forked from cloudflare/cfssl
-
Notifications
You must be signed in to change notification settings - Fork 0
/
provider.go
123 lines (102 loc) · 2.85 KB
/
provider.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
package roots
import (
"crypto/sha256"
"crypto/x509"
"errors"
"io/ioutil"
"github.com/cloudflare/cfssl/helpers"
"github.com/cloudflare/cfssl/transport/core"
"github.com/cloudflare/cfssl/transport/roots/system"
)
// Providers is a mapping of supported providers and the functions
// that can build them.
var Providers = map[string]func(map[string]string) ([]*x509.Certificate, error){
"system": system.New,
"cfssl": NewCFSSL,
"file": TrustPEM,
}
// A TrustStore contains a pool of certificate that are trusted for a
// given TLS configuration.
type TrustStore struct {
roots map[string]*x509.Certificate
}
// Pool returns a certificate pool containing the certificates
// loaded into the provider.
func (ts *TrustStore) Pool() *x509.CertPool {
var pool = x509.NewCertPool()
for _, cert := range ts.roots {
pool.AddCert(cert)
}
return pool
}
// Certificates returns a slice of the loaded certificates.
func (ts *TrustStore) Certificates() []*x509.Certificate {
var roots = make([]*x509.Certificate, 0, len(ts.roots))
for _, cert := range ts.roots {
roots = append(roots, cert)
}
return roots
}
func (ts *TrustStore) addCerts(certs []*x509.Certificate) {
if ts.roots == nil {
ts.roots = map[string]*x509.Certificate{}
}
for _, cert := range certs {
digest := sha256.Sum256(cert.Raw)
ts.roots[string(digest[:])] = cert
}
}
// Trusted contains a store of trusted certificates.
type Trusted interface {
// Certificates returns a slice containing the certificates
// that are loaded into the provider.
Certificates() []*x509.Certificate
// AddCert adds a new certificate into the certificate pool.
AddCert(cert *x509.Certificate)
// AddPEM adds a one or more PEM-encoded certificates into the
// certificate pool.
AddPEM(cert []byte) bool
}
// New produces a new trusted root provider from a collection of
// roots. If there are no roots, the system roots will be used.
func New(rootDefs []*core.Root) (*TrustStore, error) {
var err error
var store = &TrustStore{}
var roots []*x509.Certificate
if len(rootDefs) == 0 {
roots, err = system.New(nil)
if err != nil {
return nil, err
}
store.addCerts(roots)
return store, nil
}
err = errors.New("transport: no supported root providers found")
for _, root := range rootDefs {
pfn, ok := Providers[root.Type]
if ok {
roots, err = pfn(root.Metadata)
if err != nil {
break
}
store.addCerts(roots)
}
}
if err != nil {
store = nil
}
return store, err
}
// TrustPEM takes a source file containing one or more certificates
// and adds them to the trust store.
func TrustPEM(metadata map[string]string) ([]*x509.Certificate, error) {
sourceFile, ok := metadata["source"]
if !ok {
return nil, errors.New("transport: PEM source requires a source file")
}
in, err := ioutil.ReadFile(sourceFile)
if err != nil {
return nil, err
}
return helpers.ParseCertificatesPEM(in)
}