2018-10-05 21:48:36 +00:00
|
|
|
package authority
|
|
|
|
|
|
|
|
import (
|
2019-10-28 18:50:43 +00:00
|
|
|
"context"
|
2018-10-05 21:48:36 +00:00
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
2018-10-19 05:26:39 +00:00
|
|
|
"encoding/asn1"
|
2019-03-05 08:07:13 +00:00
|
|
|
"encoding/base64"
|
2018-10-05 21:48:36 +00:00
|
|
|
"encoding/pem"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
2019-03-07 01:37:49 +00:00
|
|
|
"github.com/smallstep/certificates/authority/provisioner"
|
2019-03-05 08:07:13 +00:00
|
|
|
"github.com/smallstep/certificates/db"
|
2018-10-05 21:48:36 +00:00
|
|
|
"github.com/smallstep/cli/crypto/pemutil"
|
|
|
|
"github.com/smallstep/cli/crypto/tlsutil"
|
|
|
|
"github.com/smallstep/cli/crypto/x509util"
|
2019-10-28 18:50:43 +00:00
|
|
|
"github.com/smallstep/cli/jose"
|
2018-10-05 21:48:36 +00:00
|
|
|
)
|
|
|
|
|
2018-10-19 05:26:39 +00:00
|
|
|
// GetTLSOptions returns the tls options configured.
|
|
|
|
func (a *Authority) GetTLSOptions() *tlsutil.TLSOptions {
|
|
|
|
return a.config.TLS
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2019-03-12 01:47:57 +00:00
|
|
|
var oidAuthorityKeyIdentifier = asn1.ObjectIdentifier{2, 5, 29, 35}
|
2018-10-05 21:48:36 +00:00
|
|
|
|
|
|
|
func withDefaultASN1DN(def *x509util.ASN1DN) x509util.WithOption {
|
|
|
|
return func(p x509util.Profile) error {
|
|
|
|
if def == nil {
|
|
|
|
return errors.New("default ASN1DN template cannot be nil")
|
|
|
|
}
|
|
|
|
crt := p.Subject()
|
|
|
|
|
|
|
|
if len(crt.Subject.Country) == 0 && def.Country != "" {
|
|
|
|
crt.Subject.Country = append(crt.Subject.Country, def.Country)
|
|
|
|
}
|
|
|
|
if len(crt.Subject.Organization) == 0 && def.Organization != "" {
|
|
|
|
crt.Subject.Organization = append(crt.Subject.Organization, def.Organization)
|
|
|
|
}
|
|
|
|
if len(crt.Subject.OrganizationalUnit) == 0 && def.OrganizationalUnit != "" {
|
|
|
|
crt.Subject.OrganizationalUnit = append(crt.Subject.OrganizationalUnit, def.OrganizationalUnit)
|
|
|
|
}
|
|
|
|
if len(crt.Subject.Locality) == 0 && def.Locality != "" {
|
|
|
|
crt.Subject.Locality = append(crt.Subject.Locality, def.Locality)
|
|
|
|
}
|
|
|
|
if len(crt.Subject.Province) == 0 && def.Province != "" {
|
|
|
|
crt.Subject.Province = append(crt.Subject.Province, def.Province)
|
|
|
|
}
|
|
|
|
if len(crt.Subject.StreetAddress) == 0 && def.StreetAddress != "" {
|
|
|
|
crt.Subject.StreetAddress = append(crt.Subject.StreetAddress, def.StreetAddress)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sign creates a signed certificate from a certificate signing request.
|
2019-10-09 19:57:12 +00:00
|
|
|
func (a *Authority) Sign(csr *x509.CertificateRequest, signOpts provisioner.Options, extraOpts ...provisioner.SignOption) ([]*x509.Certificate, error) {
|
2018-10-19 05:26:39 +00:00
|
|
|
var (
|
2019-07-29 18:56:14 +00:00
|
|
|
errContext = apiCtx{"csr": csr, "signOptions": signOpts}
|
2019-03-08 00:03:38 +00:00
|
|
|
mods = []x509util.WithOption{withDefaultASN1DN(a.config.AuthorityConfig.Template)}
|
2019-03-07 01:37:49 +00:00
|
|
|
certValidators = []provisioner.CertificateValidator{}
|
2020-01-10 02:42:26 +00:00
|
|
|
// issIdentity = a.intermediateIdentity
|
2018-10-19 05:26:39 +00:00
|
|
|
)
|
2020-01-03 01:48:28 +00:00
|
|
|
|
|
|
|
// Set backdate with the configured value
|
|
|
|
signOpts.Backdate = a.config.AuthorityConfig.Backdate.Duration
|
|
|
|
|
2018-10-19 05:26:39 +00:00
|
|
|
for _, op := range extraOpts {
|
|
|
|
switch k := op.(type) {
|
2019-03-07 01:37:49 +00:00
|
|
|
case provisioner.CertificateValidator:
|
|
|
|
certValidators = append(certValidators, k)
|
|
|
|
case provisioner.CertificateRequestValidator:
|
|
|
|
if err := k.Valid(csr); err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "sign"), http.StatusUnauthorized, errContext}
|
2018-10-19 05:26:39 +00:00
|
|
|
}
|
2019-03-07 23:14:18 +00:00
|
|
|
case provisioner.ProfileModifier:
|
|
|
|
mods = append(mods, k.Option(signOpts))
|
2018-10-19 05:26:39 +00:00
|
|
|
default:
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Errorf("sign: invalid extra option type %T", k),
|
2018-10-19 05:26:39 +00:00
|
|
|
http.StatusInternalServerError, errContext}
|
|
|
|
}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2019-03-21 00:36:45 +00:00
|
|
|
if err := csr.CheckSignature(); err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "sign: invalid certificate request"),
|
2019-03-21 00:36:45 +00:00
|
|
|
http.StatusBadRequest, errContext}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2020-01-10 02:42:26 +00:00
|
|
|
leaf, err := x509util.NewLeafProfileWithCSR(csr, a.x509Issuer, a.x509Signer, mods...)
|
2018-10-05 21:48:36 +00:00
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrapf(err, "sign"), http.StatusInternalServerError, errContext}
|
2018-10-19 05:26:39 +00:00
|
|
|
}
|
|
|
|
|
2019-03-21 00:36:45 +00:00
|
|
|
for _, v := range certValidators {
|
|
|
|
if err := v.Valid(leaf.Subject()); err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "sign"), http.StatusUnauthorized, errContext}
|
2019-03-21 00:36:45 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
crtBytes, err := leaf.CreateCertificate()
|
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "sign: error creating new leaf certificate"),
|
2018-10-19 05:26:39 +00:00
|
|
|
http.StatusInternalServerError, errContext}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
serverCert, err := x509.ParseCertificate(crtBytes)
|
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "sign: error parsing new leaf certificate"),
|
2018-10-19 05:26:39 +00:00
|
|
|
http.StatusInternalServerError, errContext}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
2018-10-19 05:26:39 +00:00
|
|
|
|
2020-01-10 02:42:26 +00:00
|
|
|
// caCert, err := x509.ParseCertificate(a.x509SignerCert.Raw)
|
|
|
|
// if err != nil {
|
|
|
|
// return nil, &apiError{errors.Wrap(err, "sign: error parsing intermediate certificate"),
|
|
|
|
// http.StatusInternalServerError, errContext}
|
|
|
|
// }
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2019-03-05 08:07:13 +00:00
|
|
|
if err = a.db.StoreCertificate(serverCert); err != nil {
|
|
|
|
if err != db.ErrNotImplemented {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "sign: error storing certificate in db"),
|
2019-03-05 08:07:13 +00:00
|
|
|
http.StatusInternalServerError, errContext}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-10 02:42:26 +00:00
|
|
|
return []*x509.Certificate{serverCert, a.x509Issuer}, nil
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Renew creates a new Certificate identical to the old certificate, except
|
|
|
|
// with a validity window that begins 'now'.
|
2019-10-09 19:57:12 +00:00
|
|
|
func (a *Authority) Renew(oldCert *x509.Certificate) ([]*x509.Certificate, error) {
|
2018-11-01 22:43:24 +00:00
|
|
|
// Check step provisioner extensions
|
2019-10-28 18:50:43 +00:00
|
|
|
if err := a.authorizeRenew(oldCert); err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, err
|
2018-11-01 22:43:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Issuer
|
2020-01-10 02:42:26 +00:00
|
|
|
// issIdentity := a.intermediateIdentity
|
2018-10-05 21:48:36 +00:00
|
|
|
|
2020-01-03 01:48:28 +00:00
|
|
|
// Durations
|
|
|
|
backdate := a.config.AuthorityConfig.Backdate.Duration
|
2018-10-05 21:48:36 +00:00
|
|
|
duration := oldCert.NotAfter.Sub(oldCert.NotBefore)
|
2020-01-03 01:48:28 +00:00
|
|
|
now := time.Now().UTC()
|
|
|
|
|
2019-03-21 00:12:52 +00:00
|
|
|
newCert := &x509.Certificate{
|
2018-10-05 21:48:36 +00:00
|
|
|
PublicKey: oldCert.PublicKey,
|
2020-01-10 02:42:26 +00:00
|
|
|
Issuer: a.x509Issuer.Subject,
|
2018-10-05 21:48:36 +00:00
|
|
|
Subject: oldCert.Subject,
|
2020-01-03 01:48:28 +00:00
|
|
|
NotBefore: now.Add(-1 * backdate),
|
|
|
|
NotAfter: now.Add(duration - backdate),
|
2018-10-05 21:48:36 +00:00
|
|
|
KeyUsage: oldCert.KeyUsage,
|
|
|
|
UnhandledCriticalExtensions: oldCert.UnhandledCriticalExtensions,
|
|
|
|
ExtKeyUsage: oldCert.ExtKeyUsage,
|
|
|
|
UnknownExtKeyUsage: oldCert.UnknownExtKeyUsage,
|
|
|
|
BasicConstraintsValid: oldCert.BasicConstraintsValid,
|
2019-11-13 19:18:05 +00:00
|
|
|
IsCA: oldCert.IsCA,
|
|
|
|
MaxPathLen: oldCert.MaxPathLen,
|
|
|
|
MaxPathLenZero: oldCert.MaxPathLenZero,
|
|
|
|
OCSPServer: oldCert.OCSPServer,
|
|
|
|
IssuingCertificateURL: oldCert.IssuingCertificateURL,
|
|
|
|
DNSNames: oldCert.DNSNames,
|
|
|
|
EmailAddresses: oldCert.EmailAddresses,
|
|
|
|
IPAddresses: oldCert.IPAddresses,
|
|
|
|
URIs: oldCert.URIs,
|
2018-10-05 21:48:36 +00:00
|
|
|
PermittedDNSDomainsCritical: oldCert.PermittedDNSDomainsCritical,
|
|
|
|
PermittedDNSDomains: oldCert.PermittedDNSDomains,
|
|
|
|
ExcludedDNSDomains: oldCert.ExcludedDNSDomains,
|
|
|
|
PermittedIPRanges: oldCert.PermittedIPRanges,
|
|
|
|
ExcludedIPRanges: oldCert.ExcludedIPRanges,
|
|
|
|
PermittedEmailAddresses: oldCert.PermittedEmailAddresses,
|
|
|
|
ExcludedEmailAddresses: oldCert.ExcludedEmailAddresses,
|
|
|
|
PermittedURIDomains: oldCert.PermittedURIDomains,
|
|
|
|
ExcludedURIDomains: oldCert.ExcludedURIDomains,
|
|
|
|
CRLDistributionPoints: oldCert.CRLDistributionPoints,
|
|
|
|
PolicyIdentifiers: oldCert.PolicyIdentifiers,
|
|
|
|
}
|
|
|
|
|
2019-02-15 00:44:36 +00:00
|
|
|
// Copy all extensions except for Authority Key Identifier. This one might
|
|
|
|
// be different if we rotate the intermediate certificate and it will cause
|
|
|
|
// a TLS bad certificate error.
|
|
|
|
for _, ext := range oldCert.Extensions {
|
|
|
|
if !ext.Id.Equal(oidAuthorityKeyIdentifier) {
|
|
|
|
newCert.ExtraExtensions = append(newCert.ExtraExtensions, ext)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-10 02:42:26 +00:00
|
|
|
leaf, err := x509util.NewLeafProfileWithTemplate(newCert, a.x509Issuer, a.x509Signer)
|
2018-10-05 21:48:36 +00:00
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{err, http.StatusInternalServerError, apiCtx{}}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
crtBytes, err := leaf.CreateCertificate()
|
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "error renewing certificate from existing server certificate"),
|
2019-07-29 18:56:14 +00:00
|
|
|
http.StatusInternalServerError, apiCtx{}}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
serverCert, err := x509.ParseCertificate(crtBytes)
|
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "error parsing new server certificate"),
|
2019-07-29 18:56:14 +00:00
|
|
|
http.StatusInternalServerError, apiCtx{}}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
2020-01-10 02:42:26 +00:00
|
|
|
caCert, err := x509.ParseCertificate(a.x509Issuer.Raw)
|
2018-10-05 21:48:36 +00:00
|
|
|
if err != nil {
|
2019-10-09 19:57:12 +00:00
|
|
|
return nil, &apiError{errors.Wrap(err, "error parsing intermediate certificate"),
|
2019-07-29 18:56:14 +00:00
|
|
|
http.StatusInternalServerError, apiCtx{}}
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 21:10:45 +00:00
|
|
|
if err = a.db.StoreCertificate(serverCert); err != nil {
|
|
|
|
if err != db.ErrNotImplemented {
|
|
|
|
return nil, &apiError{errors.Wrap(err, "error storing certificate in db"),
|
|
|
|
http.StatusInternalServerError, apiCtx{}}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-09 19:57:12 +00:00
|
|
|
return []*x509.Certificate{serverCert, caCert}, nil
|
2018-10-05 21:48:36 +00:00
|
|
|
}
|
|
|
|
|
2019-03-05 08:07:13 +00:00
|
|
|
// RevokeOptions are the options for the Revoke API.
|
|
|
|
type RevokeOptions struct {
|
|
|
|
Serial string
|
|
|
|
Reason string
|
|
|
|
ReasonCode int
|
|
|
|
PassiveOnly bool
|
|
|
|
MTLS bool
|
|
|
|
Crt *x509.Certificate
|
|
|
|
OTT string
|
|
|
|
}
|
|
|
|
|
|
|
|
// Revoke revokes a certificate.
|
|
|
|
//
|
|
|
|
// NOTE: Only supports passive revocation - prevent existing certificates from
|
|
|
|
// being renewed.
|
|
|
|
//
|
|
|
|
// TODO: Add OCSP and CRL support.
|
2019-10-28 18:50:43 +00:00
|
|
|
func (a *Authority) Revoke(ctx context.Context, opts *RevokeOptions) error {
|
2019-07-29 18:56:14 +00:00
|
|
|
errContext := apiCtx{
|
2019-03-05 08:07:13 +00:00
|
|
|
"serialNumber": opts.Serial,
|
|
|
|
"reasonCode": opts.ReasonCode,
|
|
|
|
"reason": opts.Reason,
|
|
|
|
"passiveOnly": opts.PassiveOnly,
|
|
|
|
"mTLS": opts.MTLS,
|
2019-10-28 18:50:43 +00:00
|
|
|
"context": string(provisioner.MethodFromContext(ctx)),
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
if opts.MTLS {
|
|
|
|
errContext["certificate"] = base64.StdEncoding.EncodeToString(opts.Crt.Raw)
|
|
|
|
} else {
|
|
|
|
errContext["ott"] = opts.OTT
|
|
|
|
}
|
|
|
|
|
|
|
|
rci := &db.RevokedCertificateInfo{
|
|
|
|
Serial: opts.Serial,
|
|
|
|
ReasonCode: opts.ReasonCode,
|
|
|
|
Reason: opts.Reason,
|
|
|
|
MTLS: opts.MTLS,
|
|
|
|
RevokedAt: time.Now().UTC(),
|
|
|
|
}
|
|
|
|
|
2019-10-28 18:50:43 +00:00
|
|
|
var (
|
|
|
|
p provisioner.Interface
|
|
|
|
err error
|
|
|
|
)
|
2019-03-05 08:07:13 +00:00
|
|
|
// If not mTLS then get the TokenID of the token.
|
|
|
|
if !opts.MTLS {
|
2019-10-28 18:50:43 +00:00
|
|
|
// Validate payload
|
|
|
|
token, err := jose.ParseSigned(opts.OTT)
|
|
|
|
if err != nil {
|
|
|
|
return &apiError{errors.Wrapf(err, "revoke: error parsing token"),
|
|
|
|
http.StatusUnauthorized, errContext}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get claims w/out verification. We should have already verified this token
|
|
|
|
// earlier with a call to authorizeSSHRevoke.
|
|
|
|
var claims Claims
|
|
|
|
if err = token.UnsafeClaimsWithoutVerification(&claims); err != nil {
|
|
|
|
return &apiError{errors.Wrap(err, "revoke"), http.StatusUnauthorized, errContext}
|
|
|
|
}
|
|
|
|
|
|
|
|
// This method will also validate the audiences for JWK provisioners.
|
|
|
|
var ok bool
|
|
|
|
p, ok = a.provisioners.LoadByToken(token, &claims.Claims)
|
|
|
|
if !ok {
|
|
|
|
return &apiError{
|
|
|
|
errors.Errorf("revoke: provisioner not found"),
|
|
|
|
http.StatusInternalServerError, errContext}
|
|
|
|
}
|
2019-03-05 08:07:13 +00:00
|
|
|
rci.TokenID, err = p.GetTokenID(opts.OTT)
|
|
|
|
if err != nil {
|
|
|
|
return &apiError{errors.Wrap(err, "revoke: could not get ID for token"),
|
|
|
|
http.StatusInternalServerError, errContext}
|
|
|
|
}
|
|
|
|
errContext["tokenID"] = rci.TokenID
|
2019-10-28 18:50:43 +00:00
|
|
|
} else {
|
|
|
|
// Load the Certificate provisioner if one exists.
|
|
|
|
p, err = a.LoadProvisionerByCertificate(opts.Crt)
|
|
|
|
if err != nil {
|
|
|
|
return &apiError{
|
|
|
|
errors.Wrap(err, "revoke: unable to load certificate provisioner"),
|
|
|
|
http.StatusUnauthorized, errContext}
|
|
|
|
}
|
2019-03-05 08:07:13 +00:00
|
|
|
}
|
|
|
|
rci.ProvisionerID = p.GetID()
|
|
|
|
errContext["provisionerID"] = rci.ProvisionerID
|
|
|
|
|
2019-10-28 18:50:43 +00:00
|
|
|
if provisioner.MethodFromContext(ctx) == provisioner.RevokeSSHMethod {
|
|
|
|
err = a.db.RevokeSSH(rci)
|
|
|
|
} else { // default to revoke x509
|
|
|
|
err = a.db.Revoke(rci)
|
|
|
|
}
|
2019-03-05 08:07:13 +00:00
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
return nil
|
|
|
|
case db.ErrNotImplemented:
|
|
|
|
return &apiError{errors.New("revoke: no persistence layer configured"),
|
|
|
|
http.StatusNotImplemented, errContext}
|
|
|
|
case db.ErrAlreadyExists:
|
|
|
|
return &apiError{errors.Errorf("revoke: certificate with serial number %s has already been revoked", rci.Serial),
|
|
|
|
http.StatusBadRequest, errContext}
|
|
|
|
default:
|
|
|
|
return &apiError{err, http.StatusInternalServerError, errContext}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-05 21:48:36 +00:00
|
|
|
// GetTLSCertificate creates a new leaf certificate to be used by the CA HTTPS server.
|
|
|
|
func (a *Authority) GetTLSCertificate() (*tls.Certificate, error) {
|
|
|
|
profile, err := x509util.NewLeafProfile("Step Online CA",
|
2020-01-10 02:42:26 +00:00
|
|
|
a.x509Issuer, a.x509Signer,
|
2018-10-05 21:48:36 +00:00
|
|
|
x509util.WithHosts(strings.Join(a.config.DNSNames, ",")))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
crtBytes, err := profile.CreateCertificate()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
keyPEM, err := pemutil.Serialize(profile.SubjectPrivateKey())
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
crtPEM := pem.EncodeToMemory(&pem.Block{
|
|
|
|
Type: "CERTIFICATE",
|
|
|
|
Bytes: crtBytes,
|
|
|
|
})
|
|
|
|
|
|
|
|
// Load the x509 key pair (combining server and intermediate blocks)
|
|
|
|
// to a tls.Certificate.
|
2020-01-10 02:42:26 +00:00
|
|
|
intermediatePEM, err := pemutil.Serialize(a.x509Issuer)
|
2018-10-05 21:48:36 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
tlsCrt, err := tls.X509KeyPair(append(crtPEM,
|
|
|
|
pem.EncodeToMemory(intermediatePEM)...),
|
|
|
|
pem.EncodeToMemory(keyPEM))
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "error creating tls certificate")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the 'leaf' certificate and set the attribute accordingly.
|
|
|
|
leaf, err := x509.ParseCertificate(tlsCrt.Certificate[0])
|
|
|
|
if err != nil {
|
|
|
|
return nil, errors.Wrap(err, "error parsing tls certificate")
|
|
|
|
}
|
|
|
|
tlsCrt.Leaf = leaf
|
|
|
|
|
|
|
|
return &tlsCrt, nil
|
|
|
|
}
|