mirror of https://github.com/fatedier/frp
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
117 lines
2.4 KiB
117 lines
2.4 KiB
package transport |
|
|
|
import ( |
|
"crypto/rand" |
|
"crypto/rsa" |
|
"crypto/tls" |
|
"crypto/x509" |
|
"encoding/pem" |
|
"io/ioutil" |
|
"math/big" |
|
) |
|
|
|
func newCustomTLSKeyPair(certfile, keyfile string) (*tls.Certificate, error) { |
|
tlsCert, err := tls.LoadX509KeyPair(certfile, keyfile) |
|
if err != nil { |
|
return nil, err |
|
} |
|
return &tlsCert, nil |
|
} |
|
|
|
func newRandomTLSKeyPair() *tls.Certificate { |
|
key, err := rsa.GenerateKey(rand.Reader, 1024) |
|
if err != nil { |
|
panic(err) |
|
} |
|
template := x509.Certificate{SerialNumber: big.NewInt(1)} |
|
certDER, err := x509.CreateCertificate( |
|
rand.Reader, |
|
&template, |
|
&template, |
|
&key.PublicKey, |
|
key) |
|
if err != nil { |
|
panic(err) |
|
} |
|
keyPEM := pem.EncodeToMemory(&pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(key)}) |
|
certPEM := pem.EncodeToMemory(&pem.Block{Type: "CERTIFICATE", Bytes: certDER}) |
|
|
|
tlsCert, err := tls.X509KeyPair(certPEM, keyPEM) |
|
if err != nil { |
|
panic(err) |
|
} |
|
return &tlsCert |
|
} |
|
|
|
// Only support one ca file to add |
|
func newCertPool(caPath string) (*x509.CertPool, error) { |
|
pool := x509.NewCertPool() |
|
|
|
caCrt, err := ioutil.ReadFile(caPath) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
pool.AppendCertsFromPEM(caCrt) |
|
|
|
return pool, nil |
|
} |
|
|
|
func NewServerTLSConfig(certPath, keyPath, caPath string) (*tls.Config, error) { |
|
var base = &tls.Config{} |
|
|
|
if certPath == "" || keyPath == "" { |
|
// server will generate tls conf by itself |
|
cert := newRandomTLSKeyPair() |
|
base.Certificates = []tls.Certificate{*cert} |
|
} else { |
|
cert, err := newCustomTLSKeyPair(certPath, keyPath) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
base.Certificates = []tls.Certificate{*cert} |
|
} |
|
|
|
if caPath != "" { |
|
pool, err := newCertPool(caPath) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
base.ClientAuth = tls.RequireAndVerifyClientCert |
|
base.ClientCAs = pool |
|
} |
|
|
|
return base, nil |
|
} |
|
|
|
func NewClientTLSConfig(certPath, keyPath, caPath, servearName string) (*tls.Config, error) { |
|
var base = &tls.Config{} |
|
|
|
if certPath == "" || keyPath == "" { |
|
// client will not generate tls conf by itself |
|
} else { |
|
cert, err := newCustomTLSKeyPair(certPath, keyPath) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
base.Certificates = []tls.Certificate{*cert} |
|
} |
|
|
|
if caPath != "" { |
|
pool, err := newCertPool(caPath) |
|
if err != nil { |
|
return nil, err |
|
} |
|
|
|
base.RootCAs = pool |
|
base.ServerName = servearName |
|
base.InsecureSkipVerify = false |
|
} else { |
|
base.InsecureSkipVerify = true |
|
} |
|
|
|
return base, nil |
|
}
|
|
|