openssl_csr: improve subject validation (#53198)
* Improve subject field validation. * Add country name idempotency test. * Add failed country name test. * Add changelog.
This commit is contained in:
parent
264d9a9008
commit
b2e992cecd
4 changed files with 56 additions and 4 deletions
|
@ -0,0 +1,2 @@
|
|||
bugfixes:
|
||||
- "openssl_csr - improve ``subject`` validation."
|
|
@ -484,7 +484,11 @@ class CertificateSigningRequestPyOpenSSL(CertificateSigningRequestBase):
|
|||
if entry[1] is not None:
|
||||
# Workaround for https://github.com/pyca/pyopenssl/issues/165
|
||||
nid = OpenSSL._util.lib.OBJ_txt2nid(to_bytes(entry[0]))
|
||||
OpenSSL._util.lib.X509_NAME_add_entry_by_NID(subject._name, nid, OpenSSL._util.lib.MBSTRING_UTF8, to_bytes(entry[1]), -1, -1, 0)
|
||||
if nid == 0:
|
||||
raise CertificateSigningRequestError('Unknown subject field identifier "{0}"'.format(entry[0]))
|
||||
res = OpenSSL._util.lib.X509_NAME_add_entry_by_NID(subject._name, nid, OpenSSL._util.lib.MBSTRING_UTF8, to_bytes(entry[1]), -1, -1, 0)
|
||||
if res == 0:
|
||||
raise CertificateSigningRequestError('Invalid value for subject field identifier "{0}": {1}'.format(entry[0], entry[1]))
|
||||
|
||||
extensions = []
|
||||
if self.subjectAltName:
|
||||
|
@ -766,9 +770,12 @@ class CertificateSigningRequestCryptography(CertificateSigningRequestBase):
|
|||
|
||||
def _generate_csr(self):
|
||||
csr = cryptography.x509.CertificateSigningRequestBuilder()
|
||||
csr = csr.subject_name(cryptography.x509.Name([
|
||||
cryptography.x509.NameAttribute(self._get_name_oid(entry[0]), to_text(entry[1])) for entry in self.subject
|
||||
]))
|
||||
try:
|
||||
csr = csr.subject_name(cryptography.x509.Name([
|
||||
cryptography.x509.NameAttribute(self._get_name_oid(entry[0]), to_text(entry[1])) for entry in self.subject
|
||||
]))
|
||||
except ValueError as e:
|
||||
raise CertificateSigningRequestError(str(e))
|
||||
|
||||
if self.subjectAltName:
|
||||
csr = csr.add_extension(cryptography.x509.SubjectAlternativeName([
|
||||
|
|
|
@ -206,3 +206,38 @@
|
|||
commonName: This is for Ansible
|
||||
useCommonNameForSAN: no
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
|
||||
- name: Generate CSR with country name
|
||||
openssl_csr:
|
||||
path: '{{ output_dir }}/csr4.csr'
|
||||
privatekey_path: '{{ output_dir }}/privatekey2.pem'
|
||||
country_name: de
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: country_idempotent_1
|
||||
|
||||
- name: Generate CSR with country name (idempotent)
|
||||
openssl_csr:
|
||||
path: '{{ output_dir }}/csr4.csr'
|
||||
privatekey_path: '{{ output_dir }}/privatekey2.pem'
|
||||
country_name: de
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: country_idempotent_2
|
||||
|
||||
- name: Generate CSR with country name (idempotent 2)
|
||||
openssl_csr:
|
||||
path: '{{ output_dir }}/csr4.csr'
|
||||
privatekey_path: '{{ output_dir }}/privatekey2.pem'
|
||||
subject:
|
||||
C: de
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: country_idempotent_3
|
||||
|
||||
- name: Generate CSR with country name (bad country name)
|
||||
openssl_csr:
|
||||
path: '{{ output_dir }}/csr4.csr'
|
||||
privatekey_path: '{{ output_dir }}/privatekey2.pem'
|
||||
subject:
|
||||
C: dex
|
||||
select_crypto_backend: '{{ select_crypto_backend }}'
|
||||
register: country_fail_4
|
||||
ignore_errors: yes
|
||||
|
|
|
@ -101,3 +101,11 @@
|
|||
assert:
|
||||
that:
|
||||
- csr3_cn.stdout.split('=')[-1] == 'This is for Ansible'
|
||||
|
||||
- name: Validate country name idempotency and validation
|
||||
assert:
|
||||
that:
|
||||
- country_idempotent_1 is changed
|
||||
- country_idempotent_2 is not changed
|
||||
- country_idempotent_3 is not changed
|
||||
- country_fail_4 is failed
|
||||
|
|
Loading…
Reference in a new issue