-
Notifications
You must be signed in to change notification settings - Fork 209
/
utils.go
60 lines (47 loc) · 1.71 KB
/
utils.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
package utils
import (
"context"
"crypto/tls"
"fmt"
"io"
"time"
certerrors "github.com/akash-network/node/x/cert/errors"
"github.com/cosmos/cosmos-sdk/client"
ctypes "github.com/akash-network/akash-api/go/node/cert/v1beta3"
)
// LoadAndQueryCertificateForAccount wraps LoadAndQueryPEMForAccount and tls.X509KeyPair
func LoadAndQueryCertificateForAccount(ctx context.Context, cctx client.Context, fin io.Reader) (tls.Certificate, error) {
kpm, err := NewKeyPairManager(cctx, cctx.FromAddress)
if err != nil {
return tls.Certificate{}, err
}
x509cert, tlsCert, err := kpm.ReadX509KeyPair(fin)
if err != nil {
return tls.Certificate{}, err
}
// Check if valid according to time
if x509cert.NotBefore.After(time.Now().UTC()) {
return tls.Certificate{}, fmt.Errorf("%w: certificate is not yet active, start ts %s", certerrors.ErrCertificate, x509cert.NotBefore)
}
if time.Now().UTC().After(x509cert.NotAfter) {
return tls.Certificate{}, fmt.Errorf("%w: certificate has been expired since %s", certerrors.ErrCertificate, x509cert.NotAfter)
}
params := &ctypes.QueryCertificatesRequest{
Filter: ctypes.CertificateFilter{
Owner: x509cert.Subject.CommonName,
Serial: x509cert.SerialNumber.String(),
},
}
certs, err := ctypes.NewQueryClient(cctx).Certificates(ctx, params)
if err != nil {
return tls.Certificate{}, err
}
if len(certs.Certificates) == 0 {
return tls.Certificate{}, fmt.Errorf("%w: certificate has not been committed to blockchain", certerrors.ErrCertificate)
}
foundCert := certs.Certificates[0]
if foundCert.GetCertificate().State != ctypes.CertificateValid {
return tls.Certificate{}, fmt.Errorf("%w: certificate is not valid", certerrors.ErrCertificate)
}
return tlsCert, nil
}