tls.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. // Copyright 2019 Yunion
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package seclib2
  15. import (
  16. "bytes"
  17. "crypto/tls"
  18. "crypto/x509"
  19. "encoding/pem"
  20. "io/ioutil"
  21. "yunion.io/x/log"
  22. "yunion.io/x/pkg/errors"
  23. )
  24. var CERT_SEP = []byte("-END CERTIFICATE-")
  25. func findCertEndIndex(certBytes []byte) int {
  26. endpos := bytes.Index(certBytes, CERT_SEP)
  27. if endpos < 0 {
  28. return endpos
  29. }
  30. endpos += len(CERT_SEP)
  31. for endpos < len(certBytes) && certBytes[endpos] != '\n' {
  32. endpos += 1
  33. }
  34. return endpos
  35. }
  36. func splitCert(certBytes []byte) [][]byte {
  37. ret := make([][]byte, 0)
  38. for {
  39. endpos := findCertEndIndex(certBytes)
  40. if endpos > 0 {
  41. ret = append(ret, certBytes[:endpos])
  42. for endpos < len(certBytes) && certBytes[endpos] != '-' {
  43. endpos += 1
  44. }
  45. if endpos < len(certBytes) {
  46. certBytes = certBytes[endpos:]
  47. } else {
  48. break
  49. }
  50. }
  51. }
  52. return ret
  53. }
  54. func InitTLSConfigWithCA(certFile, keyFile, caCertFile string) (*tls.Config, error) {
  55. cert, err := NewCert(certFile, keyFile, nil)
  56. if err != nil {
  57. return nil, err
  58. }
  59. cfg := &tls.Config{}
  60. cfg.RootCAs, err = NewCertPool([]string{caCertFile})
  61. if err != nil {
  62. return nil, err
  63. }
  64. cfg.Certificates = []tls.Certificate{*cert}
  65. return cfg, nil
  66. }
  67. // NewCertPool creates x509 certPool with provided CA files.
  68. func NewCertPool(CAFiles []string) (*x509.CertPool, error) {
  69. certPool := x509.NewCertPool()
  70. for _, CAFile := range CAFiles {
  71. pemByte, err := ioutil.ReadFile(CAFile)
  72. if err != nil {
  73. return nil, err
  74. }
  75. for {
  76. var block *pem.Block
  77. block, pemByte = pem.Decode(pemByte)
  78. if block == nil {
  79. break
  80. }
  81. cert, err := x509.ParseCertificate(block.Bytes)
  82. if err != nil {
  83. return nil, err
  84. }
  85. certPool.AddCert(cert)
  86. }
  87. }
  88. return certPool, nil
  89. }
  90. // NewCert generates TLS cert by using the given cert,key and parse function.
  91. func NewCert(certfile, keyfile string, parseFunc func([]byte, []byte) (tls.Certificate, error)) (*tls.Certificate, error) {
  92. cert, err := ioutil.ReadFile(certfile)
  93. if err != nil {
  94. return nil, err
  95. }
  96. key, err := ioutil.ReadFile(keyfile)
  97. if err != nil {
  98. return nil, err
  99. }
  100. if parseFunc == nil {
  101. parseFunc = tls.X509KeyPair
  102. }
  103. tlsCert, err := parseFunc(cert, key)
  104. if err != nil {
  105. return nil, err
  106. }
  107. return &tlsCert, nil
  108. }
  109. func InitTLSConfig(certFile, keyFile string) (*tls.Config, error) {
  110. allCertPEM, err := ioutil.ReadFile(certFile)
  111. if err != nil {
  112. log.Errorf("read tls certfile fail %s", err)
  113. return nil, err
  114. }
  115. certPEMs := splitCert(allCertPEM)
  116. keyPEM, err := ioutil.ReadFile(keyFile)
  117. if err != nil {
  118. log.Errorf("read tls keyfile fail %s", err)
  119. return nil, err
  120. }
  121. cert, err := tls.X509KeyPair(certPEMs[0], keyPEM)
  122. if err != nil {
  123. return nil, err
  124. }
  125. caCertPool := x509.NewCertPool()
  126. for i := 1; i < len(certPEMs); i += 1 {
  127. caCertPool.AppendCertsFromPEM(certPEMs[i])
  128. }
  129. tlsConfig := &tls.Config{
  130. Certificates: []tls.Certificate{cert},
  131. RootCAs: caCertPool,
  132. }
  133. // tlsConfig.ServerName = "CN=*"
  134. tlsConfig.BuildNameToCertificate()
  135. return tlsConfig, nil
  136. }
  137. func InitTLSConfigByData(caCertBlock, certPEMBlock, keyPEMBlock []byte) (*tls.Config, error) {
  138. cert, err := tls.X509KeyPair(certPEMBlock, keyPEMBlock)
  139. if err != nil {
  140. return nil, err
  141. }
  142. caCertPool := x509.NewCertPool()
  143. for {
  144. var block *pem.Block
  145. block, caCertBlock = pem.Decode(caCertBlock)
  146. if block == nil {
  147. break
  148. }
  149. caCert, err := x509.ParseCertificate(block.Bytes)
  150. if err != nil {
  151. return nil, errors.Wrap(err, "parse caCert data")
  152. }
  153. caCertPool.AddCert(caCert)
  154. }
  155. tlsConfig := &tls.Config{
  156. Certificates: []tls.Certificate{cert},
  157. RootCAs: caCertPool,
  158. }
  159. tlsConfig.BuildNameToCertificate()
  160. return tlsConfig, nil
  161. }