| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384 |
- package storage
- import (
- "crypto/tls"
- "crypto/x509"
- "fmt"
- "os"
- )
- // NewTLSConfig creates a new tls.Config from the given TLSConfig.
- func NewTLSConfig(cfg *TLSConfig) (*tls.Config, error) {
- tlsConfig := &tls.Config{InsecureSkipVerify: cfg.InsecureSkipVerify}
- // If a CA cert is provided then let's read it in.
- if len(cfg.CAFile) > 0 {
- b, err := readCAFile(cfg.CAFile)
- if err != nil {
- return nil, err
- }
- if !updateRootCA(tlsConfig, b) {
- return nil, fmt.Errorf("unable to use specified CA cert %s", cfg.CAFile)
- }
- }
- if len(cfg.ServerName) > 0 {
- tlsConfig.ServerName = cfg.ServerName
- }
- // If a client cert & key is provided then configure TLS config accordingly.
- if len(cfg.CertFile) > 0 && len(cfg.KeyFile) == 0 {
- return nil, fmt.Errorf("client cert file %q specified without client key file", cfg.CertFile)
- } else if len(cfg.KeyFile) > 0 && len(cfg.CertFile) == 0 {
- return nil, fmt.Errorf("client key file %q specified without client cert file", cfg.KeyFile)
- } else if len(cfg.CertFile) > 0 && len(cfg.KeyFile) > 0 {
- // Verify that client cert and key are valid.
- if _, err := cfg.getClientCertificate(nil); err != nil {
- return nil, err
- }
- tlsConfig.GetClientCertificate = cfg.getClientCertificate
- }
- return tlsConfig, nil
- }
- // readCAFile reads the CA cert file from disk.
- func readCAFile(f string) ([]byte, error) {
- data, err := os.ReadFile(f)
- if err != nil {
- return nil, fmt.Errorf("unable to load specified CA cert %s: %s", f, err)
- }
- return data, nil
- }
- // updateRootCA parses the given byte slice as a series of PEM encoded certificates and updates tls.Config.RootCAs.
- func updateRootCA(cfg *tls.Config, b []byte) bool {
- caCertPool := x509.NewCertPool()
- if !caCertPool.AppendCertsFromPEM(b) {
- return false
- }
- cfg.RootCAs = caCertPool
- return true
- }
- // getClientCertificate reads the pair of client cert and key from disk and returns a tls.Certificate.
- func (c *TLSConfig) getClientCertificate(*tls.CertificateRequestInfo) (*tls.Certificate, error) {
- cert, err := tls.LoadX509KeyPair(c.CertFile, c.KeyFile)
- if err != nil {
- return nil, fmt.Errorf("unable to use specified client cert (%s) & key (%s): %s", c.CertFile, c.KeyFile, err)
- }
- return &cert, nil
- }
- // TLSConfig configures the options for TLS connections.
- type TLSConfig struct {
- // The CA cert to use for the targets.
- CAFile string `yaml:"ca_file"`
- // The client cert file for the targets.
- CertFile string `yaml:"cert_file"`
- // The client key file for the targets.
- KeyFile string `yaml:"key_file"`
- // Used to verify the hostname for the targets.
- ServerName string `yaml:"server_name"`
- // Disable target certificate validation.
- InsecureSkipVerify bool `yaml:"insecure_skip_verify"`
- }
|