1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123
|
package roots
import (
"crypto/sha256"
"crypto/x509"
"errors"
"os"
"github.com/cloudflare/cfssl/helpers"
"github.com/cloudflare/cfssl/transport/core"
"github.com/cloudflare/cfssl/transport/roots/system"
)
// Providers is a mapping of supported providers and the functions
// that can build them.
var Providers = map[string]func(map[string]string) ([]*x509.Certificate, error){
"system": system.New,
"cfssl": NewCFSSL,
"file": TrustPEM,
}
// A TrustStore contains a pool of certificate that are trusted for a
// given TLS configuration.
type TrustStore struct {
roots map[string]*x509.Certificate
}
// Pool returns a certificate pool containing the certificates
// loaded into the provider.
func (ts *TrustStore) Pool() *x509.CertPool {
var pool = x509.NewCertPool()
for _, cert := range ts.roots {
pool.AddCert(cert)
}
return pool
}
// Certificates returns a slice of the loaded certificates.
func (ts *TrustStore) Certificates() []*x509.Certificate {
var roots = make([]*x509.Certificate, 0, len(ts.roots))
for _, cert := range ts.roots {
roots = append(roots, cert)
}
return roots
}
func (ts *TrustStore) addCerts(certs []*x509.Certificate) {
if ts.roots == nil {
ts.roots = map[string]*x509.Certificate{}
}
for _, cert := range certs {
digest := sha256.Sum256(cert.Raw)
ts.roots[string(digest[:])] = cert
}
}
// Trusted contains a store of trusted certificates.
type Trusted interface {
// Certificates returns a slice containing the certificates
// that are loaded into the provider.
Certificates() []*x509.Certificate
// AddCert adds a new certificate into the certificate pool.
AddCert(cert *x509.Certificate)
// AddPEM adds a one or more PEM-encoded certificates into the
// certificate pool.
AddPEM(cert []byte) bool
}
// New produces a new trusted root provider from a collection of
// roots. If there are no roots, the system roots will be used.
func New(rootDefs []*core.Root) (*TrustStore, error) {
var err error
var store = &TrustStore{}
var roots []*x509.Certificate
if len(rootDefs) == 0 {
roots, err = system.New(nil)
if err != nil {
return nil, err
}
store.addCerts(roots)
return store, nil
}
err = errors.New("transport: no supported root providers found")
for _, root := range rootDefs {
pfn, ok := Providers[root.Type]
if ok {
roots, err = pfn(root.Metadata)
if err != nil {
break
}
store.addCerts(roots)
}
}
if err != nil {
store = nil
}
return store, err
}
// TrustPEM takes a source file containing one or more certificates
// and adds them to the trust store.
func TrustPEM(metadata map[string]string) ([]*x509.Certificate, error) {
sourceFile, ok := metadata["source"]
if !ok {
return nil, errors.New("transport: PEM source requires a source file")
}
in, err := os.ReadFile(sourceFile)
if err != nil {
return nil, err
}
return helpers.ParseCertificatesPEM(in)
}
|