ca.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. package main
  2. import (
  3. "crypto/ecdsa"
  4. "crypto/rsa"
  5. "errors"
  6. "flag"
  7. "net"
  8. "net/http"
  9. "github.com/cloudflare/cfssl/api/info"
  10. "github.com/cloudflare/cfssl/certdb/sql"
  11. "github.com/cloudflare/cfssl/log"
  12. "github.com/cloudflare/cfssl/multiroot/config"
  13. "github.com/cloudflare/cfssl/signer"
  14. "github.com/cloudflare/cfssl/signer/local"
  15. "github.com/cloudflare/cfssl/whitelist"
  16. "github.com/prometheus/client_golang/prometheus/promhttp"
  17. _ "github.com/go-sql-driver/mysql" // import to support MySQL
  18. _ "github.com/lib/pq" // import to support Postgres
  19. _ "github.com/mattn/go-sqlite3" // import to support SQLite
  20. )
  21. func parseSigner(root *config.Root) (signer.Signer, error) {
  22. privateKey := root.PrivateKey
  23. switch priv := privateKey.(type) {
  24. case *rsa.PrivateKey, *ecdsa.PrivateKey:
  25. s, err := local.NewSigner(priv, root.Certificate, signer.DefaultSigAlgo(priv), nil)
  26. if err != nil {
  27. return nil, err
  28. }
  29. s.SetPolicy(root.Config)
  30. if root.DB != nil {
  31. dbAccessor := sql.NewAccessor(root.DB)
  32. s.SetDBAccessor(dbAccessor)
  33. }
  34. return s, nil
  35. default:
  36. return nil, errors.New("unsupported private key type")
  37. }
  38. }
  39. var (
  40. defaultLabel string
  41. signers = map[string]signer.Signer{}
  42. whitelists = map[string]whitelist.NetACL{}
  43. )
  44. func main() {
  45. flagAddr := flag.String("a", ":8888", "listening address")
  46. flagRootFile := flag.String("roots", "", "configuration file specifying root keys")
  47. flagDefaultLabel := flag.String("l", "", "specify a default label")
  48. flagEndpointCert := flag.String("tls-cert", "", "server certificate")
  49. flagEndpointKey := flag.String("tls-key", "", "server private key")
  50. flag.IntVar(&log.Level, "loglevel", log.LevelInfo, "Log level (0 = DEBUG, 5 = FATAL)")
  51. flag.Parse()
  52. if *flagRootFile == "" {
  53. log.Fatal("no root file specified")
  54. }
  55. roots, err := config.Parse(*flagRootFile)
  56. if err != nil {
  57. log.Fatalf("%v", err)
  58. }
  59. for label, root := range roots {
  60. s, err := parseSigner(root)
  61. if err != nil {
  62. log.Criticalf("%v", err)
  63. }
  64. signers[label] = s
  65. if root.ACL != nil {
  66. whitelists[label] = root.ACL
  67. }
  68. log.Info("loaded signer ", label)
  69. }
  70. defaultLabel = *flagDefaultLabel
  71. infoHandler, err := info.NewMultiHandler(signers, defaultLabel)
  72. if err != nil {
  73. log.Criticalf("%v", err)
  74. }
  75. var localhost = whitelist.NewBasic()
  76. localhost.Add(net.ParseIP("127.0.0.1"))
  77. localhost.Add(net.ParseIP("::1"))
  78. http.HandleFunc("/api/v1/cfssl/authsign", dispatchRequest)
  79. http.Handle("/api/v1/cfssl/info", infoHandler)
  80. http.Handle("/metrics", promhttp.Handler())
  81. if *flagEndpointCert == "" && *flagEndpointKey == "" {
  82. log.Info("Now listening on ", *flagAddr)
  83. log.Fatal(http.ListenAndServe(*flagAddr, nil))
  84. } else {
  85. log.Info("Now listening on https:// ", *flagAddr)
  86. log.Fatal(http.ListenAndServeTLS(*flagAddr, *flagEndpointCert, *flagEndpointKey, nil))
  87. }
  88. }