package server import ( // We must import sha512 so that it registers with the runtime so that // certificates that use it can be parsed. _ "crypto/sha512" "crypto/tls" "fmt" "net" "strconv" "sync" "github.com/hashicorp/vault/vault" ) // ListenerFactory is the factory function to create a listener. type ListenerFactory func(map[string]string) (net.Listener, map[string]string, vault.ReloadFunc, error) // BuiltinListeners is the list of built-in listener types. var BuiltinListeners = map[string]ListenerFactory{ "tcp": tcpListenerFactory, } // tlsLookup maps the tls_min_version configuration to the internal value var tlsLookup = map[string]uint16{ "tls10": tls.VersionTLS10, "tls11": tls.VersionTLS11, "tls12": tls.VersionTLS12, } // NewListener creates a new listener of the given type with the given // configuration. The type is looked up in the BuiltinListeners map. func NewListener(t string, config map[string]string) (net.Listener, map[string]string, vault.ReloadFunc, error) { f, ok := BuiltinListeners[t] if !ok { return nil, nil, nil, fmt.Errorf("unknown listener type: %s", t) } return f(config) } func listenerWrapTLS( ln net.Listener, props map[string]string, config map[string]string) (net.Listener, map[string]string, vault.ReloadFunc, error) { props["tls"] = "disabled" if v, ok := config["tls_disable"]; ok { disabled, err := strconv.ParseBool(v) if err != nil { return nil, nil, nil, fmt.Errorf("invalid value for 'tls_disable': %v", err) } if disabled { return ln, props, nil, nil } } _, ok := config["tls_cert_file"] if !ok { return nil, nil, nil, fmt.Errorf("'tls_cert_file' must be set") } _, ok = config["tls_key_file"] if !ok { return nil, nil, nil, fmt.Errorf("'tls_key_file' must be set") } cg := &certificateGetter{ config: config, } if err := cg.reload(nil); err != nil { return nil, nil, nil, fmt.Errorf("error loading TLS cert: %s", err) } tlsvers, ok := config["tls_min_version"] if !ok { tlsvers = "tls12" } tlsConf := &tls.Config{} tlsConf.GetCertificate = cg.getCertificate tlsConf.NextProtos = []string{"http/1.1"} tlsConf.MinVersion, ok = tlsLookup[tlsvers] if !ok { return nil, nil, nil, fmt.Errorf("'tls_min_version' value %s not supported, please specify one of [tls10,tls11,tls12]", tlsvers) } tlsConf.ClientAuth = tls.RequestClientCert ln = tls.NewListener(ln, tlsConf) props["tls"] = "enabled" return ln, props, cg.reload, nil } type certificateGetter struct { sync.RWMutex config map[string]string cert *tls.Certificate } func (cg *certificateGetter) reload(map[string]interface{}) error { cert, err := tls.LoadX509KeyPair(cg.config["tls_cert_file"], cg.config["tls_key_file"]) if err != nil { return err } cg.Lock() defer cg.Unlock() cg.cert = &cert return nil } func (cg *certificateGetter) getCertificate(clientHello *tls.ClientHelloInfo) (*tls.Certificate, error) { cg.RLock() defer cg.RUnlock() if cg.cert == nil { return nil, fmt.Errorf("nil certificate") } return cg.cert, nil }