|
package app |
|
|
|
import ( |
|
"crypto" |
|
"crypto/ecdsa" |
|
"crypto/elliptic" |
|
"crypto/rand" |
|
"crypto/rsa" |
|
"crypto/x509" |
|
"crypto/x509/pkix" |
|
"encoding/pem" |
|
"fmt" |
|
"math/big" |
|
"os" |
|
"time" |
|
|
|
"github.com/spf13/cobra" |
|
"golang.org/x/crypto/ed25519" |
|
) |
|
|
|
type certType int |
|
|
|
const ( |
|
certTypeUnknown certType = iota |
|
certTypeCASystem |
|
certTypeCAPlugin |
|
certTypeServer |
|
certTypeClient |
|
) |
|
|
|
func copyFile(dst, src string) error { |
|
data, err := os.ReadFile(src) |
|
if err != nil { |
|
return fmt.Errorf("read '%s': %w", src, err) |
|
} |
|
err = os.WriteFile(dst, data, 0o644) |
|
if err != nil { |
|
return fmt.Errorf("write '%s': %w", dst, err) |
|
} |
|
return nil |
|
} |
|
|
|
func loadPair(certFile, keyFile string) (cert *x509.Certificate, pk interface{}, err error) { |
|
data, err := os.ReadFile(certFile) |
|
if err != nil { |
|
return nil, nil, fmt.Errorf("read cert file '%s': %w", certFile, err) |
|
} |
|
p, _ := pem.Decode(data) |
|
cert, err = x509.ParseCertificate(p.Bytes) |
|
if err != nil { |
|
return nil, nil, fmt.Errorf("parse cert file '%s': %w", certFile, err) |
|
} |
|
|
|
data, err = os.ReadFile(keyFile) |
|
if err != nil { |
|
return nil, nil, fmt.Errorf("read key file '%s': %w", keyFile, err) |
|
} |
|
p, _ = pem.Decode(data) |
|
pk, err = x509.ParsePKCS8PrivateKey(p.Bytes) |
|
if err != nil { |
|
return nil, nil, fmt.Errorf("parse key file '%s': %w", keyFile, err) |
|
} |
|
return cert, pk, nil |
|
} |
|
|
|
func certTemplate(t certType) *x509.Certificate { |
|
switch t { |
|
case certTypeCASystem, certTypeCAPlugin: |
|
return &x509.Certificate{ |
|
IsCA: true, |
|
NotBefore: time.Now(), |
|
NotAfter: time.Now().AddDate(100, 0, 0), |
|
KeyUsage: x509.KeyUsageCertSign, |
|
BasicConstraintsValid: true, |
|
} |
|
case certTypeServer, certTypeClient: |
|
return &x509.Certificate{ |
|
Subject: pkix.Name{ |
|
CommonName: _certCommonName, |
|
}, |
|
NotBefore: time.Now(), |
|
NotAfter: time.Now().AddDate(100, 0, 0), |
|
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature, |
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}, |
|
BasicConstraintsValid: true, |
|
DNSNames: []string{_certCommonName}, |
|
} |
|
} |
|
|
|
panic("unknown certType") |
|
} |
|
|
|
type keypair interface { |
|
Public() crypto.PublicKey |
|
} |
|
|
|
func privateKey() (keypair, error) { |
|
if _certED25519Key { |
|
_, pk, err := ed25519.GenerateKey(rand.Reader) |
|
return pk, err |
|
} |
|
|
|
switch _certECDSACurve { |
|
case "": |
|
|
|
case "P224": |
|
return ecdsa.GenerateKey(elliptic.P224(), rand.Reader) |
|
case "P256": |
|
return ecdsa.GenerateKey(elliptic.P256(), rand.Reader) |
|
case "P384": |
|
return ecdsa.GenerateKey(elliptic.P384(), rand.Reader) |
|
case "P521": |
|
return ecdsa.GenerateKey(elliptic.P521(), rand.Reader) |
|
default: |
|
return nil, fmt.Errorf("invalid ECDSA curve '%s'", _certECDSACurve) |
|
} |
|
|
|
return rsa.GenerateKey(rand.Reader, _certRSABits) |
|
} |
|
|
|
func genCertFiles(t certType, extra ...certType) error { |
|
template := certTemplate(t) |
|
sn, err := certSerialNumber() |
|
if err != nil { |
|
return err |
|
} |
|
|
|
pk, err := privateKey() |
|
if err != nil { |
|
return fmt.Errorf("generate private key: %w", err) |
|
} |
|
template.SerialNumber = sn |
|
parentCert, parentKey := template, (interface{})(pk) |
|
|
|
var certFile, keyFile string |
|
switch t { |
|
case certTypeCASystem: |
|
certFile = _certSystemCACertFile |
|
keyFile = _certSystemCAKeyFile |
|
case certTypeCAPlugin: |
|
certFile = _certPluginCACertFile |
|
keyFile = _certPluginCAKeyFile |
|
case certTypeServer: |
|
certFile = _certServerCertFile |
|
keyFile = _certServerKeyFile |
|
parentCert, parentKey, err = loadPair(_certSystemCACertFile, _certSystemCAKeyFile) |
|
if err != nil { |
|
return fmt.Errorf("load keypair: %w", err) |
|
} |
|
err = copyFile(_certServerCAFile, _certPluginCACertFile) |
|
if err != nil { |
|
return fmt.Errorf("copy CA bundle: %w", err) |
|
} |
|
case certTypeClient: |
|
certFile = _certClientCertFile |
|
keyFile = _certClientKeyFile |
|
parentCert, parentKey, err = loadPair(_certPluginCACertFile, _certPluginCAKeyFile) |
|
if err != nil { |
|
return fmt.Errorf("load keypair: %w", err) |
|
} |
|
err = copyFile(_certClientCAFile, _certSystemCACertFile) |
|
if err != nil { |
|
return fmt.Errorf("copy CA bundle: %w", err) |
|
} |
|
default: |
|
panic("unknown certType") |
|
} |
|
|
|
certBytes, err := x509.CreateCertificate(rand.Reader, template, parentCert, pk.Public(), parentKey) |
|
if err != nil { |
|
return fmt.Errorf("create certificate: %w", err) |
|
} |
|
|
|
certOut, err := os.Create(certFile) |
|
if err != nil { |
|
return fmt.Errorf("open cert file '%s': %w", certFile, err) |
|
} |
|
defer certOut.Close() |
|
|
|
err = pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: certBytes}) |
|
if err != nil { |
|
return fmt.Errorf("encode certificate: %w", err) |
|
} |
|
|
|
privBytes, err := x509.MarshalPKCS8PrivateKey(pk) |
|
if err != nil { |
|
return fmt.Errorf("encode private key: %w", err) |
|
} |
|
|
|
keyOut, err := os.Create(keyFile) |
|
if err != nil { |
|
return fmt.Errorf("open key file '%s': %w", keyFile, err) |
|
} |
|
defer keyOut.Close() |
|
|
|
err = pem.Encode(keyOut, &pem.Block{Type: "PRIVATE KEY", Bytes: privBytes}) |
|
if err != nil { |
|
return fmt.Errorf("encode private key: %w", err) |
|
} |
|
|
|
if len(extra) > 0 { |
|
return genCertFiles(extra[0], extra[1:]...) |
|
} |
|
return nil |
|
} |
|
|
|
var ( |
|
genCerts = &cobra.Command{ |
|
Use: "gen-cert", |
|
Short: "Generate a certificate for SysAPI (gRPC) usage.", |
|
} |
|
|
|
genAllCert = &cobra.Command{ |
|
Use: "all", |
|
Short: "Generate all certificates for GoAlert to authenticate to/from gRPC clients.", |
|
RunE: func(cmd *cobra.Command, args []string) error { |
|
err := genCertFiles(certTypeCASystem, certTypeCAPlugin, certTypeServer, certTypeClient) |
|
if err != nil { |
|
return fmt.Errorf("generate cert files: %w", err) |
|
} |
|
return nil |
|
}, |
|
} |
|
|
|
genCACert = &cobra.Command{ |
|
Use: "ca", |
|
Short: "Generate a CA certificates for GoAlert to authenticate to/from gRPC clients.", |
|
RunE: func(cmd *cobra.Command, args []string) error { |
|
err := genCertFiles(certTypeCASystem, certTypeCAPlugin) |
|
if err != nil { |
|
return fmt.Errorf("generate cert files: %w", err) |
|
} |
|
return nil |
|
}, |
|
} |
|
|
|
genServerCert = &cobra.Command{ |
|
Use: "server", |
|
Short: "Generate a server certificate for GoAlert to authenticate to/from gRPC clients.", |
|
RunE: func(cmd *cobra.Command, args []string) error { |
|
err := genCertFiles(certTypeServer) |
|
if err != nil { |
|
return fmt.Errorf("generate cert files: %w", err) |
|
} |
|
return nil |
|
}, |
|
} |
|
genClientCert = &cobra.Command{ |
|
Use: "client", |
|
Short: "Generate a client certificate for services that talk to GoAlert.", |
|
RunE: func(cmd *cobra.Command, args []string) error { |
|
err := genCertFiles(certTypeClient) |
|
if err != nil { |
|
return fmt.Errorf("generate cert files: %w", err) |
|
} |
|
return nil |
|
}, |
|
} |
|
) |
|
|
|
func certSerialNumber() (*big.Int, error) { |
|
if _certSerialNumber == "" { |
|
return randSerialNumber(), nil |
|
} |
|
|
|
sn := new(big.Int) |
|
sn, ok := sn.SetString(_certSerialNumber, 10) |
|
if !ok { |
|
return nil, fmt.Errorf("invalid value for serial number '%s'", _certSerialNumber) |
|
} |
|
return sn, nil |
|
} |
|
|
|
func randSerialNumber() *big.Int { |
|
maxSN := new(big.Int) |
|
|
|
maxSN.Exp(big.NewInt(2), big.NewInt(159), nil).Sub(maxSN, big.NewInt(1)) |
|
sn, err := rand.Int(rand.Reader, maxSN) |
|
if err != nil { |
|
panic(err) |
|
} |
|
return sn |
|
} |
|
|
|
var ( |
|
_certCommonName string = "GoAlert" |
|
_certSerialNumber string = "" |
|
_certSystemCACertFile string = "system.ca.pem" |
|
_certSystemCAKeyFile string = "system.ca.key" |
|
_certPluginCACertFile string = "plugin.ca.pem" |
|
_certPluginCAKeyFile string = "plugin.ca.key" |
|
_certClientCertFile string = "goalert-client.pem" |
|
_certClientKeyFile string = "goalert-client.key" |
|
_certClientCAFile string = "goalert-client.ca.pem" |
|
_certServerCertFile string = "goalert-server.pem" |
|
_certServerKeyFile string = "goalert-server.key" |
|
_certServerCAFile string = "goalert-server.ca.pem" |
|
|
|
_certValidFrom string = "" |
|
_certValidFor time.Duration = 10 * 365 * 24 * time.Hour |
|
_certRSABits int = 2048 |
|
_certECDSACurve string = "" |
|
_certED25519Key bool = false |
|
) |
|
|
|
func initCertCommands() { |
|
genCerts.PersistentFlags().StringVar(&_certSerialNumber, "serial-number", _certSerialNumber, "Serial number to use for generated certificate (default is random).") |
|
|
|
genCerts.PersistentFlags().StringVar(&_certValidFrom, "start-date", _certValidFrom, "Creation date formatted as Jan 2 15:04:05 2006") |
|
genCerts.PersistentFlags().DurationVar(&_certValidFor, "duration", _certValidFor, "Creation date formatted as Jan 2 15:04:05 2006") |
|
genCerts.PersistentFlags().IntVar(&_certRSABits, "rsa-bits", _certRSABits, "Size of RSA key(s) to create. Ignored if either --ecdsa-curve or --ed25519 are set.") |
|
genCerts.PersistentFlags().StringVar(&_certECDSACurve, "ecdsa-curve", _certECDSACurve, "ECDSA curve to use to generate a key. Valid values are P224, P256 (recommended), P384, P521. Ignored if --ed25519 is set.") |
|
genCerts.PersistentFlags().BoolVar(&_certED25519Key, "ed25519", _certED25519Key, "Generate ED25519 key(s).") |
|
|
|
genCerts.PersistentFlags().StringVar(&_certCommonName, "cn", _certCommonName, "Common name of the certificate.") |
|
|
|
genCerts.PersistentFlags().StringVar(&_certSystemCACertFile, "system-ca-cert-file", _certSystemCACertFile, "CA cert file for signing server certs.") |
|
genCerts.PersistentFlags().StringVar(&_certSystemCAKeyFile, "system-ca-key-file", _certSystemCAKeyFile, "CA key file for signing server certs.") |
|
genCerts.PersistentFlags().StringVar(&_certPluginCACertFile, "plugin-ca-cert-file", _certPluginCACertFile, "CA cert file for signing client certs.") |
|
genCerts.PersistentFlags().StringVar(&_certPluginCAKeyFile, "plugin-ca-key-file", _certPluginCAKeyFile, "CA key file for signing client certs.") |
|
|
|
genServerCert.Flags().StringVar(&_certServerCertFile, "server-cert-file", _certServerCertFile, "Output file for the new server certificate.") |
|
genServerCert.Flags().StringVar(&_certServerKeyFile, "server-key-file", _certServerKeyFile, "Output file for the new server key.") |
|
genServerCert.Flags().StringVar(&_certServerCAFile, "server-ca-file", _certServerCAFile, "Output file for the server CA bundle.") |
|
|
|
genClientCert.Flags().StringVar(&_certClientCertFile, "client-cert-file", _certClientCertFile, "Output file for the new client certificate.") |
|
genClientCert.Flags().StringVar(&_certClientKeyFile, "client-key-file", _certClientKeyFile, "Output file for the new client key.") |
|
genClientCert.Flags().StringVar(&_certClientCAFile, "client-ca-file", _certClientCAFile, "Output file for the client CA bundle.") |
|
|
|
genCerts.AddCommand(genAllCert, genCACert, genServerCert, genClientCert) |
|
} |
|
|