Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
M
mailinabox
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Administrator
mailinabox
Commits
7d1c0b38
Commit
7d1c0b38
authored
Oct 07, 2014
by
Joshua Tauberer
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
show SSL certificate expiration info in the control panel even long before certificates expire
parent
20892b5d
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
25 additions
and
20 deletions
+25
-20
buy_certificate.py
management/buy_certificate.py
+1
-1
status_checks.py
management/status_checks.py
+23
-18
web_update.py
management/web_update.py
+1
-1
No files found.
management/buy_certificate.py
View file @
7d1c0b38
...
...
@@ -108,7 +108,7 @@ def buy_ssl_certificate(api_key, domain, command, env):
# Check before we overwrite something we shouldn't.
if
os
.
path
.
exists
(
ssl_certificate
):
cert_status
=
check_certificate
(
None
,
ssl_certificate
,
None
)
cert_status
,
cert_status_details
=
check_certificate
(
None
,
ssl_certificate
,
None
)
if
cert_status
!=
"SELF-SIGNED"
:
print
(
"Please back up and delete the file
%
s so I can save your new certificate."
%
ssl_certificate
)
sys
.
exit
(
1
)
...
...
management/status_checks.py
View file @
7d1c0b38
...
...
@@ -360,9 +360,15 @@ def check_ssl_cert(domain, env):
# Check that the certificate is good.
cert_status
=
check_certificate
(
domain
,
ssl_certificate
,
ssl_key
)
cert_status
,
cert_status_details
=
check_certificate
(
domain
,
ssl_certificate
,
ssl_key
)
if
cert_status
==
"OK"
:
# The certificate is ok. The details has expiry info.
env
[
'out'
]
.
print_ok
(
"SSL certificate is signed & valid. "
+
cert_status_details
)
elif
cert_status
==
"SELF-SIGNED"
:
# Offer instructions for purchasing a signed certificate.
if
cert_status
==
"SELF-SIGNED"
:
fingerprint
=
shell
(
'check_output'
,
[
"openssl"
,
"x509"
,
...
...
@@ -393,13 +399,11 @@ def check_ssl_cert(domain, env):
If you receive intermediate certificates, use a text editor and paste your certificate on top and then the intermediate certificates
below it. Save the file and place it onto this machine at
%
s. Then run "service nginx restart"."""
%
ssl_certificate
)
elif
cert_status
==
"OK"
:
env
[
'out'
]
.
print_ok
(
"SSL certificate is signed & valid."
)
else
:
env
[
'out'
]
.
print_error
(
"The SSL certificate has a problem:"
)
env
[
'out'
]
.
print_error
(
"The SSL certificate has a problem: "
+
cert_status
)
if
cert_status_details
:
env
[
'out'
]
.
print_line
(
""
)
env
[
'out'
]
.
print_line
(
cert_statu
s
)
env
[
'out'
]
.
print_line
(
cert_status_detail
s
)
env
[
'out'
]
.
print_line
(
""
)
def
check_certificate
(
domain
,
ssl_certificate
,
ssl_private_key
):
...
...
@@ -444,8 +448,8 @@ def check_certificate(domain, ssl_certificate, ssl_private_key):
wildcard_domain
=
re
.
sub
(
"^[^
\
.]+"
,
"*"
,
domain
)
if
domain
is
not
None
and
domain
not
in
certificate_names
and
wildcard_domain
not
in
certificate_names
:
return
"This certificate is for the wrong domain names. It is for
%
s."
%
\
", "
.
join
(
sorted
(
certificate_names
)
)
return
(
"The certificate is for the wrong domain name. It is for
%
s."
%
", "
.
join
(
sorted
(
certificate_names
)),
None
)
# Second, check that the certificate matches the private key. Get the modulus of the
# private key and of the public key in the certificate. They should match. The output
...
...
@@ -461,7 +465,7 @@ def check_certificate(domain, ssl_certificate, ssl_private_key):
"-in"
,
ssl_certificate
,
"-noout"
,
"-modulus"
])
if
private_key_modulus
!=
cert_key_modulus
:
return
"The certificate installed at
%
s does not correspond to the private key at
%
s."
%
(
ssl_certificate
,
ssl_private_key
)
return
(
"The certificate installed at
%
s does not correspond to the private key at
%
s."
%
(
ssl_certificate
,
ssl_private_key
),
None
)
# Next validate that the certificate is valid. This checks whether the certificate
# is self-signed, that the chain of trust makes sense, that it is signed by a CA
...
...
@@ -475,7 +479,7 @@ def check_certificate(domain, ssl_certificate, ssl_private_key):
cert
=
open
(
ssl_certificate
)
.
read
()
m
=
re
.
match
(
r'(-*BEGIN CERTIFICATE-*.*?-*END CERTIFICATE-*)(.*)'
,
cert
,
re
.
S
)
if
m
==
None
:
return
"The certificate file is an invalid PEM certificate."
return
(
"The certificate file is an invalid PEM certificate."
,
None
)
mycert
,
chaincerts
=
m
.
groups
()
# This command returns a non-zero exit status in most cases, so trap errors.
...
...
@@ -491,10 +495,10 @@ def check_certificate(domain, ssl_certificate, ssl_private_key):
if
"self signed"
in
verifyoutput
:
# Certificate is self-signed.
return
"SELF-SIGNED"
return
(
"SELF-SIGNED"
,
None
)
elif
retcode
!=
0
:
# There is some unknown problem. Return the `openssl verify` raw output.
return
verifyoutput
.
strip
(
)
return
(
"There is a problem with the SSL certificate."
,
verifyoutput
.
strip
()
)
else
:
# `openssl verify` returned a zero exit status so the cert is currently
# good.
...
...
@@ -502,11 +506,12 @@ def check_certificate(domain, ssl_certificate, ssl_private_key):
# But is it expiring soon?
now
=
datetime
.
datetime
.
now
(
dateutil
.
tz
.
tzlocal
())
ndays
=
(
cert_expiration_date
-
now
)
.
days
expiry_info
=
"The certificate expires in
%
d days on
%
s."
%
(
ndays
,
cert_expiration_date
.
strftime
(
"
%
x"
))
if
ndays
<=
31
:
return
"This certificate expires in
%
d days on
%
s."
%
(
ndays
,
cert_expiration_date
.
strftime
(
"
%
x"
)
)
return
(
"The certificate is expiring soon: "
+
expiry_info
,
None
)
# Return the special OK code.
return
"OK"
return
(
"OK"
,
expiry_info
)
_apt_updates
=
None
def
list_apt_updates
(
apt_update
=
True
):
...
...
@@ -592,7 +597,7 @@ if __name__ == "__main__":
ssl_key
,
ssl_certificate
,
ssl_csr_path
=
get_domain_ssl_files
(
domain
,
env
)
if
not
os
.
path
.
exists
(
ssl_certificate
):
sys
.
exit
(
1
)
cert_status
=
check_certificate
(
domain
,
ssl_certificate
,
ssl_key
)
cert_status
,
cert_status_details
=
check_certificate
(
domain
,
ssl_certificate
,
ssl_key
)
if
cert_status
!=
"OK"
:
sys
.
exit
(
1
)
sys
.
exit
(
0
)
management/web_update.py
View file @
7d1c0b38
...
...
@@ -146,7 +146,7 @@ def get_domain_ssl_files(domain, env):
# the user has uploaded a different private key for this domain.
if
not
ssl_key_is_alt
:
from
status_checks
import
check_certificate
if
check_certificate
(
domain
,
ssl_certificate_primary
,
None
)
==
"OK"
:
if
check_certificate
(
domain
,
ssl_certificate_primary
,
None
)
[
0
]
==
"OK"
:
ssl_certificate
=
ssl_certificate_primary
# Where would the CSR go? As with the SSL cert itself, the CSR must be
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment