Initial commit

This commit is contained in:
Alex Vanin 2024-03-24 13:25:34 +03:00
commit bad7ccf8aa
4 changed files with 120 additions and 0 deletions

1
.gitignore vendored Normal file
View file

@ -0,0 +1 @@
server/*.pem

34
README.md Normal file
View file

@ -0,0 +1,34 @@
# Self Signed Certs
This app starts HTTPS server with auto-generated self signed certificate.
Use `-p` to specify server port. Default is `10453`.
Use `-o` to specify path to output file for the certificate. Default is `./cert.pem`
## Example
Start server application
```
$ cd server
$ go run main.go -o cert.pem
```
Try to connect with default settings and receive error.
```
$ curl https://localhost:10453
curl: (60) SSL certificate problem: self-signed certificate
```
Receive 200 OK response after adding `-k` flag.
```
$ curl -k https://localhost:10453
```
Receive 200 OK by using `--cacert` option.
```
$ curl --cacert cert.pem https://localhost:10453
```

3
go.mod Normal file
View file

@ -0,0 +1,3 @@
module selfcert
go 1.22.1

82
server/main.go Normal file
View file

@ -0,0 +1,82 @@
package main
import (
"crypto/rand"
"crypto/rsa"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"encoding/pem"
"flag"
"fmt"
"log"
"math/big"
"net/http"
"os"
"time"
)
func main() {
cFile := flag.String("o", "./cert.pem", "Path to write cert file to use in the client")
port := flag.String("p", "10453", "Server port")
flag.Parse()
cert, key, err := certs(*cFile)
if err != nil {
log.Fatalf("Cannot create certs: %v", err)
}
kp, err := tls.X509KeyPair(cert, key)
if err != nil {
log.Fatalf("Cannot create key pair: %v", err)
}
config := &tls.Config{
Certificates: []tls.Certificate{kp},
}
server := &http.Server{
Addr: ":" + *port,
ReadTimeout: time.Second,
WriteTimeout: time.Second,
TLSConfig: config,
}
server.Handler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
log.Print("New Message")
w.Header().Set("Hello", "World")
w.WriteHeader(200)
})
server.ListenAndServeTLS("", "")
}
func certs(outCertFile string) (certOut []byte, keyOut []byte, err error) {
privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
if err != nil {
return nil, nil, fmt.Errorf("generate private key: %w", err)
}
template := x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{CommonName: "localhost"},
NotBefore: time.Now(),
NotAfter: time.Now().Add(time.Hour * 24 * 365),
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
BasicConstraintsValid: true,
}
derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, &privateKey.PublicKey, privateKey)
if err != nil {
return nil, nil, fmt.Errorf("create certificate: %w", err)
}
certOut = pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: derBytes})
keyOut = pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(privateKey)})
if len(outCertFile) > 0 {
os.WriteFile(outCertFile, certOut, 0400)
}
return
}