cert400/cmd/generateFunc.go

243 lines
7.1 KiB
Go

/*
Copyright © 2024 raul
*/
package cmd
import (
"bytes"
"crypto/rand"
"crypto/rsa"
"crypto/x509"
"crypto/x509/pkix"
"encoding/pem"
"fmt"
"log"
"math/big"
"os"
"time"
"github.com/spf13/viper"
)
var (
serialnumber int
organization string
country string
province string
locality string
streetaddress string
postalcode string
notafter int
RSA_bitsize int
)
func generateCA() {
home, err := os.UserHomeDir()
if err != nil {
log.Fatalf("Error happened looking up user home directory: %v\n", err)
}
RSA_bitsize = viper.GetInt("CA.rsa_bitsize")
serialnumber = viper.GetInt("CA.serial_number")
organization = viper.GetString("CA.organization")
country = viper.GetString("CA.country")
province = viper.GetString("CA.province")
locality = viper.GetString("CA.locality")
streetaddress = viper.GetString("CA.street_address")
postalcode = viper.GetString("CA.postal_code")
notafter = viper.GetInt("CA.not_after")
// fmt.Println(serialnumber, organization, country, province, locality, streetaddress, postalcode, notafter)
// os.Exit(0)
ca := &x509.Certificate{
SerialNumber: big.NewInt(int64(serialnumber)),
Subject: pkix.Name{
Organization: []string{organization},
Country: []string{country},
Province: []string{province},
Locality: []string{locality},
StreetAddress: []string{streetaddress},
PostalCode: []string{postalcode},
},
NotBefore: time.Now(),
NotAfter: time.Now().AddDate(notafter, 0, 0),
IsCA: true,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
BasicConstraintsValid: true,
}
caPrivKey, err := rsa.GenerateKey(rand.Reader, RSA_bitsize)
if err != nil {
log.Fatalf("Error happened generating private key: %v\n", err)
}
caBytes, err := x509.CreateCertificate(rand.Reader, ca, ca, &caPrivKey.PublicKey, caPrivKey)
if err != nil {
log.Fatalf("Error happened creating certificate: %v\n", err)
}
//////
//fmt.Printf("Checking %v/.config/\n", home)
_, err = os.Stat(home + "/.config")
if err != nil {
if os.IsNotExist(err) {
fmt.Printf("$HOME/.config doesn't exist, creating...\n")
os.Mkdir(home+"/.config", 0700)
} else {
log.Fatalf("Error happened accessing .config: %v", err)
}
}
//fmt.Printf("Checking %v/.config/cert400\n", home)
_, err = os.Stat(home + "/.config/cert400")
if err != nil {
if os.IsNotExist(err) {
fmt.Printf("$HOME/.config/cert400 doesn't exist, creating...\n")
os.Mkdir(home+"/.config/cert400", 0700)
} else {
log.Fatalf("Error happened accessing cert400: %v\n", err)
}
}
fmt.Printf("Generating %v/.config/cert400/ca.key...\n", home)
// TODO: Check if keys already exist and warn the user about it
key, err := os.OpenFile(home+"/.config/cert400/ca.key", os.O_WRONLY|os.O_CREATE, 0600)
if err != nil {
log.Fatalf("Error happened opening file: %v\n", err)
}
defer key.Close()
fmt.Printf("Generating %v/.config/cert400/ca.cert...\n", home)
cert, err := os.OpenFile(home+"/.config/cert400/ca.crt", os.O_WRONLY|os.O_CREATE, 0600)
if err != nil {
log.Fatalf("Error happened opening file: %v\n", err)
}
defer cert.Close()
//////
caPEM := new(bytes.Buffer)
pem.Encode(caPEM, &pem.Block{
Type: "CERTIFICATE",
Bytes: caBytes,
})
caPrivKeyPEM := new(bytes.Buffer)
pem.Encode(caPrivKeyPEM, &pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: x509.MarshalPKCS1PrivateKey(caPrivKey),
})
cert.WriteString(string(caPEM.Bytes()))
key.WriteString(string(caPrivKeyPEM.Bytes()))
}
func generateCert() {
home, err := os.UserHomeDir()
if err != nil {
log.Printf("Error happened looking up user home directory: %v\n", err)
return
}
cert := &x509.Certificate{
SerialNumber: big.NewInt(1658),
Subject: pkix.Name{
Organization: []string{"LOL Company"},
Country: []string{"US"},
Province: []string{""},
Locality: []string{"San Francisco"},
StreetAddress: []string{"Golden Gate Bridge"},
PostalCode: []string{"94016"},
},
PermittedDNSDomains: []string{"test.bulgariu.xyz"},
NotBefore: time.Now(),
NotAfter: time.Now().AddDate(10, 0, 0),
SubjectKeyId: []byte{1, 2, 3, 4, 6},
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
KeyUsage: x509.KeyUsageDigitalSignature,
}
certPrivKey, err := rsa.GenerateKey(rand.Reader, 4096)
if err != nil {
log.Printf("Error happened generating client privkey: %v\n", err)
return
}
////////////////////// Fetching CA data //////////////////////
// caPath, err := os.Open(home + "/.config/cert400/ca.crt")
// if err != nil {
// log.Printf("Error happened opening CA certificate: %v\n", err)
// return
// }
// defer caPath.Close()
// caPrivPath, err := os.Open(home + "/.config/cert400/ca.key")
// if err != nil {
// log.Printf("Error happened opening CA privkey: %v\n", err)
// return
// }
// defer caPrivPath.Close()
//////////////////////////////////////////////////////////////
// Parse private CA certificate /////////////////////////////
caFile, err := os.ReadFile(home + "/.config/cert400/ca.crt")
if err != nil {
log.Printf("Error happened reading from CA certificate: %v\n", err)
return
}
caPubBlock, _ := pem.Decode(caFile)
caCert, err := x509.ParseCertificate(caPubBlock.Bytes)
if err != nil {
log.Printf("Error happened parsing CA certificate: %v\n", err)
return
}
/////////////////////////////////////////////////////////////
// Parse public CA certificate /////////////////////////////
caPrivFile, err := os.ReadFile(home + "/.config/cert400/ca.key")
if err != nil {
log.Printf("Error happened reading from CA privkey: %v\n", err)
return
}
caPrivBlock, _ := pem.Decode(caPrivFile)
caPrivKey, err := x509.ParsePKCS1PrivateKey(caPrivBlock.Bytes)
if err != nil {
log.Printf("Error happened parsing CA privkey: %v\n", err)
return
}
// Generate signed client certificate
certBytes, err := x509.CreateCertificate(rand.Reader, cert, caCert, &certPrivKey.PublicKey, caPrivKey)
if err != nil {
log.Printf("Error happened signing certificate: %v\n", err)
return
}
certPEM := new(bytes.Buffer)
pem.Encode(certPEM, &pem.Block{
Type: "CERTIFICATE",
Bytes: certBytes,
})
certPrivKeyPEM := new(bytes.Buffer)
pem.Encode(certPrivKeyPEM, &pem.Block{
Type: "RSA PRIVATE KEY",
Bytes: x509.MarshalPKCS1PrivateKey(certPrivKey),
})
fmt.Printf("Generating %v/.config/cert400/client.key...\n", home)
clientkey, err := os.OpenFile(home+"/.config/cert400/client.key", os.O_WRONLY|os.O_CREATE, 0600)
if err != nil {
log.Printf("Error happened opening file: %v\n", err)
return
}
defer clientkey.Close()
fmt.Printf("Generating %v/.config/cert400/client.cert...\n", home)
clientcert, err := os.OpenFile(home+"/.config/cert400/client.crt", os.O_WRONLY|os.O_CREATE, 0600)
if err != nil {
log.Printf("Error happened opening file: %v\n", err)
return
}
defer clientcert.Close()
clientkey.WriteString(string(certPrivKeyPEM.Bytes()))
clientcert.WriteString(string(certPEM.Bytes()))
}