mirror of
https://github.com/projectcapsule/capsule.git
synced 2026-03-04 02:30:23 +00:00
203 lines
4.9 KiB
Go
203 lines
4.9 KiB
Go
// Copyright 2020-2023 Project Capsule Authors.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package cert
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/x509"
|
|
"crypto/x509/pkix"
|
|
"encoding/pem"
|
|
"math/big"
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
type CA interface {
|
|
GenerateCertificate(opts CertificateOptions) (certificatePem *bytes.Buffer, certificateKey *bytes.Buffer, err error)
|
|
CACertificatePem() (b *bytes.Buffer, err error)
|
|
CAPrivateKeyPem() (b *bytes.Buffer, err error)
|
|
ExpiresIn(now time.Time) (time.Duration, error)
|
|
ValidateCert(certificate *x509.Certificate) error
|
|
}
|
|
|
|
type CapsuleCA struct {
|
|
certificate *x509.Certificate
|
|
key *rsa.PrivateKey
|
|
}
|
|
|
|
func (c CapsuleCA) CACertificatePem() (b *bytes.Buffer, err error) {
|
|
var crtBytes []byte
|
|
crtBytes, err = x509.CreateCertificate(rand.Reader, c.certificate, c.certificate, &c.key.PublicKey, c.key)
|
|
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
b = new(bytes.Buffer)
|
|
err = pem.Encode(b, &pem.Block{
|
|
Type: "CERTIFICATE",
|
|
Bytes: crtBytes,
|
|
})
|
|
|
|
return b, err
|
|
}
|
|
|
|
func (c CapsuleCA) CAPrivateKeyPem() (b *bytes.Buffer, err error) {
|
|
b = new(bytes.Buffer)
|
|
|
|
return b, pem.Encode(b, &pem.Block{
|
|
Type: "RSA PRIVATE KEY",
|
|
Bytes: x509.MarshalPKCS1PrivateKey(c.key),
|
|
})
|
|
}
|
|
|
|
func ValidateCertificate(cert *x509.Certificate, key *rsa.PrivateKey, expirationThreshold time.Duration) error {
|
|
if !key.PublicKey.Equal(cert.PublicKey) {
|
|
return errors.New("certificate signed by wrong public key")
|
|
}
|
|
|
|
now := time.Now()
|
|
|
|
if now.Before(cert.NotBefore) {
|
|
return errors.New("certificate is not valid yet")
|
|
}
|
|
|
|
if now.After(cert.NotAfter.Add(-expirationThreshold)) {
|
|
return errors.New("certificate expired or going to expire soon")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func GenerateCertificateAuthority() (s *CapsuleCA, err error) {
|
|
s = &CapsuleCA{
|
|
certificate: &x509.Certificate{
|
|
SerialNumber: big.NewInt(2019),
|
|
Subject: pkix.Name{
|
|
Organization: []string{"Clastix"},
|
|
Country: []string{"UK"},
|
|
Province: []string{""},
|
|
Locality: []string{"London"},
|
|
StreetAddress: []string{"27, Old Gloucester Street"},
|
|
PostalCode: []string{"WC1N 3AX"},
|
|
},
|
|
NotBefore: time.Now(),
|
|
NotAfter: time.Now().AddDate(10, 0, 0),
|
|
IsCA: true,
|
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
|
|
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
|
|
BasicConstraintsValid: true,
|
|
},
|
|
}
|
|
|
|
s.key, err = rsa.GenerateKey(rand.Reader, 4096)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func GetCertificateFromBytes(certBytes []byte) (*x509.Certificate, error) {
|
|
var b *pem.Block
|
|
|
|
b, _ = pem.Decode(certBytes)
|
|
|
|
return x509.ParseCertificate(b.Bytes)
|
|
}
|
|
|
|
func GetPrivateKeyFromBytes(keyBytes []byte) (*rsa.PrivateKey, error) {
|
|
var b *pem.Block
|
|
|
|
b, _ = pem.Decode(keyBytes)
|
|
|
|
return x509.ParsePKCS1PrivateKey(b.Bytes)
|
|
}
|
|
|
|
func GetCertificateWithPrivateKeyFromBytes(certBytes, keyBytes []byte) (*x509.Certificate, *rsa.PrivateKey, error) {
|
|
cert, err := GetCertificateFromBytes(certBytes)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
key, err := GetPrivateKeyFromBytes(keyBytes)
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
return cert, key, nil
|
|
}
|
|
|
|
func NewCertificateAuthorityFromBytes(certBytes, keyBytes []byte) (*CapsuleCA, error) {
|
|
cert, key, err := GetCertificateWithPrivateKeyFromBytes(certBytes, keyBytes)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return &CapsuleCA{
|
|
certificate: cert,
|
|
key: key,
|
|
}, nil
|
|
}
|
|
|
|
//nolint:nakedret
|
|
func (c *CapsuleCA) GenerateCertificate(opts CertificateOptions) (certificatePem *bytes.Buffer, certificateKey *bytes.Buffer, err error) {
|
|
var certPrivKey *rsa.PrivateKey
|
|
certPrivKey, err = rsa.GenerateKey(rand.Reader, 4096)
|
|
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
cert := &x509.Certificate{
|
|
SerialNumber: big.NewInt(1658),
|
|
Subject: pkix.Name{
|
|
Organization: []string{"Clastix"},
|
|
Country: []string{"UK"},
|
|
Province: []string{""},
|
|
Locality: []string{"London"},
|
|
StreetAddress: []string{"27, Old Gloucester Street"},
|
|
PostalCode: []string{"WC1N 3AX"},
|
|
},
|
|
DNSNames: opts.DNSNames(),
|
|
NotBefore: time.Now().AddDate(0, 0, -1),
|
|
NotAfter: opts.ExpirationDate(),
|
|
SubjectKeyId: []byte{1, 2, 3, 4, 6},
|
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
|
|
KeyUsage: x509.KeyUsageDigitalSignature,
|
|
}
|
|
|
|
var certBytes []byte
|
|
certBytes, err = x509.CreateCertificate(rand.Reader, cert, c.certificate, &certPrivKey.PublicKey, c.key)
|
|
|
|
if err != nil {
|
|
return nil, nil, err
|
|
}
|
|
|
|
certificatePem = new(bytes.Buffer)
|
|
err = pem.Encode(certificatePem, &pem.Block{
|
|
Type: "CERTIFICATE",
|
|
Bytes: certBytes,
|
|
})
|
|
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
certificateKey = new(bytes.Buffer)
|
|
|
|
err = pem.Encode(certificateKey, &pem.Block{
|
|
Type: "RSA PRIVATE KEY",
|
|
Bytes: x509.MarshalPKCS1PrivateKey(certPrivKey),
|
|
})
|
|
if err != nil {
|
|
return
|
|
}
|
|
|
|
return
|
|
}
|