forked from TrueCloudLab/certificates
3e6137110b
This adds a new KMS, SSHAgentKMS, which is a KMS to provide signing keys for issuing ssh certificates signed by a key managed by a ssh-agent. It uses the golang.org/x/crypto package to get a native Go implementation to talk to a ssh-agent. This was primarly written to be able to use gpg-agent to provide the keys stored in a YubiKeys openpgp interface, but can be used for other setups like proxying a ssh-agent over network. That way the signing key for ssh certificates can be kept in a "sign-only" hsm. This code was written for my employer Intinor AB, but for simplicity sake gifted to me to contribute upstream. Signed-off-by: Anton Lundin <glance@acc.umu.se>
105 lines
2.8 KiB
Go
105 lines
2.8 KiB
Go
package apiv1
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/x509"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
// KeyManager is the interface implemented by all the KMS.
|
|
type KeyManager interface {
|
|
GetPublicKey(req *GetPublicKeyRequest) (crypto.PublicKey, error)
|
|
CreateKey(req *CreateKeyRequest) (*CreateKeyResponse, error)
|
|
CreateSigner(req *CreateSignerRequest) (crypto.Signer, error)
|
|
Close() error
|
|
}
|
|
|
|
// CertificateManager is the interface implemented by the KMS that can load and
|
|
// store x509.Certificates.
|
|
type CertificateManager interface {
|
|
LoadCertificate(req *LoadCertificateRequest) (*x509.Certificate, error)
|
|
StoreCertificate(req *StoreCertificateRequest) error
|
|
}
|
|
|
|
// ErrNotImplemented is the type of error returned if an operation is not
|
|
// implemented.
|
|
type ErrNotImplemented struct {
|
|
msg string
|
|
}
|
|
|
|
func (e ErrNotImplemented) Error() string {
|
|
if e.msg != "" {
|
|
return e.msg
|
|
}
|
|
return "not implemented"
|
|
}
|
|
|
|
// Type represents the KMS type used.
|
|
type Type string
|
|
|
|
const (
|
|
// DefaultKMS is a KMS implementation using software.
|
|
DefaultKMS Type = ""
|
|
// SoftKMS is a KMS implementation using software.
|
|
SoftKMS Type = "softkms"
|
|
// CloudKMS is a KMS implementation using Google's Cloud KMS.
|
|
CloudKMS Type = "cloudkms"
|
|
// AmazonKMS is a KMS implementation using Amazon AWS KMS.
|
|
AmazonKMS Type = "awskms"
|
|
// PKCS11 is a KMS implementation using the PKCS11 standard.
|
|
PKCS11 Type = "pkcs11"
|
|
// YubiKey is a KMS implementation using a YubiKey PIV.
|
|
YubiKey Type = "yubikey"
|
|
// SSHAgentKMS is a KMS implementation using ssh-agent to access keys.
|
|
SSHAgentKMS Type = "sshagentkms"
|
|
)
|
|
|
|
// Options are the KMS options. They represent the kms object in the ca.json.
|
|
type Options struct {
|
|
// The type of the KMS to use.
|
|
Type string `json:"type"`
|
|
|
|
// Path to the credentials file used in CloudKMS and AmazonKMS.
|
|
CredentialsFile string `json:"credentialsFile"`
|
|
|
|
// Path to the module used with PKCS11 KMS.
|
|
Module string `json:"module"`
|
|
|
|
// Pin used to access the PKCS11 module.
|
|
Pin string `json:"pin"`
|
|
|
|
// ManagementKey used in YubiKeys. Default management key is the hexadecimal
|
|
// string 010203040506070801020304050607080102030405060708:
|
|
// []byte{
|
|
// 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
|
|
// 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
|
|
// 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08,
|
|
// }
|
|
ManagementKey string `json:"managementKey"`
|
|
|
|
// Region to use in AmazonKMS.
|
|
Region string `json:"region"`
|
|
|
|
// Profile to use in AmazonKMS.
|
|
Profile string `json:"profile"`
|
|
}
|
|
|
|
// Validate checks the fields in Options.
|
|
func (o *Options) Validate() error {
|
|
if o == nil {
|
|
return nil
|
|
}
|
|
|
|
switch Type(strings.ToLower(o.Type)) {
|
|
case DefaultKMS, SoftKMS, CloudKMS, AmazonKMS, SSHAgentKMS:
|
|
case YubiKey:
|
|
case PKCS11:
|
|
return ErrNotImplemented{"support for PKCS11 is not yet implemented"}
|
|
default:
|
|
return errors.Errorf("unsupported kms type %s", o.Type)
|
|
}
|
|
|
|
return nil
|
|
}
|