| // Copyright 2020 The Monogon Project Authors. | 
 | // | 
 | // SPDX-License-Identifier: Apache-2.0 | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     http://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | package pki | 
 |  | 
 | import ( | 
 | 	"context" | 
 | 	"crypto" | 
 | 	"crypto/ed25519" | 
 | 	"crypto/rand" | 
 | 	"crypto/sha1" | 
 | 	"crypto/x509" | 
 | 	"crypto/x509/pkix" | 
 | 	"encoding/asn1" | 
 | 	"fmt" | 
 | 	"math/big" | 
 | 	"time" | 
 |  | 
 | 	"go.etcd.io/etcd/clientv3" | 
 | ) | 
 |  | 
 | // Issuer is a CA that can issue certificates. Two issuers are currently implemented: | 
 | //  - SelfSigned, which will generated a certificate signed by its corresponding private key. | 
 | //  - Certificate, which will use another existing Certificate as a CA. | 
 | type Issuer interface { | 
 | 	// CACertificate returns the DER-encoded x509 certificate of the CA that will sign certificates when Issue is | 
 | 	// called, or nil if this is self-signing issuer. | 
 | 	CACertificate(ctx context.Context, kv clientv3.KV) ([]byte, error) | 
 | 	// Issue will generate a key and certificate signed by the Issuer. The returned certificate is x509 DER-encoded, | 
 | 	// while the key is a bare ed25519 key. | 
 | 	Issue(ctx context.Context, template x509.Certificate, kv clientv3.KV) (cert, key []byte, err error) | 
 | } | 
 |  | 
 | var ( | 
 | 	// From RFC 5280 Section 4.1.2.5 | 
 | 	unknownNotAfter = time.Unix(253402300799, 0) | 
 | ) | 
 |  | 
 | // Workaround for https://github.com/golang/go/issues/26676 in Go's crypto/x509. Specifically Go | 
 | // violates Section 4.2.1.2 of RFC 5280 without this. | 
 | // Fixed for 1.15 in https://go-review.googlesource.com/c/go/+/227098/. | 
 | // | 
 | // Taken from https://github.com/FiloSottile/mkcert/blob/master/cert.go#L295 written by one of Go's | 
 | // crypto engineers | 
 | func calculateSKID(pubKey crypto.PublicKey) ([]byte, error) { | 
 | 	spkiASN1, err := x509.MarshalPKIXPublicKey(pubKey) | 
 | 	if err != nil { | 
 | 		return nil, err | 
 | 	} | 
 |  | 
 | 	var spki struct { | 
 | 		Algorithm        pkix.AlgorithmIdentifier | 
 | 		SubjectPublicKey asn1.BitString | 
 | 	} | 
 | 	_, err = asn1.Unmarshal(spkiASN1, &spki) | 
 | 	if err != nil { | 
 | 		return nil, err | 
 | 	} | 
 | 	skid := sha1.Sum(spki.SubjectPublicKey.Bytes) | 
 | 	return skid[:], nil | 
 | } | 
 |  | 
 | // issueCertificate is a generic low level certificate-and-key issuance function. If ca or cakey is null, the | 
 | // certificate will be self-signed. The returned certificate is DER-encoded, while the returned key is internal. | 
 | func issueCertificate(template x509.Certificate, ca *x509.Certificate, caKey interface{}) (cert, key []byte, err error) { | 
 | 	pubKey, privKey, err := ed25519.GenerateKey(rand.Reader) | 
 | 	if err != nil { | 
 | 		panic(err) | 
 | 	} | 
 |  | 
 | 	serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 127) | 
 | 	serialNumber, err := rand.Int(rand.Reader, serialNumberLimit) | 
 | 	if err != nil { | 
 | 		err = fmt.Errorf("failed to generate serial number: %w", err) | 
 | 		return | 
 | 	} | 
 |  | 
 | 	skid, err := calculateSKID(pubKey) | 
 | 	if err != nil { | 
 | 		return []byte{}, privKey, err | 
 | 	} | 
 |  | 
 | 	template.SerialNumber = serialNumber | 
 | 	template.NotBefore = time.Now() | 
 | 	template.NotAfter = unknownNotAfter | 
 | 	template.BasicConstraintsValid = true | 
 | 	template.SubjectKeyId = skid | 
 |  | 
 | 	// Set the AuthorityKeyID to the SKID of the signing certificate (or self, if self-signing). | 
 | 	if ca != nil && caKey != nil { | 
 | 		template.AuthorityKeyId = ca.AuthorityKeyId | 
 | 	} else { | 
 | 		template.AuthorityKeyId = template.SubjectKeyId | 
 | 	} | 
 |  | 
 | 	if ca == nil || caKey == nil { | 
 | 		ca = &template | 
 | 		caKey = privKey | 
 | 	} | 
 |  | 
 | 	caCertRaw, err := x509.CreateCertificate(rand.Reader, &template, ca, pubKey, caKey) | 
 | 	return caCertRaw, privKey, err | 
 | } | 
 |  | 
 | type selfSigned struct{} | 
 |  | 
 | func (s *selfSigned) Issue(ctx context.Context, template x509.Certificate, kv clientv3.KV) (cert, key []byte, err error) { | 
 | 	return issueCertificate(template, nil, nil) | 
 | } | 
 |  | 
 | func (s *selfSigned) CACertificate(ctx context.Context, kv clientv3.KV) ([]byte, error) { | 
 | 	return nil, nil | 
 | } | 
 |  | 
 | var ( | 
 | 	// SelfSigned is an Issuer that generates self-signed certificates. | 
 | 	SelfSigned = &selfSigned{} | 
 | ) | 
 |  | 
 | func (c *Certificate) Issue(ctx context.Context, template x509.Certificate, kv clientv3.KV) (cert, key []byte, err error) { | 
 | 	caCert, caKey, err := c.ensure(ctx, kv) | 
 | 	if err != nil { | 
 | 		return nil, nil, fmt.Errorf("could not ensure CA certificate %q exists: %w", c.name, err) | 
 | 	} | 
 |  | 
 | 	ca, err := x509.ParseCertificate(caCert) | 
 | 	if err != nil { | 
 | 		return nil, nil, fmt.Errorf("could not parse CA certificate: %w", err) | 
 | 	} | 
 | 	// Ensure only one level of CAs exist, and that they are created explicitly. | 
 | 	template.IsCA = false | 
 | 	return issueCertificate(template, ca, ed25519.PrivateKey(caKey)) | 
 | } | 
 |  | 
 | func (c *Certificate) CACertificate(ctx context.Context, kv clientv3.KV) ([]byte, error) { | 
 | 	cert, _, err := c.ensure(ctx, kv) | 
 | 	return cert, err | 
 | } |