summaryrefslogtreecommitdiff
path: root/certs/app
diff options
context:
space:
mode:
authorAzul <azul@leap.se>2013-01-26 11:23:43 +0100
committerAzul <azul@leap.se>2013-01-26 11:23:43 +0100
commit8d9c2e90b77d417f9715c95de91c629e80ca6603 (patch)
treeb449fea406e45de9e4cfd9462c4fc5cb01c74cee /certs/app
parent0f8efed9afa480174c77c89d4d9d4a40f99bddab (diff)
no need to store the cert anymore - just new initialize and send it
Diffstat (limited to 'certs/app')
-rw-r--r--certs/app/controllers/certs_controller.rb5
-rw-r--r--certs/app/models/client_certificate.rb28
2 files changed, 6 insertions, 27 deletions
diff --git a/certs/app/controllers/certs_controller.rb b/certs/app/controllers/certs_controller.rb
index 3ec2f68..6db270c 100644
--- a/certs/app/controllers/certs_controller.rb
+++ b/certs/app/controllers/certs_controller.rb
@@ -4,11 +4,8 @@ class CertsController < ApplicationController
# GET /cert
def show
- @cert = ClientCertificate.create
+ @cert = ClientCertificate.new
render :text => @cert.key + @cert.cert, :content_type => 'text/plain'
- rescue RECORD_NOT_FOUND
- flash[:error] = t(:cert_pool_empty)
- redirect_to root_path
end
end
diff --git a/certs/app/models/client_certificate.rb b/certs/app/models/client_certificate.rb
index b664ff0..b2b8c0d 100644
--- a/certs/app/models/client_certificate.rb
+++ b/certs/app/models/client_certificate.rb
@@ -9,41 +9,23 @@ require 'openssl'
require 'certificate_authority'
require 'date'
-class ClientCertificate < CouchRest::Model::Base
+class ClientCertificate
- timestamps!
-
- property :key, String # the client private RSA key
- property :cert, String # the client x509 certificate, signed by the CA
- property :valid_until, Time # expiration time of the client certificate
-
- before_validation :generate, :on => :create
-
- validates :key, :presence => true
- validates :cert, :presence => true
-
- design do
- end
-
- class << self
- def valid_attributes_hash
- {:key => "ABCD", :cert => "A123"}
- end
- end
+ attr_accessor :key # the client private RSA key
+ attr_accessor :cert # the client x509 certificate, signed by the CA
#
# generate the private key and client certificate
#
- def generate
+ def initialize
cert = CertificateAuthority::Certificate.new
# set subject
cert.subject.common_name = random_common_name
# set expiration
- self.valid_until = months_from_yesterday(APP_CONFIG[:client_cert_lifespan])
cert.not_before = yesterday
- cert.not_after = self.valid_until
+ cert.not_after = months_from_yesterday(APP_CONFIG[:client_cert_lifespan])
# generate key
cert.serial_number.number = cert_serial_number