123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261 |
- package tlscert
- import (
- "crypto/tls"
- "crypto/x509"
- "embed"
- "encoding/pem"
- "io"
- "os"
- "path/filepath"
- "strings"
- "imuslab.com/zoraxy/mod/info/logger"
- "imuslab.com/zoraxy/mod/utils"
- )
- type CertCache struct {
- Cert *x509.Certificate
- PubKey string
- PriKey string
- }
- type Manager struct {
- CertStore string //Path where all the certs are stored
- LoadedCerts []*CertCache //A list of loaded certs
- Logger *logger.Logger //System wide logger for debug mesage
- verbal bool
- }
- //go:embed localhost.pem localhost.key
- var buildinCertStore embed.FS
- func NewManager(certStore string, verbal bool, logger *logger.Logger) (*Manager, error) {
- if !utils.FileExists(certStore) {
- os.MkdirAll(certStore, 0775)
- }
- pubKey := "./tmp/localhost.pem"
- priKey := "./tmp/localhost.key"
- //Check if this is initial setup
- if !utils.FileExists(pubKey) {
- buildInPubKey, _ := buildinCertStore.ReadFile(filepath.Base(pubKey))
- os.WriteFile(pubKey, buildInPubKey, 0775)
- }
- if !utils.FileExists(priKey) {
- buildInPriKey, _ := buildinCertStore.ReadFile(filepath.Base(priKey))
- os.WriteFile(priKey, buildInPriKey, 0775)
- }
- thisManager := Manager{
- CertStore: certStore,
- LoadedCerts: []*CertCache{},
- verbal: verbal,
- Logger: logger,
- }
- err := thisManager.UpdateLoadedCertList()
- if err != nil {
- return nil, err
- }
- return &thisManager, nil
- }
- // Update domain mapping from file
- func (m *Manager) UpdateLoadedCertList() error {
- //Get a list of certificates from file
- domainList, err := m.ListCertDomains()
- if err != nil {
- return err
- }
- //Load each of the certificates into memory
- certList := []*CertCache{}
- for _, certname := range domainList {
- //Read their certificate into memory
- pubKey := filepath.Join(m.CertStore, certname+".pem")
- priKey := filepath.Join(m.CertStore, certname+".key")
- certificate, err := tls.LoadX509KeyPair(pubKey, priKey)
- if err != nil {
- m.Logger.PrintAndLog("tls-router", "Certificate load failed: "+certname, err)
- continue
- }
- for _, thisCert := range certificate.Certificate {
- loadedCert, err := x509.ParseCertificate(thisCert)
- if err != nil {
- //Error pasring cert, skip this byte segment
- m.Logger.PrintAndLog("tls-router", "Certificate parse failed: "+certname, err)
- continue
- }
- thisCacheEntry := CertCache{
- Cert: loadedCert,
- PubKey: pubKey,
- PriKey: priKey,
- }
- certList = append(certList, &thisCacheEntry)
- }
- }
- //Replace runtime cert array
- m.LoadedCerts = certList
- return nil
- }
- // Match cert by CN
- func (m *Manager) CertMatchExists(serverName string) bool {
- for _, certCacheEntry := range m.LoadedCerts {
- if certCacheEntry.Cert.VerifyHostname(serverName) == nil || certCacheEntry.Cert.Issuer.CommonName == serverName {
- return true
- }
- }
- return false
- }
- // Get cert entry by matching server name, return pubKey and priKey if found
- // check with CertMatchExists before calling to the load function
- func (m *Manager) GetCertByX509CNHostname(serverName string) (string, string) {
- for _, certCacheEntry := range m.LoadedCerts {
- if certCacheEntry.Cert.VerifyHostname(serverName) == nil || certCacheEntry.Cert.Issuer.CommonName == serverName {
- return certCacheEntry.PubKey, certCacheEntry.PriKey
- }
- }
- return "", ""
- }
- // Return a list of domains by filename
- func (m *Manager) ListCertDomains() ([]string, error) {
- filenames, err := m.ListCerts()
- if err != nil {
- return []string{}, err
- }
- //Remove certificates where there are missing public key or private key
- filenames = getCertPairs(filenames)
- return filenames, nil
- }
- // Return a list of cert files (public and private keys)
- func (m *Manager) ListCerts() ([]string, error) {
- certs, err := os.ReadDir(m.CertStore)
- if err != nil {
- return []string{}, err
- }
- filenames := make([]string, 0, len(certs))
- for _, cert := range certs {
- if !cert.IsDir() {
- filenames = append(filenames, cert.Name())
- }
- }
- return filenames, nil
- }
- // Get a certificate from disk where its certificate matches with the helloinfo
- func (m *Manager) GetCert(helloInfo *tls.ClientHelloInfo) (*tls.Certificate, error) {
- //Check if the domain corrisponding cert exists
- pubKey := "./tmp/localhost.pem"
- priKey := "./tmp/localhost.key"
- if utils.FileExists(filepath.Join(m.CertStore, helloInfo.ServerName+".pem")) && utils.FileExists(filepath.Join(m.CertStore, helloInfo.ServerName+".key")) {
- //Direct hit
- pubKey = filepath.Join(m.CertStore, helloInfo.ServerName+".pem")
- priKey = filepath.Join(m.CertStore, helloInfo.ServerName+".key")
- } else if m.CertMatchExists(helloInfo.ServerName) {
- //Use x509
- pubKey, priKey = m.GetCertByX509CNHostname(helloInfo.ServerName)
- } else {
- //Fallback to legacy method of matching certificates
- if m.DefaultCertExists() {
- //Use default.pem and default.key
- pubKey = filepath.Join(m.CertStore, "default.pem")
- priKey = filepath.Join(m.CertStore, "default.key")
- }
- }
- //Load the cert and serve it
- cer, err := tls.LoadX509KeyPair(pubKey, priKey)
- if err != nil {
- return nil, nil
- }
- return &cer, nil
- }
- // Check if both the default cert public key and private key exists
- func (m *Manager) DefaultCertExists() bool {
- return utils.FileExists(filepath.Join(m.CertStore, "default.pem")) && utils.FileExists(filepath.Join(m.CertStore, "default.key"))
- }
- // Check if the default cert exists returning seperate results for pubkey and prikey
- func (m *Manager) DefaultCertExistsSep() (bool, bool) {
- return utils.FileExists(filepath.Join(m.CertStore, "default.pem")), utils.FileExists(filepath.Join(m.CertStore, "default.key"))
- }
- // Delete the cert if exists
- func (m *Manager) RemoveCert(domain string) error {
- pubKey := filepath.Join(m.CertStore, domain+".pem")
- priKey := filepath.Join(m.CertStore, domain+".key")
- if utils.FileExists(pubKey) {
- err := os.Remove(pubKey)
- if err != nil {
- return err
- }
- }
- if utils.FileExists(priKey) {
- err := os.Remove(priKey)
- if err != nil {
- return err
- }
- }
- //Update the cert list
- m.UpdateLoadedCertList()
- return nil
- }
- // Check if the given file is a valid TLS file
- func IsValidTLSFile(file io.Reader) bool {
- // Read the contents of the uploaded file
- contents, err := io.ReadAll(file)
- if err != nil {
- // Handle the error
- return false
- }
- // Parse the contents of the file as a PEM-encoded certificate or key
- block, _ := pem.Decode(contents)
- if block == nil {
- // The file is not a valid PEM-encoded certificate or key
- return false
- }
- // Parse the certificate or key
- if strings.Contains(block.Type, "CERTIFICATE") {
- // The file contains a certificate
- cert, err := x509.ParseCertificate(block.Bytes)
- if err != nil {
- // Handle the error
- return false
- }
- // Check if the certificate is a valid TLS/SSL certificate
- return !cert.IsCA && cert.KeyUsage&x509.KeyUsageDigitalSignature != 0 && cert.KeyUsage&x509.KeyUsageKeyEncipherment != 0
- } else if strings.Contains(block.Type, "PRIVATE KEY") {
- // The file contains a private key
- _, err := x509.ParsePKCS1PrivateKey(block.Bytes)
- return err == nil
- } else {
- return false
- }
- }
|