1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
|
package localca
import (
"context"
"crypto/tls"
"encoding/pem"
"errors"
"strings"
"time"
"golang.org/x/crypto/acme/autocert"
"within.website/ln"
"within.website/ln/opname"
)
var (
ErrBadData = errors.New("localca: certificate data is bad")
ErrDomainDoesntHaveSuffix = errors.New("localca: domain doesn't have the given suffix")
)
// Manager automatically provisions and caches TLS certificates in a given
// autocert Cache. If it cannot fetch a certificate on demand, the certificate
// is dynamically generated with a lifetime of 100 years, which should be good
// enough.
type Manager struct {
Cache autocert.Cache
DomainSuffix string
*issuer
}
// New creates a new Manager with the given key filename, certificate filename,
// allowed domain suffix and autocert cache. All given certificates will be
// created if they don't already exist.
func New(keyFile, certFile, suffix string, cache autocert.Cache) (Manager, error) {
iss, err := getIssuer(keyFile, certFile, true)
if err != nil {
return Manager{}, err
}
result := Manager{
DomainSuffix: suffix,
Cache: cache,
issuer: iss,
}
return result, nil
}
func (m Manager) GetCertificate(hello *tls.ClientHelloInfo) (*tls.Certificate, error) {
name := hello.ServerName
if !strings.Contains(strings.Trim(name, "."), ".") {
return nil, errors.New("localca: server name component count invalid")
}
if !strings.HasSuffix(name, m.DomainSuffix) {
return nil, ErrDomainDoesntHaveSuffix
}
ctx, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
defer cancel()
ctx = opname.With(ctx, "localca.Manager.GetCertificate")
ctx = ln.WithF(ctx, ln.F{"server_name": name})
data, err := m.Cache.Get(ctx, name)
if err != nil && err != autocert.ErrCacheMiss {
return nil, err
}
if err == autocert.ErrCacheMiss {
data, _, err = m.issuer.sign([]string{name}, nil)
if err != nil {
return nil, err
}
err = m.Cache.Put(ctx, name, data)
if err != nil {
return nil, err
}
}
cert, err := loadCertificate(name, data)
if err != nil {
return nil, err
}
ln.Log(ctx, ln.Info("returned cert successfully"))
return cert, nil
}
func loadCertificate(name string, data []byte) (*tls.Certificate, error) {
priv, pub := pem.Decode(data)
if priv == nil || !strings.Contains(priv.Type, "PRIVATE") {
return nil, ErrBadData
}
privKey, err := parsePrivateKey(priv.Bytes)
if err != nil {
return nil, err
}
// public
var pubDER [][]byte
for len(pub) > 0 {
var b *pem.Block
b, pub = pem.Decode(pub)
if b == nil {
break
}
pubDER = append(pubDER, b.Bytes)
}
if len(pub) > 0 {
return nil, ErrBadData
}
// verify and create TLS cert
leaf, err := validCert(name, pubDER, privKey, time.Now())
if err != nil {
return nil, err
}
tlscert := &tls.Certificate{
Certificate: pubDER,
PrivateKey: privKey,
Leaf: leaf,
}
return tlscert, nil
}
|