blob: 22ac7e381b61e2b6426a95a1200bfd132c02e650 [file] [log] [blame]
// Copyright Istio Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Package signer implements a CA signer that uses keys stored on local disk.
package signer
import (
"bytes"
"crypto/x509"
"encoding/pem"
"fmt"
"time"
)
import (
capi "k8s.io/api/certificates/v1"
)
import (
"github.com/apache/dubbo-go-pixiu/pkg/test/csrctrl/authority"
"github.com/apache/dubbo-go-pixiu/security/pkg/pki/util"
)
type Signer struct {
caProvider *caProvider
CertTTL time.Duration
}
func NewSigner(signerRoot, signerName string, certificateDuration time.Duration) (*Signer, error) {
caProvider, err := newCAProvider(signerRoot, signerName)
if err != nil {
return nil, err
}
ret := &Signer{
caProvider: caProvider,
CertTTL: certificateDuration,
}
return ret, nil
}
func (s *Signer) Sign(x509cr *x509.CertificateRequest, usages []capi.KeyUsage, requestedLifetime time.Duration, appendRootCert bool) ([]byte, error) {
currCA, err := s.caProvider.currentCA()
if err != nil {
return nil, err
}
der, err := currCA.Sign(x509cr.Raw, authority.PermissiveSigningPolicy{
TTL: requestedLifetime,
Usages: usages,
})
if err != nil {
return nil, err
}
_, err = x509.ParseCertificate(der)
if err != nil {
return nil, fmt.Errorf("error decoding DER certificate bytes: %s", err.Error())
}
pemBytes := bytes.NewBuffer([]byte{})
err = pem.Encode(pemBytes, &pem.Block{Type: "CERTIFICATE", Bytes: der})
if err != nil {
return nil, fmt.Errorf("error encoding certificate PEM: %s", err.Error())
}
intermediateCerts, err := util.AppendRootCerts(pemBytes.Bytes(), s.caProvider.caIntermediate.CertFile)
if err != nil {
return nil, fmt.Errorf("failed to append intermediate certificates (%v)", err)
}
if appendRootCert {
rootCerts, err := util.AppendRootCerts(intermediateCerts, s.caProvider.caLoader.CertFile)
if err != nil {
return nil, fmt.Errorf("failed to append root certificates (%v)", err)
}
return rootCerts, nil
}
return intermediateCerts, nil
}
func (s *Signer) GetRootCerts() string {
return s.caProvider.caLoader.CertFile
}