openhim-core
Version:
The OpenHIM core application that provides logging and routing of http requests
113 lines (92 loc) • 3.68 kB
JavaScript
;
Object.defineProperty(exports, "__esModule", {
value: true
});
exports.generateCert = generateCert;
var _winston = require('winston');
var _winston2 = _interopRequireDefault(_winston);
var _pem = require('pem');
var _pem2 = _interopRequireDefault(_pem);
var _keystore = require('../model/keystore');
var _utils = require('../utils');
var utils = _interopRequireWildcard(_utils);
var _authorisation = require('./authorisation');
var authorisation = _interopRequireWildcard(_authorisation);
var _util = require('util');
function _interopRequireWildcard(obj) { if (obj && obj.__esModule) { return obj; } else { var newObj = {}; if (obj != null) { for (var key in obj) { if (Object.prototype.hasOwnProperty.call(obj, key)) newObj[key] = obj[key]; } } newObj.default = obj; return newObj; } }
function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { default: obj }; }
const readCertificateInfo = (0, _util.promisify)(_pem2.default.readCertificateInfo);
const getFingerprint = (0, _util.promisify)(_pem2.default.getFingerprint);
async function generateCert(ctx) {
// Must be admin
let result;
if (authorisation.inGroup('admin', ctx.authenticated) === false) {
utils.logAndSetResponse(ctx, 403, `User ${ctx.authenticated.email} is not an admin, API access to getServerKey by id denied.`, 'info');
return;
}
const { request: { body: options } } = ctx;
if (options.type === 'server') {
_winston2.default.info('Generating server cert');
result = await generateServerCert(options, ctx);
} else {
_winston2.default.info('Generating client cert');
result = await generateClientCert(options, ctx);
}
ctx.status = 201;
ctx.body = result;
}
async function generateClientCert(options, ctx) {
const keystoreDoc = await _keystore.KeystoreModelAPI.findOne();
// Set additional options
options.selfSigned = true;
// Attempt to create the certificate
try {
ctx.body = await createCertificate(options);
const certInfo = await extractCertMetadata(ctx.body.certificate, ctx);
keystoreDoc.ca.push(certInfo);
await keystoreDoc.save();
// Add the new certificate to the keystore
ctx.status = 201;
_winston2.default.info('Client certificate created');
} catch (err) {
utils.logAndSetResponse(ctx, 'internal server error', `Could not create a client cert via the API: ${err}`, 'error');
}
return ctx.body;
}
async function generateServerCert(options, ctx) {
const keystoreDoc = await _keystore.KeystoreModelAPI.findOne();
options.selfSigned = true;
try {
ctx.body = await createCertificate(options);
keystoreDoc.cert = await extractCertMetadata(ctx.body.certificate, ctx);
keystoreDoc.key = ctx.body.key;
await keystoreDoc.save();
// Add the new certificate to the keystore
ctx.status = 201;
_winston2.default.info('Server certificate created');
} catch (err) {
utils.logAndSetResponse(ctx, 'internal server error', `Could not create a client cert via the API: ${err}`, 'error');
}
return ctx.body;
}
function createCertificate(options) {
return new Promise((resolve, reject) => {
_pem2.default.createCertificate(options, (err, cert) => {
if (err) {
return reject(err);
}
resolve({
certificate: cert.certificate,
key: cert.clientKey
});
});
});
}
async function extractCertMetadata(cert, ctx) {
const certInfo = await readCertificateInfo(cert);
const fingerprint = await getFingerprint(cert);
certInfo.data = ctx.body.certificate;
certInfo.fingerprint = fingerprint.fingerprint;
return certInfo;
}
//# sourceMappingURL=certificateAuthority.js.map