forked from smallstep/cli
-
Notifications
You must be signed in to change notification settings - Fork 0
/
acme_flow.go
56 lines (50 loc) · 1.4 KB
/
acme_flow.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
package cautils
import (
"crypto/x509"
"github.com/pkg/errors"
"github.com/smallstep/cli/crypto/pemutil"
"github.com/smallstep/cli/ui"
"github.com/urfave/cli"
)
// ACMECreateCertFlow performs an ACME transaction to get a new certificate.
func ACMECreateCertFlow(ctx *cli.Context, provisionerName string) error {
args := ctx.Args()
subject := args.Get(0)
certFile, keyFile := args.Get(1), args.Get(2)
af, err := newACMEFlow(ctx, withSubjectSANs(subject, ctx.StringSlice("san")),
withProvisionerName(provisionerName))
if err != nil {
return err
}
certs, err := af.GetCertificate()
if err != nil {
return err
}
if err = writeCert(certs, certFile); err != nil {
return err
}
ui.PrintSelected("Certificate", certFile)
_, err = pemutil.Serialize(af.priv, pemutil.ToFile(keyFile, 0600))
if err != nil {
return errors.WithStack(err)
}
ui.PrintSelected("Private Key", keyFile)
return nil
}
// ACMESignCSRFlow performs an ACME transaction using an existing CSR to get a
// new certificate.
func ACMESignCSRFlow(ctx *cli.Context, csr *x509.CertificateRequest, certFile, provisionerName string) error {
af, err := newACMEFlow(ctx, withCSR(csr), withProvisionerName(provisionerName))
if err != nil {
return err
}
certs, err := af.GetCertificate()
if err != nil {
return err
}
if err = writeCert(certs, certFile); err != nil {
return err
}
ui.PrintSelected("Certificate", certFile)
return nil
}