| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105 |
- package tools
- import (
- "bytes"
- "crypto/rand"
- "crypto/rsa"
- "crypto/x509"
- "crypto/x509/pkix"
- "encoding/pem"
- "fmt"
- "math/big"
- "os"
- "time"
- )
- func SSL() *ssl {
- return &ssl{}
- }
- type (
- ssl struct {
- }
- sslcert struct {
- privateKey *rsa.PrivateKey
- Template x509.Certificate
- }
- )
- func (t *ssl) Cert(cn string) (res *sslcert) {
- res = &sslcert{}
- var err error
-
- res.privateKey, err = rsa.GenerateKey(rand.Reader, 4096)
- if err != nil {
- log.Write([]byte(fmt.Sprintf("failed to generate private key: %w", err)))
- return
- }
- serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
- serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
- if err != nil {
- log.Write([]byte(fmt.Sprintf("failed to generate serial number: %w", err)))
- return
- }
- res.Template = x509.Certificate{
- SerialNumber: serialNumber,
- Subject: pkix.Name{
- // Organization: []string{org},
- CommonName: cn, // Essential for browsers/clients to trust the cert
- },
- NotBefore: time.Now(),
- NotAfter: time.Now().Add(365 * 24 * time.Hour), // Valid for 1 year
- KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
- ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth, x509.ExtKeyUsageClientAuth},
- BasicConstraintsValid: true,
- IsCA: true, // Mark as a CA to sign other certs if needed
- DNSNames: []string{cn},
- }
- return
- }
- func (res *sslcert) WriteCSR(file string) error {
- csrTemplate := x509.CertificateRequest{
- Subject: res.Template.Subject,
- DNSNames: res.Template.DNSNames,
- }
- csrBytes, err := x509.CreateCertificateRequest(rand.Reader, &csrTemplate, res.privateKey)
- if err != nil {
- return fmt.Errorf("Failed to create certificate request: %v", err)
- }
- csrPEM := pem.EncodeToMemory(&pem.Block{
- Type: "CERTIFICATE REQUEST",
- Bytes: csrBytes,
- })
- return os.WriteFile(file, csrPEM, 0644)
- }
- func (res *sslcert) WritePEMs(key, crt string) error {
- certBytes, err := x509.CreateCertificate(rand.Reader, &res.Template, &res.Template, res.privateKey.PublicKey, res.privateKey)
- if err != nil {
- return fmt.Errorf("failed to create certificate: %w", err)
- }
- certPEM := new(bytes.Buffer)
- pem.Encode(certPEM, &pem.Block{Type: "CERTIFICATE", Bytes: certBytes})
- keyPEM := new(bytes.Buffer)
- pem.Encode(keyPEM, &pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(res.privateKey)})
- if err := os.WriteFile(crt, certPEM.Bytes(), 0644); err != nil {
- return fmt.Errorf("failed to write cert.pem: %w", err)
- }
- if err := os.WriteFile(key, keyPEM.Bytes(), 0600); err != nil {
- return fmt.Errorf("failed to write key.pem: %w", err)
- }
- return nil
- }
|