2019-03-05 01:58:20 +00:00
|
|
|
package provisioner
|
|
|
|
|
2019-03-06 22:51:12 +00:00
|
|
|
import (
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
2019-03-05 01:58:20 +00:00
|
|
|
|
|
|
|
// Claims so that individual provisioners can override global claims.
|
|
|
|
type Claims struct {
|
|
|
|
globalClaims *Claims
|
|
|
|
MinTLSDur *Duration `json:"minTLSCertDuration,omitempty"`
|
|
|
|
MaxTLSDur *Duration `json:"maxTLSCertDuration,omitempty"`
|
|
|
|
DefaultTLSDur *Duration `json:"defaultTLSCertDuration,omitempty"`
|
|
|
|
DisableRenewal *bool `json:"disableRenewal,omitempty"`
|
|
|
|
}
|
|
|
|
|
2019-03-06 22:51:12 +00:00
|
|
|
// Init initializes and validates the individual provisioner claims.
|
|
|
|
func (pc *Claims) Init(global *Claims) (*Claims, error) {
|
|
|
|
if pc == nil {
|
|
|
|
pc = &Claims{}
|
|
|
|
}
|
|
|
|
pc.globalClaims = global
|
2019-03-09 01:24:58 +00:00
|
|
|
return pc, pc.Validate()
|
2019-03-06 22:51:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// DefaultTLSCertDuration returns the default TLS cert duration for the
|
|
|
|
// provisioner. If the default is not set within the provisioner, then the global
|
|
|
|
// default from the authority configuration will be used.
|
|
|
|
func (pc *Claims) DefaultTLSCertDuration() time.Duration {
|
|
|
|
if pc.DefaultTLSDur == nil || pc.DefaultTLSDur.Duration == 0 {
|
|
|
|
return pc.globalClaims.DefaultTLSCertDuration()
|
|
|
|
}
|
|
|
|
return pc.DefaultTLSDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// MinTLSCertDuration returns the minimum TLS cert duration for the provisioner.
|
|
|
|
// If the minimum is not set within the provisioner, then the global
|
|
|
|
// minimum from the authority configuration will be used.
|
|
|
|
func (pc *Claims) MinTLSCertDuration() time.Duration {
|
|
|
|
if pc.MinTLSDur == nil || pc.MinTLSDur.Duration == 0 {
|
|
|
|
return pc.globalClaims.MinTLSCertDuration()
|
|
|
|
}
|
|
|
|
return pc.MinTLSDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// MaxTLSCertDuration returns the maximum TLS cert duration for the provisioner.
|
|
|
|
// If the maximum is not set within the provisioner, then the global
|
|
|
|
// maximum from the authority configuration will be used.
|
|
|
|
func (pc *Claims) MaxTLSCertDuration() time.Duration {
|
|
|
|
if pc.MaxTLSDur == nil || pc.MaxTLSDur.Duration == 0 {
|
|
|
|
return pc.globalClaims.MaxTLSCertDuration()
|
|
|
|
}
|
|
|
|
return pc.MaxTLSDur.Duration
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsDisableRenewal returns if the renewal flow is disabled for the
|
|
|
|
// provisioner. If the property is not set within the provisioner, then the
|
|
|
|
// global value from the authority configuration will be used.
|
|
|
|
func (pc *Claims) IsDisableRenewal() bool {
|
|
|
|
if pc.DisableRenewal == nil {
|
|
|
|
return pc.globalClaims.IsDisableRenewal()
|
|
|
|
}
|
|
|
|
return *pc.DisableRenewal
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates and modifies the Claims with default values.
|
|
|
|
func (pc *Claims) Validate() error {
|
|
|
|
var (
|
|
|
|
min = pc.MinTLSCertDuration()
|
|
|
|
max = pc.MaxTLSCertDuration()
|
|
|
|
def = pc.DefaultTLSCertDuration()
|
|
|
|
)
|
|
|
|
switch {
|
|
|
|
case min == 0:
|
|
|
|
return errors.Errorf("claims: MinTLSCertDuration cannot be empty")
|
|
|
|
case max == 0:
|
|
|
|
return errors.Errorf("claims: MaxTLSCertDuration cannot be empty")
|
|
|
|
case def == 0:
|
|
|
|
return errors.Errorf("claims: DefaultTLSCertDuration cannot be empty")
|
|
|
|
case max < min:
|
|
|
|
return errors.Errorf("claims: MaxCertDuration cannot be less "+
|
|
|
|
"than MinCertDuration: MaxCertDuration - %v, MinCertDuration - %v", max, min)
|
|
|
|
case def < min:
|
|
|
|
return errors.Errorf("claims: DefaultCertDuration cannot be less than MinCertDuration: DefaultCertDuration - %v, MinCertDuration - %v", def, min)
|
|
|
|
case max < def:
|
|
|
|
return errors.Errorf("claims: MaxCertDuration cannot be less than DefaultCertDuration: MaxCertDuration - %v, DefaultCertDuration - %v", max, def)
|
|
|
|
default:
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|