2014-04-303-3/+21
| | | | | | | | | | | | | | | | | | | | The following changes have been done: 1. Applet Upgrade for real token. The applet is written and an instance of applet created. 2. 95% of the format operation done. This includes proper status update progreass bar for esc and writing the phone home url to the token. Once this operation is complete, the token can be entered into esc and esc will be able to phone home and point to TPS for further operations such as enrollment and pin reset when they are implemented. 3. The phoneHome xml file changed slightly to prevent esc from reading exttraneous line feeds when phoning home. 4. The CS.cfg has been changed to correctly reflect the phone home url we want to write to the token. The following to be done to fully finish format, later tickets. 1.Updating the tokendb with tne newly formatted token. Future ticket. 2.Revoking tokens current certificates, if any. Future ticket. 3.Symmetric Key changeover. Future ticket.
* Fixed TPS connector configuration.Endi S. Dewata2014-04-302-14/+44
| | | | | | | | | | | | | | | | | | | | The code that configures the TPS connectors during installation has been modified to use the ConnectionDatabase, which is also used by the CLI/UI after the installation. The code has also been fixed to configure the correct properties as defined in CS.cfg. The static properties have been removed from CS.cfg because now they will be generated dynamically by the ConnectionDatabase. Due to class dependency issue, the methods for configuring the TPS connectors have been moved from ConfigurationUtils into a new TPSInstaller class. The URI's in ConfigurationRequest have been converted from String into URI to simplify validation. Ticket #890
* Updated REST interface for security domain.Endi S. Dewata2014-04-282-4/+13
| | | | | | | The REST interface for security domain has been modified to return Response objects to allow better handling of server responses. Ticket #554
* Secure Channel final steps.Jack Magne2014-04-281-17/+4
| | | | | | | | | | | | | This patch allows the current secure channel functionality to work with both tpsclient and esc. In order to get esc to work the following changes were needed. 1. It turns out the server has been been forcing chunked encoding format upon the outgoing data. Turns out that the system already knows how to do this so we were getting double chunk size values and getting twice the amount of CRLF chars. 2. There was a minor error where I was not attempting to select the card manager applet but the coolkey applet, which does not exist yet.
* Added group members table in TPS UI.Endi S. Dewata2014-04-222-2/+4
| | | | | | | | | | A new table has been added to the group page in TPS UI for managing the group members. The addGroupMember() method in group REST interface has been fixed to accept JSON request properly. Ticket #654
* Fixed user's name in TPS UI.Endi S. Dewata2014-04-213-3/+220
| | | | | | | | | | | | | | | | Previously the user's name displayed in the top right corner of the TPS UI was hardcoded to Administrator. It has been fixed to display the full name of the authenticated user obtained from the server. The login() method in the account REST service has been modified to return the account information about the user and the roles in which the user belongs. This information can later be used to further customize the behavior of the UI based on the authorization data. The PKIRealm has been modified to store the authenticated user info in the PKI principal. Ticket #654
* Fixes for comments on patches 87 and 89Abhishek Koneru2014-04-1610-28/+132
|
* Added new CLI commands for Key resource.Abhishek Koneru2014-04-161-0/+21
| | | | | key-archive, key-retrieve, key-recover, key-generate, key-request-review, key-template-show, key-template-find
* New CLI commands for Key and KeyRequest resources.Abhishek Koneru2014-04-161-1/+1
| | | | | This patch adds three new CLI commands - KeyShowCLI, KeyRequestShowCLI, KeyModifyCLI
* Added enable/disable functionality for TPS audit.Endi S. Dewata2014-04-153-11/+29
| | | | | | | | | A new method has been added to TPS audit REST service to enable or disable audit logging. The CLI and UI have been modified to provide a way to acces this functionality. Also, new ACL entries have been added for audit. Ticket #955
* Added change token status dialog.Endi S. Dewata2014-04-153-24/+83
| | | | | | | | | | | | | | | | | A new dialog has been added to change the token status. The status can be changed by clicking the Status value in the tokens table. Initially the status is Uninitialized. The status can be changed according to the allowed status transitions defined in the CS.cfg. The status and reason fields in TokenRecord is now translated into a single status field in TokenData. This way the UI only needs to handle a single status field. A new field has also been added to the database for token type. Some issues displaying and updating some token attributes have been fixed as well. Ticket #654
* Further progress Format operation.Jack Magne2014-04-1435-144/+441
| | | | | | | | | | | | 1. Read applet into memory to prepare to write to token. 2. With tpsclient create secure channel by implementing Initialize Update and ExternalAuthenticate messages. 3. Support for MAC and encryption for messages going on after secure channel has been created. 4. Implemented method to remove an aid file or instance from the token. 5. Added some symkey methods to allow TPS to manipulate session keys. 6. Performed some cfu feedback fixes such as changing al the names of APDU classes to have APDU in the name. Have not tried this with real token as of yet. The tpsclient does verify of the MAC coming from the server and decrypts encrypted messages. Decrypted messages have to be correct for the MAC verification to work. Next step will be to add the phone home servlet to the TPS and give it a try with a real token and esc.
* Added general configuration page.Endi S. Dewata2014-04-082-24/+13
| | | | | | | | | | | | | | | | | | | A new page has been added to manage general TPS configuration properties. The properties are read-only by default. In edit mode the property name will become a link which will show a dialog to edit the property value. The config REST service has been updated to use PATCH for update operation and handle possible null collection of properties. Fixed a bug in TableItem.reset() where the code didn't clear the table cell properly. Fixed a bug in ConfigDatabase.getProperties() where the code didn't handle null property key properly. Ticket #654
* Added audit page.Endi S. Dewata2014-04-082-100/+40
| | | | | | | | | | A new page has been added to the TPS UI to manage audit configuration. The audit REST service has been modified to use PATCH like the other services. The audit events will now have 3 possible values: mandatory, enabled, disabled. Mandatory events cannot be edited. Optional events can be edited in edit mode. Ticket #654
* Added profile mapping page.Endi S. Dewata2014-04-082-24/+9
| | | | | | | | A new profile mapping page has been added to TPS UI. The page is fully functional like other existing pages. The REST service for profile mappings has been updated to be more consistent with other resources. Ticket #654
* Share subsystem cert in shared tomcat instancesAde Lee2014-03-311-0/+45
| | | | | | | | | | In shared tomcat instances, we need to share the subsystem cert and not create a new one for each additional subsystem added to the instance. In addition, if the instances share the same database, then only one pkidbuser should be created with the relevant subsystem cert and seeAlso attribute. Ticket 893