/// <summary> /// WIP: For current configured environment, show preview of recommended site management (for /// local IIS, scan sites and recommend actions) /// </summary> /// <returns></returns> public async Task <List <ManagedCertificate> > PreviewManagedCertificates(StandardServerTypes serverType, ICertifiedServer serverProvider, ICertifyManager certifyManager) { var sites = new List <ManagedCertificate>(); if (serverType == StandardServerTypes.IIS) { try { var allSites = await serverProvider.GetSiteBindingList(CoreAppSettings.Current.IgnoreStoppedSites); var iisSites = allSites .OrderBy(s => s.SiteId) .ThenBy(s => s.Host); var siteIds = iisSites.GroupBy(x => x.SiteId); foreach (var s in siteIds) { var managedCertificate = new ManagedCertificate { Id = s.Key }; managedCertificate.ItemType = ManagedCertificateType.SSL_ACME; managedCertificate.TargetHost = "localhost"; managedCertificate.Name = iisSites.First(i => i.SiteId == s.Key).SiteName; //TODO: replace site binding with domain options //managedCertificate.SiteBindings = new List<ManagedCertificateBinding>(); /* foreach (var binding in s) * { * var managedBinding = new ManagedCertificateBinding { Hostname = binding.Host, IP = binding.IP, Port = binding.Port, UseSNI = true, CertName = "Certify_" + binding.Host }; * // managedCertificate.SiteBindings.Add(managedBinding); * }*/ sites.Add(managedCertificate); } } catch (Exception) { //can't read sites Debug.WriteLine("Can't get IIS site list."); } } return(sites); }
/// <summary> /// /// </summary> /// <param name="package"></param> /// <param name="isPreviewMode"></param> /// <returns></returns> public async Task <List <ActionStep> > PerformImport(ImportExportPackage package, ImportSettings settings, bool isPreviewMode) { // apply import var steps = new List <ActionStep>(); // import managed certs, certificate files, stored credentials, CAs var currentAppVersion = Certify.Management.Util.GetAppVersion(); if (currentAppVersion != package.SystemVersion) { if (package.SystemVersion == null || AppVersion.IsOtherVersionNewer(AppVersion.FromVersion(package.SystemVersion), AppVersion.FromVersion(currentAppVersion))) { steps.Add(new ActionStep { Title = "Version Check", Category = "Import", Key = "Version", HasWarning = true, Description = "Migration to an older app version is not supported. Results may be unreliable." }); } } else { steps.Add(new ActionStep { Title = "Version Check", Category = "Import", Key = "Version", Description = "Source is from the same version or a supported app version." }); } // check encryption var decryptionFailed = false; try { var decryptionCheckBytes = DecryptBytes(package.EncryptionValidation.Content, settings.EncryptionSecret, package.EncryptionSalt); var decryptionCheckString = Encoding.ASCII.GetString(decryptionCheckBytes).Trim('\0'); if (decryptionCheckString != "Secret") { // failed decryption decryptionFailed = true; } } catch (Exception) { decryptionFailed = true; } if (decryptionFailed) { steps.Add(new ActionStep { HasError = true, Title = "Decryption Check", Category = "Import", Key = "Decrypt", Description = "Secrets cannot be decrypted using the provided password." }); return(steps); } else { steps.Add(new ActionStep { Title = "Decryption Check", Category = "Import", Key = "Decrypt", Description = "Secrets can be decrypted OK using the provided password." }); } // stored credentials var credentialImportSteps = new List <ActionStep>(); foreach (var c in package.Content.StoredCredentials) { var decodedBytes = Convert.FromBase64String(c.Secret); var decryptedBytes = DecryptBytes(decodedBytes, settings.EncryptionSecret, package.EncryptionSalt); // convert decrypted bytes to UTF8 string and trim NUL c.Secret = UTF8Encoding.UTF8.GetString(decryptedBytes).Trim('\0'); var existing = await _credentialsManager.GetCredential(c.StorageKey); if (existing == null) { if (!isPreviewMode) { // perform import var result = await _credentialsManager.Update(c); if (result != null) { credentialImportSteps.Add(new ActionStep { Title = c.Title, Key = c.StorageKey }); } else { credentialImportSteps.Add(new ActionStep { Title = c.Title, Key = c.StorageKey, HasWarning = true, Description = $"Failed to store this credential. Items which depend on it may not function." }); } } else { // preview only credentialImportSteps.Add(new ActionStep { Title = c.Title, Key = c.StorageKey }); } } else { // credential already exists credentialImportSteps.Add(new ActionStep { Title = c.Title, Key = c.StorageKey, HasWarning = true, Description = $"Credential already exists, it will not be re-imported." }); } } steps.Add(new ActionStep { Title = "Import Stored Credentials", Category = "Import", Substeps = credentialImportSteps, Key = "StoredCredentials" }); var targetSiteBindings = new List <BindingInfo>(); if (await _targetServer?.IsAvailable() == true) { targetSiteBindings = await _targetServer.GetSiteBindingList(false); } // managed certs var managedCertImportSteps = new List <ActionStep>(); foreach (var c in package.Content.ManagedCertificates) { var existing = await _itemManager.GetById(c.Id); if (existing == null) { // check if item is auto deployment or single site, if single site warn if we don't have an exact match (convert to Auto) DeploymentOption deploymentMode = c.RequestConfig.DeploymentSiteOption; bool hasUnmatchedTargets = false; bool siteIdChanged = false; var warningMsg = ""; if (deploymentMode == DeploymentOption.SingleSite) { var targets = targetSiteBindings.Where(t => t.SiteId == c.ServerSiteId); if (targets.Any()) { //exact match on site id, check domains var unmatchedDomains = new List <string>(); foreach (var d in c.GetCertificateDomains()) { var t = targets.FirstOrDefault(ta => ta.Host == d); if (t == null) { unmatchedDomains.Add(d); hasUnmatchedTargets = true; warningMsg += " " + d; } } } else { // no exact site id match, check if a different site is an exact match, if so migrate site id // if no exact match, change to auto } } else { // auto deploy, site id only used for IIS site selection in UI } if (!isPreviewMode) { // perform actual import try { // TODO : re-map certificate pfx path, could be a different location on this instance // warn if deployment task script paths don't match an existing file? // TODO : warn if Certificate Authority ID does not match one we have (cert renewal will fail) var result = await _itemManager.Update(c); if (result != null) { managedCertImportSteps.Add(new ActionStep { Title = c.Name, Key = c.Id, HasWarning = (hasUnmatchedTargets || siteIdChanged) }); } else { managedCertImportSteps.Add(new ActionStep { Title = c.Name, Key = c.Id, HasError = true, Description = $"Failed to import item." }); } } catch (Exception exp) { managedCertImportSteps.Add(new ActionStep { Title = c.Name, Key = c.Id, HasError = true, Description = $"Failed to import item: {exp.Message}" }); } } else { // preview only managedCertImportSteps.Add(new ActionStep { Title = c.Name, Key = c.Id }); } } else { managedCertImportSteps.Add(new ActionStep { Title = c.Name, Key = c.Id, HasWarning = true, Description = "Item already exists, it will not be re-imported." }); } } steps.Add(new ActionStep { Title = "Import Managed Certificates", Category = "Import", Substeps = managedCertImportSteps, Key = "ManagedCerts" }); // certificate files var certFileImportSteps = new List <ActionStep>(); foreach (var c in package.Content.CertificateFiles) { var pfxBytes = DecryptBytes(c.Content, settings.EncryptionSecret, package.EncryptionSalt); X509Certificate2 cert = null; try { cert = new X509Certificate2(pfxBytes); } catch (Exception) { // maybe we need a password var managedCert = package.Content.ManagedCertificates.FirstOrDefault(m => m.CertificatePath == c.Filename && m.CertificatePasswordCredentialId != null); if (managedCert != null) { //get stored cred var cred = await _credentialsManager.GetUnlockedCredentialsDictionary(managedCert.CertificatePasswordCredentialId); if (cred != null) { var pfxPwd = cred["password"]; cert = new X509Certificate2(pfxBytes, pfxPwd); } } } if (cert != null) { bool isVerified = cert.Verify(); if (!System.IO.File.Exists(c.Filename)) { if (!isPreviewMode) { // perform actual import, TODO: re-map cert PFX storage location try { System.IO.File.WriteAllBytes(c.Filename, c.Content); certFileImportSteps.Add(new ActionStep { Title = $"Importing PFX {cert.Subject}, expiring {cert.NotAfter}", Key = c.Filename, HasWarning = !isVerified, Description = isVerified ? null : "Certificate did not pass verify check." }); } catch (Exception exp) { certFileImportSteps.Add(new ActionStep { Title = $"Importing PFX {cert.Subject}, expiring {cert.NotAfter}", Key = c.Filename, HasError = true, Description = $"Failed to write certificate to destination: {c.Filename} [{exp.Message}]" }); } } else { // preview only certFileImportSteps.Add(new ActionStep { Title = $"Importing PFX {cert.Subject}, expiring {cert.NotAfter}", Key = c.Filename, HasWarning = !isVerified, Description = isVerified ? "Would import to " + c.Filename : "Certificate did not pass verify check." }); } } else { certFileImportSteps.Add(new ActionStep { Title = $"Importing PFX {cert.Subject}, expiring {cert.NotAfter}", Key = c.Filename, HasWarning = true, Description = "Output file already exists, it will not be re-imported" }); } } else { certFileImportSteps.Add(new ActionStep { Title = $"Importing PFX Failed", Key = c.Filename, HasWarning = true, Description = "Could not create PFX from bytes. Password may be incorrect." }); } } steps.Add(new ActionStep { Title = "Import Certificate Files", Category = "Import", Substeps = certFileImportSteps, Key = "CertFiles" }); return(steps); }