forked from skydive-project/skydive
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtls.go
74 lines (67 loc) · 2.46 KB
/
tls.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
/*
* Copyright (C) 2017 Red Hat, Inc.
*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package common
import (
"crypto/tls"
"crypto/x509"
"fmt"
"io/ioutil"
)
// SetupTLSLoadCertificate create a X509 certificate from file
func SetupTLSLoadCertificate(certPEM string) *x509.CertPool {
rootPEM, err := ioutil.ReadFile(certPEM)
if err != nil {
panic(fmt.Sprintf("Failed to open root certificate '%s' : %s", certPEM, err.Error()))
}
roots := x509.NewCertPool()
ok := roots.AppendCertsFromPEM([]byte(rootPEM))
if !ok {
panic(fmt.Sprintf("Failed to parse root certificate '%s'", rootPEM))
}
return roots
}
// SetupTLSClientConfig create a client X509 certificate from public and private key
func SetupTLSClientConfig(certPEM string, keyPEM string) *tls.Config {
cert, err := tls.LoadX509KeyPair(certPEM, keyPEM)
if err != nil {
panic(fmt.Sprintf("Can't read X509 key pair set in config : cert '%s' key '%s' : %s", certPEM, keyPEM, err.Error()))
}
cfgTLS := &tls.Config{
Certificates: []tls.Certificate{cert},
}
return cfgTLS
}
// SetupTLSServerConfig create a server X509 certificate from public and private key
func SetupTLSServerConfig(certPEM string, keyPEM string) *tls.Config {
cfgTLS := SetupTLSClientConfig(certPEM, keyPEM)
cfgTLS.MinVersion = tls.VersionTLS12
cfgTLS.ClientAuth = tls.VerifyClientCertIfGiven //tls.NoClientCert // tls.RequireAndVerifyClientCert
cfgTLS.CurvePreferences = []tls.CurveID{tls.CurveP521, tls.CurveP384, tls.CurveP256}
cfgTLS.PreferServerCipherSuites = true
cfgTLS.CipherSuites = []uint16{
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
}
return cfgTLS
}