diff options
| author | Daniil Baturin <daniil@vyos.io> | 2023-09-28 15:43:07 +0100 | 
|---|---|---|
| committer | GitHub <noreply@github.com> | 2023-09-28 15:43:07 +0100 | 
| commit | 8ffe4a8cdd937ce3002ed95283b10acbfb9d6351 (patch) | |
| tree | 0de7eeb4769d77cd0a64c1edb40ecd162dc0d3c2 /src | |
| parent | 448c140c0717f713e0eeb5d9d9bce3f94da198f6 (diff) | |
| parent | 1ac230548c86d3308ff5b479b79b0e64b75a0e8a (diff) | |
| download | vyos-1x-8ffe4a8cdd937ce3002ed95283b10acbfb9d6351.tar.gz vyos-1x-8ffe4a8cdd937ce3002ed95283b10acbfb9d6351.zip | |
Merge pull request #2305 from sarthurdev/T5606
ipsec: T5606: Add support for whole CA chains
Diffstat (limited to 'src')
| -rwxr-xr-x | src/conf_mode/vpn_ipsec.py | 15 | 
1 files changed, 13 insertions, 2 deletions
| diff --git a/src/conf_mode/vpn_ipsec.py b/src/conf_mode/vpn_ipsec.py index fa271cbdb..9e9385ddb 100755 --- a/src/conf_mode/vpn_ipsec.py +++ b/src/conf_mode/vpn_ipsec.py @@ -29,7 +29,10 @@ from vyos.configdict import leaf_node_changed  from vyos.configverify import verify_interface_exists  from vyos.defaults import directories  from vyos.ifconfig import Interface +from vyos.pki import encode_certificate  from vyos.pki import encode_public_key +from vyos.pki import find_chain +from vyos.pki import load_certificate  from vyos.pki import load_private_key  from vyos.pki import wrap_certificate  from vyos.pki import wrap_crl @@ -431,15 +434,23 @@ def generate_pki_files_x509(pki, x509_conf):      ca_cert_name = x509_conf['ca_certificate']      ca_cert_data = dict_search_args(pki, 'ca', ca_cert_name, 'certificate')      ca_cert_crls = dict_search_args(pki, 'ca', ca_cert_name, 'crl') or [] +    ca_index = 1      crl_index = 1 +    ca_cert = load_certificate(ca_cert_data) +    pki_ca_certs = [load_certificate(ca['certificate']) for ca in pki['ca'].values()] + +    ca_cert_chain = find_chain(ca_cert, pki_ca_certs) +      cert_name = x509_conf['certificate']      cert_data = dict_search_args(pki, 'certificate', cert_name, 'certificate')      key_data = dict_search_args(pki, 'certificate', cert_name, 'private', 'key')      protected = 'passphrase' in x509_conf -    with open(os.path.join(CA_PATH, f'{ca_cert_name}.pem'), 'w') as f: -        f.write(wrap_certificate(ca_cert_data)) +    for ca_cert_obj in ca_cert_chain: +        with open(os.path.join(CA_PATH, f'{ca_cert_name}_{ca_index}.pem'), 'w') as f: +            f.write(encode_certificate(ca_cert_obj)) +        ca_index += 1      for crl in ca_cert_crls:          with open(os.path.join(CRL_PATH, f'{ca_cert_name}_{crl_index}.pem'), 'w') as f: | 
