-
Notifications
You must be signed in to change notification settings - Fork 20
/
serializers.py
164 lines (137 loc) · 6.29 KB
/
serializers.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
"""Serializers for Certificate API"""
import django_countries
from django.contrib.auth import password_validation
from django_countries.serializers import CountryFieldMixin
from rest_auth.serializers import UserDetailsSerializer
from rest_framework import serializers
from certificate_engine.types import CertificateTypes
from x509_pki.models import Certificate, DistinguishedName, KeyStore
countries = django_countries.Countries()
class DistinguishedNameSerializer(CountryFieldMixin, serializers.ModelSerializer):
class Meta:
fields = (
"commonName",
"countryName",
"stateOrProvinceName",
"localityName",
"organizationName",
"organizationalUnitName",
"emailAddress",
"subjectAltNames",
)
model = DistinguishedName
class CertificateSerializer(serializers.ModelSerializer):
dn = DistinguishedNameSerializer()
passphrase_issuer = serializers.CharField(max_length=200, required=False, allow_null=True, allow_blank=True)
passphrase_out = serializers.CharField(max_length=200, required=False, allow_null=True, allow_blank=True)
passphrase_out_confirmation = serializers.CharField(
max_length=200, required=False, allow_null=True, allow_blank=True
)
owner = serializers.HiddenField(default=serializers.CurrentUserDefault())
class Meta:
fields = (
"id",
"name",
"owner",
"parent",
"type",
"dn",
"created_at",
"expires_at",
"revoked_at",
"days_valid",
"expired",
"revoked",
"crl_distribution_url",
"ocsp_distribution_host",
"passphrase_issuer",
"passphrase_out",
"passphrase_out_confirmation",
)
model = Certificate
extra_kwargs = {
"passphrase_out": {"write_only": True},
"passphrase_out_confirmation": {"write_only": True},
"passphrase_issuer": {"write_only": True},
}
def validate_passphrase_out(self, passphrase_out):
if passphrase_out:
password_validation.validate_password(passphrase_out, self.instance)
return passphrase_out
return None
def validate_passphrase_issuer(self, passphrase_issuer):
if passphrase_issuer:
if not self.initial_data.get("parent"):
raise serializers.ValidationError(
"You should provide a parent certificate if you provide an issuer passphrase"
)
parent = Certificate.objects.get(pk=self.initial_data.get("parent"))
try:
if not parent.is_passphrase_valid(passphrase_issuer):
raise serializers.ValidationError("Passphrase incorrect. Not allowed " "to revoke your certificate")
except KeyStore.DoesNotExist:
raise serializers.ValidationError("Certificate has no cert, something went " "wrong during generation")
return passphrase_issuer
return None
def validate_passphrase_out_confirmation(self, passphrase_out_confirmation):
if passphrase_out_confirmation:
passphrase_out = self.initial_data.get("passphrase_out")
if passphrase_out and passphrase_out_confirmation and passphrase_out != passphrase_out_confirmation:
raise serializers.ValidationError("The two passphrase fields didn't match.")
password_validation.validate_password(passphrase_out_confirmation, self.instance)
return passphrase_out_confirmation
return None
def validate(self, data):
name = data.get("name")
if not name:
name = str(data.get("dn").get("commonName"))
cert_type = data.get("type")
owner = data.get("owner")
if Certificate.objects.filter(name=name, owner=owner, type=cert_type).count() > 0:
raise serializers.ValidationError(f"{dict(Certificate.TYPES)[cert_type]} " f'"{name}" already exists.')
return data
def create(self, validated_data):
dn_data = validated_data.pop("dn")
dn = DistinguishedName.objects.create(**dn_data)
certificate = Certificate.objects.create(dn=dn, **validated_data)
return certificate
class CertificateRevokeSerializer(serializers.ModelSerializer):
passphrase_issuer = serializers.CharField(max_length=200, required=True)
class Meta:
fields = ("passphrase_issuer",)
model = Certificate
extra_kwargs = {"passphrase_issuer": {"write_only": True}}
def validate_passphrase_issuer(self, passphrase_issuer):
if passphrase_issuer:
if self.instance.type == CertificateTypes.ROOT:
revoke_issuer = self.instance
else:
revoke_issuer = self.instance.parent
try:
if not revoke_issuer.is_passphrase_valid(passphrase_issuer):
raise serializers.ValidationError("Passphrase incorrect. Not allowed " "to revoke your certificate")
except KeyStore.DoesNotExist:
raise serializers.ValidationError("Certificate has no cert, something went " "wrong during generation")
return passphrase_issuer
return None
class CertificateCRLSerializer(serializers.ModelSerializer):
passphrase_issuer = serializers.CharField(max_length=200, required=True)
class Meta:
fields = ("passphrase_issuer",)
model = Certificate
extra_kwargs = {"passphrase_issuer": {"write_only": True}}
def validate_passphrase_issuer(self, passphrase_issuer):
if passphrase_issuer:
self.instance.passphrase_issuer = passphrase_issuer
if not self.instance.is_passphrase_valid():
raise serializers.ValidationError("Passphrase issuer incorrect. No permission to create CRL File")
return passphrase_issuer
return None
def update(self, instance, validated_data):
instance.passphrase_issuer = validated_data["passphrase_issuer"]
instance.generate_crl()
return instance
class UserSerializer(UserDetailsSerializer):
class Meta(UserDetailsSerializer.Meta):
fields = ("username", "email", "first_name", "last_name")
read_only_fields = ("username",)