2019-07-01 06:07:58 +08:00
|
|
|
// Copyright 2015 Matthew Holt and The Caddy Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2019-04-26 03:54:48 +08:00
|
|
|
package caddytls
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"crypto/tls"
|
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
|
2019-07-03 02:37:06 +08:00
|
|
|
"github.com/caddyserver/caddy/v2"
|
2019-04-26 03:54:48 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2019-08-22 00:46:35 +08:00
|
|
|
caddy.RegisterModule(FolderLoader{})
|
2019-04-26 03:54:48 +08:00
|
|
|
}
|
|
|
|
|
2019-08-10 02:05:47 +08:00
|
|
|
// FolderLoader loads certificates and their associated keys from disk
|
2019-04-26 03:54:48 +08:00
|
|
|
// by recursively walking the specified directories, looking for PEM
|
|
|
|
// files which contain both a certificate and a key.
|
2019-08-10 02:05:47 +08:00
|
|
|
type FolderLoader []string
|
2019-04-26 03:54:48 +08:00
|
|
|
|
2019-08-22 00:46:35 +08:00
|
|
|
// CaddyModule returns the Caddy module information.
|
|
|
|
func (FolderLoader) CaddyModule() caddy.ModuleInfo {
|
|
|
|
return caddy.ModuleInfo{
|
2019-12-11 04:36:46 +08:00
|
|
|
ID: "tls.certificates.load_folders",
|
|
|
|
New: func() caddy.Module { return new(FolderLoader) },
|
2019-08-22 00:46:35 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-12-05 00:23:15 +08:00
|
|
|
// Provision implements caddy.Provisioner.
|
|
|
|
func (fl FolderLoader) Provision(ctx caddy.Context) error {
|
|
|
|
repl, ok := ctx.Value(caddy.ReplacerCtxKey).(*caddy.Replacer)
|
|
|
|
if !ok {
|
|
|
|
repl = caddy.NewReplacer()
|
|
|
|
}
|
|
|
|
for k, path := range fl {
|
|
|
|
fl[k] = repl.ReplaceKnown(path, "")
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-04-26 03:54:48 +08:00
|
|
|
// LoadCertificates loads all the certificates+keys in the directories
|
|
|
|
// listed in fl from all files ending with .pem. This method of loading
|
|
|
|
// certificates expects the certificate and key to be bundled into the
|
|
|
|
// same file.
|
2019-08-10 02:05:47 +08:00
|
|
|
func (fl FolderLoader) LoadCertificates() ([]Certificate, error) {
|
2019-06-25 02:16:10 +08:00
|
|
|
var certs []Certificate
|
2019-04-26 03:54:48 +08:00
|
|
|
for _, dir := range fl {
|
|
|
|
err := filepath.Walk(dir, func(fpath string, info os.FileInfo, err error) error {
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to traverse into path: %s", fpath)
|
|
|
|
}
|
|
|
|
if info.IsDir() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if !strings.HasSuffix(strings.ToLower(info.Name()), ".pem") {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-02-18 06:40:34 +08:00
|
|
|
bundle, err := os.ReadFile(fpath)
|
2019-04-26 03:54:48 +08:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2022-02-18 06:40:34 +08:00
|
|
|
cert, err := tlsCertFromCertAndKeyPEMBundle(bundle)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("%s: %w", fpath, err)
|
|
|
|
}
|
2019-04-26 03:54:48 +08:00
|
|
|
|
2019-06-25 02:16:10 +08:00
|
|
|
certs = append(certs, Certificate{Certificate: cert})
|
2019-04-26 03:54:48 +08:00
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return certs, nil
|
|
|
|
}
|
|
|
|
|
2022-02-18 06:40:34 +08:00
|
|
|
func tlsCertFromCertAndKeyPEMBundle(bundle []byte) (tls.Certificate, error) {
|
2019-04-26 03:54:48 +08:00
|
|
|
certBuilder, keyBuilder := new(bytes.Buffer), new(bytes.Buffer)
|
|
|
|
var foundKey bool // use only the first key in the file
|
|
|
|
|
|
|
|
for {
|
|
|
|
// Decode next block so we can see what type it is
|
|
|
|
var derBlock *pem.Block
|
|
|
|
derBlock, bundle = pem.Decode(bundle)
|
|
|
|
if derBlock == nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
|
|
|
if derBlock.Type == "CERTIFICATE" {
|
|
|
|
// Re-encode certificate as PEM, appending to certificate chain
|
2022-02-18 06:40:34 +08:00
|
|
|
if err := pem.Encode(certBuilder, derBlock); err != nil {
|
2020-11-23 05:50:29 +08:00
|
|
|
return tls.Certificate{}, err
|
|
|
|
}
|
2019-04-26 03:54:48 +08:00
|
|
|
} else if derBlock.Type == "EC PARAMETERS" {
|
|
|
|
// EC keys generated from openssl can be composed of two blocks:
|
|
|
|
// parameters and key (parameter block should come first)
|
|
|
|
if !foundKey {
|
|
|
|
// Encode parameters
|
2022-02-18 06:40:34 +08:00
|
|
|
if err := pem.Encode(keyBuilder, derBlock); err != nil {
|
2020-11-23 05:50:29 +08:00
|
|
|
return tls.Certificate{}, err
|
|
|
|
}
|
2019-04-26 03:54:48 +08:00
|
|
|
|
|
|
|
// Key must immediately follow
|
|
|
|
derBlock, bundle = pem.Decode(bundle)
|
|
|
|
if derBlock == nil || derBlock.Type != "EC PRIVATE KEY" {
|
2022-02-18 06:40:34 +08:00
|
|
|
return tls.Certificate{}, fmt.Errorf("expected elliptic private key to immediately follow EC parameters")
|
2019-04-26 03:54:48 +08:00
|
|
|
}
|
2022-02-18 06:40:34 +08:00
|
|
|
if err := pem.Encode(keyBuilder, derBlock); err != nil {
|
2020-11-23 05:50:29 +08:00
|
|
|
return tls.Certificate{}, err
|
|
|
|
}
|
2019-04-26 03:54:48 +08:00
|
|
|
foundKey = true
|
|
|
|
}
|
|
|
|
} else if derBlock.Type == "PRIVATE KEY" || strings.HasSuffix(derBlock.Type, " PRIVATE KEY") {
|
|
|
|
// RSA key
|
|
|
|
if !foundKey {
|
2022-02-18 06:40:34 +08:00
|
|
|
if err := pem.Encode(keyBuilder, derBlock); err != nil {
|
2020-11-23 05:50:29 +08:00
|
|
|
return tls.Certificate{}, err
|
|
|
|
}
|
2019-04-26 03:54:48 +08:00
|
|
|
foundKey = true
|
|
|
|
}
|
|
|
|
} else {
|
2022-02-18 06:40:34 +08:00
|
|
|
return tls.Certificate{}, fmt.Errorf("unrecognized PEM block type: %s", derBlock.Type)
|
2019-04-26 03:54:48 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
certPEMBytes, keyPEMBytes := certBuilder.Bytes(), keyBuilder.Bytes()
|
|
|
|
if len(certPEMBytes) == 0 {
|
2022-02-18 06:40:34 +08:00
|
|
|
return tls.Certificate{}, fmt.Errorf("failed to parse PEM data")
|
2019-04-26 03:54:48 +08:00
|
|
|
}
|
|
|
|
if len(keyPEMBytes) == 0 {
|
2022-02-18 06:40:34 +08:00
|
|
|
return tls.Certificate{}, fmt.Errorf("no private key block found")
|
2019-04-26 03:54:48 +08:00
|
|
|
}
|
|
|
|
|
2024-09-25 20:00:48 +08:00
|
|
|
// if the start of the key file looks like an encrypted private key,
|
|
|
|
// reject it with a helpful error message
|
|
|
|
if strings.HasPrefix(string(keyPEMBytes[:40]), "ENCRYPTED") {
|
|
|
|
return tls.Certificate{}, fmt.Errorf("encrypted private keys are not supported; please decrypt the key first")
|
|
|
|
}
|
|
|
|
|
2019-04-26 03:54:48 +08:00
|
|
|
cert, err := tls.X509KeyPair(certPEMBytes, keyPEMBytes)
|
|
|
|
if err != nil {
|
2022-02-18 06:40:34 +08:00
|
|
|
return tls.Certificate{}, fmt.Errorf("making X509 key pair: %v", err)
|
2019-04-26 03:54:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return cert, nil
|
|
|
|
}
|
2019-06-25 02:16:10 +08:00
|
|
|
|
2023-12-05 00:23:15 +08:00
|
|
|
var (
|
|
|
|
_ CertificateLoader = (FolderLoader)(nil)
|
|
|
|
_ caddy.Provisioner = (FolderLoader)(nil)
|
|
|
|
)
|