forked from smallstep/cli
-
Notifications
You must be signed in to change notification settings - Fork 0
/
rootProfile.go
81 lines (68 loc) · 1.98 KB
/
rootProfile.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package x509util
import (
"crypto/rand"
"crypto/x509/pkix"
"math/big"
"time"
"github.com/pkg/errors"
"github.com/smallstep/cli/pkg/x509"
)
// Root implements the Profile for a root certificate.
type Root struct {
base
}
// NewRootProfile returns a new root x509 Certificate profile.
func NewRootProfile(name string, withOps ...WithOption) (*Root, error) {
crt, err := defaultRootTemplate(name)
if err != nil {
return nil, errors.WithStack(err)
}
b, err := newBase(crt, crt, withOps...)
if err != nil {
return nil, errors.WithStack(err)
}
r := &Root{}
fromBase(r, *b)
r.SetIssuerPrivateKey(r.SubjectPrivateKey())
return r, nil
}
// NewRootProfileWithTemplate returns a new root x509 Certificate profile.
func NewRootProfileWithTemplate(crt *x509.Certificate, withOps ...WithOption) (*Root, error) {
b, err := newBase(crt, crt, withOps...)
if err != nil {
return nil, err
}
r := &Root{}
fromBase(r, *b)
r.SetIssuerPrivateKey(r.SubjectPrivateKey())
return r, nil
}
func defaultRootTemplate(cn string) (*x509.Certificate, error) {
var (
err error
notBefore = time.Now()
)
ct := &x509.Certificate{
IsCA: true,
NotBefore: notBefore,
// 10 year root certificate validity.
NotAfter: notBefore.Add(time.Hour * 24 * 365 * 10),
KeyUsage: x509.KeyUsageKeyEncipherment |
x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign |
x509.KeyUsageCRLSign,
BasicConstraintsValid: true,
MaxPathLen: 1,
MaxPathLenZero: false,
Issuer: pkix.Name{CommonName: cn},
Subject: pkix.Name{CommonName: cn},
}
// TODO figure out how to test rand w/out threading as another arg
serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
ct.SerialNumber, err = rand.Int(rand.Reader, serialNumberLimit)
// TODO error condition untested -- hard to test w/o mocking rand
if err != nil {
return nil, errors.Wrapf(err, "Failed to generate serial number for "+
"certificate with common name '%s'", cn)
}
return ct, nil
}