File: findcert.go

package info (click to toggle)
relic 7.6.1-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 3,108 kB
  • sloc: sh: 230; makefile: 10
file content (121 lines) | stat: -rw-r--r-- 3,443 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
package azuretoken

import (
	"bytes"
	"context"
	"errors"
	"fmt"
	"net/url"
	"strings"
	"time"
)

type certRef struct {
	KeyName, KeyVersion string
	CertBlob            []byte
}

// encode the exact key version into our ID field so that when we're being used
// via a worker token, callers get a consistent signing key from GetKey() to
// Sign()
func (r certRef) KeyID() []byte {
	return []byte(r.KeyName + "/" + r.KeyVersion)
}

// decode a previous KeyID() call back into a key version
func refFromKeyID(keyID []byte) *certRef {
	words := bytes.Split(keyID, []byte{'/'})
	if len(words) != 2 {
		return nil
	}
	return &certRef{
		KeyName:    string(words[0]),
		KeyVersion: string(words[1]),
	}
}

// load the named certificate version and return the key it references
func (t *kvToken) loadCertificateVersion(ctx context.Context, baseURL, certName, certVersion string) (*certRef, error) {
	cert, err := t.cli.GetCertificate(ctx, baseURL, certName, certVersion)
	if err != nil {
		return nil, err
	}
	if cert.Kid == nil {
		return nil, errors.New("missing key ID in certificate")
	}
	keyWords, _, err := parseKeyURL(*cert.Kid)
	if err != nil {
		return nil, err
	}
	if len(keyWords) != 4 || keyWords[1] != "keys" {
		return nil, fmt.Errorf("unexpected format for key ID: %s", *cert.Kid)
	}
	var blob []byte
	if cert.Cer != nil {
		blob = *cert.Cer
	}
	return &certRef{
		KeyName:    keyWords[2],
		KeyVersion: keyWords[3],
		CertBlob:   blob,
	}, nil
}

// load the latest enabled version of the named certificate and return the key it references
func (t *kvToken) loadCertificateLatest(ctx context.Context, baseURL, certName string) (*certRef, error) {
	// list all versions of the cert and pick the latest enabled one
	certs, err := t.cli.GetCertificateVersions(ctx, baseURL, certName, nil)
	if err != nil {
		return nil, fmt.Errorf("listing cert versions: %w", err)
	}
	var best string
	var bestNBF time.Time
	for certs.NotDone() {
		for _, cert := range certs.Values() {
			if cert.Attributes == nil || cert.Attributes.Enabled == nil || !*cert.Attributes.Enabled {
				continue
			}
			if cert.Attributes.NotBefore == nil || cert.ID == nil {
				continue
			}
			nbf := time.Time(*cert.Attributes.NotBefore)
			if nbf.After(bestNBF) {
				best, bestNBF = *cert.ID, nbf
			}
		}
		if err := certs.NextWithContext(ctx); err != nil {
			return nil, fmt.Errorf("listing cert versions: %w", err)
		}
	}
	// parse the cert ID and load it
	if best == "" || bestNBF.IsZero() {
		return nil, fmt.Errorf("cert %s has no enabled versions", certName)
	}
	words, _, err := parseKeyURL(best)
	if err != nil {
		return nil, fmt.Errorf("cert %s has invalid key ID: %w", certName, err)
	}
	if len(words) != 4 || words[1] != "certificates" {
		return nil, fmt.Errorf("unexpected format for certificate ID: %s", best)
	}
	return t.loadCertificateVersion(ctx, baseURL, words[2], words[3])
}

var errKeyID = errors.New("id: expected URL of a certificate, certificate version, or key version")

func parseKeyURL(keyURL string) (words []string, baseURL string, err error) {
	if keyURL == "" {
		return nil, "", errKeyID
	}
	// deconstruct URL to call GetKey so it can put it back together again
	u, err := url.Parse(keyURL)
	if err != nil {
		return nil, "", fmt.Errorf("id: %w", err)
	} else if u.Scheme == "" || u.Host == "" {
		return nil, "", errKeyID
	}
	words = strings.Split(u.Path, "/")
	u.Path = ""
	baseURL = u.String()
	return words, baseURL, nil
}