123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165 |
- package nebula
- import (
- "errors"
- "fmt"
- "io/ioutil"
- "strings"
- "time"
- "github.com/slackhq/nebula/cert"
- )
- var trustedCAs *cert.NebulaCAPool
- type CertState struct {
- certificate *cert.NebulaCertificate
- rawCertificate []byte
- rawCertificateNoKey []byte
- publicKey []byte
- privateKey []byte
- }
- func NewCertState(certificate *cert.NebulaCertificate, privateKey []byte) (*CertState, error) {
- // Marshal the certificate to ensure it is valid
- rawCertificate, err := certificate.Marshal()
- if err != nil {
- return nil, fmt.Errorf("invalid nebula certificate on interface: %s", err)
- }
- publicKey := certificate.Details.PublicKey
- cs := &CertState{
- rawCertificate: rawCertificate,
- certificate: certificate, // PublicKey has been set to nil above
- privateKey: privateKey,
- publicKey: publicKey,
- }
- cs.certificate.Details.PublicKey = nil
- rawCertNoKey, err := cs.certificate.Marshal()
- if err != nil {
- return nil, fmt.Errorf("error marshalling certificate no key: %s", err)
- }
- cs.rawCertificateNoKey = rawCertNoKey
- // put public key back
- cs.certificate.Details.PublicKey = cs.publicKey
- return cs, nil
- }
- func NewCertStateFromConfig(c *Config) (*CertState, error) {
- var pemPrivateKey []byte
- var err error
- privPathOrPEM := c.GetString("pki.key", "")
- if privPathOrPEM == "" {
- // Support backwards compat with the old x509
- //TODO: remove after this is rolled out everywhere - NB 2018/02/23
- privPathOrPEM = c.GetString("x509.key", "")
- }
- if privPathOrPEM == "" {
- return nil, errors.New("no pki.key path or PEM data provided")
- }
- if strings.Contains(privPathOrPEM, "-----BEGIN") {
- pemPrivateKey = []byte(privPathOrPEM)
- privPathOrPEM = "<inline>"
- } else {
- pemPrivateKey, err = ioutil.ReadFile(privPathOrPEM)
- if err != nil {
- return nil, fmt.Errorf("unable to read pki.key file %s: %s", privPathOrPEM, err)
- }
- }
- rawKey, _, err := cert.UnmarshalX25519PrivateKey(pemPrivateKey)
- if err != nil {
- return nil, fmt.Errorf("error while unmarshaling pki.key %s: %s", privPathOrPEM, err)
- }
- var rawCert []byte
- pubPathOrPEM := c.GetString("pki.cert", "")
- if pubPathOrPEM == "" {
- // Support backwards compat with the old x509
- //TODO: remove after this is rolled out everywhere - NB 2018/02/23
- pubPathOrPEM = c.GetString("x509.cert", "")
- }
- if pubPathOrPEM == "" {
- return nil, errors.New("no pki.cert path or PEM data provided")
- }
- if strings.Contains(pubPathOrPEM, "-----BEGIN") {
- rawCert = []byte(pubPathOrPEM)
- pubPathOrPEM = "<inline>"
- } else {
- rawCert, err = ioutil.ReadFile(pubPathOrPEM)
- if err != nil {
- return nil, fmt.Errorf("unable to read pki.cert file %s: %s", pubPathOrPEM, err)
- }
- }
- nebulaCert, _, err := cert.UnmarshalNebulaCertificateFromPEM(rawCert)
- if err != nil {
- return nil, fmt.Errorf("error while unmarshaling pki.cert %s: %s", pubPathOrPEM, err)
- }
- if nebulaCert.Expired(time.Now()) {
- return nil, fmt.Errorf("nebula certificate for this host is expired")
- }
- if len(nebulaCert.Details.Ips) == 0 {
- return nil, fmt.Errorf("no IPs encoded in certificate")
- }
- if err = nebulaCert.VerifyPrivateKey(rawKey); err != nil {
- return nil, fmt.Errorf("private key is not a pair with public key in nebula cert")
- }
- return NewCertState(nebulaCert, rawKey)
- }
- func loadCAFromConfig(c *Config) (*cert.NebulaCAPool, error) {
- var rawCA []byte
- var err error
- caPathOrPEM := c.GetString("pki.ca", "")
- if caPathOrPEM == "" {
- // Support backwards compat with the old x509
- //TODO: remove after this is rolled out everywhere - NB 2018/02/23
- caPathOrPEM = c.GetString("x509.ca", "")
- }
- if caPathOrPEM == "" {
- return nil, errors.New("no pki.ca path or PEM data provided")
- }
- if strings.Contains(caPathOrPEM, "-----BEGIN") {
- rawCA = []byte(caPathOrPEM)
- caPathOrPEM = "<inline>"
- } else {
- rawCA, err = ioutil.ReadFile(caPathOrPEM)
- if err != nil {
- return nil, fmt.Errorf("unable to read pki.ca file %s: %s", caPathOrPEM, err)
- }
- }
- CAs, err := cert.NewCAPoolFromBytes(rawCA)
- if err != nil {
- return nil, fmt.Errorf("error while adding CA certificate to CA trust store: %s", err)
- }
- for _, fp := range c.GetStringSlice("pki.blocklist", []string{}) {
- l.WithField("fingerprint", fp).Infof("Blocklisting cert")
- CAs.BlocklistFingerprint(fp)
- }
- // Support deprecated config for at leaast one minor release to allow for migrations
- for _, fp := range c.GetStringSlice("pki.blacklist", []string{}) {
- l.WithField("fingerprint", fp).Infof("Blocklisting cert")
- l.Warn("pki.blacklist is deprecated and will not be supported in a future release. Please migrate your config to use pki.blocklist")
- CAs.BlocklistFingerprint(fp)
- }
- return CAs, nil
- }
|