2018-03-17 04:28:27 +00:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
2018-03-19 21:36:17 +00:00
|
|
|
"bytes"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/x509"
|
|
|
|
"crypto/x509/pkix"
|
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
|
|
|
"math/big"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/consul/agent/connect"
|
2018-03-17 04:28:27 +00:00
|
|
|
"github.com/hashicorp/consul/agent/consul/state"
|
|
|
|
"github.com/hashicorp/consul/agent/structs"
|
|
|
|
"github.com/hashicorp/go-memdb"
|
|
|
|
)
|
|
|
|
|
|
|
|
// ConnectCA manages the Connect CA.
|
|
|
|
type ConnectCA struct {
|
|
|
|
// srv is a pointer back to the server.
|
|
|
|
srv *Server
|
|
|
|
}
|
|
|
|
|
|
|
|
// Roots returns the currently trusted root certificates.
|
|
|
|
func (s *ConnectCA) Roots(
|
|
|
|
args *structs.DCSpecificRequest,
|
|
|
|
reply *structs.IndexedCARoots) error {
|
|
|
|
// Forward if necessary
|
|
|
|
if done, err := s.srv.forward("ConnectCA.Roots", args, args, reply); done {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return s.srv.blockingQuery(
|
|
|
|
&args.QueryOptions, &reply.QueryMeta,
|
|
|
|
func(ws memdb.WatchSet, state *state.Store) error {
|
|
|
|
index, roots, err := state.CARoots(ws)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
reply.Index, reply.Roots = index, roots
|
|
|
|
if reply.Roots == nil {
|
|
|
|
reply.Roots = make(structs.CARoots, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
// The API response must NEVER contain the secret information
|
|
|
|
// such as keys and so on. We use a whitelist below to copy the
|
|
|
|
// specific fields we want to expose.
|
|
|
|
for i, r := range reply.Roots {
|
|
|
|
// IMPORTANT: r must NEVER be modified, since it is a pointer
|
|
|
|
// directly to the structure in the memdb store.
|
|
|
|
|
|
|
|
reply.Roots[i] = &structs.CARoot{
|
|
|
|
ID: r.ID,
|
|
|
|
Name: r.Name,
|
|
|
|
RootCert: r.RootCert,
|
|
|
|
RaftIndex: r.RaftIndex,
|
2018-03-20 17:36:05 +00:00
|
|
|
Active: r.Active,
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.Active {
|
|
|
|
reply.ActiveRootID = r.ID
|
2018-03-17 04:28:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
)
|
|
|
|
}
|
2018-03-19 21:36:17 +00:00
|
|
|
|
|
|
|
// Sign signs a certificate for a service.
|
|
|
|
//
|
|
|
|
// NOTE(mitchellh): There is a LOT missing from this. I do next to zero
|
|
|
|
// validation of the incoming CSR, the way the cert is signed probably
|
|
|
|
// isn't right, we're not using enough of the CSR fields, etc.
|
|
|
|
func (s *ConnectCA) Sign(
|
|
|
|
args *structs.CASignRequest,
|
2018-03-20 04:00:01 +00:00
|
|
|
reply *structs.IssuedCert) error {
|
2018-03-19 21:36:17 +00:00
|
|
|
// Parse the CSR
|
|
|
|
csr, err := connect.ParseCSR(args.CSR)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse the SPIFFE ID
|
|
|
|
spiffeId, err := connect.ParseSpiffeID(csr.URIs[0])
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
serviceId, ok := spiffeId.(*connect.SpiffeIDService)
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("SPIFFE ID in CSR must be a service ID")
|
|
|
|
}
|
|
|
|
|
2018-03-20 03:29:14 +00:00
|
|
|
// Get the currently active root
|
|
|
|
state := s.srv.fsm.State()
|
|
|
|
_, root, err := state.CARootActive(nil)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-03-21 17:10:53 +00:00
|
|
|
if root == nil {
|
|
|
|
return fmt.Errorf("no active CA found")
|
|
|
|
}
|
2018-03-19 21:36:17 +00:00
|
|
|
|
|
|
|
// Determine the signing certificate. It is the set signing cert
|
|
|
|
// unless that is empty, in which case it is identically to the public
|
|
|
|
// cert.
|
|
|
|
certPem := root.SigningCert
|
|
|
|
if certPem == "" {
|
|
|
|
certPem = root.RootCert
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse the CA cert and signing key from the root
|
|
|
|
caCert, err := connect.ParseCert(certPem)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error parsing CA cert: %s", err)
|
|
|
|
}
|
|
|
|
signer, err := connect.ParseSigner(root.SigningKey)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error parsing signing key: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// The serial number for the cert. NOTE(mitchellh): in the final
|
|
|
|
// implementation this should be monotonically increasing based on
|
|
|
|
// some raft state.
|
|
|
|
sn, err := rand.Int(rand.Reader, (&big.Int{}).Exp(big.NewInt(2), big.NewInt(159), nil))
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error generating serial number: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the keyId for the cert from the signing public key.
|
|
|
|
keyId, err := connect.KeyId(signer.Public())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cert template for generation
|
|
|
|
template := x509.Certificate{
|
|
|
|
SerialNumber: sn,
|
|
|
|
Subject: pkix.Name{CommonName: serviceId.Service},
|
|
|
|
URIs: csr.URIs,
|
2018-03-20 04:00:01 +00:00
|
|
|
Signature: csr.Signature,
|
|
|
|
SignatureAlgorithm: csr.SignatureAlgorithm,
|
|
|
|
PublicKeyAlgorithm: csr.PublicKeyAlgorithm,
|
|
|
|
PublicKey: csr.PublicKey,
|
2018-03-19 21:36:17 +00:00
|
|
|
BasicConstraintsValid: true,
|
|
|
|
KeyUsage: x509.KeyUsageDataEncipherment | x509.KeyUsageKeyAgreement,
|
|
|
|
ExtKeyUsage: []x509.ExtKeyUsage{
|
|
|
|
x509.ExtKeyUsageClientAuth,
|
|
|
|
x509.ExtKeyUsageServerAuth,
|
|
|
|
},
|
2018-03-20 04:00:01 +00:00
|
|
|
NotAfter: time.Now().Add(3 * 24 * time.Hour),
|
2018-03-19 21:36:17 +00:00
|
|
|
NotBefore: time.Now(),
|
|
|
|
AuthorityKeyId: keyId,
|
|
|
|
SubjectKeyId: keyId,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the certificate, PEM encode it and return that value.
|
|
|
|
var buf bytes.Buffer
|
|
|
|
bs, err := x509.CreateCertificate(
|
|
|
|
rand.Reader, &template, caCert, signer.Public(), signer)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error generating certificate: %s", err)
|
|
|
|
}
|
|
|
|
err = pem.Encode(&buf, &pem.Block{Type: "CERTIFICATE", Bytes: bs})
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error encoding private key: %s", err)
|
|
|
|
}
|
|
|
|
|
2018-03-20 04:00:01 +00:00
|
|
|
// Set the response
|
|
|
|
*reply = structs.IssuedCert{
|
|
|
|
SerialNumber: template.SerialNumber,
|
|
|
|
Cert: buf.String(),
|
|
|
|
}
|
|
|
|
|
2018-03-19 21:36:17 +00:00
|
|
|
return nil
|
|
|
|
}
|