1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
|
package cautils
import (
"crypto/x509"
"github.com/pkg/errors"
"github.com/smallstep/cli/crypto/pemutil"
"github.com/smallstep/cli/ui"
"github.com/urfave/cli"
)
// ACMECreateCertFlow performs an ACME transaction to get a new certificate.
func ACMECreateCertFlow(ctx *cli.Context, provisionerName string) error {
args := ctx.Args()
subject := args.Get(0)
certFile, keyFile := args.Get(1), args.Get(2)
af, err := newACMEFlow(ctx, withSubjectSANs(subject, ctx.StringSlice("san")),
withProvisionerName(provisionerName))
if err != nil {
return err
}
certs, err := af.GetCertificate()
if err != nil {
return err
}
if err = writeCert(certs, certFile); err != nil {
return err
}
ui.PrintSelected("Certificate", certFile)
_, err = pemutil.Serialize(af.priv, pemutil.ToFile(keyFile, 0600))
if err != nil {
return errors.WithStack(err)
}
ui.PrintSelected("Private Key", keyFile)
return nil
}
// ACMESignCSRFlow performs an ACME transaction using an existing CSR to get a
// new certificate.
func ACMESignCSRFlow(ctx *cli.Context, csr *x509.CertificateRequest, certFile, provisionerName string) error {
af, err := newACMEFlow(ctx, withCSR(csr), withProvisionerName(provisionerName))
if err != nil {
return err
}
certs, err := af.GetCertificate()
if err != nil {
return err
}
if err = writeCert(certs, certFile); err != nil {
return err
}
ui.PrintSelected("Certificate", certFile)
return nil
}
|