2022-06-27 08:27:57 +00:00
package commands
import (
"crypto/ecdsa"
"crypto/ed25519"
"crypto/elliptic"
"crypto/rsa"
"crypto/x509"
"crypto/x509/pkix"
2023-02-17 03:29:07 +00:00
"encoding/pem"
2022-06-27 08:27:57 +00:00
"fmt"
"math/big"
"net"
"os"
"path/filepath"
"strings"
"time"
"github.com/spf13/cobra"
"github.com/authelia/authelia/v4/internal/utils"
)
func cmdFlagsCryptoCertificateCommon ( cmd * cobra . Command ) {
cmd . Flags ( ) . String ( cmdFlagNameSignature , "SHA256" , "signature algorithm for the certificate" )
2022-12-22 00:21:29 +00:00
cmd . Flags ( ) . StringP ( cmdFlagNameCommonName , "n" , "" , "certificate common name" )
2022-06-27 08:27:57 +00:00
cmd . Flags ( ) . StringSliceP ( cmdFlagNameOrganization , "o" , [ ] string { "Authelia" } , "certificate organization" )
cmd . Flags ( ) . StringSlice ( cmdFlagNameOrganizationalUnit , nil , "certificate organizational unit" )
cmd . Flags ( ) . StringSlice ( cmdFlagNameCountry , nil , "certificate country" )
cmd . Flags ( ) . StringSlice ( cmdFlagNameProvince , nil , "certificate province" )
cmd . Flags ( ) . StringSliceP ( cmdFlagNameLocality , "l" , nil , "certificate locality" )
cmd . Flags ( ) . StringSliceP ( cmdFlagNameStreetAddress , "s" , nil , "certificate street address" )
cmd . Flags ( ) . StringSliceP ( cmdFlagNamePostcode , "p" , nil , "certificate postcode" )
2023-02-11 03:11:40 +00:00
cmd . Flags ( ) . String ( cmdFlagNameNotBefore , "" , "earliest date and time the certificate is considered valid in various formats (default is now)" )
cmd . Flags ( ) . String ( cmdFlagNameNotAfter , "" , "latest date and time the certificate is considered valid in various formats" )
cmd . Flags ( ) . String ( cmdFlagNameDuration , "1y" , "duration of time the certificate is valid for" )
2022-06-27 08:27:57 +00:00
cmd . Flags ( ) . StringSlice ( cmdFlagNameSANs , nil , "subject alternative names" )
}
func cmdFlagsCryptoCertificateGenerate ( cmd * cobra . Command ) {
cmd . Flags ( ) . String ( cmdFlagNamePathCA , "" , "source directory of the certificate authority files, if not provided the certificate will be self-signed" )
cmd . Flags ( ) . String ( cmdFlagNameFileCAPrivateKey , "ca.private.pem" , "certificate authority private key to use to signing this certificate" )
cmd . Flags ( ) . String ( cmdFlagNameFileCACertificate , "ca.public.crt" , "certificate authority certificate to use when signing this certificate" )
cmd . Flags ( ) . String ( cmdFlagNameFileCertificate , "public.crt" , "name of the file to export the certificate data to" )
2023-02-17 03:29:07 +00:00
cmd . Flags ( ) . String ( cmdFlagNameFileBundleChain , "public.chain.pem" , fmt . Sprintf ( "name of the file to export the certificate chain PEM bundle to when the --%s flag includes 'chain'" , cmdFlagNameBundles ) )
cmd . Flags ( ) . String ( cmdFlagNameFileBundlePrivKeyChain , "private.chain.pem" , fmt . Sprintf ( "name of the file to export the certificate chain and private key PEM bundle to when the --%s flag includes 'priv-chain'" , cmdFlagNameBundles ) )
cmd . Flags ( ) . StringSlice ( cmdFlagNameBundles , nil , "enables generating bundles options are 'chain' and 'privkey-chain'" )
2022-06-27 08:27:57 +00:00
cmd . Flags ( ) . StringSlice ( cmdFlagNameExtendedUsage , nil , "specify the extended usage types of the certificate" )
cmd . Flags ( ) . Bool ( cmdFlagNameCA , false , "create the certificate as a certificate authority certificate" )
}
func cmdFlagsCryptoCertificateRequest ( cmd * cobra . Command ) {
cmd . Flags ( ) . String ( cmdFlagNameFileCSR , "request.csr" , "name of the file to export the certificate request data to" )
}
func cmdFlagsCryptoPairGenerate ( cmd * cobra . Command ) {
cmd . Flags ( ) . String ( cmdFlagNameFilePublicKey , "public.pem" , "name of the file to export the public key data to" )
cmd . Flags ( ) . Bool ( cmdFlagNamePKCS8 , false , "force PKCS #8 ASN.1 format" )
}
func cmdFlagsCryptoPrivateKey ( cmd * cobra . Command ) {
cmd . Flags ( ) . String ( cmdFlagNameFilePrivateKey , "private.pem" , "name of the file to export the private key data to" )
cmd . Flags ( ) . StringP ( cmdFlagNameDirectory , "d" , "" , "directory where the generated keys, certificates, etc will be stored" )
}
func cmdFlagsCryptoPrivateKeyRSA ( cmd * cobra . Command ) {
cmd . Flags ( ) . IntP ( cmdFlagNameBits , "b" , 2048 , "number of RSA bits for the certificate" )
}
func cmdFlagsCryptoPrivateKeyECDSA ( cmd * cobra . Command ) {
cmd . Flags ( ) . StringP ( cmdFlagNameCurve , "b" , "P256" , "Sets the elliptic curve which can be P224, P256, P384, or P521" )
}
func cmdFlagsCryptoPrivateKeyEd25519 ( cmd * cobra . Command ) {
}
func cryptoSANsToString ( dnsSANs [ ] string , ipSANs [ ] net . IP ) ( sans [ ] string ) {
sans = make ( [ ] string , len ( dnsSANs ) + len ( ipSANs ) )
j := 0
for i , dnsSAN := range dnsSANs {
sans [ j ] = fmt . Sprintf ( "DNS.%d:%s" , i + 1 , dnsSAN )
j ++
}
for i , ipSAN := range ipSANs {
sans [ j ] = fmt . Sprintf ( "IP.%d:%s" , i + 1 , ipSAN )
j ++
}
return sans
}
2023-02-11 03:11:40 +00:00
func cryptoGetWritePathsFromCmd ( cmd * cobra . Command ) ( dir , privateKey , publicKey string , err error ) {
2022-06-27 08:27:57 +00:00
if dir , err = cmd . Flags ( ) . GetString ( cmdFlagNameDirectory ) ; err != nil {
2023-02-11 03:11:40 +00:00
return "" , "" , "" , err
2022-06-27 08:27:57 +00:00
}
ca , _ := cmd . Flags ( ) . GetBool ( cmdFlagNameCA )
csr := cmd . Use == cmdUseRequest
2023-02-11 03:11:40 +00:00
var pathPrivate , pathPublic string
2022-06-27 08:27:57 +00:00
var flagPrivate , flagPublic string
switch {
case ca && csr :
flagPrivate , flagPublic = cmdFlagNameFileCAPrivateKey , cmdFlagNameFileCSR
case csr :
flagPrivate , flagPublic = cmdFlagNameFilePrivateKey , cmdFlagNameFileCSR
case ca :
flagPrivate , flagPublic = cmdFlagNameFileCAPrivateKey , cmdFlagNameFileCACertificate
case cmd . Parent ( ) . Parent ( ) . Use == cmdUsePair :
flagPrivate , flagPublic = cmdFlagNameFilePrivateKey , cmdFlagNameFilePublicKey
default :
flagPrivate , flagPublic = cmdFlagNameFilePrivateKey , cmdFlagNameFileCertificate
}
2023-02-11 03:11:40 +00:00
if pathPrivate , err = cmd . Flags ( ) . GetString ( flagPrivate ) ; err != nil {
return "" , "" , "" , err
2022-06-27 08:27:57 +00:00
}
2023-02-11 03:11:40 +00:00
if pathPublic , err = cmd . Flags ( ) . GetString ( flagPublic ) ; err != nil {
return "" , "" , "" , err
2022-06-27 08:27:57 +00:00
}
2023-02-11 03:11:40 +00:00
return dir , filepath . Join ( dir , pathPrivate ) , filepath . Join ( dir , pathPublic ) , nil
2022-06-27 08:27:57 +00:00
}
2023-01-07 00:19:41 +00:00
func ( ctx * CmdCtx ) cryptoGenPrivateKeyFromCmd ( cmd * cobra . Command ) ( privateKey any , err error ) {
2022-06-27 08:27:57 +00:00
switch cmd . Parent ( ) . Use {
case cmdUseRSA :
var (
bits int
)
if bits , err = cmd . Flags ( ) . GetInt ( cmdFlagNameBits ) ; err != nil {
return nil , err
}
2023-01-07 00:19:41 +00:00
if privateKey , err = rsa . GenerateKey ( ctx . providers . Random , bits ) ; err != nil {
2022-06-27 08:27:57 +00:00
return nil , fmt . Errorf ( "generating RSA private key resulted in an error: %w" , err )
}
case cmdUseECDSA :
var (
curveStr string
curve elliptic . Curve
)
if curveStr , err = cmd . Flags ( ) . GetString ( cmdFlagNameCurve ) ; err != nil {
return nil , err
}
if curve = utils . EllipticCurveFromString ( curveStr ) ; curve == nil {
return nil , fmt . Errorf ( "invalid curve '%s' was specified: curve must be P224, P256, P384, or P521" , curveStr )
}
2023-01-07 00:19:41 +00:00
if privateKey , err = ecdsa . GenerateKey ( curve , ctx . providers . Random ) ; err != nil {
2022-06-27 08:27:57 +00:00
return nil , fmt . Errorf ( "generating ECDSA private key resulted in an error: %w" , err )
}
case cmdUseEd25519 :
2023-01-07 00:19:41 +00:00
if _ , privateKey , err = ed25519 . GenerateKey ( ctx . providers . Random ) ; err != nil {
2022-06-27 08:27:57 +00:00
return nil , fmt . Errorf ( "generating Ed25519 private key resulted in an error: %w" , err )
}
}
return privateKey , nil
}
2023-02-17 03:29:07 +00:00
func cryptoGenerateCertificateBundlesFromCmd ( cmd * cobra . Command , b * strings . Builder , dir string , ca * x509 . Certificate , certificate [ ] byte , privkey any ) ( err error ) {
var bundles [ ] string
if bundles , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameBundles ) ; err != nil {
return err
2023-02-11 03:11:40 +00:00
}
2023-02-17 03:29:07 +00:00
blocks := [ ] * pem . Block {
{ Type : utils . BlockTypeCertificate , Bytes : certificate } ,
2023-02-11 03:11:40 +00:00
}
2023-02-17 03:29:07 +00:00
if ca != nil {
blocks = append ( blocks , & pem . Block { Type : utils . BlockTypeCertificate , Bytes : ca . Raw } )
2023-02-11 03:11:40 +00:00
}
2023-02-17 03:29:07 +00:00
var name string
if utils . IsStringInSliceFold ( "chain" , bundles ) {
if name , err = cmd . Flags ( ) . GetString ( cmdFlagNameFileBundleChain ) ; err != nil {
return err
}
pathPEM := filepath . Join ( dir , name )
b . WriteString ( fmt . Sprintf ( "\tCertificate (chain): %s\n" , pathPEM ) )
if err = utils . WritePEM ( pathPEM , blocks ... ) ; err != nil {
return err
}
2023-02-11 03:11:40 +00:00
}
2023-02-17 03:29:07 +00:00
if utils . IsStringInSliceFold ( "priv-chain" , bundles ) {
if name , err = cmd . Flags ( ) . GetString ( cmdFlagNameFileBundlePrivKeyChain ) ; err != nil {
return err
}
var block * pem . Block
if block , err = utils . PEMBlockFromX509Key ( privkey , false ) ; err != nil {
return err
}
blocks = append ( [ ] * pem . Block { block } , blocks ... )
pathPEM := filepath . Join ( dir , name )
b . WriteString ( fmt . Sprintf ( "\tCertificate (priv-chain): %s\n" , pathPEM ) )
if err = utils . WritePEM ( pathPEM , blocks ... ) ; err != nil {
return err
}
}
2023-02-11 03:11:40 +00:00
2023-02-17 03:29:07 +00:00
return nil
2023-02-11 03:11:40 +00:00
}
2022-10-05 05:05:23 +00:00
func cryptoGetCAFromCmd ( cmd * cobra . Command ) ( privateKey any , cert * x509 . Certificate , err error ) {
2022-06-27 08:27:57 +00:00
if ! cmd . Flags ( ) . Changed ( cmdFlagNamePathCA ) {
return nil , nil , nil
}
var (
dir , filePrivateKey , fileCertificate string
ok bool
2022-10-05 05:05:23 +00:00
certificate any
2022-06-27 08:27:57 +00:00
)
if dir , err = cmd . Flags ( ) . GetString ( cmdFlagNamePathCA ) ; err != nil {
return nil , nil , err
}
if filePrivateKey , err = cmd . Flags ( ) . GetString ( cmdFlagNameFileCAPrivateKey ) ; err != nil {
return nil , nil , err
}
if fileCertificate , err = cmd . Flags ( ) . GetString ( cmdFlagNameFileCACertificate ) ; err != nil {
return nil , nil , err
}
var (
bytesPrivateKey , bytesCertificate [ ] byte
)
pathPrivateKey := filepath . Join ( dir , filePrivateKey )
if bytesPrivateKey , err = os . ReadFile ( pathPrivateKey ) ; err != nil {
return nil , nil , fmt . Errorf ( "could not read private key file '%s': %w" , pathPrivateKey , err )
}
if privateKey , err = utils . ParseX509FromPEM ( bytesPrivateKey ) ; err != nil {
return nil , nil , fmt . Errorf ( "could not parse private key from file '%s': %w" , pathPrivateKey , err )
}
if privateKey == nil || ! utils . IsX509PrivateKey ( privateKey ) {
return nil , nil , fmt . Errorf ( "could not parse private key from file '%s': does not appear to be a private key" , pathPrivateKey )
}
pathCertificate := filepath . Join ( dir , fileCertificate )
if bytesCertificate , err = os . ReadFile ( pathCertificate ) ; err != nil {
return nil , nil , fmt . Errorf ( "could not read certificate file '%s': %w" , pathCertificate , err )
}
if certificate , err = utils . ParseX509FromPEM ( bytesCertificate ) ; err != nil {
return nil , nil , fmt . Errorf ( "could not parse certificate from file '%s': %w" , pathCertificate , err )
}
if cert , ok = utils . CastX509AsCertificate ( certificate ) ; ! ok {
return nil , nil , fmt . Errorf ( "could not parse certificate from file '%s': does not appear to be a certificate" , pathCertificate )
}
return privateKey , cert , nil
}
func cryptoGetCSRFromCmd ( cmd * cobra . Command ) ( csr * x509 . CertificateRequest , err error ) {
var (
subject * pkix . Name
dnsSANs [ ] string
ipSANs [ ] net . IP
)
if subject , err = cryptoGetSubjectFromCmd ( cmd ) ; err != nil {
return nil , err
}
keyAlg , sigAlg := cryptoGetAlgFromCmd ( cmd )
if dnsSANs , ipSANs , err = cryptoGetSANsFromCmd ( cmd ) ; err != nil {
return nil , err
}
csr = & x509 . CertificateRequest {
Subject : * subject ,
PublicKeyAlgorithm : keyAlg ,
SignatureAlgorithm : sigAlg ,
DNSNames : dnsSANs ,
IPAddresses : ipSANs ,
}
return csr , nil
}
func cryptoGetSANsFromCmd ( cmd * cobra . Command ) ( dnsSANs [ ] string , ipSANs [ ] net . IP , err error ) {
var (
sans [ ] string
)
if sans , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameSANs ) ; err != nil {
return nil , nil , err
}
for _ , san := range sans {
if ipSAN := net . ParseIP ( san ) ; ipSAN != nil {
ipSANs = append ( ipSANs , ipSAN )
continue
}
dnsSANs = append ( dnsSANs , san )
}
return dnsSANs , ipSANs , nil
}
func cryptoGetAlgFromCmd ( cmd * cobra . Command ) ( keyAlg x509 . PublicKeyAlgorithm , sigAlg x509 . SignatureAlgorithm ) {
sigAlgStr , _ := cmd . Flags ( ) . GetString ( cmdFlagNameSignature )
keyAlgStr := cmd . Parent ( ) . Use
return utils . KeySigAlgorithmFromString ( keyAlgStr , sigAlgStr )
}
func cryptoGetSubjectFromCmd ( cmd * cobra . Command ) ( subject * pkix . Name , err error ) {
var (
commonName string
organization , organizationalUnit , country , locality , province , streetAddress , postcode [ ] string
)
if commonName , err = cmd . Flags ( ) . GetString ( cmdFlagNameCommonName ) ; err != nil {
return nil , err
}
if organization , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameOrganization ) ; err != nil {
return nil , err
}
if organizationalUnit , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameOrganizationalUnit ) ; err != nil {
return nil , err
}
if country , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameCountry ) ; err != nil {
return nil , err
}
if locality , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameLocality ) ; err != nil {
return nil , err
}
if province , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameProvince ) ; err != nil {
return nil , err
}
if streetAddress , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameStreetAddress ) ; err != nil {
return nil , err
}
if postcode , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNamePostcode ) ; err != nil {
return nil , err
}
return & pkix . Name {
CommonName : commonName ,
Organization : organization ,
OrganizationalUnit : organizationalUnit ,
Country : country ,
Locality : locality ,
Province : province ,
StreetAddress : streetAddress ,
PostalCode : postcode ,
} , nil
}
2023-01-07 00:19:41 +00:00
func ( ctx * CmdCtx ) cryptoGetCertificateFromCmd ( cmd * cobra . Command ) ( certificate * x509 . Certificate , err error ) {
2022-06-27 08:27:57 +00:00
var (
2023-02-11 03:11:40 +00:00
ca bool
subject * pkix . Name
notBefore , notAfter time . Time
2022-06-27 08:27:57 +00:00
)
if ca , err = cmd . Flags ( ) . GetBool ( cmdFlagNameCA ) ; err != nil {
return nil , err
}
if subject , err = cryptoGetSubjectFromCmd ( cmd ) ; err != nil {
return nil , err
}
2023-02-11 03:11:40 +00:00
if notBefore , notAfter , err = cryptoCertificateValidityFromCmd ( cmd ) ; err != nil {
2022-06-27 08:27:57 +00:00
return nil , err
}
var (
serialNumber * big . Int
dnsSANs , extKeyUsages [ ] string
ipSANs [ ] net . IP
)
serialNumberLimit := new ( big . Int ) . Lsh ( big . NewInt ( 1 ) , 128 )
2023-01-07 00:19:41 +00:00
if serialNumber , err = ctx . providers . Random . IntErr ( serialNumberLimit ) ; err != nil {
2022-06-27 08:27:57 +00:00
return nil , fmt . Errorf ( "failed to generate serial number: %w" , err )
}
if dnsSANs , ipSANs , err = cryptoGetSANsFromCmd ( cmd ) ; err != nil {
return nil , err
}
keyAlg , sigAlg := cryptoGetAlgFromCmd ( cmd )
if extKeyUsages , err = cmd . Flags ( ) . GetStringSlice ( cmdFlagNameExtendedUsage ) ; err != nil {
return nil , err
}
certificate = & x509 . Certificate {
SerialNumber : serialNumber ,
Subject : * subject ,
NotBefore : notBefore ,
2023-02-11 03:11:40 +00:00
NotAfter : notAfter ,
2022-06-27 08:27:57 +00:00
IsCA : ca ,
KeyUsage : utils . X509ParseKeyUsage ( nil , ca ) ,
ExtKeyUsage : utils . X509ParseExtendedKeyUsage ( extKeyUsages , ca ) ,
PublicKeyAlgorithm : keyAlg ,
SignatureAlgorithm : sigAlg ,
DNSNames : dnsSANs ,
IPAddresses : ipSANs ,
BasicConstraintsValid : true ,
}
return certificate , nil
}
2023-02-11 03:11:40 +00:00
func cryptoCertificateValidityFromCmd ( cmd * cobra . Command ) ( notBefore , notAfter time . Time , err error ) {
never := time . UnixMicro ( 0 )
switch cmd . Flags ( ) . Changed ( cmdFlagNameNotBefore ) {
case true :
var notBeforeStr string
if notBeforeStr , err = cmd . Flags ( ) . GetString ( cmdFlagNameNotBefore ) ; err != nil {
return never , never , err
}
if notBefore , err = utils . ParseTimeString ( notBeforeStr ) ; err != nil {
return never , never , fmt . Errorf ( "failed to parse not before: %w" , err )
}
default :
notBefore = time . Now ( )
}
switch useNotAfter := cmd . Flags ( ) . Changed ( cmdFlagNameNotAfter ) ; {
case useNotAfter && cmd . Flags ( ) . Changed ( cmdFlagNameDuration ) :
return never , never , fmt . Errorf ( "failed to determine not after " )
case useNotAfter :
var notAfterStr string
if notAfterStr , err = cmd . Flags ( ) . GetString ( cmdFlagNameNotAfter ) ; err != nil {
return never , never , err
}
if notAfter , err = utils . ParseTimeString ( notAfterStr ) ; err != nil {
return never , never , fmt . Errorf ( "failed to parse not after: %w" , err )
}
default :
var (
durationStr string
duration time . Duration
)
if durationStr , err = cmd . Flags ( ) . GetString ( cmdFlagNameDuration ) ; err != nil {
return never , never , err
}
if duration , err = utils . ParseDurationString ( durationStr ) ; err != nil {
return never , never , fmt . Errorf ( "failed to parse duration string: %w" , err )
}
notAfter = notBefore . Add ( duration )
}
return notBefore , notAfter , nil
}
2022-10-17 10:51:59 +00:00
func fmtCryptoHashUse ( use string ) string {
switch use {
case cmdUseHashArgon2 :
return "Argon2"
case cmdUseHashSHA2Crypt :
return "SHA2 Crypt"
case cmdUseHashPBKDF2 :
return "PBKDF2"
default :
return use
}
}
func fmtCryptoCertificateUse ( use string ) string {
2022-06-27 08:27:57 +00:00
switch use {
case cmdUseEd25519 :
return "Ed25519"
default :
return strings . ToUpper ( use )
}
}