* For caddy v1 in our org This RP changes all imports for caddyserver/caddy to coredns/caddy. This is the v1 code of caddy. For the coredns/caddy repo the following changes have been made: * anything not needed by us is deleted * all `telemetry` stuff is deleted * all its import paths are also changed to point to coredns/caddy * the v1 branch has been moved to the master branch * a v1.1.0 tag has been added to signal the latest release Signed-off-by: Miek Gieben <miek@miek.nl> * Fix imports Signed-off-by: Miek Gieben <miek@miek.nl> * Group coredns/caddy with out plugins Signed-off-by: Miek Gieben <miek@miek.nl> * remove this file Signed-off-by: Miek Gieben <miek@miek.nl> * Relax import ordering github.com/coredns is now also a coredns dep, this makes github.com/coredns/caddy fit more natural in the list. Signed-off-by: Miek Gieben <miek@miek.nl> * Fix final import Signed-off-by: Miek Gieben <miek@miek.nl>
90 lines
2.3 KiB
Go
90 lines
2.3 KiB
Go
package tls
|
|
|
|
import (
|
|
ctls "crypto/tls"
|
|
|
|
"github.com/coredns/caddy"
|
|
"github.com/coredns/coredns/core/dnsserver"
|
|
"github.com/coredns/coredns/plugin"
|
|
"github.com/coredns/coredns/plugin/pkg/tls"
|
|
)
|
|
|
|
func init() { plugin.Register("tls", setup) }
|
|
|
|
func setup(c *caddy.Controller) error {
|
|
err := parseTLS(c)
|
|
if err != nil {
|
|
return plugin.Error("tls", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func setTLSDefaults(tls *ctls.Config) {
|
|
tls.MinVersion = ctls.VersionTLS12
|
|
tls.MaxVersion = ctls.VersionTLS13
|
|
tls.CipherSuites = []uint16{
|
|
ctls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
ctls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
ctls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,
|
|
ctls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
|
ctls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
|
|
ctls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
ctls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
|
|
ctls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
|
ctls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
|
}
|
|
tls.PreferServerCipherSuites = true
|
|
}
|
|
|
|
func parseTLS(c *caddy.Controller) error {
|
|
config := dnsserver.GetConfig(c)
|
|
|
|
if config.TLSConfig != nil {
|
|
return plugin.Error("tls", c.Errf("TLS already configured for this server instance"))
|
|
}
|
|
|
|
for c.Next() {
|
|
args := c.RemainingArgs()
|
|
if len(args) < 2 || len(args) > 3 {
|
|
return plugin.Error("tls", c.ArgErr())
|
|
}
|
|
clientAuth := ctls.NoClientCert
|
|
for c.NextBlock() {
|
|
switch c.Val() {
|
|
case "client_auth":
|
|
authTypeArgs := c.RemainingArgs()
|
|
if len(authTypeArgs) != 1 {
|
|
return c.ArgErr()
|
|
}
|
|
switch authTypeArgs[0] {
|
|
case "nocert":
|
|
clientAuth = ctls.NoClientCert
|
|
case "request":
|
|
clientAuth = ctls.RequestClientCert
|
|
case "require":
|
|
clientAuth = ctls.RequireAnyClientCert
|
|
case "verify_if_given":
|
|
clientAuth = ctls.VerifyClientCertIfGiven
|
|
case "require_and_verify":
|
|
clientAuth = ctls.RequireAndVerifyClientCert
|
|
default:
|
|
return c.Errf("unknown authentication type '%s'", authTypeArgs[0])
|
|
}
|
|
default:
|
|
return c.Errf("unknown option '%s'", c.Val())
|
|
}
|
|
}
|
|
tls, err := tls.NewTLSConfigFromArgs(args...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
tls.ClientAuth = clientAuth
|
|
// NewTLSConfigFromArgs only sets RootCAs, so we need to let ClientCAs refer to it.
|
|
tls.ClientCAs = tls.RootCAs
|
|
|
|
setTLSDefaults(tls)
|
|
|
|
config.TLSConfig = tls
|
|
}
|
|
return nil
|
|
}
|