| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159 | 
							- package nebula
 
- import (
 
- 	"errors"
 
- 	"fmt"
 
- 	"io/ioutil"
 
- 	"strings"
 
- 	"time"
 
- 	"github.com/slackhq/nebula/cert"
 
- )
 
- var trustedCAs *cert.NebulaCAPool
 
- type CertState struct {
 
- 	certificate         *cert.NebulaCertificate
 
- 	rawCertificate      []byte
 
- 	rawCertificateNoKey []byte
 
- 	publicKey           []byte
 
- 	privateKey          []byte
 
- }
 
- func NewCertState(certificate *cert.NebulaCertificate, privateKey []byte) (*CertState, error) {
 
- 	// Marshal the certificate to ensure it is valid
 
- 	rawCertificate, err := certificate.Marshal()
 
- 	if err != nil {
 
- 		return nil, fmt.Errorf("invalid nebula certificate on interface: %s", err)
 
- 	}
 
- 	publicKey := certificate.Details.PublicKey
 
- 	cs := &CertState{
 
- 		rawCertificate: rawCertificate,
 
- 		certificate:    certificate, // PublicKey has been set to nil above
 
- 		privateKey:     privateKey,
 
- 		publicKey:      publicKey,
 
- 	}
 
- 	cs.certificate.Details.PublicKey = nil
 
- 	rawCertNoKey, err := cs.certificate.Marshal()
 
- 	if err != nil {
 
- 		return nil, fmt.Errorf("error marshalling certificate no key: %s", err)
 
- 	}
 
- 	cs.rawCertificateNoKey = rawCertNoKey
 
- 	// put public key back
 
- 	cs.certificate.Details.PublicKey = cs.publicKey
 
- 	return cs, nil
 
- }
 
- func NewCertStateFromConfig(c *Config) (*CertState, error) {
 
- 	var pemPrivateKey []byte
 
- 	var err error
 
- 	privPathOrPEM := c.GetString("pki.key", "")
 
- 	if privPathOrPEM == "" {
 
- 		// Support backwards compat with the old x509
 
- 		//TODO: remove after this is rolled out everywhere - NB 2018/02/23
 
- 		privPathOrPEM = c.GetString("x509.key", "")
 
- 	}
 
- 	if privPathOrPEM == "" {
 
- 		return nil, errors.New("no pki.key path or PEM data provided")
 
- 	}
 
- 	if strings.Contains(privPathOrPEM, "-----BEGIN") {
 
- 		pemPrivateKey = []byte(privPathOrPEM)
 
- 		privPathOrPEM = "<inline>"
 
- 	} else {
 
- 		pemPrivateKey, err = ioutil.ReadFile(privPathOrPEM)
 
- 		if err != nil {
 
- 			return nil, fmt.Errorf("unable to read pki.key file %s: %s", privPathOrPEM, err)
 
- 		}
 
- 	}
 
- 	rawKey, _, err := cert.UnmarshalX25519PrivateKey(pemPrivateKey)
 
- 	if err != nil {
 
- 		return nil, fmt.Errorf("error while unmarshaling pki.key %s: %s", privPathOrPEM, err)
 
- 	}
 
- 	var rawCert []byte
 
- 	pubPathOrPEM := c.GetString("pki.cert", "")
 
- 	if pubPathOrPEM == "" {
 
- 		// Support backwards compat with the old x509
 
- 		//TODO: remove after this is rolled out everywhere - NB 2018/02/23
 
- 		pubPathOrPEM = c.GetString("x509.cert", "")
 
- 	}
 
- 	if pubPathOrPEM == "" {
 
- 		return nil, errors.New("no pki.cert path or PEM data provided")
 
- 	}
 
- 	if strings.Contains(pubPathOrPEM, "-----BEGIN") {
 
- 		rawCert = []byte(pubPathOrPEM)
 
- 		pubPathOrPEM = "<inline>"
 
- 	} else {
 
- 		rawCert, err = ioutil.ReadFile(pubPathOrPEM)
 
- 		if err != nil {
 
- 			return nil, fmt.Errorf("unable to read pki.cert file %s: %s", pubPathOrPEM, err)
 
- 		}
 
- 	}
 
- 	nebulaCert, _, err := cert.UnmarshalNebulaCertificateFromPEM(rawCert)
 
- 	if err != nil {
 
- 		return nil, fmt.Errorf("error while unmarshaling pki.cert %s: %s", pubPathOrPEM, err)
 
- 	}
 
- 	if nebulaCert.Expired(time.Now()) {
 
- 		return nil, fmt.Errorf("nebula certificate for this host is expired")
 
- 	}
 
- 	if len(nebulaCert.Details.Ips) == 0 {
 
- 		return nil, fmt.Errorf("no IPs encoded in certificate")
 
- 	}
 
- 	if err = nebulaCert.VerifyPrivateKey(rawKey); err != nil {
 
- 		return nil, fmt.Errorf("private key is not a pair with public key in nebula cert")
 
- 	}
 
- 	return NewCertState(nebulaCert, rawKey)
 
- }
 
- func loadCAFromConfig(c *Config) (*cert.NebulaCAPool, error) {
 
- 	var rawCA []byte
 
- 	var err error
 
- 	caPathOrPEM := c.GetString("pki.ca", "")
 
- 	if caPathOrPEM == "" {
 
- 		// Support backwards compat with the old x509
 
- 		//TODO: remove after this is rolled out everywhere - NB 2018/02/23
 
- 		caPathOrPEM = c.GetString("x509.ca", "")
 
- 	}
 
- 	if caPathOrPEM == "" {
 
- 		return nil, errors.New("no pki.ca path or PEM data provided")
 
- 	}
 
- 	if strings.Contains(caPathOrPEM, "-----BEGIN") {
 
- 		rawCA = []byte(caPathOrPEM)
 
- 		caPathOrPEM = "<inline>"
 
- 	} else {
 
- 		rawCA, err = ioutil.ReadFile(caPathOrPEM)
 
- 		if err != nil {
 
- 			return nil, fmt.Errorf("unable to read pki.ca file %s: %s", caPathOrPEM, err)
 
- 		}
 
- 	}
 
- 	CAs, err := cert.NewCAPoolFromBytes(rawCA)
 
- 	if err != nil {
 
- 		return nil, fmt.Errorf("error while adding CA certificate to CA trust store: %s", err)
 
- 	}
 
- 	// pki.blacklist entered the scene at about the same time we aliased x509 to pki, not supporting backwards compat
 
- 	for _, fp := range c.GetStringSlice("pki.blacklist", []string{}) {
 
- 		l.WithField("fingerprint", fp).Infof("Blacklisting cert")
 
- 		CAs.BlacklistFingerprint(fp)
 
- 	}
 
- 	return CAs, nil
 
- }
 
 
  |