public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
* [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates
@ 2021-08-24 15:50 Michael Tremer
  2021-08-24 15:50 ` [PATCH 2/3] IPsec: Do not interpret $? as error code of move() Michael Tremer
                   ` (2 more replies)
  0 siblings, 3 replies; 6+ messages in thread
From: Michael Tremer @ 2021-08-24 15:50 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 907 bytes --]

Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
---
 html/cgi-bin/vpnmain.cgi | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi
index d54b56577..980601ba0 100644
--- a/html/cgi-bin/vpnmain.cgi
+++ b/html/cgi-bin/vpnmain.cgi
@@ -849,7 +849,7 @@ END
 		print "Content-Disposition: attachment; filename=cacert.pem\r\n\r\n";
 
 		my @cert = &General::system_output("/usr/bin/openssl", "x509", "-in", "${General::swroot}/ca/cacert.pem");
-		print "@cert";
+		print join("", @cert);
 		exit(0);
 	}
 ###
@@ -861,7 +861,7 @@ END
 		print "Content-Disposition: attachment; filename=hostcert.pem\r\n\r\n";
 
 		my @cert = &General::system_output("/usr/bin/openssl", "x509", "-in", "${General::swroot}/certs/hostcert.pem");
-		print "@cert";
+		print join("", @cert);
 		exit(0);
 	}
 ###
-- 
2.20.1


^ permalink raw reply	[flat|nested] 6+ messages in thread

* [PATCH 2/3] IPsec: Do not interpret $? as error code of move()
  2021-08-24 15:50 [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Michael Tremer
@ 2021-08-24 15:50 ` Michael Tremer
  2021-09-03 16:27   ` Stefan Schantl
  2021-08-24 15:50 ` [PATCH 3/3] vpnmain.cgi: " Michael Tremer
  2021-09-03 16:26 ` [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Stefan Schantl
  2 siblings, 1 reply; 6+ messages in thread
From: Michael Tremer @ 2021-08-24 15:50 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 822 bytes --]

Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
---
 html/cgi-bin/vpnmain.cgi | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi
index 980601ba0..e9064e19c 100644
--- a/html/cgi-bin/vpnmain.cgi
+++ b/html/cgi-bin/vpnmain.cgi
@@ -2042,9 +2042,8 @@ END
 			unlink ($filename);
 			goto VPNCONF_ERROR;
 		} else {
-			move($filename, "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem");
-			if ($? ne 0) {
-				$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
+			unless (move($filename, "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem")) {
+				$errormessage = "$Lang::tr{'certificate file move failed'} ($filename): $!";
 				unlink ($filename);
 				goto VPNCONF_ERROR;
 			}
-- 
2.20.1


^ permalink raw reply	[flat|nested] 6+ messages in thread

* [PATCH 3/3] vpnmain.cgi: Do not interpret $? as error code of move()
  2021-08-24 15:50 [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Michael Tremer
  2021-08-24 15:50 ` [PATCH 2/3] IPsec: Do not interpret $? as error code of move() Michael Tremer
@ 2021-08-24 15:50 ` Michael Tremer
  2021-09-03 16:27   ` Stefan Schantl
  2021-09-03 16:26 ` [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Stefan Schantl
  2 siblings, 1 reply; 6+ messages in thread
From: Michael Tremer @ 2021-08-24 15:50 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 3235 bytes --]

From: Stefan Schantl <stefan.schantl(a)ipfire.org>

Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
---
 html/cgi-bin/vpnmain.cgi | 30 ++++++++++++++++++------------
 1 file changed, 18 insertions(+), 12 deletions(-)

diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi
index e9064e19c..7bb0d1b35 100644
--- a/html/cgi-bin/vpnmain.cgi
+++ b/html/cgi-bin/vpnmain.cgi
@@ -675,8 +675,7 @@ END
 		unlink ($filename);
 		goto UPLOADCA_ERROR;
 	} else {
-		move($filename, "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem");
-		if ($? ne 0) {
+		unless(move($filename, "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem")) {
 			$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
 			unlink ($filename);
 			goto UPLOADCA_ERROR;
@@ -947,20 +946,23 @@ END
 
 		if (!$errormessage) {
 			&General::log("ipsec", "Moving cacert...");
-			move("/tmp/newcacert", "${General::swroot}/ca/cacert.pem");
-			$errormessage = "$Lang::tr{'certificate file move failed'}: $!" if ($? ne 0);
+			unless(move("/tmp/newcacert", "${General::swroot}/ca/cacert.pem")) {
+				$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
+			}
 		}
 
 		if (!$errormessage) {
 			&General::log("ipsec", "Moving host cert...");
-			move("/tmp/newhostcert", "${General::swroot}/certs/hostcert.pem");
-			$errormessage = "$Lang::tr{'certificate file move failed'}: $!" if ($? ne 0);
+			unless(move("/tmp/newhostcert", "${General::swroot}/certs/hostcert.pem")) {
+				$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
+			}
 		}
 
 		if (!$errormessage) {
 			&General::log("ipsec", "Moving private key...");
-			move("/tmp/newhostkey", "${General::swroot}/certs/hostkey.pem");
-			$errormessage = "$Lang::tr{'certificate file move failed'}: $!" if ($? ne 0);
+			unless(move("/tmp/newhostkey", "${General::swroot}/certs/hostkey.pem")) {
+				$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
+			}
 		}
 
 		#cleanup temp files
@@ -1979,8 +1981,11 @@ END
 					while (grep(/Imported-$idx/, @names) ) {$idx++};
 					$cgiparams{'CA_NAME'}="Imported-$idx";
 					$cgiparams{'CERT_NAME'}=&Header::cleanhtml(getCNfromcert ('/tmp/newhostcert'));
-					move("/tmp/newcacert", "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem");
-					$errormessage = "$Lang::tr{'certificate file move failed'}: $!" if ($? ne 0);
+
+					unless(move("/tmp/newcacert", "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem")) {
+						$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
+					}
+
 					if (!$errormessage) {
 						my $key = &General::findhasharraykey (\%cahash);
 						$cahash{$key}[0] = $cgiparams{'CA_NAME'};
@@ -1993,8 +1998,9 @@ END
 		}
 		if (!$errormessage) {
 			&General::log("ipsec", "Moving host cert...");
-			move("/tmp/newhostcert", "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem");
-			$errormessage = "$Lang::tr{'certificate file move failed'}: $!" if ($? ne 0);
+			unless(move("/tmp/newhostcert", "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem")) {
+				$errormessage = "$Lang::tr{'certificate file move failed'}: $!";
+			}
 		}
 
 		#cleanup temp files
-- 
2.20.1


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates
  2021-08-24 15:50 [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Michael Tremer
  2021-08-24 15:50 ` [PATCH 2/3] IPsec: Do not interpret $? as error code of move() Michael Tremer
  2021-08-24 15:50 ` [PATCH 3/3] vpnmain.cgi: " Michael Tremer
@ 2021-09-03 16:26 ` Stefan Schantl
  2 siblings, 0 replies; 6+ messages in thread
From: Stefan Schantl @ 2021-09-03 16:26 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1368 bytes --]

Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
> ---
>  html/cgi-bin/vpnmain.cgi | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi
> index d54b56577..980601ba0 100644
> --- a/html/cgi-bin/vpnmain.cgi
> +++ b/html/cgi-bin/vpnmain.cgi
> @@ -849,7 +849,7 @@ END
>                 print "Content-Disposition: attachment;
> filename=cacert.pem\r\n\r\n";
>  
>                 my @cert =
> &General::system_output("/usr/bin/openssl", "x509", "-in",
> "${General::swroot}/ca/cacert.pem");
> -               print "@cert";
> +               print join("", @cert);
>                 exit(0);
>         }
>  ###
> @@ -861,7 +861,7 @@ END
>                 print "Content-Disposition: attachment;
> filename=hostcert.pem\r\n\r\n";
>  
>                 my @cert =
> &General::system_output("/usr/bin/openssl", "x509", "-in",
> "${General::swroot}/certs/hostcert.pem");
> -               print "@cert";
> +               print join("", @cert);
>                 exit(0);
>         }
>  ###


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 2/3] IPsec: Do not interpret $? as error code of move()
  2021-08-24 15:50 ` [PATCH 2/3] IPsec: Do not interpret $? as error code of move() Michael Tremer
@ 2021-09-03 16:27   ` Stefan Schantl
  0 siblings, 0 replies; 6+ messages in thread
From: Stefan Schantl @ 2021-09-03 16:27 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 1507 bytes --]

Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> Signed-off-by: Michael Tremer <michael.tremer(a)ipfire.org>
> ---
>  html/cgi-bin/vpnmain.cgi | 5 ++---
>  1 file changed, 2 insertions(+), 3 deletions(-)
> 
> diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi
> index 980601ba0..e9064e19c 100644
> --- a/html/cgi-bin/vpnmain.cgi
> +++ b/html/cgi-bin/vpnmain.cgi
> @@ -2042,9 +2042,8 @@ END
>                         unlink ($filename);
>                         goto VPNCONF_ERROR;
>                 } else {
> -                       move($filename,
> "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem");
> -                       if ($? ne 0) {
> -                               $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!";
> +                       unless (move($filename,
> "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem")) {
> +                               $errormessage =
> "$Lang::tr{'certificate file move failed'} ($filename): $!";
>                                 unlink ($filename);
>                                 goto VPNCONF_ERROR;
>                         }


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH 3/3] vpnmain.cgi: Do not interpret $? as error code of move()
  2021-08-24 15:50 ` [PATCH 3/3] vpnmain.cgi: " Michael Tremer
@ 2021-09-03 16:27   ` Stefan Schantl
  0 siblings, 0 replies; 6+ messages in thread
From: Stefan Schantl @ 2021-09-03 16:27 UTC (permalink / raw)
  To: development

[-- Attachment #1: Type: text/plain, Size: 6153 bytes --]

Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
Tested-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> From: Stefan Schantl <stefan.schantl(a)ipfire.org>
> 
> Signed-off-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
> ---
>  html/cgi-bin/vpnmain.cgi | 30 ++++++++++++++++++------------
>  1 file changed, 18 insertions(+), 12 deletions(-)
> 
> diff --git a/html/cgi-bin/vpnmain.cgi b/html/cgi-bin/vpnmain.cgi
> index e9064e19c..7bb0d1b35 100644
> --- a/html/cgi-bin/vpnmain.cgi
> +++ b/html/cgi-bin/vpnmain.cgi
> @@ -675,8 +675,7 @@ END
>                 unlink ($filename);
>                 goto UPLOADCA_ERROR;
>         } else {
> -               move($filename,
> "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem");
> -               if ($? ne 0) {
> +               unless(move($filename,
> "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem")) {
>                         $errormessage = "$Lang::tr{'certificate file
> move failed'}: $!";
>                         unlink ($filename);
>                         goto UPLOADCA_ERROR;
> @@ -947,20 +946,23 @@ END
>  
>                 if (!$errormessage) {
>                         &General::log("ipsec", "Moving cacert...");
> -                       move("/tmp/newcacert",
> "${General::swroot}/ca/cacert.pem");
> -                       $errormessage = "$Lang::tr{'certificate file
> move failed'}: $!" if ($? ne 0);
> +                       unless(move("/tmp/newcacert",
> "${General::swroot}/ca/cacert.pem")) {
> +                               $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!";
> +                       }
>                 }
>  
>                 if (!$errormessage) {
>                         &General::log("ipsec", "Moving host
> cert...");
> -                       move("/tmp/newhostcert",
> "${General::swroot}/certs/hostcert.pem");
> -                       $errormessage = "$Lang::tr{'certificate file
> move failed'}: $!" if ($? ne 0);
> +                       unless(move("/tmp/newhostcert",
> "${General::swroot}/certs/hostcert.pem")) {
> +                               $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!";
> +                       }
>                 }
>  
>                 if (!$errormessage) {
>                         &General::log("ipsec", "Moving private
> key...");
> -                       move("/tmp/newhostkey",
> "${General::swroot}/certs/hostkey.pem");
> -                       $errormessage = "$Lang::tr{'certificate file
> move failed'}: $!" if ($? ne 0);
> +                       unless(move("/tmp/newhostkey",
> "${General::swroot}/certs/hostkey.pem")) {
> +                               $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!";
> +                       }
>                 }
>  
>                 #cleanup temp files
> @@ -1979,8 +1981,11 @@ END
>                                         while (grep(/Imported-$idx/,
> @names) ) {$idx++};
>                                         $cgiparams{'CA_NAME'}="Import
> ed-$idx";
>                                         $cgiparams{'CERT_NAME'}=&Head
> er::cleanhtml(getCNfromcert ('/tmp/newhostcert'));
> -                                       move("/tmp/newcacert",
> "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem");
> -                                       $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!" if ($? ne 0);
> +
> +                                       unless(move("/tmp/newcacert",
> "${General::swroot}/ca/$cgiparams{'CA_NAME'}cert.pem")) {
> +                                               $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!";
> +                                       }
> +
>                                         if (!$errormessage) {
>                                                 my $key =
> &General::findhasharraykey (\%cahash);
>                                                 $cahash{$key}[0] =
> $cgiparams{'CA_NAME'};
> @@ -1993,8 +1998,9 @@ END
>                 }
>                 if (!$errormessage) {
>                         &General::log("ipsec", "Moving host
> cert...");
> -                       move("/tmp/newhostcert",
> "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem");
> -                       $errormessage = "$Lang::tr{'certificate file
> move failed'}: $!" if ($? ne 0);
> +                       unless(move("/tmp/newhostcert",
> "${General::swroot}/certs/$cgiparams{'NAME'}cert.pem")) {
> +                               $errormessage =
> "$Lang::tr{'certificate file move failed'}: $!";
> +                       }
>                 }
>  
>                 #cleanup temp files


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2021-09-03 16:27 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-08-24 15:50 [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Michael Tremer
2021-08-24 15:50 ` [PATCH 2/3] IPsec: Do not interpret $? as error code of move() Michael Tremer
2021-09-03 16:27   ` Stefan Schantl
2021-08-24 15:50 ` [PATCH 3/3] vpnmain.cgi: " Michael Tremer
2021-09-03 16:27   ` Stefan Schantl
2021-09-03 16:26 ` [PATCH 1/3] IPsec: Fix extra whitespace in exported certificates Stefan Schantl

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox