mirror of
				https://github.com/Ylianst/MeshCentral.git
				synced 2025-03-09 15:40:18 +00:00 
			
		
		
		
	Many fixes.
This commit is contained in:
		
							parent
							
								
									f2a4c0c652
								
							
						
					
					
						commit
						88621aaf2c
					
				
					 19 changed files with 1153 additions and 83 deletions
				
			
		|  | @ -151,7 +151,7 @@ module.exports.CertificateOperations = function () { | |||
|         var certargs = args.cert; | ||||
|         var mpscertargs = args.mpscert; | ||||
|         var strongCertificate = (args.fastcert ? false : true); | ||||
|         var rcountmax = 5; | ||||
|         var rcountmax = 4; | ||||
|         var caindex = 1; | ||||
|         var caok = false; | ||||
|         var calist = []; | ||||
|  | @ -197,12 +197,6 @@ module.exports.CertificateOperations = function () { | |||
|             rcount++; | ||||
|         } | ||||
| 
 | ||||
|         // If the console certificate already exist, load it
 | ||||
|         if (obj.fileExists(parent.getConfigFilePath("amtconsole-cert-public.crt")) && obj.fileExists(parent.getConfigFilePath("agentserver-cert-private.key"))) { | ||||
|             r.console = { cert: obj.fs.readFileSync(parent.getConfigFilePath("amtconsole-cert-public.crt"), "utf8"), key: obj.fs.readFileSync(parent.getConfigFilePath("amtconsole-cert-private.key"), "utf8") }; | ||||
|             rcount++; | ||||
|         } | ||||
| 
 | ||||
|         // If the swarm server certificate exist, load it (This is an optional certificate)
 | ||||
|         if (obj.fileExists(parent.getConfigFilePath("swarmserver-cert-public.crt")) && obj.fileExists(parent.getConfigFilePath("swarmserver-cert-private.key"))) { | ||||
|             r.swarmserver = { cert: obj.fs.readFileSync(parent.getConfigFilePath("swarmserver-cert-public.crt"), "utf8"), key: obj.fs.readFileSync(parent.getConfigFilePath("swarmserver-cert-private.key"), "utf8") }; | ||||
|  | @ -285,8 +279,6 @@ module.exports.CertificateOperations = function () { | |||
|         } | ||||
| 
 | ||||
|         if (rcount === rcountmax) { | ||||
|             // Fetch the Intel AMT console name
 | ||||
|             r.AmtConsoleName = obj.pki.certificateFromPem(r.console.cert).subject.getField("CN").value; | ||||
|             // Fetch the Intel AMT MPS common name
 | ||||
|             r.AmtMpsName = obj.pki.certificateFromPem(r.mps.cert).subject.getField("CN").value; | ||||
|             // Fetch the name of the server
 | ||||
|  | @ -396,24 +388,7 @@ module.exports.CertificateOperations = function () { | |||
|             mpsPrivateKey = r.mps.key; | ||||
|         } | ||||
| 
 | ||||
|         // If the Intel AMT console certificate does not exist, create one
 | ||||
|         var consoleCertAndKey, consoleCertificate, consolePrivateKey, amtConsoleName = "MeshCentral"; | ||||
|         if (r.console == null) { | ||||
|             console.log("Generating Intel AMT console certificate..."); | ||||
|             consoleCertAndKey = obj.IssueWebServerCertificate(rootCertAndKey, false, amtConsoleName, country, organization, { name: "extKeyUsage", clientAuth: true, "2.16.840.1.113741.1.2.1": true, "2.16.840.1.113741.1.2.2": true, "2.16.840.1.113741.1.2.3": true }, false); // Intel AMT Remote, Agent and Activation usages
 | ||||
|             consoleCertificate = obj.pki.certificateToPem(consoleCertAndKey.cert); | ||||
|             consolePrivateKey = obj.pki.privateKeyToPem(consoleCertAndKey.key); | ||||
|             obj.fs.writeFileSync(parent.getConfigFilePath("amtconsole-cert-public.crt"), consoleCertificate); | ||||
|             obj.fs.writeFileSync(parent.getConfigFilePath("amtconsole-cert-private.key"), consolePrivateKey); | ||||
|         } else { | ||||
|             // Keep the console certificate we have
 | ||||
|             consoleCertAndKey = { cert: obj.pki.certificateFromPem(r.console.cert), key: obj.pki.privateKeyFromPem(r.console.key) }; | ||||
|             consoleCertificate = r.console.cert; | ||||
|             consolePrivateKey = r.console.key; | ||||
|             amtConsoleName = consoleCertAndKey.cert.subject.getField("CN").value; | ||||
|         } | ||||
| 
 | ||||
|         r = { root: { cert: rootCertificate, key: rootPrivateKey }, web: { cert: webCertificate, key: webPrivateKey, ca: [] }, mps: { cert: mpsCertificate, key: mpsPrivateKey }, agent: { cert: agentCertificate, key: agentPrivateKey }, console: { cert: consoleCertificate, key: consolePrivateKey }, ca: calist, CommonName: commonName, RootName: rootName, AmtConsoleName: amtConsoleName, AmtMpsName: mpsCommonName, dns: {}, WebIssuer: webIssuer }; | ||||
|         r = { root: { cert: rootCertificate, key: rootPrivateKey }, web: { cert: webCertificate, key: webPrivateKey, ca: [] }, mps: { cert: mpsCertificate, key: mpsPrivateKey }, agent: { cert: agentCertificate, key: agentPrivateKey }, ca: calist, CommonName: commonName, RootName: rootName, AmtMpsName: mpsCommonName, dns: {}, WebIssuer: webIssuer }; | ||||
| 
 | ||||
|         // Look for domains with DNS names that have no certificates and generated them.
 | ||||
|         for (i in config.domains) { | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue