summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTed Trask <ttrask01@yahoo.com>2015-02-02 16:16:46 -0500
committerTed Trask <ttrask01@yahoo.com>2015-02-02 16:17:27 -0500
commit7fa6abdb25ee1ea7dda9b3771d139788c120940f (patch)
tree7b05e633e96654ce19c2381e6e8f3dafce96efcc
parent2238876a4b10036a82ce3cd3e8c9c759651047e8 (diff)
downloadacf-openssl-7fa6abdb25ee1ea7dda9b3771d139788c120940f.tar.bz2
acf-openssl-7fa6abdb25ee1ea7dda9b3771d139788c120940f.tar.xz
Change basedir to cadir and restrict to within /etc/ssl/
-rw-r--r--openssl-model.lua92
-rw-r--r--openssl-read-html.lsp34
-rw-r--r--openssl-status-html.lsp12
3 files changed, 71 insertions, 67 deletions
diff --git a/openssl-model.lua b/openssl-model.lua
index 4806d9d..13eafc9 100644
--- a/openssl-model.lua
+++ b/openssl-model.lua
@@ -18,6 +18,7 @@ local configfile = "openssl-ca-acf.cnf"
local requestdir = "req/"
local certdir = "cert/"
local openssldir = "/etc/ssl/"
+local basedir = openssldir
-- Save the config in a variable so isn't loaded each and every time needed
local config = nil
@@ -33,10 +34,13 @@ local ca_mandatory_entries = { "new_certs_dir", "certificate", "private_key", "d
local initializecfe = function(self, clientdata, label)
local retval = cfe({ type="group", value={}, label=label or "" })
- retval.value.basedir = cfe({ type="hidden", label="Base Directory", key=true })
+ retval.value.cadir = cfe({ type="hidden", label="CA Directory", key=true })
self.handle_clientdata(retval, clientdata)
- if retval.value.basedir.value ~= "" then
- openssldir = posix.dirname(retval.value.basedir.value.."/tmp").."/"
+ basedir = openssldir
+ if string.find(retval.value.cadir.value, "%.%.") then
+ retval.value.cadir.errtxt = "Invalid Directory"
+ elseif retval.value.cadir.value ~= "" then
+ basedir = string.gsub(basedir..retval.value.cadir.value.."/", "//", "/")
end
return retval
end
@@ -44,7 +48,7 @@ end
-- Create a cfe with the distinguished name defaults
local getdefaults = function(self, clientdata)
local defaults = initializecfe(self, clientdata, "OpenSSL Request")
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local distinguished_name = config.req.distinguished_name or ""
-- Define the order of the parameters in the form
@@ -66,7 +70,7 @@ end
-- Validate the values of distinguished names using the min/max found in the config file
local validate_distinguished_names = function(values)
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local distinguished_name = config.req.distinguished_name or ""
local success = true
@@ -137,7 +141,7 @@ local create_subject_string = function(values, ignorevalues)
end
local getconfigentry = function(section, value)
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local result = config[section][value] or config[""][value] or ""
while string.find(result, "%$[%w_]+") do
local sub = string.match(result, "%$[%w_]+")
@@ -148,7 +152,7 @@ end
-- Find the sections of the config file that define ca's (ca -name option)
local find_ca_sections = function()
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local cert_types = {}
for section in pairs(config) do
@@ -186,7 +190,7 @@ local validate_request = function(defaults, noextensionsections)
end
if defaults.value.extensions then
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local extensions = format.parse_ini_file(defaults.value.extensions.value)
for name,value in pairs(extensions or {}) do
if name ~= "" and noextensionsections then
@@ -203,7 +207,7 @@ local validate_request = function(defaults, noextensionsections)
end
local copyca = function(cacert, cakey)
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local certpath = getconfigentry(config.ca.default_ca, "certificate")
fs.move_file(cacert, certpath)
local keypath = getconfigentry(config.ca.default_ca, "private_key")
@@ -264,7 +268,7 @@ end
local listrequests = function(user)
user = user or "*"
local list={}
- local files = posix.glob(openssldir..requestdir..user..".*\\.csr") or {}
+ local files = posix.glob(basedir..requestdir..user..".*\\.csr") or {}
for i,x in ipairs(files) do
local name = string.gsub(posix.basename(x), ".csr$", "")
local a,b,c = string.match(name, "([^%.]*)%.([^%.]*)%.([^%.]*)")
@@ -276,7 +280,7 @@ end
local listcerts = function(user)
user = user or "*"
local list={}
- local files = posix.glob(openssldir..certdir..user..".*\\.pfx") or {}
+ local files = posix.glob(basedir..certdir..user..".*\\.pfx") or {}
-- Do this in two steps - saves forking openssl for each cert, which
-- speeds things up noticably for > 100 certs
local crtlist = {}
@@ -287,7 +291,7 @@ local listcerts = function(user)
list[#list + 1] = {cert=name, user=a, certtype=b,
commonName=unhashname(c), serial=d, enddate=enddate,
daysremaining=time}
- crtlist[#crtlist+1] = "x509 -in "..openssldir..certdir..name..".crt -noout -enddate"
+ crtlist[#crtlist+1] = "x509 -in "..basedir..certdir..name..".crt -noout -enddate"
end
local out = modelfunctions.run_executable({"openssl"}, false, table.concat(crtlist, "\n").."\nexit\n")
@@ -314,7 +318,7 @@ local listcerts = function(user)
end
local listrevoked = function()
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
local databasepath = getconfigentry(config.ca.default_ca, "database")
local revoked = {}
local database = fs.read_file_as_array(databasepath) or {}
@@ -331,12 +335,12 @@ local checkenvironment = function()
local cmdline = {}
-- First check for the openssl, req, and cert directories
- errtxt[#errtxt+1], cmdline[#cmdline+1] = checkdir("openssl directory", openssldir)
- errtxt[#errtxt+1], cmdline[#cmdline+1] = checkdir("new certificate directory", openssldir..certdir)
- errtxt[#errtxt+1], cmdline[#cmdline+1] = checkdir("request directory", openssldir..requestdir)
+ errtxt[#errtxt+1], cmdline[#cmdline+1] = checkdir("openssl directory", basedir)
+ errtxt[#errtxt+1], cmdline[#cmdline+1] = checkdir("new certificate directory", basedir..certdir)
+ errtxt[#errtxt+1], cmdline[#cmdline+1] = checkdir("request directory", basedir..requestdir)
-- Then check for the config file entries
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
if config then
local chkpath = getconfigentry(config.ca.default_ca, "new_certs_dir")
@@ -384,21 +388,21 @@ end
mymodule.getstatus = function(self, clientdata)
-- set the working directory and umask once for model
posix.umask("rw-------")
- posix.chdir(openssldir)
+ posix.chdir(basedir)
local retval = initializecfe(self, clientdata, "OpenSSL status")
local value,errtxt=processinfo.package_version(packagename)
retval.value.version = cfe({ value=value, errtxt=errtxt, label="Program version", name=packagename })
- retval.value.conffile = cfe({ value=openssldir..configfile, label="Configuration file" })
+ retval.value.conffile = cfe({ value=basedir..configfile, label="Configuration file" })
retval.value.cacert = cfe({ label="CA Certificate" })
retval.value.cacertcontents = cfe({ type="longtext", label="CA Certificate contents" })
retval.value.cakey = cfe({ label="CA Key" })
- if not fs.is_file(openssldir..configfile) then
+ if not fs.is_file(basedir..configfile) then
retval.value.conffile.errtxt="File not found"
retval.value.cacert.errtxt="File not defined"
retval.value.cacertcontents.errtxt=""
retval.value.cakey.errtxt="File not defined"
else
- config = config or format.parse_ini_file(fs.read_file(openssldir..configfile) or "")
+ config = config or format.parse_ini_file(fs.read_file(basedir..configfile) or "")
if (not config) or (not config.ca) or (not config.ca.default_ca) then
retval.value.conffile.errtxt="Invalid config file"
retval.value.cacert.errtxt="File not defined"
@@ -449,7 +453,7 @@ mymodule.getreqdefaults = function(self, clientdata)
value=config.ca.default_ca, option=find_ca_sections(), seq=96 })
-- Add in the extensions
local extensions = ""
- local content = fs.read_file(openssldir..configfile) or ""
+ local content = fs.read_file(basedir..configfile) or ""
config = config or format.parse_ini_file(content)
if config.req.req_extensions then
extensions = format.get_ini_section(content, config.req.req_extensions)
@@ -464,7 +468,7 @@ mymodule.setreqdefaults = function(self, defaults)
-- If success, write the values to the config file
if success then
- local fileval = fs.read_file(openssldir..configfile) or ""
+ local fileval = fs.read_file(basedir..configfile) or ""
config = config or format.parse_ini_file(fileval)
local ext_section
if not config.req or not config.req.req_extensions then
@@ -479,7 +483,7 @@ mymodule.setreqdefaults = function(self, defaults)
fileval = format.set_ini_section(fileval, ext_section, format.dostounix(defaults.value.extensions.value))
fileval = format.update_ini_file(fileval, "ca", "default_ca", defaults.value.certtype.value)
fileval = write_distinguished_names(fileval, defaults, {"certtype", "extensions", "validdays"})
- fs.write_file(openssldir..configfile, fileval)
+ fs.write_file(basedir..configfile, fileval)
end
if not success then
@@ -515,7 +519,7 @@ mymodule.submitrequest = function(self, defaults, submit, user)
success = false
end
- local reqname = openssldir..requestdir..user.."."..defaults.value.certtype.value.."."..hashname(defaults.value.commonName.value)
+ local reqname = basedir..requestdir..user.."."..defaults.value.certtype.value.."."..hashname(defaults.value.commonName.value)
if fs.is_file(reqname..".csr") then
defaults.errtxt = "Failed to submit request\nRequest already exists"
success = false
@@ -531,7 +535,7 @@ mymodule.submitrequest = function(self, defaults, submit, user)
local subject = create_subject_string(defaults, {"password", "password_confirm", "certtype", "extensions"})
-- Generate a temp config file for this request
- local fileval = fs.read_file(openssldir..configfile) or ""
+ local fileval = fs.read_file(basedir..configfile) or ""
config = config or format.parse_ini_file(fileval)
local ext_section = "v3_req"
while config[ext_section] do ext_section = "v3_req_"..tostring(os.time()) end
@@ -596,7 +600,7 @@ mymodule.viewrequest = function(self, clientdata)
self.handle_clientdata(retval, clientdata)
local request = retval.value.request.value
- local reqpath = openssldir..requestdir .. request
+ local reqpath = basedir..requestdir .. request
local cmdresult = modelfunctions.run_executable({"openssl", "req", "-in", reqpath..".csr", "-text", "-noout"})
local a,b,c = string.match(request, "([^%.]*)%.([^%.]*)%.([^%.]*)")
retval.value.details = cfe({ type="table", value={request=request, user=a, certtype=b, commonName=unhashname(c), value=cmdresult}, label="Request Details" })
@@ -610,7 +614,7 @@ mymodule.getapproverequest = function(self, clientdata)
end
mymodule.approverequest = function(self, apprequest)
- local reqpath = openssldir..requestdir .. apprequest.value.request.value
+ local reqpath = basedir..requestdir .. apprequest.value.request.value
if fs.is_file(reqpath..".csr") then
-- Request file exists, so try to sign
local user,certtype,commonName = string.match(apprequest.value.request.value, "([^%.]*)%.([^%.]*)%.([^%.]*)")
@@ -619,7 +623,7 @@ mymodule.approverequest = function(self, apprequest)
local serialpath = getconfigentry(certtype, "serial")
local serialfile = fs.read_file(serialpath) or ""
local serial = string.match(serialfile, "%x+")
- local certname = openssldir..certdir..apprequest.value.request.value.."."..serial
+ local certname = basedir..certdir..apprequest.value.request.value.."."..serial
-- Now, sign the certificate
apprequest.descr, apprequest.errtxt = modelfunctions.run_executable({"openssl", "ca", "-config", reqpath..".cfg", "-in", reqpath..".csr", "-out", certname..".crt", "-name", certtype, "-batch"}, true)
@@ -665,11 +669,11 @@ end
mymodule.deleterequest = function(self, delrequest, submit, user)
user = user or ".*"
- if (not fs.is_file(openssldir..requestdir..delrequest.value.request.value..".csr")) or (not string.find(delrequest.value.request.value, "^"..user.."%.")) then
+ if (not fs.is_file(basedir..requestdir..delrequest.value.request.value..".csr")) or (not string.find(delrequest.value.request.value, "^"..user.."%.")) then
delrequest.value.request.errtxt = "Request not found"
delrequest.errtxt = "Failed to Delete Request"
else
- local reqpath = openssldir..requestdir..delrequest.value.request.value
+ local reqpath = basedir..requestdir..delrequest.value.request.value
os.remove(reqpath..".pwd")
os.remove(reqpath..".sbj")
os.remove(reqpath..".pem")
@@ -685,7 +689,7 @@ mymodule.viewcert = function(self, clientdata)
self.handle_clientdata(retval, clientdata)
local cert = retval.value.cert.value
- local cmdresult = modelfunctions.run_executable({"openssl", "x509", "-in", openssldir..certdir..cert..".crt", "-noout", "-text"})
+ local cmdresult = modelfunctions.run_executable({"openssl", "x509", "-in", basedir..certdir..cert..".crt", "-noout", "-text"})
local a,b,c,d = string.match(cert, "([^%.]*)%.([^%.]*)%.([^%.]*).([^%.]*)")
retval.value.details = cfe({ type="table", value={cert=cert, user=a, certtype=b, commonName=unhashname(c), serial=d, value=cmdresult}, label="Certificate Details" })
return retval
@@ -698,7 +702,7 @@ mymodule.getcert = function(self, clientdata)
local cert = retval.value.cert.value
if cert ~= "" then
- local f = fs.read_file(openssldir..certdir..cert..".pfx") or ""
+ local f = fs.read_file(basedir..certdir..cert..".pfx") or ""
local a,b,c,d = string.match(cert, "([^%.]*)%.([^%.]*)%.([^%.]*).([^%.]*)")
c = string.gsub(unhashname(c), "[^%w_-]", "")
retval.value.details = cfe({ type="raw", value=f, label=c..".pfx", option="application/x-pkcs12" })
@@ -714,7 +718,7 @@ mymodule.getrevokecert = function(self, clientdata)
end
mymodule.revokecert = function(self, revreq)
- revreq.descr, revreq.errtxt = modelfunctions.run_executable({"openssl", "ca", "-config", openssldir..configfile, "-revoke", openssldir..certdir..revreq.value.cert.value..".crt", "-batch"}, true)
+ revreq.descr, revreq.errtxt = modelfunctions.run_executable({"openssl", "ca", "-config", basedir..configfile, "-revoke", basedir..certdir..revreq.value.cert.value..".crt", "-batch"}, true)
return revreq
end
@@ -726,7 +730,7 @@ end
mymodule.deletecert = function(self, delcert)
-- The certificate will still be in the ca directories and index.txt, just not available for web interface
- local certname = openssldir..certdir..delcert.value.cert.value
+ local certname = basedir..certdir..delcert.value.cert.value
os.remove(certname..".cfg")
os.remove(certname..".crt")
os.remove(certname..".pem")
@@ -745,7 +749,7 @@ end
mymodule.renewcert = function(self, recert, submit, approve)
local success = true
local user,certtype,commonName,serialnum = string.match(recert.value.cert.value, "([^%.]*)%.([^%.]*)%.([^%.]*).([^%.]*)")
- local reqname = openssldir..requestdir..user.."."..certtype.."."..commonName
+ local reqname = basedir..requestdir..user.."."..certtype.."."..commonName
if fs.is_file(reqname..".csr") then
recert.errtxt = "Failed to submit request"
recert.value.cert.errtxt = "Request already exists"
@@ -755,7 +759,7 @@ mymodule.renewcert = function(self, recert, submit, approve)
if success then
-- Submit the request
-- First, put the subject, config file and password in place
- local certname = openssldir..certdir..recert.value.cert.value
+ local certname = basedir..certdir..recert.value.cert.value
fs.copy_file(certname..".pwd", reqname..".pwd")
fs.copy_file(certname..".sbj", reqname..".sbj")
fs.copy_file(certname..".cfg", reqname..".cfg")
@@ -800,8 +804,8 @@ mymodule.getcrl = function(self, clientdata)
local crltype = retval.value.crltype.value
if modelfunctions.validateselect(retval.value.crltype) then
retval.value.details = cfe({ type="raw", option="application/pkix-crl" })
- modelfunctions.run_executable({"openssl", "ca", "-config", openssldir..configfile, "-gencrl", "-out", openssldir.."ca-crl.crl"})
- modelfunctions.run_executable({"openssl", "crl", "-in", openssldir.."ca-crl.crl", "-out", openssldir.."ca-der-crl.crl", "-outform", "DER"})
+ modelfunctions.run_executable({"openssl", "ca", "-config", basedir..configfile, "-gencrl", "-out", basedir.."ca-crl.crl"})
+ modelfunctions.run_executable({"openssl", "crl", "-in", basedir.."ca-crl.crl", "-out", basedir.."ca-der-crl.crl", "-outform", "DER"})
if crltype == "DER" then
retval.value.details.label = "ca-der-crl.crl"
retval.value.details.value = fs.read_file(retval.value.details.label) or ""
@@ -826,8 +830,8 @@ mymodule.getca = function(self, clientdata)
retval.value.details = cfe({ type="raw", option="application/x-x509-ca-cert" })
local fname = "cacert."
if certtype == "DER" then
- if not posix.stat(openssldir.."cacert.der") then
- modelfunctions.run_executable({"openssl", "x509", "-in", openssldir.."cacert.pem", "-outform", "der", "-out", openssldir.."cacert.der"})
+ if not posix.stat(basedir.."cacert.der") then
+ modelfunctions.run_executable({"openssl", "x509", "-in", basedir.."cacert.pem", "-outform", "der", "-out", basedir.."cacert.der"})
end
fname = fname.."der"
retval.value.details.label = fname
@@ -928,7 +932,7 @@ mymodule.generateca = function(self, defaults)
-- Submit the request
local subject = create_subject_string(defaults, {"days"})
- local cmdresult = modelfunctions.run_executable({"openssl", "req", "-x509", "-nodes", "-new", "-config", openssldir..configfile, "-keyout", "/tmp/cakey.pem", "-out", "/tmp/cacert.pem", "-subj", subject, "-days", defaults.value.days.value}, true)
+ local cmdresult = modelfunctions.run_executable({"openssl", "req", "-x509", "-nodes", "-new", "-config", basedir..configfile, "-keyout", "/tmp/cakey.pem", "-out", "/tmp/cacert.pem", "-subj", subject, "-days", defaults.value.days.value}, true)
local certfilestats = posix.stat("/tmp/cacert.pem")
local keyfilestats = posix.stat("/tmp/cakey.pem")
if not certfilestats or certfilestats.size == 0 or not keyfilestats or keyfilestats.size == 0 then
@@ -955,7 +959,7 @@ end
mymodule.getconfigfile = function(self, clientdata)
local retval = initializecfe(self, clientdata, "")
- local retval2 = modelfunctions.getfiledetails(openssldir..configfile)
+ local retval2 = modelfunctions.getfiledetails(basedir..configfile)
for name,value in pairs(retval.value) do
retval2.value[name] = value
end
@@ -964,7 +968,7 @@ end
mymodule.setconfigfile = function(self, filedetails)
-- validate
- return modelfunctions.setfiledetails(self, filedetails, {openssldir..configfile})
+ return modelfunctions.setfiledetails(self, filedetails, {basedir..configfile})
end
mymodule.getenvironment = function(self, clientdata)
diff --git a/openssl-read-html.lsp b/openssl-read-html.lsp
index c188db5..4691b13 100644
--- a/openssl-read-html.lsp
+++ b/openssl-read-html.lsp
@@ -24,7 +24,7 @@
<% htmlviewfunctions.displaycommandresults({"approve", "deleterequest", "deletemyrequest", "renewcert", "requestrenewcert", "revoke", "deletecert"}, session) %>
-<% local basedir = cfe({ type="hidden", value=view.value.basedir.value }) %>
+<% local cadir = cfe({ type="hidden", value=view.value.cadir.value }) %>
<%
local label = ""
if view.value.user then
@@ -52,15 +52,15 @@ local header_level = htmlviewfunctions.displaysectionstart(cfe({label="Pending c
<%
req.value = request.request
if viewlibrary.check_permission("viewrequest") then
- htmlviewfunctions.displayitem(cfe({type="link", value={request=req, basedir=basedir}, label="", option="View", action="viewrequest"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={request=req, cadir=cadir}, label="", option="View", action="viewrequest"}), page_info, -1)
end
if viewlibrary.check_permission("approve") then
- htmlviewfunctions.displayitem(cfe({type="form", value={request=req, basedir=basedir}, label="", option="Approve", action="approve"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={request=req, cadir=cadir}, label="", option="Approve", action="approve"}), page_info, -1)
end
if viewlibrary.check_permission("deleterequest") then
- htmlviewfunctions.displayitem(cfe({type="form", value={request=req, basedir=basedir}, label="", option="Delete", action="deleterequest"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={request=req, cadir=cadir}, label="", option="Delete", action="deleterequest"}), page_info, -1)
elseif viewlibrary.check_permission("deletemyrequest") then
- htmlviewfunctions.displayitem(cfe({type="form", value={request=req, basedir=basedir}, label="", option="Delete", action="deletemyrequest"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={request=req, cadir=cadir}, label="", option="Delete", action="deletemyrequest"}), page_info, -1)
end
%>
</td>
@@ -117,21 +117,21 @@ end %>
<%
crt.value = cert.cert
if viewlibrary.check_permission("viewcert") then
- htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, basedir=basedir}, label="", option="View", action="viewcert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, cadir=cadir}, label="", option="View", action="viewcert"}), page_info, -1)
end
if viewlibrary.check_permission("getcert") then
- htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, viewtype=viewtype, basedir=basedir}, label="", option="Download", action="getcert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, viewtype=viewtype, cadir=cadir}, label="", option="Download", action="getcert"}), page_info, -1)
end
if viewlibrary.check_permission("renewcert") then
- htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, basedir=basedir}, label="", option="Renew", action="renewcert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, cadir=cadir}, label="", option="Renew", action="renewcert"}), page_info, -1)
elseif viewlibrary.check_permission("requestrenewcert") then
- htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, basedir=basedir}, label="", option="Renew", action="requestrenewcert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, cadir=cadir}, label="", option="Renew", action="requestrenewcert"}), page_info, -1)
end
if viewlibrary.check_permission("revoke") then
- htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, basedir=basedir}, label="", option="Revoke", action="revoke"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, cadir=cadir}, label="", option="Revoke", action="revoke"}), page_info, -1)
end
if viewlibrary.check_permission("deletecert") then
- htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, basedir=basedir}, label="", option="Delete", action="deletecert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, cadir=cadir}, label="", option="Delete", action="deletecert"}), page_info, -1)
end
%>
</td>
@@ -169,13 +169,13 @@ end %>
<%
crt.value = cert.cert
if viewlibrary.check_permission("viewcert") then
- htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, basedir=basedir}, label="", option="View", action="viewcert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, cadir=cadir}, label="", option="View", action="viewcert"}), page_info, -1)
end
--[[ if viewlibrary.check_permission("getcert") then
- htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, viewtype=viewtype, basedir=basedir}, label="", option="Download", action="getcert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={cert=crt, viewtype=viewtype, cadir=cadir}, label="", option="Download", action="getcert"}), page_info, -1)
end --]]
if viewlibrary.check_permission("deletecert") then
- htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, basedir=basedir}, label="", option="Delete", action="deletecert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="form", value={cert=crt, cadir=cadir}, label="", option="Delete", action="deletecert"}), page_info, -1)
end
%>
</td>
@@ -192,10 +192,10 @@ end %>
<%
if viewlibrary.check_permission("getrevoked") then
- local basedir = cfe({type="hidden", value=view.value.basedir.value})
+ local cadir = cfe({type="hidden", value=view.value.cadir.value})
htmlviewfunctions.displaysectionstart(cfe({label="Get revoked list (crl)"}), page_info, header_level)
- htmlviewfunctions.displayitem(cfe({type="link", value={crltype=cfe({type="hidden", value="PEM"}), viewtype=viewtype, basedir=basedir}, label="", option="Download PEM", action="getrevoked"}), page_info, -1)
- htmlviewfunctions.displayitem(cfe({type="link", value={crltype=cfe({type="hidden", value="DER"}), viewtype=viewtype, basedir=basedir}, label="", option="Download DER", action="getrevoked"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={crltype=cfe({type="hidden", value="PEM"}), viewtype=viewtype, cadir=cadir}, label="", option="Download PEM", action="getrevoked"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={crltype=cfe({type="hidden", value="DER"}), viewtype=viewtype, cadir=cadir}, label="", option="Download DER", action="getrevoked"}), page_info, -1)
htmlviewfunctions.displaysectionend(header_level)
end
%>
diff --git a/openssl-status-html.lsp b/openssl-status-html.lsp
index 1cd35c6..07c1646 100644
--- a/openssl-status-html.lsp
+++ b/openssl-status-html.lsp
@@ -25,7 +25,7 @@ htmlviewfunctions.displayitem(view.value.cakey)
if not view.value.version.errtxt and not view.value.conffile.errtxt then
if view.value.environment.errtxt then
if viewlibrary and viewlibrary.dispatch_component and viewlibrary.check_permission("checkenvironment") then
- viewlibrary.dispatch_component("checkenvironment", {basedir=view.value.basedir.value})
+ viewlibrary.dispatch_component("checkenvironment", {cadir=view.value.cadir.value})
end
elseif not view.value.cacert.errtxt and not view.value.cakey.errtxt then
htmlviewfunctions.displaysectionstart(view.value.cacertcontents, page_info, header_level)
@@ -33,10 +33,10 @@ if not view.value.version.errtxt and not view.value.conffile.errtxt then
htmlviewfunctions.displaysectionend(header_level)
elseif viewlibrary and viewlibrary.dispatch_component then
if viewlibrary.check_permission("putcacert") then
- viewlibrary.dispatch_component("putcacert", {basedir=view.value.basedir.value})
+ viewlibrary.dispatch_component("putcacert", {cadir=view.value.cadir.value})
end
if viewlibrary.check_permission("generatecacert") then
- viewlibrary.dispatch_component("generatecacert", {basedir=view.value.basedir.value})
+ viewlibrary.dispatch_component("generatecacert", {cadir=view.value.cadir.value})
end
end
end
@@ -45,10 +45,10 @@ end
<%
if not view.value.cacert.errtxt and viewlibrary.check_permission("downloadcacert") then
local viewtype = cfe({type="hidden", value="stream"})
- local basedir = cfe({type="hidden", value=view.value.basedir.value})
+ local cadir = cfe({type="hidden", value=view.value.cadir.value})
htmlviewfunctions.displaysectionstart(cfe({label="Download CA Cert"}), page_info, header_level)
- htmlviewfunctions.displayitem(cfe({type="link", value={certtype=cfe({type="hidden", value="PEM"}), viewtype=viewtype, basedir=basedir}, label="", option="Download PEM", action="downloadcacert"}), page_info, -1)
- htmlviewfunctions.displayitem(cfe({type="link", value={certtype=cfe({type="hidden", value="DER"}), viewtype=viewtype, basedir=basedir}, label="", option="Download DER", action="downloadcacert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={certtype=cfe({type="hidden", value="PEM"}), viewtype=viewtype, cadir=cadir}, label="", option="Download PEM", action="downloadcacert"}), page_info, -1)
+ htmlviewfunctions.displayitem(cfe({type="link", value={certtype=cfe({type="hidden", value="DER"}), viewtype=viewtype, cadir=cadir}, label="", option="Download DER", action="downloadcacert"}), page_info, -1)
htmlviewfunctions.displaysectionend(header_level)
end
%>