2022-03-06 15:51:09 +00:00
|
|
|
/*
|
2022-03-21 17:46:04 +00:00
|
|
|
Copyright 2022 CAcert Inc.
|
|
|
|
SPDX-License-Identifier: Apache-2.0
|
2022-03-06 15:51:09 +00:00
|
|
|
|
2022-03-21 17:46:04 +00:00
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
2022-03-06 15:51:09 +00:00
|
|
|
|
2022-03-21 17:46:04 +00:00
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
2022-03-06 15:51:09 +00:00
|
|
|
|
2022-03-21 17:46:04 +00:00
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
2022-03-06 15:51:09 +00:00
|
|
|
*/
|
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2022-03-06 15:18:04 +00:00
|
|
|
"context"
|
2022-03-06 13:40:46 +00:00
|
|
|
"crypto"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/pem"
|
2022-03-06 15:51:09 +00:00
|
|
|
"errors"
|
2022-03-06 13:40:46 +00:00
|
|
|
"flag"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2022-03-06 15:18:04 +00:00
|
|
|
"os"
|
|
|
|
"os/signal"
|
|
|
|
"syscall"
|
2022-03-06 13:40:46 +00:00
|
|
|
"time"
|
|
|
|
|
2022-07-26 17:02:03 +00:00
|
|
|
"code.cacert.org/cacert/goocsp/pkg/crlcertdb"
|
2022-03-06 13:40:46 +00:00
|
|
|
"github.com/knadh/koanf"
|
|
|
|
"github.com/knadh/koanf/parsers/yaml"
|
|
|
|
"github.com/knadh/koanf/providers/file"
|
|
|
|
"github.com/sirupsen/logrus"
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-07-26 17:02:03 +00:00
|
|
|
"code.cacert.org/cacert/goocsp/pkg/opensslcertdb"
|
2022-03-29 16:31:55 +00:00
|
|
|
|
2022-07-26 17:02:03 +00:00
|
|
|
"code.cacert.org/cacert/goocsp/pkg/ocsp"
|
2022-03-28 19:28:41 +00:00
|
|
|
|
2022-07-26 17:02:03 +00:00
|
|
|
"code.cacert.org/cacert/goocsp/pkg/ocspsource"
|
2022-03-06 13:40:46 +00:00
|
|
|
)
|
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
/* constants for configuration keys */
|
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
const (
|
2022-07-26 17:00:04 +00:00
|
|
|
coIssuers = "issuers"
|
|
|
|
issuerCaCert = "caCertificate"
|
|
|
|
issuerReCert = "responderCertificate"
|
|
|
|
issuerReKey = "responderKey"
|
|
|
|
issuerDbType = "dbType"
|
|
|
|
issuerDbFile = "dbFile"
|
2022-03-06 13:40:46 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
2022-03-21 17:46:04 +00:00
|
|
|
var (
|
|
|
|
serverAddr = flag.String("serverAddr", ":8080", "Server ip addr and port")
|
|
|
|
config = koanf.New(".")
|
|
|
|
opts []ocspsource.Option
|
|
|
|
)
|
2022-03-06 13:40:46 +00:00
|
|
|
|
|
|
|
err := config.Load(file.Provider("config.yaml"), yaml.Parser())
|
|
|
|
if err != nil {
|
|
|
|
logrus.Panicf("could not load configuration: %v", err)
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 15:18:04 +00:00
|
|
|
logrus.SetLevel(logrus.DebugLevel)
|
2022-03-06 13:40:46 +00:00
|
|
|
|
|
|
|
issuerConfigs := config.Slices(coIssuers)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-28 19:16:14 +00:00
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
opts = configureIssuers(ctx, issuerConfigs, opts)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
|
|
|
cacertSource, err := ocspsource.NewSource(opts...)
|
|
|
|
if err != nil {
|
|
|
|
logrus.Panicf("could not create OCSP source: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
http.Handle("/", withLogging(ocsp.NewResponder(cacertSource, nil).ServeHTTP))
|
|
|
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
server := &http.Server{
|
|
|
|
Addr: *serverAddr,
|
|
|
|
}
|
|
|
|
|
|
|
|
setupCloseHandler(ctx, server)
|
|
|
|
|
|
|
|
if err := server.ListenAndServe(); err != nil {
|
|
|
|
if !errors.Is(err, http.ErrServerClosed) {
|
|
|
|
logrus.Panicf("could not start the server process: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logrus.Infof("server shutdown")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-26 17:00:04 +00:00
|
|
|
var ErrUnknownDBType = errors.New("unknown certificate db type")
|
|
|
|
|
|
|
|
const (
|
|
|
|
dbTypeCRL = "crl"
|
|
|
|
dbTypeOpenSSL = "openssl"
|
|
|
|
)
|
|
|
|
|
2022-03-28 19:16:14 +00:00
|
|
|
func configureIssuers(ctx context.Context, issuerConfigs []*koanf.Koanf, opts []ocspsource.Option) []ocspsource.Option {
|
2022-03-06 13:40:46 +00:00
|
|
|
for number, issuerConfig := range issuerConfigs {
|
|
|
|
hasErrors := false
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-07-26 17:00:04 +00:00
|
|
|
for _, item := range []string{issuerCaCert, issuerReCert, issuerReKey, issuerDbType, issuerDbFile} {
|
2022-03-06 13:40:46 +00:00
|
|
|
if v := issuerConfig.String(item); v == "" {
|
|
|
|
logrus.Warnf("%s parameter for issuers entry %d is missing", item, number)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
hasErrors = true
|
|
|
|
}
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
if hasErrors {
|
|
|
|
logrus.Warnf("configuration for issuers entry %d had errors and has been skipped", number)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
caCertificate, err := parseCertificate(issuerConfig.String(issuerCaCert))
|
|
|
|
if err != nil {
|
|
|
|
logrus.Errorf("could not parse CA certificate for issuer %d: %v", number, err)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
responderCertificate, err := parseCertificate(issuerConfig.String(issuerReCert))
|
|
|
|
if err != nil {
|
|
|
|
logrus.Errorf("could not parse OCSP responder certificate for issuer %d: %v", number, err)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
responderKey, err := parsePrivateKey(issuerConfig.String(issuerReKey))
|
|
|
|
if err != nil {
|
|
|
|
logrus.Errorf("could not parse OCSP responder key for issuer %d: %v", number, err)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-07-26 17:00:04 +00:00
|
|
|
var certDb ocspsource.CertificateDatabase
|
|
|
|
|
|
|
|
switch issuerConfig.String(issuerDbType) {
|
|
|
|
case dbTypeOpenSSL:
|
|
|
|
certDb, err = opensslcertdb.NewCertDB(ctx, issuerConfig.String(issuerDbFile))
|
|
|
|
case dbTypeCRL:
|
|
|
|
certDb, err = crlcertdb.NewCertDB(ctx, issuerConfig.String(issuerDbFile))
|
|
|
|
default:
|
|
|
|
err = ErrUnknownDBType
|
|
|
|
}
|
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
if err != nil {
|
2022-03-28 19:16:14 +00:00
|
|
|
logrus.Errorf("could not create certificate db %d: %v", number, err)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
continue
|
|
|
|
}
|
2022-03-29 16:20:28 +00:00
|
|
|
|
2022-03-28 19:16:14 +00:00
|
|
|
issuer := ocspsource.NewIssuer(
|
|
|
|
caCertificate,
|
|
|
|
responderCertificate,
|
|
|
|
responderKey,
|
|
|
|
certDb,
|
|
|
|
)
|
2022-03-06 15:18:04 +00:00
|
|
|
|
2022-03-21 17:46:04 +00:00
|
|
|
opts = append(opts, ocspsource.WithIssuer(issuer))
|
2022-03-06 15:51:09 +00:00
|
|
|
}
|
|
|
|
|
2022-03-21 17:46:04 +00:00
|
|
|
return opts
|
2022-03-06 15:18:04 +00:00
|
|
|
}
|
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
// The setupCloseHandler takes care of OS signal handling
|
|
|
|
func setupCloseHandler(ctx context.Context, server *http.Server) {
|
2022-03-21 17:46:04 +00:00
|
|
|
c := make(chan os.Signal, 1)
|
|
|
|
|
2022-03-06 15:18:04 +00:00
|
|
|
signal.Notify(c, os.Interrupt, syscall.SIGTERM)
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
go func(ctx context.Context) {
|
2022-03-06 15:18:04 +00:00
|
|
|
<-c
|
|
|
|
logrus.Infof("program interrupted")
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
err := server.Shutdown(ctx)
|
2022-03-06 15:18:04 +00:00
|
|
|
if err != nil {
|
|
|
|
logrus.Errorf("could not close server: %v", err)
|
|
|
|
}
|
2022-03-06 15:51:09 +00:00
|
|
|
}(ctx)
|
2022-03-06 13:40:46 +00:00
|
|
|
}
|
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
// The withLogging provides middleware to log incoming requests
|
2022-03-06 13:40:46 +00:00
|
|
|
func withLogging(next http.HandlerFunc) http.HandlerFunc {
|
|
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
start := time.Now()
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
next.ServeHTTP(w, r)
|
|
|
|
logrus.Infof("GET %s FROM %s in %dms", r.URL.Path, r.RemoteAddr, time.Since(start).Milliseconds())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
// parseCertificate is a helper to parse X.509 certificates from files
|
2022-03-06 13:40:46 +00:00
|
|
|
func parseCertificate(certificateFile string) (*x509.Certificate, error) {
|
|
|
|
pemData, err := ioutil.ReadFile(certificateFile)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not read PEM data from %s: %w", certificateFile, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
block, _ := pem.Decode(pemData)
|
|
|
|
if block == nil {
|
|
|
|
return nil, fmt.Errorf("could not find PEM data in %s", certificateFile)
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
certificate, err := x509.ParseCertificate(block.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not parse certificate in %s: %w", certificateFile, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return certificate, nil
|
|
|
|
}
|
|
|
|
|
2022-03-06 15:51:09 +00:00
|
|
|
// parsePrivateKey is a helper to parse PKCS#1 or PKCS#8 private keys from files
|
2022-03-06 13:40:46 +00:00
|
|
|
func parsePrivateKey(keyFile string) (crypto.Signer, error) {
|
|
|
|
pemData, err := ioutil.ReadFile(keyFile)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("could not read PEM data from %s: %w", keyFile, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
block, _ := pem.Decode(pemData)
|
|
|
|
if block == nil {
|
|
|
|
return nil, fmt.Errorf("could not find PEM data in %s", keyFile)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch block.Type {
|
|
|
|
case "PRIVATE KEY":
|
|
|
|
key, err := x509.ParsePKCS8PrivateKey(block.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("no usable private key found in %s: %w", keyFile, err)
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
|
|
|
signer, ok := key.(crypto.Signer)
|
|
|
|
if !ok {
|
|
|
|
return nil, errors.New("key cannot be used as signer")
|
|
|
|
}
|
|
|
|
|
|
|
|
return signer, nil
|
2022-03-06 13:40:46 +00:00
|
|
|
case "RSA PRIVATE KEY":
|
|
|
|
rsaKey, err := x509.ParsePKCS1PrivateKey(block.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("no usable private key found in %s: %w", keyFile, err)
|
|
|
|
}
|
2022-03-21 17:46:04 +00:00
|
|
|
|
2022-03-06 13:40:46 +00:00
|
|
|
return rsaKey, nil
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("unsupported PEM block type %s in %s", block.Type, keyFile)
|
|
|
|
}
|
|
|
|
}
|