aboutsummaryrefslogtreecommitdiff
path: root/desire.go
blob: f5dde998f4420456528ca8981e4429247d906b45 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
package acme

import (
	"crypto"
	"crypto/rand"
	"crypto/rsa"
	"crypto/x509"
	"crypto/x509/pkix"
	"encoding/base64"
	"os"
	"syscall"
)

type Desire struct {
	altnames []string
	key      crypto.PrivateKey
	cert     []*x509.Certificate
	solver   map[ChalType]Solver
}

func NewDesire(altnames []string, size int) (*Desire, error) {
	key, err := rsa.GenerateKey(rand.Reader, size)
	if err != nil {
		return nil, err
	}
	return &Desire{
		key:      key,
		altnames: altnames,
		solver:   make(map[ChalType]Solver),
	}, nil
}

func (d *Desire) RegisterSolver(s Solver) {
	d.solver[s.Type()] = s
}

func (d *Desire) HasSolver() bool {
	return len(d.solver) > 0
}

func backup(fname string) error {
	err := os.Rename(fname, fname+".bak")
	if nerr, ok := err.(*os.LinkError); ok && nerr.Err == syscall.ENOENT {
		return nil
	}
	return err
}

func (d *Desire) Save(cert, key string) error {
	if err := d.saveKey(key); err != nil {
		return err
	}
	return d.saveCert(cert)
}

func (d *Desire) saveKey(fname string) error {
	if err := backup(fname); err != nil {
		return err
	}
	fd, err := CreatePrivFile(fname)
	if err != nil {
		return err
	}
	defer fd.Close()
	return saveKey(fd, d.key)
}

func (d *Desire) saveCert(fname string) error {
	if err := backup(fname); err != nil {
		return err
	}
	fd, err := CreatePubFile(fname)
	if err != nil {
		return err
	}
	defer fd.Close()
	for _, crt := range d.cert {
		if err := saveCert(fd, crt); err != nil {
			return err
		}
	}
	return nil
}

func (d *Desire) CSR() (string, error) {
	tmpl := x509.CertificateRequest{
		Subject: pkix.Name{CommonName: d.altnames[0]},
	}
	if len(d.altnames) > 1 {
		tmpl.DNSNames = d.altnames
	}
	der, err := x509.CreateCertificateRequest(rand.Reader, &tmpl, d.key)
	if err != nil {
		return "", err
	}
	return base64.RawURLEncoding.EncodeToString(der), nil
}