Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
erp5
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Rafael Monnerat
erp5
Commits
203056d6
Commit
203056d6
authored
Nov 01, 2023
by
Rafael Monnerat
👻
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
erp5_certificate_authority: Verify if the returned certificated is from the expected CA
parent
f07ba7a6
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
50 additions
and
1 deletion
+50
-1
bt5/erp5_certificate_authority/DocumentTemplateItem/portal_components/document.erp5.CaucaseConnector.py
...eItem/portal_components/document.erp5.CaucaseConnector.py
+14
-1
bt5/erp5_certificate_authority/TestTemplateItem/portal_components/test.erp5.testCertificateAuthorityCaucaseConnector.py
...nts/test.erp5.testCertificateAuthorityCaucaseConnector.py
+36
-0
No files found.
bt5/erp5_certificate_authority/DocumentTemplateItem/portal_components/document.erp5.CaucaseConnector.py
View file @
203056d6
...
...
@@ -32,6 +32,7 @@ from Products.ERP5Type.XMLObject import XMLObject
from
Products.ERP5Type.Globals
import
InitializeClass
from
caucase.client
import
CaucaseClient
,
CaucaseHTTPError
from
Products.ERP5Type.Core.Workflow
import
ValidationFailed
from
caucase.utils
import
load_ca_certificate
,
load_certificate
from
six.moves
import
http_client
...
...
@@ -201,6 +202,17 @@ class CaucaseConnector(XMLObject):
ca_crt_file
.
seek
(
0
)
self
.
setCaCertificateChain
(
ca_crt_file
.
read
())
security
.
declareProtected
(
Permissions
.
ManageUsers
,
'verifyCertificate'
)
def
verifyCertificate
(
self
,
crt_pem
):
if
not
self
.
getCaCertificateChain
():
self
.
updateCACertificateChain
()
# Here we are just checking if the certificate is valid, and if the
# certificate was issued from a ca we expect, otherwise it will just fail.
load_certificate
(
crt_pem
,
[
load_ca_certificate
(
self
.
getCaCertificateChain
())],
[])
return
crt_pem
def
createCertificateSigningRequest
(
self
,
csr
):
return
self
.
_getServiceConnection
().
createCertificateSigningRequest
(
csr
)
...
...
@@ -210,7 +222,8 @@ class CaucaseConnector(XMLObject):
security
.
declareProtected
(
Permissions
.
ManageUsers
,
'getCertificate'
)
def
getCertificate
(
self
,
csr_id
):
return
self
.
_getAuthenticatedServiceConnection
().
getCertificate
(
csr_id
)
return
self
.
verifyCertificate
(
self
.
_getAuthenticatedServiceConnection
().
getCertificate
(
csr_id
))
security
.
declareProtected
(
Permissions
.
ManageUsers
,
'revokeCertificate'
)
def
revokeCertificate
(
self
,
crt_pem
,
key_pem
=
None
):
...
...
bt5/erp5_certificate_authority/TestTemplateItem/portal_components/test.erp5.testCertificateAuthorityCaucaseConnector.py
View file @
203056d6
...
...
@@ -31,6 +31,8 @@ from Products.ERP5Type.tests.ERP5TypeCaucaseTestCase import ERP5TypeCaucaseTestC
from
Products.ERP5Type.Core.Workflow
import
ValidationFailed
from
caucase.client
import
CaucaseError
from
caucase.exceptions
import
CertificateVerificationError
from
cryptography
import
x509
from
cryptography.hazmat.backends
import
default_backend
from
cryptography.hazmat.primitives
import
serialization
...
...
@@ -178,3 +180,37 @@ PB8=
-----END CERTIFICATE-----
"""
)
self
.
assertRaises
(
CaucaseError
,
self
.
caucase_connector
.
updateCACertificateChain
)
def
test_untrust
(
self
):
# Simply test
key
,
csr
=
self
.
caucase_connector
.
_createCertificateRequest
()
# Only simple test for the order of response dont change
self
.
assertIn
(
"PRIVATE KEY"
,
key
)
self
.
assertIn
(
"CERTIFICATE REQUEST"
,
csr
)
self
.
caucase_connector
.
setCaCertificateChain
(
"""-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
"""
)
csr_id
=
self
.
caucase_connector
.
createCertificateSigningRequest
(
csr
)
self
.
caucase_connector
.
createCertificate
(
csr_id
)
self
.
assertRaises
(
CertificateVerificationError
,
self
.
caucase_connector
.
getCertificate
,
csr_id
)
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment