github.imxd.top/operator-framework/operator-sdk@v0.8.2/pkg/tls/primitives.go (about)

     1  // Copyright 2018 The Operator-SDK Authors
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  package tlsutil
    16  
    17  import (
    18  	"crypto/rand"
    19  	"crypto/rsa"
    20  	"crypto/x509"
    21  	"crypto/x509/pkix"
    22  	"encoding/pem"
    23  	"errors"
    24  	"fmt"
    25  	"math"
    26  	"math/big"
    27  	"time"
    28  
    29  	"k8s.io/api/core/v1"
    30  )
    31  
    32  const (
    33  	rsaKeySize   = 2048
    34  	duration365d = time.Hour * 24 * 365
    35  )
    36  
    37  // newPrivateKey returns randomly generated RSA private key.
    38  func newPrivateKey() (*rsa.PrivateKey, error) {
    39  	return rsa.GenerateKey(rand.Reader, rsaKeySize)
    40  }
    41  
    42  // encodePrivateKeyPEM encodes the given private key pem and returns bytes (base64).
    43  func encodePrivateKeyPEM(key *rsa.PrivateKey) []byte {
    44  	return pem.EncodeToMemory(&pem.Block{
    45  		Type:  "RSA PRIVATE KEY",
    46  		Bytes: x509.MarshalPKCS1PrivateKey(key),
    47  	})
    48  }
    49  
    50  // encodeCertificatePEM encodes the given certificate pem and returns bytes (base64).
    51  func encodeCertificatePEM(cert *x509.Certificate) []byte {
    52  	return pem.EncodeToMemory(&pem.Block{
    53  		Type:  "CERTIFICATE",
    54  		Bytes: cert.Raw,
    55  	})
    56  }
    57  
    58  // parsePEMEncodedCert parses a certificate from the given pemdata
    59  func parsePEMEncodedCert(pemdata []byte) (*x509.Certificate, error) {
    60  	decoded, _ := pem.Decode(pemdata)
    61  	if decoded == nil {
    62  		return nil, errors.New("no PEM data found")
    63  	}
    64  	return x509.ParseCertificate(decoded.Bytes)
    65  }
    66  
    67  // parsePEMEncodedPrivateKey parses a private key from given pemdata
    68  func parsePEMEncodedPrivateKey(pemdata []byte) (*rsa.PrivateKey, error) {
    69  	decoded, _ := pem.Decode(pemdata)
    70  	if decoded == nil {
    71  		return nil, errors.New("no PEM data found")
    72  	}
    73  	return x509.ParsePKCS1PrivateKey(decoded.Bytes)
    74  }
    75  
    76  // newSelfSignedCACertificate returns a self-signed CA certificate based on given configuration and private key.
    77  // The certificate has one-year lease.
    78  func newSelfSignedCACertificate(key *rsa.PrivateKey) (*x509.Certificate, error) {
    79  	serial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))
    80  	if err != nil {
    81  		return nil, err
    82  	}
    83  	now := time.Now()
    84  	tmpl := x509.Certificate{
    85  		SerialNumber:          serial,
    86  		NotBefore:             now.UTC(),
    87  		NotAfter:              now.Add(duration365d).UTC(),
    88  		KeyUsage:              x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
    89  		BasicConstraintsValid: true,
    90  		IsCA:                  true,
    91  	}
    92  	certDERBytes, err := x509.CreateCertificate(rand.Reader, &tmpl, &tmpl, key.Public(), key)
    93  	if err != nil {
    94  		return nil, err
    95  	}
    96  	return x509.ParseCertificate(certDERBytes)
    97  }
    98  
    99  // newSignedCertificate signs a certificate using the given private key, CA and returns a signed certificate.
   100  // The certificate could be used for both client and server auth.
   101  // The certificate has one-year lease.
   102  func newSignedCertificate(cfg *CertConfig, service *v1.Service, key *rsa.PrivateKey, caCert *x509.Certificate, caKey *rsa.PrivateKey) (*x509.Certificate, error) {
   103  	serial, err := rand.Int(rand.Reader, new(big.Int).SetInt64(math.MaxInt64))
   104  	if err != nil {
   105  		return nil, err
   106  	}
   107  	eku := []x509.ExtKeyUsage{}
   108  	switch cfg.CertType {
   109  	case ClientCert:
   110  		eku = append(eku, x509.ExtKeyUsageClientAuth)
   111  	case ServingCert:
   112  		eku = append(eku, x509.ExtKeyUsageServerAuth)
   113  	case ClientAndServingCert:
   114  		eku = append(eku, x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth)
   115  	}
   116  	certTmpl := x509.Certificate{
   117  		Subject: pkix.Name{
   118  			CommonName:   cfg.CommonName,
   119  			Organization: cfg.Organization,
   120  		},
   121  		DNSNames:     []string{fmt.Sprintf("%s.%s.svc.cluster.local", service.Name, service.Namespace)},
   122  		SerialNumber: serial,
   123  		NotBefore:    caCert.NotBefore,
   124  		NotAfter:     time.Now().Add(duration365d).UTC(),
   125  		KeyUsage:     x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
   126  		ExtKeyUsage:  eku,
   127  	}
   128  	certDERBytes, err := x509.CreateCertificate(rand.Reader, &certTmpl, caCert, key.Public(), caKey)
   129  	if err != nil {
   130  		return nil, err
   131  	}
   132  	return x509.ParseCertificate(certDERBytes)
   133  }