/* Copyright © 2024 raul */ package cmd import ( "bytes" "crypto/rand" "crypto/rsa" "crypto/x509" "crypto/x509/pkix" "encoding/pem" "fmt" "log" "math/big" "os" "time" "github.com/spf13/viper" //"github.com/spf13/viper" ) var ( serialnumber int organization string country string province string locality string streetaddress string postalcode string notafter int RSA_bitsize int ) func generateCA() { home, err := os.UserHomeDir() if err != nil { log.Fatalf("Error happened looking up user home directory: %v\n", err) } RSA_bitsize = viper.GetInt("CA.rsa_bitsize") serialnumber = viper.GetInt("CA.serial_number") organization = viper.GetString("CA.organization") country = viper.GetString("CA.country") province = viper.GetString("CA.province") locality = viper.GetString("CA.locality") streetaddress = viper.GetString("CA.street_address") postalcode = viper.GetString("CA.postal_code") notafter = viper.GetInt("CA.not_after") // fmt.Println(serialnumber, organization, country, province, locality, streetaddress, postalcode, notafter) // os.Exit(0) ca := &x509.Certificate{ SerialNumber: big.NewInt(int64(serialnumber)), Subject: pkix.Name{ Organization: []string{organization}, Country: []string{country}, Province: []string{province}, Locality: []string{locality}, StreetAddress: []string{streetaddress}, PostalCode: []string{postalcode}, }, NotBefore: time.Now(), NotAfter: time.Now().AddDate(notafter, 0, 0), IsCA: true, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}, KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, BasicConstraintsValid: true, } caPrivKey, err := rsa.GenerateKey(rand.Reader, RSA_bitsize) if err != nil { log.Fatalf("Error happened generating private key: %v\n", err) } caBytes, err := x509.CreateCertificate(rand.Reader, ca, ca, &caPrivKey.PublicKey, caPrivKey) if err != nil { log.Fatalf("Error happened creating certificate: %v\n", err) } ////// //fmt.Printf("Checking %v/.config/\n", home) _, err = os.Stat(home + "/.config") if err != nil { if os.IsNotExist(err) { fmt.Printf("$HOME/.config doesn't exist, creating...\n") os.Mkdir(home+"/.config", 0700) } else { log.Fatalf("Error happened accessing .config: %v", err) } } //fmt.Printf("Checking %v/.config/cert400\n", home) _, err = os.Stat(home + "/.config/cert400") if err != nil { if os.IsNotExist(err) { fmt.Printf("$HOME/.config/cert400 doesn't exist, creating...\n") os.Mkdir(home+"/.config/cert400", 0700) } else { log.Fatalf("Error happened accessing cert400: %v\n", err) } } fmt.Printf("Generating %v/.config/cert400/ca.key...\n", home) // TODO: Check if keys already exist and warn the user about it key, err := os.OpenFile(home+"/.config/cert400/ca.key", os.O_WRONLY|os.O_CREATE, 0600) if err != nil { log.Fatalf("Error happened opening file: %v\n", err) } defer key.Close() fmt.Printf("Generating %v/.config/cert400/ca.cert...\n", home) cert, err := os.OpenFile(home+"/.config/cert400/ca.crt", os.O_WRONLY|os.O_CREATE, 0600) if err != nil { log.Fatalf("Error happened opening file: %v\n", err) } defer cert.Close() ////// caPEM := new(bytes.Buffer) pem.Encode(caPEM, &pem.Block{ Type: "CERTIFICATE", Bytes: caBytes, }) caPrivKeyPEM := new(bytes.Buffer) pem.Encode(caPrivKeyPEM, &pem.Block{ Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(caPrivKey), }) // readCert, err := io.ReadAll(caPEM) // if err != nil { // log.Fatalf("Error happened preparing to write cert: %v\n", err) // } cert.WriteString(string(caPEM.Bytes())) // readKey, err := io.ReadAll(caPrivKeyPEM) // if err != nil { // log.Fatalf("Error happened preparing to write key: %v\n", err) // } key.WriteString(string(caPrivKeyPEM.Bytes())) } func generateCert() { // cert := &x509.Certificate{ // SerialNumber: big.NewInt(1658), // Subject: pkix.Name{ // Organization: []string{"LOL Company"}, // Country: []string{"US"}, // Province: []string{""}, // Locality: []string{"San Francisco"}, // StreetAddress: []string{"Golden Gate Bridge"}, // PostalCode: []string{"94016"}, // }, // PermittedDNSDomains: []string{"test.bulgariu.xyz"}, // NotBefore: time.Now(), // NotAfter: time.Now().AddDate(10, 0, 0), // SubjectKeyId: []byte{1, 2, 3, 4, 6}, // ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}, // KeyUsage: x509.KeyUsageDigitalSignature, // } }