1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279
|
package tls
import (
"crypto"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/rsa"
"crypto/sha256"
"crypto/x509"
"crypto/x509/pkix"
"encoding/asn1"
"encoding/pem"
"math"
"math/big"
"net"
"time"
"github.com/crc-org/crc/v2/pkg/crc/logging"
"github.com/pkg/errors"
)
// This file is taken from openshift/installer repo and adds more function
// https://github.com/openshift/installer/blob/master/pkg/asset/tls/tls.go
// Importing installer just for this file adds lots of different dependencies
// and also increase the binary size.
const (
keySize = 2048
// ValidityOneDay sets the validity of a cert to 24 hours.
ValidityOneDay = time.Hour * 24
// ValidityOneYear sets the validity of a cert to 1 year.
ValidityOneYear = ValidityOneDay * 365
// ValidityTenYears sets the validity of a cert to 10 years.
ValidityTenYears = ValidityOneYear * 10
)
// CertCfg contains all needed fields to configure a new certificate
type CertCfg struct {
DNSNames []string
ExtKeyUsages []x509.ExtKeyUsage
IPAddresses []net.IP
KeyUsages x509.KeyUsage
Subject pkix.Name
Validity time.Duration
IsCA bool
}
// rsaPublicKey reflects the ASN.1 structure of a PKCS#1 public key.
type rsaPublicKey struct {
N *big.Int
E int
}
// PrivateKey generates an RSA Private key and returns the value
func PrivateKey() (*rsa.PrivateKey, error) {
rsaKey, err := rsa.GenerateKey(rand.Reader, keySize)
if err != nil {
return nil, errors.Wrap(err, "error generating RSA private key")
}
return rsaKey, nil
}
// SelfSignedCertificate creates a self signed certificate
func SelfSignedCertificate(cfg *CertCfg, key *rsa.PrivateKey) (*x509.Certificate, error) {
serial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))
if err != nil {
return nil, err
}
cert := x509.Certificate{
BasicConstraintsValid: true,
IsCA: cfg.IsCA,
KeyUsage: cfg.KeyUsages,
NotAfter: time.Now().Add(cfg.Validity),
NotBefore: time.Now(),
SerialNumber: serial,
Subject: cfg.Subject,
}
// verifies that the CN and/or OU for the cert is set
if len(cfg.Subject.CommonName) == 0 || len(cfg.Subject.OrganizationalUnit) == 0 {
return nil, errors.Errorf("certification's subject is not set, or invalid")
}
pub := key.Public()
cert.SubjectKeyId, err = generateSubjectKeyID(pub)
if err != nil {
return nil, errors.Wrap(err, "failed to set subject key identifier")
}
certBytes, err := x509.CreateCertificate(rand.Reader, &cert, &cert, key.Public(), key)
if err != nil {
return nil, errors.Wrap(err, "failed to create certificate")
}
return x509.ParseCertificate(certBytes)
}
// SignedCertificate creates a new X.509 certificate based on a template.
func SignedCertificate(
cfg *CertCfg,
csr *x509.CertificateRequest,
key *rsa.PrivateKey,
caCert *x509.Certificate,
caKey *rsa.PrivateKey,
) (*x509.Certificate, error) {
serial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))
if err != nil {
return nil, err
}
certTmpl := x509.Certificate{
DNSNames: csr.DNSNames,
ExtKeyUsage: cfg.ExtKeyUsages,
IPAddresses: csr.IPAddresses,
KeyUsage: cfg.KeyUsages,
NotAfter: time.Now().Add(cfg.Validity),
NotBefore: caCert.NotBefore,
SerialNumber: serial,
Subject: csr.Subject,
IsCA: cfg.IsCA,
Version: 3,
BasicConstraintsValid: true,
}
pub := key.Public()
certTmpl.SubjectKeyId, err = generateSubjectKeyID(pub)
if err != nil {
return nil, errors.Wrap(err, "failed to set subject key identifier")
}
certBytes, err := x509.CreateCertificate(rand.Reader, &certTmpl, caCert, key.Public(), caKey)
if err != nil {
return nil, errors.Wrap(err, "failed to create x509 certificate")
}
return x509.ParseCertificate(certBytes)
}
// generateSubjectKeyID generates a SHA-1 hash of the subject public key.
func generateSubjectKeyID(pub crypto.PublicKey) ([]byte, error) {
var publicKeyBytes []byte
var err error
switch pub := pub.(type) {
case *rsa.PublicKey:
publicKeyBytes, err = asn1.Marshal(rsaPublicKey{N: pub.N, E: pub.E})
if err != nil {
return nil, errors.Wrap(err, "failed to Marshal ans1 public key")
}
case *ecdsa.PublicKey:
publicKeyBytes = elliptic.Marshal(pub.Curve, pub.X, pub.Y)
default:
return nil, errors.New("only RSA and ECDSA public keys supported")
}
hash := sha256.Sum256(publicKeyBytes)
return hash[:], nil
}
// GenerateSignedCertificate generate a key and cert defined by CertCfg and signed by CA.
func GenerateSignedCertificate(caKey *rsa.PrivateKey, caCert *x509.Certificate,
cfg *CertCfg) (*rsa.PrivateKey, *x509.Certificate, error) {
// create a private key
key, err := PrivateKey()
if err != nil {
return nil, nil, errors.Wrap(err, "failed to generate private key")
}
// create a CSR
csrTmpl := x509.CertificateRequest{Subject: cfg.Subject, DNSNames: cfg.DNSNames, IPAddresses: cfg.IPAddresses}
csrBytes, err := x509.CreateCertificateRequest(rand.Reader, &csrTmpl, key)
if err != nil {
return nil, nil, errors.Wrap(err, "failed to create certificate request")
}
csr, err := x509.ParseCertificateRequest(csrBytes)
if err != nil {
logging.Debugf("Failed to parse x509 certificate request: %s", err)
return nil, nil, errors.Wrap(err, "error parsing x509 certificate request")
}
// create a cert
cert, err := SignedCertificate(cfg, csr, key, caCert, caKey)
if err != nil {
logging.Debugf("Failed to create a signed certificate: %s", err)
return nil, nil, errors.Wrap(err, "failed to create a signed certificate")
}
return key, cert, nil
}
// GenerateSelfSignedCertificate generates a key/cert pair defined by CertCfg.
func GenerateSelfSignedCertificate(cfg *CertCfg) (*rsa.PrivateKey, *x509.Certificate, error) {
key, err := PrivateKey()
if err != nil {
logging.Debugf("Failed to generate a private key: %s", err)
return nil, nil, errors.Wrap(err, "failed to generate private key")
}
crt, err := SelfSignedCertificate(cfg, key)
if err != nil {
logging.Debugf("Failed to create self-signed certificate: %s", err)
return nil, nil, errors.Wrap(err, "failed to create self-signed certificate")
}
return key, crt, nil
}
func GetSelfSignedCA() (*rsa.PrivateKey, *x509.Certificate, error) {
rootCAConf := &CertCfg{
Subject: pkix.Name{CommonName: "admin-kubeconfig-signer-custom", OrganizationalUnit: []string{"openshift"}},
KeyUsages: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
Validity: ValidityTenYears,
IsCA: true,
}
return GenerateSelfSignedCertificate(rootCAConf)
}
func GenerateClientCertificate(rootCAKey *rsa.PrivateKey, rootCACert *x509.Certificate) ([]byte, []byte, error) {
adminUserConf := &CertCfg{
Subject: pkix.Name{CommonName: "system:admin", OrganizationalUnit: []string{"system:masters"}},
KeyUsages: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
Validity: ValidityTenYears,
}
clientKey, clientCrt, err := GenerateSignedCertificate(rootCAKey, rootCACert, adminUserConf)
if err != nil {
return nil, nil, err
}
return PrivateKeyToPem(clientKey), CertToPem(clientCrt), nil
}
// PrivateKeyToPem converts an rsa.PrivateKey object to pem string
func PrivateKeyToPem(key *rsa.PrivateKey) []byte {
keyInBytes := x509.MarshalPKCS1PrivateKey(key)
keyinPem := pem.EncodeToMemory(
&pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: keyInBytes,
},
)
return keyinPem
}
// CertToPem converts an x509.Certificate object to a pem string
func CertToPem(cert *x509.Certificate) []byte {
certInPem := pem.EncodeToMemory(
&pem.Block{
Type: "CERTIFICATE",
Bytes: cert.Raw,
},
)
return certInPem
}
// VerifyCertificateAgainstRootCA takes caPEM and certificatePEM as string
// to validate if given certificate is signed by given ca.
func VerifyCertificateAgainstRootCA(ca, certificate string) (bool, error) {
roots := x509.NewCertPool()
ok := roots.AppendCertsFromPEM([]byte(ca))
if !ok {
return false, errors.New("failed to parse root certificate")
}
block, _ := pem.Decode([]byte(certificate))
if block == nil {
return false, errors.New("failed to decode client PEM")
}
cert, err := x509.ParseCertificate(block.Bytes)
if err != nil {
return false, errors.Wrapf(err, "failed to parse client PEM")
}
opts := x509.VerifyOptions{
Roots: roots,
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
}
if _, err := cert.Verify(opts); err != nil {
return false, nil
}
return true, nil
}
|