201 lines
5 KiB
Go
201 lines
5 KiB
Go
/*
|
|
Copyright 2022 CAcert Inc.
|
|
SPDX-License-Identifier: Apache-2.0
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"git.cacert.org/cacert-gosigner/internal/config"
|
|
"git.cacert.org/cacert-gosigner/internal/handler"
|
|
"git.cacert.org/cacert-gosigner/internal/health"
|
|
"git.cacert.org/cacert-gosigner/internal/hsm"
|
|
"git.cacert.org/cacert-gosigner/internal/serial"
|
|
"git.cacert.org/cacert-gosigner/internal/x509/revoking"
|
|
)
|
|
|
|
var (
|
|
commit = "dev"
|
|
date = "unknown"
|
|
version = "unknown"
|
|
)
|
|
|
|
const (
|
|
defaultSignerConfigFile = "config.yaml"
|
|
)
|
|
|
|
func main() {
|
|
var (
|
|
showVersion, setupMode, verbose bool
|
|
signerConfigFile, logLevel string
|
|
logger *logrus.Logger
|
|
)
|
|
|
|
logger = logrus.New()
|
|
logger.SetOutput(os.Stdout)
|
|
logger.SetLevel(logrus.InfoLevel)
|
|
|
|
logger.Infof("cacert-gosigner %s (%s) - built %s", version, commit, date)
|
|
|
|
flag.StringVar(&signerConfigFile, "config", defaultSignerConfigFile, "signer configuration file")
|
|
flag.BoolVar(&showVersion, "version", false, "show version")
|
|
flag.BoolVar(&setupMode, "setup", false, "setup mode")
|
|
flag.BoolVar(&verbose, "verbose", false, "verbose output")
|
|
flag.StringVar(&logLevel, "loglevel", "INFO", "log level")
|
|
|
|
flag.Parse()
|
|
|
|
if showVersion {
|
|
return
|
|
}
|
|
|
|
parsedLevel, err := logrus.ParseLevel(logLevel)
|
|
if err != nil {
|
|
logger.WithError(err).Fatal("could not parse log level")
|
|
}
|
|
|
|
logger.SetLevel(parsedLevel)
|
|
|
|
caConfig := loadConfig(signerConfigFile, logger)
|
|
|
|
access := initializeHSM(caConfig, setupMode, verbose, logger)
|
|
|
|
if setupMode {
|
|
return
|
|
}
|
|
|
|
healthHandler := health.New(version, access)
|
|
|
|
revokingRepositories, err := configureRepositories(caConfig)
|
|
if err != nil {
|
|
logger.WithError(err).Fatal("could not setup revoking repositories")
|
|
}
|
|
|
|
fetchCRLHandler := revoking.NewFetchCRLHandler(revokingRepositories)
|
|
|
|
proto, err := handler.New(
|
|
logger,
|
|
handler.RegisterHealthHandler(healthHandler),
|
|
handler.RegisterFetchCRLHandler(fetchCRLHandler),
|
|
)
|
|
if err != nil {
|
|
logger.WithError(err).Fatal("could not setup protocol handler")
|
|
}
|
|
|
|
serialHandler, err := serial.New(caConfig.GetSerial(), logger, proto)
|
|
if err != nil {
|
|
logger.WithError(err).Fatal("could not setup serial link handler")
|
|
}
|
|
|
|
defer func() { _ = serialHandler.Close() }()
|
|
|
|
logger.Info("setup complete, starting signer operation")
|
|
|
|
if err = serialHandler.Run(context.Background()); err != nil {
|
|
logger.WithError(err).Fatal("error in serial handler")
|
|
}
|
|
}
|
|
|
|
func configureRepositories(
|
|
caConfig *config.SignerConfig,
|
|
) (map[string]*revoking.X509Revoking, error) {
|
|
var err error
|
|
|
|
result := make(map[string]*revoking.X509Revoking)
|
|
|
|
for _, name := range caConfig.RootCAs() {
|
|
result[fmt.Sprintf("root-%s", name)], err = buildX509Revoking(caConfig, name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
for _, name := range caConfig.SubordinateCAs() {
|
|
result[fmt.Sprintf("sub-%s", name)], err = buildX509Revoking(caConfig, name)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
}
|
|
|
|
return result, nil
|
|
}
|
|
|
|
func buildX509Revoking(caConfig *config.SignerConfig, name string) (*revoking.X509Revoking, error) {
|
|
caDef, err := caConfig.GetCADefinition(name)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get CA definition for %s: %w", name, err)
|
|
}
|
|
|
|
repo, err := caConfig.Repository(name)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not get repository for %s: %w", name, err)
|
|
}
|
|
|
|
return revoking.NewX509Revoking(
|
|
repo,
|
|
caDef.KeyInfo.CRLSignatureAlgorithm,
|
|
caDef.Certificate,
|
|
caDef.KeyPair,
|
|
), nil
|
|
}
|
|
|
|
func initializeHSM(caConfig *config.SignerConfig, setupMode, verbose bool, logger *logrus.Logger) *hsm.Access {
|
|
opts := make([]hsm.ConfigOption, 0)
|
|
|
|
opts = append(opts, hsm.CaConfigOption(caConfig))
|
|
|
|
if setupMode {
|
|
logger.Infof("running in setup mode")
|
|
|
|
opts = append(opts, hsm.SetupModeOption())
|
|
}
|
|
|
|
if verbose {
|
|
opts = append(opts, hsm.VerboseLoggingOption())
|
|
}
|
|
|
|
access, err := hsm.NewAccess(logger, opts...)
|
|
if err != nil {
|
|
logger.WithError(err).Fatal("could not setup HSM access")
|
|
}
|
|
|
|
err = access.EnsureCAKeysAndCertificates()
|
|
if err != nil {
|
|
logger.WithError(err).Fatal("could not ensure CA keys and certificates exist")
|
|
}
|
|
|
|
return access
|
|
}
|
|
|
|
func loadConfig(signerConfigFile string, logger *logrus.Logger) *config.SignerConfig {
|
|
configFile, err := os.Open(signerConfigFile)
|
|
if err != nil {
|
|
logger.WithError(err).Fatalf("could not open signer configuration file: %s", signerConfigFile)
|
|
}
|
|
|
|
caConfig, err := config.LoadConfiguration(configFile)
|
|
if err != nil {
|
|
logger.Fatalf("could not load CA hierarchy: %v", err)
|
|
}
|
|
|
|
return caConfig
|
|
}
|