package authority import ( "bytes" "fmt" "net" "sort" "time" "github.com/pkg/errors" x509 "github.com/smallstep/cli/pkg/x509" ) // certClaim interface is implemented by types used to validate specific claims in a // certificate request. type certClaim interface { Valid(crt *x509.Certificate) error } // ValidateClaims returns nil if all the claims are validated, it will return // the first error if a claim fails. func validateClaims(crt *x509.Certificate, claims []certClaim) (err error) { for _, c := range claims { if err = c.Valid(crt); err != nil { return err } } return } // commonNameClaim validates the common name of a certificate request. type commonNameClaim struct { name string } // Valid checks that certificate request common name matches the one configured. func (c *commonNameClaim) Valid(crt *x509.Certificate) error { if crt.Subject.CommonName == "" { return errors.New("common name cannot be empty") } if crt.Subject.CommonName != c.name { return errors.Errorf("common name claim failed - got %s, want %s", crt.Subject.CommonName, c.name) } return nil } type dnsNamesClaim struct { names []string } // Valid checks that certificate request common name matches the one configured. func (c *dnsNamesClaim) Valid(crt *x509.Certificate) error { sort.Strings(c.names) sort.Strings(crt.DNSNames) if len(c.names) != len(crt.DNSNames) { fmt.Printf("len(c.names) = %+v, len(crt.DNSNames) = %+v\n", len(c.names), len(crt.DNSNames)) return errors.Errorf("DNS names claim failed - got %s, want %s", crt.DNSNames, c.names) } for i := range c.names { if c.names[i] != crt.DNSNames[i] { fmt.Printf("c.names[i] = %+v, crt.DNSNames[i] = %+v\n", c.names[i], crt.DNSNames[i]) return errors.Errorf("DNS names claim failed - got %s, want %s", crt.DNSNames, c.names) } } return nil } type ipAddressesClaim struct { ips []net.IP } // Valid checks that certificate request common name matches the one configured. func (c *ipAddressesClaim) Valid(crt *x509.Certificate) error { if len(c.ips) != len(crt.IPAddresses) { return errors.Errorf("IP Addresses claim failed - got %v, want %v", crt.IPAddresses, c.ips) } sort.Slice(c.ips, func(i, j int) bool { return bytes.Compare(c.ips[i], c.ips[j]) < 0 }) sort.Slice(crt.IPAddresses, func(i, j int) bool { return bytes.Compare(crt.IPAddresses[i], crt.IPAddresses[j]) < 0 }) for i := range c.ips { if !c.ips[i].Equal(crt.IPAddresses[i]) { return errors.Errorf("IP Addresses claim failed - got %v, want %v", crt.IPAddresses[i], c.ips[i]) } } return nil } // certTemporalClaim validates the certificate temporal validity settings. type certTemporalClaim struct { min time.Duration max time.Duration } // Validate validates the certificate temporal validity settings. func (ctc *certTemporalClaim) Valid(crt *x509.Certificate) error { var ( na = crt.NotAfter nb = crt.NotBefore d = na.Sub(nb) now = time.Now() ) if na.Before(now) { return errors.Errorf("NotAfter: %v cannot be in the past", na) } if na.Before(nb) { return errors.Errorf("NotAfter: %v cannot be before NotBefore: %v", na, nb) } if d < ctc.min { return errors.Errorf("requested duration of %v is less than the authorized minimum certificate duration of %v", d, ctc.min) } if d > ctc.max { return errors.Errorf("requested duration of %v is more than the authorized maximum certificate duration of %v", d, ctc.max) } return nil }