144 lines
4.9 KiB
Go
144 lines
4.9 KiB
Go
package authority
|
|
|
|
import (
|
|
"time"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/smallstep/cli/crypto/x509util"
|
|
|
|
jose "gopkg.in/square/go-jose.v2"
|
|
)
|
|
|
|
// ProvisionerClaims so that individual provisioners can override global claims.
|
|
type ProvisionerClaims struct {
|
|
globalClaims *ProvisionerClaims
|
|
MinTLSDur *duration `json:"minTLSCertDuration,omitempty"`
|
|
MaxTLSDur *duration `json:"maxTLSCertDuration,omitempty"`
|
|
DefaultTLSDur *duration `json:"defaultTLSCertDuration,omitempty"`
|
|
DisableRenewal *bool `json:"disableRenewal,omitempty"`
|
|
}
|
|
|
|
// Init initializes and validates the individual provisioner claims.
|
|
func (pc *ProvisionerClaims) Init(global *ProvisionerClaims) (*ProvisionerClaims, error) {
|
|
if pc == nil {
|
|
pc = &ProvisionerClaims{}
|
|
}
|
|
pc.globalClaims = global
|
|
err := pc.Validate()
|
|
return pc, err
|
|
}
|
|
|
|
// DefaultTLSCertDuration returns the default TLS cert duration for the
|
|
// provisioner. If the default is not set within the provisioner, then the global
|
|
// default from the authority configuration will be used.
|
|
func (pc *ProvisionerClaims) DefaultTLSCertDuration() time.Duration {
|
|
if pc.DefaultTLSDur == nil || pc.DefaultTLSDur.Duration == 0 {
|
|
return pc.globalClaims.DefaultTLSCertDuration()
|
|
}
|
|
return pc.DefaultTLSDur.Duration
|
|
}
|
|
|
|
// MinTLSCertDuration returns the minimum TLS cert duration for the provisioner.
|
|
// If the minimum is not set within the provisioner, then the global
|
|
// minimum from the authority configuration will be used.
|
|
func (pc *ProvisionerClaims) MinTLSCertDuration() time.Duration {
|
|
if pc.MinTLSDur == nil || pc.MinTLSDur.Duration == 0 {
|
|
return pc.globalClaims.MinTLSCertDuration()
|
|
}
|
|
return pc.MinTLSDur.Duration
|
|
}
|
|
|
|
// MaxTLSCertDuration returns the maximum TLS cert duration for the provisioner.
|
|
// If the maximum is not set within the provisioner, then the global
|
|
// maximum from the authority configuration will be used.
|
|
func (pc *ProvisionerClaims) MaxTLSCertDuration() time.Duration {
|
|
if pc.MaxTLSDur == nil || pc.MaxTLSDur.Duration == 0 {
|
|
return pc.globalClaims.MaxTLSCertDuration()
|
|
}
|
|
return pc.MaxTLSDur.Duration
|
|
}
|
|
|
|
// IsDisableRenewal returns if the renewal flow is disabled for the
|
|
// provisioner. If the property is not set within the provisioner, then the
|
|
// global value from the authority configuration will be used.
|
|
func (pc *ProvisionerClaims) IsDisableRenewal() bool {
|
|
if pc.DisableRenewal == nil {
|
|
return pc.globalClaims.IsDisableRenewal()
|
|
}
|
|
return *pc.DisableRenewal
|
|
}
|
|
|
|
// Validate validates and modifies the Claims with default values.
|
|
func (pc *ProvisionerClaims) Validate() error {
|
|
var (
|
|
min = pc.MinTLSCertDuration()
|
|
max = pc.MaxTLSCertDuration()
|
|
def = pc.DefaultTLSCertDuration()
|
|
)
|
|
switch {
|
|
case min == 0:
|
|
return errors.Errorf("claims: MinTLSCertDuration cannot be empty")
|
|
case max == 0:
|
|
return errors.Errorf("claims: MaxTLSCertDuration cannot be empty")
|
|
case def == 0:
|
|
return errors.Errorf("claims: DefaultTLSCertDuration cannot be empty")
|
|
case max < min:
|
|
return errors.Errorf("claims: MaxCertDuration cannot be less "+
|
|
"than MinCertDuration: MaxCertDuration - %v, MinCertDuration - %v", max, min)
|
|
case def < min:
|
|
return errors.Errorf("claims: DefaultCertDuration cannot be less than MinCertDuration: DefaultCertDuration - %v, MinCertDuration - %v", def, min)
|
|
case max < def:
|
|
return errors.Errorf("claims: MaxCertDuration cannot be less than DefaultCertDuration: MaxCertDuration - %v, DefaultCertDuration - %v", max, def)
|
|
default:
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// Provisioner - authorized entity that can sign tokens necessary for signature requests.
|
|
type Provisioner struct {
|
|
Name string `json:"name,omitempty"`
|
|
Type string `json:"type,omitempty"`
|
|
Key *jose.JSONWebKey `json:"key,omitempty"`
|
|
EncryptedKey string `json:"encryptedKey,omitempty"`
|
|
Claims *ProvisionerClaims `json:"claims,omitempty"`
|
|
}
|
|
|
|
// Init initializes and validates a the fields of Provisioner type.
|
|
func (p *Provisioner) Init(global *ProvisionerClaims) error {
|
|
switch {
|
|
case p.Name == "":
|
|
return errors.New("provisioner name cannot be empty")
|
|
|
|
case p.Type == "":
|
|
return errors.New("provisioner type cannot be empty")
|
|
|
|
case p.Key == nil:
|
|
return errors.New("provisioner key cannot be empty")
|
|
}
|
|
|
|
var err error
|
|
p.Claims, err = p.Claims.Init(global)
|
|
return err
|
|
}
|
|
|
|
// getTLSApps returns a list of modifiers and validators that will be applied to
|
|
// the certificate.
|
|
func (p *Provisioner) getTLSApps(so SignOptions) ([]x509util.WithOption, []certClaim, error) {
|
|
c := p.Claims
|
|
return []x509util.WithOption{
|
|
x509util.WithNotBeforeAfterDuration(so.NotBefore,
|
|
so.NotAfter, c.DefaultTLSCertDuration()),
|
|
withProvisionerOID(p.Name, p.Key.KeyID),
|
|
}, []certClaim{
|
|
&certTemporalClaim{
|
|
min: c.MinTLSCertDuration(),
|
|
max: c.MaxTLSCertDuration(),
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
// ID returns the provisioner identifier. The name and credential id should
|
|
// uniquely identify any provisioner.
|
|
func (p *Provisioner) ID() string {
|
|
return p.Name + ":" + p.Key.KeyID
|
|
}
|