Pending certificate requests if view.value.user then?> for = view.value.user.value ?> end ?>
if not view.value.pending or #view.value.pending.value == 0 then ?>
No certificates pending
else ?>
Action
User
Cert Type
Common Name
for i,request in ipairs(view.value.pending.value) do ?>
if session.permissions.openssl.viewrequest then
io.write(html.link{value="viewrequest?request="..request.name, label="View "})
end ?>
if session.permissions.openssl.approve then
io.write(html.link{value="approve?request="..request.name, label="Approve "})
end ?>
if session.permissions.openssl.deleterequest then
io.write(html.link{value="deleterequest?request="..request.name, label="Delete "})
elseif session.permissions.openssl.deletemyrequest then
io.write(html.link{value="deletemyrequest?request="..request.name, label="Delete "})
end ?>
= request.user ?>
= request.certtype ?>
= request.commonName ?>
end ?>
end ?>
local reverserevoked = {}
local approved = {}
local revoked = {}
if view.value.revoked and #view.value.revoked.value > 0 then
for i,serial in ipairs(view.value.revoked.value) do
reverserevoked[serial] = i
end
for i,cert in ipairs(view.value.approved.value) do
if reverserevoked[cert.serial] then
revoked[#revoked + 1] = cert
else
approved[#approved + 1] = cert
end
end
else
approved = view.value.approved.value
end ?>
Approved certificate requests if view.value.user then?> for = view.value.user.value ?> end ?>
if #approved == 0 then ?>
No certificates approved
else ?>
Action
User
Cert Type
Common Name
Serial Num
End Date
for i,cert in ipairs(approved) do ?>
class='error' end ?>>
if session.permissions.openssl.viewcert then ?>
= html.link{value="viewcert?cert="..cert.name, label="View "} ?>
end ?>
if session.permissions.openssl.getcert then ?>
= html.link{value="getcert?cert="..cert.name, label="Download "} ?>
end ?>
--[[ if session.permissions.openssl.renewcert then ?>
= html.link{value="renewcert?cert="..cert.name, label="Renew "} ?>
elseif session.permissions.openssl.requestrenewcert then ?>
= html.link{value="requestrenewcert?cert="..cert.name, label="Renew "} ?>
end --]] ?>
if session.permissions.openssl.revoke then ?>
= html.link{value="revoke?cert="..cert.name, label="Revoke "} ?>
end ?>
if session.permissions.openssl.deletecert then ?>
= html.link{value="deletecert?cert="..cert.name, label="Delete "} ?>
end ?>
= cert.user ?>
= cert.certtype ?>
= cert.commonName ?>
= tostring(tonumber('0x'..cert.serial)) ?>
= cert.enddate ?>
end ?>
end ?>
Revoked certificates if view.value.user then?> for = view.value.user.value ?> end ?>
if #revoked == 0 then ?>
No certificates revoked
else ?>
Action
User
Cert Type
Common Name
Serial Num
for i,cert in ipairs(revoked) do ?>
if session.permissions.openssl.viewcert then ?>
= html.link{value="viewcert?cert="..cert.name, label="View "} ?>
end ?>
--[[ if session.permissions.openssl.getcert then ?>
= html.link{value="getcert?cert="..cert.name, label="Download "} ?>
end --]] ?>
if session.permissions.openssl.deletecert then ?>
= html.link{value="deletecert?cert="..cert.name, label="Delete "} ?>
end ?>
= cert.user ?>
= cert.certtype ?>
= cert.commonName ?>
= tostring(tonumber('0x'..cert.serial)) ?>
end ?>
end ?>
if session.permissions.openssl.getrevoked then ?>
Get revoked list (crl)
= html.link{value="getrevoked?crltype=PEM", label="Download PEM "} ?>
= html.link{value="getrevoked?crltype=DER", label="Download DER "} ?>
= html.link{value="getrevoked", label="Import to Firefox"} ?>
end ?>