mirror of
https://github.com/Icinga/icinga2.git
synced 2025-07-28 08:04:14 +02:00
parent
95f0a7a022
commit
578dcbe861
@ -81,7 +81,7 @@ Value RequestCertificateHandler(const MessageOrigin::Ptr& origin, const Dictiona
|
|||||||
Log(LogInformation, "JsonRpcConnection")
|
Log(LogInformation, "JsonRpcConnection")
|
||||||
<< "The certificate for CN '" << cn << "' cannot be renewed yet.";
|
<< "The certificate for CN '" << cn << "' cannot be renewed yet.";
|
||||||
result->Set("status_code", 1);
|
result->Set("status_code", 1);
|
||||||
result->Set("error", "The certificate cannot be renewed yet.");
|
result->Set("error", "The certificate for CN '" + cn + "' cannot be renewed yet.");
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -91,7 +91,7 @@ Value RequestCertificateHandler(const MessageOrigin::Ptr& origin, const Dictiona
|
|||||||
|
|
||||||
if (!X509_digest(cert.get(), EVP_sha256(), digest, &n)) {
|
if (!X509_digest(cert.get(), EVP_sha256(), digest, &n)) {
|
||||||
result->Set("status_code", 1);
|
result->Set("status_code", 1);
|
||||||
result->Set("error", "Could not calculate fingerprint for the X509 certificate.");
|
result->Set("error", "Could not calculate fingerprint for the X509 certificate for CN '" + cn + "'.");
|
||||||
|
|
||||||
Log(LogWarning, "JsonRpcConnection")
|
Log(LogWarning, "JsonRpcConnection")
|
||||||
<< "Could not calculate fingerprint for the X509 certificate requested for CN '"
|
<< "Could not calculate fingerprint for the X509 certificate requested for CN '"
|
||||||
@ -141,6 +141,7 @@ Value RequestCertificateHandler(const MessageOrigin::Ptr& origin, const Dictiona
|
|||||||
boost::shared_ptr<EVP_PKEY> pubkey;
|
boost::shared_ptr<EVP_PKEY> pubkey;
|
||||||
X509_NAME *subject;
|
X509_NAME *subject;
|
||||||
Dictionary::Ptr message;
|
Dictionary::Ptr message;
|
||||||
|
String ticket;
|
||||||
|
|
||||||
/* Check whether we are a signing instance or we
|
/* Check whether we are a signing instance or we
|
||||||
* must delay the signing request.
|
* must delay the signing request.
|
||||||
@ -151,7 +152,7 @@ Value RequestCertificateHandler(const MessageOrigin::Ptr& origin, const Dictiona
|
|||||||
if (!signedByCA) {
|
if (!signedByCA) {
|
||||||
String salt = listener->GetTicketSalt();
|
String salt = listener->GetTicketSalt();
|
||||||
|
|
||||||
String ticket = params->Get("ticket");
|
ticket = params->Get("ticket");
|
||||||
|
|
||||||
/* Auto-signing is disabled by either a) no TicketSalt
|
/* Auto-signing is disabled by either a) no TicketSalt
|
||||||
* or b) the client did not include a ticket in its request.
|
* or b) the client did not include a ticket in its request.
|
||||||
@ -166,7 +167,7 @@ Value RequestCertificateHandler(const MessageOrigin::Ptr& origin, const Dictiona
|
|||||||
<< "Ticket for CN '" << cn << "' is invalid.";
|
<< "Ticket for CN '" << cn << "' is invalid.";
|
||||||
|
|
||||||
result->Set("status_code", 1);
|
result->Set("status_code", 1);
|
||||||
result->Set("error", "Invalid ticket.");
|
result->Set("error", "Invalid ticket for CN '" + cn + "'.");
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -189,7 +190,8 @@ Value RequestCertificateHandler(const MessageOrigin::Ptr& origin, const Dictiona
|
|||||||
|
|
||||||
/* Send the signed certificate update. */
|
/* Send the signed certificate update. */
|
||||||
Log(LogInformation, "JsonRpcConnection")
|
Log(LogInformation, "JsonRpcConnection")
|
||||||
<< "Sending certificate response for CN '" << cn << "' to endpoint '" << client->GetIdentity() << "'.";
|
<< "Sending certificate response for CN '" << cn << "' to endpoint '"
|
||||||
|
<< client->GetIdentity() << "'" << (!ticket.IsEmpty() ? " (auto-signing ticket)" : "" ) << ".";
|
||||||
|
|
||||||
result->Set("cert", CertificateToString(newcert));
|
result->Set("cert", CertificateToString(newcert));
|
||||||
|
|
||||||
@ -382,6 +384,7 @@ Value UpdateCertificateHandler(const MessageOrigin::Ptr& origin, const Dictionar
|
|||||||
/* Update the certificates at runtime and reconnect all endpoints. */
|
/* Update the certificates at runtime and reconnect all endpoints. */
|
||||||
Log(LogInformation, "JsonRpcConnection")
|
Log(LogInformation, "JsonRpcConnection")
|
||||||
<< "Updating the client certificate for CN '" << cn << "' at runtime and reconnecting the endpoints.";
|
<< "Updating the client certificate for CN '" << cn << "' at runtime and reconnecting the endpoints.";
|
||||||
|
|
||||||
listener->UpdateSSLContext();
|
listener->UpdateSSLContext();
|
||||||
|
|
||||||
return Empty;
|
return Empty;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user