Newer
Older
AnthosCertManager / pkg / controller / certificates / issuing / internal / keystore.go
package internal

import (
	"bytes"
	"crypto/rand"
	"crypto/x509"
	"time"

	utilpki "gitbucket.jerxie.com/yangyangxie/AnthosCertManager/pkg/util/pki"
	jks "github.com/pavlo-v-chernykh/keystore-go/v4"
	"software.sslmate.com/src/go-pkcs12"
)

const (
	// pkcs12SecretKey is the name of the data entry in the Secret resource
	// used to store the p12 file.
	pkcs12SecretKey = "keystore.p12"
	// Data Entry Name in the Secret resource for PKCS12 containing Certificate Authority
	pkcs12TruststoreKey = "truststore.p12"

	// jksSecretKey is the name of the data entry in the Secret resource
	// used to store the jks file.
	jksSecretKey = "keystore.jks"
	// Data Entry Name in the Secret resource for JKS containing Certificate Authority
	jksTruststoreKey = "truststore.jks"
)

// encodePKCS12Keystore will encode a PKCS12 keystore using the password provided.
// The key, certificate and CA data must be provided in PKCS1 or PKCS8 PEM format.
// If the certificate data contains multiple certificates, the first will be used
// as the keystores 'certificate' and the remaining certificates will be prepended
// to the list of CAs in the resulting keystore.
func encodePKCS12Keystore(password string, rawKey []byte, certPem []byte, caPem []byte) ([]byte, error) {
	key, err := utilpki.DecodePrivateKeyBytes(rawKey)
	if err != nil {
		return nil, err
	}
	certs, err := utilpki.DecodeX509CertificateChainBytes(certPem)
	if err != nil {
		return nil, err
	}
	var cas []*x509.Certificate
	if len(caPem) > 0 {
		cas, err = utilpki.DecodeX509CertificateChainBytes(caPem)
		if err != nil {
			return nil, err
		}
	}
	// prepend the certificate chain to the list of certificates as the PKCS12
	// library only allows setting a single certificate.
	if len(certs) > 1 {
		cas = append(certs[1:], cas...)
	}
	return pkcs12.Encode(rand.Reader, key, certs[0], cas, password)
}

// encode the ca certificate
func encodePKCS12Truststore(password string, caPem []byte) ([]byte, error) {
	ca, err := utilpki.DecodeX509CertificateBytes(caPem)
	if err != nil {
		return nil, err
	}
	var cas = []*x509.Certificate{ca}
	return pkcs12.EncodeTrustStore(rand.Reader, cas, password)
}

// encode java key store. Input the PEM data and return the raw data of the DER file being protected by the given password
func encodeJKSKeystore(password []byte, rawKey []byte, certPem []byte, caPem []byte) ([]byte, error) {
	ks := jks.New()
	// add the private key
	if err := setJKSPrivateKey(&ks, password, rawKey, certPem); err != nil {
		return nil, err
	}

	// add the CA certificate if set
	if len(caPem) > 0 {
		if err := setJKSTruststore(&ks, caPem); err != nil {
			return nil, err
		}
	}

	buf := &bytes.Buffer{}
	if err := ks.Store(buf, password); err != nil {
		return nil, err
	}
	return buf.Bytes(), nil
}

func encodeJKSTruststore(password []byte, caPem []byte) ([]byte, error) {
	ks := jks.New()
	if err := setJKSTruststore(&ks, caPem); err != nil {
		return nil, err
	}

	buf := &bytes.Buffer{}
	if err := ks.Store(buf, password); err != nil {
		return nil, err
	}
	return buf.Bytes(), nil
}

func setJKSTruststore(ks *jks.KeyStore, caPem []byte) error {
	ca, err := utilpki.DecodeX509CertificateBytes(caPem)
	if err != nil {
		return err
	}
	ks.SetTrustedCertificateEntry("ca", jks.TrustedCertificateEntry{
		CreationTime: time.Now(),
		Certificate: jks.Certificate{
			Type:    "X509",
			Content: ca.Raw,
		},
	})
	return nil
}

func setJKSPrivateKey(ks *jks.KeyStore, password []byte, rawKey []byte, certPem []byte) error {
	// convert the private key to PKCS8
	key, err := utilpki.DecodePrivateKeyBytes(rawKey)
	if err != nil {
		return err
	}
	keyDER, err := x509.MarshalPKCS8PrivateKey(key)
	if err != nil {
		return err
	}
	// convert the certificate chain
	chain, err := utilpki.DecodeX509CertificateChainBytes(certPem)
	if err != nil {
		return err
	}
	certs := make([]jks.Certificate, len(chain))

	for i, cert := range chain {
		certs[i] = jks.Certificate{Type: "X509", Content: cert.Raw}
	}

	ks.SetPrivateKeyEntry("certificate", jks.PrivateKeyEntry{
		CreationTime:     time.Now(),
		PrivateKey:       keyDER,
		CertificateChain: certs,
	}, password)

	return nil
}