aboutsummaryrefslogtreecommitdiff
path: root/cmd/acmed/main.go
blob: 202fe58e4157b264ec7bc25595d5ab8f3702bdf1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
package main

import (
	"crypto/rand"
	"crypto/rsa"
	"crypto/x509"
	"encoding/pem"
	"flag"
	"io"
	"io/ioutil"
	"log"
	"os"
	"path"
)

var confName = flag.String("conf", "acme.toml", "configuration file")

func newKey(w io.Writer, size int) (*rsa.PrivateKey, error) {
	key, err := rsa.GenerateKey(rand.Reader, size)
	if err != nil {
		return nil, err
	}
	block := &pem.Block{
		Type:  "RSA PRIVATE KEY",
		Bytes: x509.MarshalPKCS1PrivateKey(key),
	}
	return key, pem.Encode(w, block)
}

func chkKey(k Keychain) (*rsa.PrivateKey, error) {
	key := k.Path()
	flags := os.O_WRONLY | os.O_CREATE | os.O_TRUNC
	if _, err := os.Stat(key); os.IsNotExist(err) {
		log.Println("allocating", key, k.Size())
		if err := os.MkdirAll(path.Dir(key), 0700); err != nil {
			return nil, err
		}
		fd, err := os.OpenFile(key, flags, 0600)
		if err != nil {
			return nil, err
		}
		defer fd.Close()
		return newKey(fd, k.Size())
	} else {
		der, err := ioutil.ReadFile(key)
		if err != nil {
			return nil, err
		}
		block, _ := pem.Decode(der)
		return x509.ParsePKCS1PrivateKey(block.Bytes)
	}
}

func main() {
	flag.Parse()
	conf, err := LoadConfig(*confName)
	if err != nil {
		log.Fatal(err)
	}

	for k, acc := range conf.Account {
		acc.key, err = chkKey(acc)
		if err != nil {
			log.Fatal(err)
		}
		conf.Account[k] = acc
	}

	for k, des := range conf.Desire {
		des.key, err = chkKey(des)
		if err != nil {
			log.Fatal(err)
		}
		conf.Desire[k] = des
	}
}