2018-10-05 21:48:36 +00:00
|
|
|
package authority
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2019-03-07 02:32:56 +00:00
|
|
|
"fmt"
|
2018-12-21 23:27:22 +00:00
|
|
|
"net"
|
2018-10-05 21:48:36 +00:00
|
|
|
"os"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
2019-03-06 22:49:25 +00:00
|
|
|
"github.com/smallstep/certificates/authority/provisioner"
|
2019-03-05 08:07:13 +00:00
|
|
|
"github.com/smallstep/certificates/db"
|
2018-10-05 21:48:36 +00:00
|
|
|
"github.com/smallstep/cli/crypto/tlsutil"
|
|
|
|
"github.com/smallstep/cli/crypto/x509util"
|
|
|
|
)
|
|
|
|
|
2018-10-19 05:26:39 +00:00
|
|
|
var (
|
|
|
|
// DefaultTLSOptions represents the default TLS version as well as the cipher
|
|
|
|
// suites used in the TLS certificates.
|
|
|
|
DefaultTLSOptions = tlsutil.TLSOptions{
|
|
|
|
CipherSuites: x509util.CipherSuites{
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305",
|
|
|
|
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
|
|
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
|
|
|
|
},
|
|
|
|
MinVersion: 1.2,
|
|
|
|
MaxVersion: 1.2,
|
|
|
|
Renegotiation: false,
|
|
|
|
}
|
2018-11-01 22:43:24 +00:00
|
|
|
defaultDisableRenewal = false
|
2019-08-05 18:40:27 +00:00
|
|
|
defaultEnableSSHCA = false
|
2019-03-06 22:49:25 +00:00
|
|
|
globalProvisionerClaims = provisioner.Claims{
|
2019-07-24 01:46:43 +00:00
|
|
|
MinTLSDur: &provisioner.Duration{Duration: 5 * time.Minute}, // TLS certs
|
|
|
|
MaxTLSDur: &provisioner.Duration{Duration: 24 * time.Hour},
|
|
|
|
DefaultTLSDur: &provisioner.Duration{Duration: 24 * time.Hour},
|
|
|
|
DisableRenewal: &defaultDisableRenewal,
|
|
|
|
MinUserSSHDur: &provisioner.Duration{Duration: 5 * time.Minute}, // User SSH certs
|
|
|
|
MaxUserSSHDur: &provisioner.Duration{Duration: 24 * time.Hour},
|
|
|
|
DefaultUserSSHDur: &provisioner.Duration{Duration: 4 * time.Hour},
|
|
|
|
MinHostSSHDur: &provisioner.Duration{Duration: 5 * time.Minute}, // Host SSH certs
|
|
|
|
MaxHostSSHDur: &provisioner.Duration{Duration: 30 * 24 * time.Hour},
|
|
|
|
DefaultHostSSHDur: &provisioner.Duration{Duration: 30 * 24 * time.Hour},
|
2019-08-05 18:40:27 +00:00
|
|
|
EnableSSHCA: &defaultEnableSSHCA,
|
2018-10-19 05:26:39 +00:00
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Config represents the CA configuration and it's mapped to a JSON object.
|
|
|
|
type Config struct {
|
2019-01-07 23:30:28 +00:00
|
|
|
Root multiString `json:"root"`
|
2019-01-05 01:51:32 +00:00
|
|
|
FederatedRoots []string `json:"federatedRoots"`
|
2018-10-05 21:48:36 +00:00
|
|
|
IntermediateCert string `json:"crt"`
|
|
|
|
IntermediateKey string `json:"key"`
|
|
|
|
Address string `json:"address"`
|
|
|
|
DNSNames []string `json:"dnsNames"`
|
2019-08-01 22:04:56 +00:00
|
|
|
SSH *SSHConfig `json:"ssh,omitempty"`
|
2018-10-05 21:48:36 +00:00
|
|
|
Logger json.RawMessage `json:"logger,omitempty"`
|
2019-03-05 08:07:13 +00:00
|
|
|
DB *db.Config `json:"db,omitempty"`
|
2018-10-05 21:48:36 +00:00
|
|
|
Monitoring json.RawMessage `json:"monitoring,omitempty"`
|
|
|
|
AuthorityConfig *AuthConfig `json:"authority,omitempty"`
|
|
|
|
TLS *tlsutil.TLSOptions `json:"tls,omitempty"`
|
|
|
|
Password string `json:"password,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// AuthConfig represents the configuration options for the authority.
|
|
|
|
type AuthConfig struct {
|
2019-03-07 21:07:39 +00:00
|
|
|
Provisioners provisioner.List `json:"provisioners"`
|
|
|
|
Template *x509util.ASN1DN `json:"template,omitempty"`
|
|
|
|
Claims *provisioner.Claims `json:"claims,omitempty"`
|
|
|
|
DisableIssuedAtCheck bool `json:"disableIssuedAtCheck,omitempty"`
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the authority configuration.
|
2019-03-05 08:07:13 +00:00
|
|
|
func (c *AuthConfig) Validate(audiences provisioner.Audiences) error {
|
2018-10-09 06:25:18 +00:00
|
|
|
if c == nil {
|
2018-10-05 21:48:36 +00:00
|
|
|
return errors.New("authority cannot be undefined")
|
2018-10-09 06:25:18 +00:00
|
|
|
}
|
|
|
|
if len(c.Provisioners) == 0 {
|
2018-10-05 21:48:36 +00:00
|
|
|
return errors.New("authority.provisioners cannot be empty")
|
2018-10-09 06:25:18 +00:00
|
|
|
}
|
2018-10-19 05:26:39 +00:00
|
|
|
|
2019-03-19 22:10:52 +00:00
|
|
|
// Merge global and configuration claims
|
|
|
|
claimer, err := provisioner.NewClaimer(c.Claims, globalProvisionerClaims)
|
|
|
|
if err != nil {
|
2018-10-19 05:26:39 +00:00
|
|
|
return err
|
|
|
|
}
|
2019-03-07 02:32:56 +00:00
|
|
|
|
|
|
|
// Initialize provisioners
|
|
|
|
config := provisioner.Config{
|
2019-03-19 22:10:52 +00:00
|
|
|
Claims: claimer.Claims(),
|
2019-03-07 02:32:56 +00:00
|
|
|
Audiences: audiences,
|
|
|
|
}
|
2018-10-09 06:25:18 +00:00
|
|
|
for _, p := range c.Provisioners {
|
2019-03-07 02:32:56 +00:00
|
|
|
if err := p.Init(config); err != nil {
|
2018-10-09 06:25:18 +00:00
|
|
|
return err
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
}
|
2019-03-07 02:32:56 +00:00
|
|
|
|
2018-10-09 06:25:18 +00:00
|
|
|
if c.Template == nil {
|
|
|
|
c.Template = &x509util.ASN1DN{}
|
|
|
|
}
|
|
|
|
return nil
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2019-08-01 22:04:56 +00:00
|
|
|
// SSHConfig contains the user and host keys.
|
|
|
|
type SSHConfig struct {
|
2019-08-03 00:48:34 +00:00
|
|
|
HostKey string `json:"hostKey"`
|
|
|
|
UserKey string `json:"userKey"`
|
|
|
|
AddUserPrincipal string `json:"addUserPrincipal"`
|
|
|
|
AddUserCommand string `json:"addUserCommand"`
|
2019-08-01 22:04:56 +00:00
|
|
|
}
|
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
// LoadConfiguration parses the given filename in JSON format and returns the
|
|
|
|
// configuration struct.
|
|
|
|
func LoadConfiguration(filename string) (*Config, error) {
|
|
|
|
f, err := os.Open(filename)
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "error opening %s", filename)
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
var c Config
|
|
|
|
if err := json.NewDecoder(f).Decode(&c); err != nil {
|
|
|
|
return nil, errors.Wrapf(err, "error parsing %s", filename)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Save saves the configuration to the given filename.
|
|
|
|
func (c *Config) Save(filename string) error {
|
|
|
|
f, err := os.OpenFile(filename, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrapf(err, "error opening %s", filename)
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
enc := json.NewEncoder(f)
|
|
|
|
enc.SetIndent("", "\t")
|
|
|
|
return errors.Wrapf(enc.Encode(c), "error writing %s", filename)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate validates the configuration.
|
|
|
|
func (c *Config) Validate() error {
|
|
|
|
switch {
|
|
|
|
case c.Address == "":
|
|
|
|
return errors.New("address cannot be empty")
|
|
|
|
|
2019-01-15 01:59:31 +00:00
|
|
|
case c.Root.HasEmpties():
|
2018-10-05 21:48:36 +00:00
|
|
|
return errors.New("root cannot be empty")
|
|
|
|
|
|
|
|
case c.IntermediateCert == "":
|
|
|
|
return errors.New("crt cannot be empty")
|
|
|
|
|
|
|
|
case c.IntermediateKey == "":
|
|
|
|
return errors.New("key cannot be empty")
|
|
|
|
|
|
|
|
case len(c.DNSNames) == 0:
|
|
|
|
return errors.New("dnsNames cannot be empty")
|
|
|
|
}
|
|
|
|
|
2018-12-21 23:27:22 +00:00
|
|
|
// Validate address (a port is required)
|
|
|
|
if _, _, err := net.SplitHostPort(c.Address); err != nil {
|
|
|
|
return errors.Errorf("invalid address %s", c.Address)
|
|
|
|
}
|
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
if c.TLS == nil {
|
|
|
|
c.TLS = &DefaultTLSOptions
|
|
|
|
} else {
|
|
|
|
if len(c.TLS.CipherSuites) == 0 {
|
|
|
|
c.TLS.CipherSuites = DefaultTLSOptions.CipherSuites
|
|
|
|
}
|
|
|
|
if c.TLS.MaxVersion == 0 {
|
|
|
|
c.TLS.MaxVersion = DefaultTLSOptions.MaxVersion
|
|
|
|
}
|
|
|
|
if c.TLS.MinVersion == 0 {
|
|
|
|
c.TLS.MinVersion = c.TLS.MaxVersion
|
|
|
|
}
|
|
|
|
if c.TLS.MinVersion > c.TLS.MaxVersion {
|
|
|
|
return errors.New("tls minVersion cannot exceed tls maxVersion")
|
|
|
|
}
|
|
|
|
c.TLS.Renegotiation = c.TLS.Renegotiation || DefaultTLSOptions.Renegotiation
|
|
|
|
}
|
|
|
|
|
2019-03-07 02:32:56 +00:00
|
|
|
return c.AuthorityConfig.Validate(c.getAudiences())
|
|
|
|
}
|
|
|
|
|
|
|
|
// getAudiences returns the legacy and possible urls without the ports that will
|
|
|
|
// be used as the default provisioner audiences. The CA might have proxies in
|
|
|
|
// front so we cannot rely on the port.
|
2019-03-05 08:07:13 +00:00
|
|
|
func (c *Config) getAudiences() provisioner.Audiences {
|
|
|
|
audiences := provisioner.Audiences{
|
|
|
|
Sign: []string{legacyAuthority},
|
|
|
|
Revoke: []string{legacyAuthority},
|
|
|
|
}
|
|
|
|
|
2019-03-07 02:32:56 +00:00
|
|
|
for _, name := range c.DNSNames {
|
2019-03-05 08:07:13 +00:00
|
|
|
audiences.Sign = append(audiences.Sign,
|
|
|
|
fmt.Sprintf("https://%s/sign", name), fmt.Sprintf("https://%s/1.0/sign", name))
|
|
|
|
audiences.Revoke = append(audiences.Revoke,
|
|
|
|
fmt.Sprintf("https://%s/revoke", name), fmt.Sprintf("https://%s/1.0/revoke", name))
|
2019-03-07 02:32:56 +00:00
|
|
|
}
|
2019-03-05 08:07:13 +00:00
|
|
|
|
2019-03-07 02:32:56 +00:00
|
|
|
return audiences
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|