mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-11-03 23:40:03 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			114 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			114 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Package ocsp implements the HTTP handler for the ocsp commands.
 | 
						|
package ocsp
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto"
 | 
						|
	"net/http"
 | 
						|
 | 
						|
	"encoding/base64"
 | 
						|
	"encoding/json"
 | 
						|
	"io/ioutil"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/cloudflare/cfssl/api"
 | 
						|
	"github.com/cloudflare/cfssl/errors"
 | 
						|
	"github.com/cloudflare/cfssl/helpers"
 | 
						|
	"github.com/cloudflare/cfssl/log"
 | 
						|
	"github.com/cloudflare/cfssl/ocsp"
 | 
						|
)
 | 
						|
 | 
						|
// A Handler accepts requests with a certficate parameter
 | 
						|
// (which should be PEM-encoded) and returns a signed ocsp
 | 
						|
// response.
 | 
						|
type Handler struct {
 | 
						|
	signer ocsp.Signer
 | 
						|
}
 | 
						|
 | 
						|
// NewHandler returns a new http.Handler that handles a ocspsign request.
 | 
						|
func NewHandler(s ocsp.Signer) http.Handler {
 | 
						|
	return &api.HTTPHandler{
 | 
						|
		Handler: &Handler{
 | 
						|
			signer: s,
 | 
						|
		},
 | 
						|
		Methods: []string{"POST"},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This type is meant to be unmarshalled from JSON
 | 
						|
type jsonSignRequest struct {
 | 
						|
	Certificate string `json:"certificate"`
 | 
						|
	Status      string `json:"status"`
 | 
						|
	Reason      int    `json:"reason,omitempty"`
 | 
						|
	RevokedAt   string `json:"revoked_at,omitempty"`
 | 
						|
	IssuerHash  string `json:"issuer_hash,omitempty"`
 | 
						|
}
 | 
						|
 | 
						|
var nameToHash = map[string]crypto.Hash{
 | 
						|
	"MD5":    crypto.MD5,
 | 
						|
	"SHA1":   crypto.SHA1,
 | 
						|
	"SHA256": crypto.SHA256,
 | 
						|
	"SHA384": crypto.SHA384,
 | 
						|
	"SHA512": crypto.SHA512,
 | 
						|
}
 | 
						|
 | 
						|
// Handle responds to requests for a ocsp signature. It creates and signs
 | 
						|
// a ocsp response for the provided certificate and status. If the status
 | 
						|
// is revoked then it also adds reason and revoked_at. The response is
 | 
						|
// base64 encoded.
 | 
						|
func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) error {
 | 
						|
	body, err := ioutil.ReadAll(r.Body)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	r.Body.Close()
 | 
						|
 | 
						|
	// Default the status to good so it matches the cli
 | 
						|
	req := &jsonSignRequest{
 | 
						|
		Status: "good",
 | 
						|
	}
 | 
						|
	err = json.Unmarshal(body, req)
 | 
						|
	if err != nil {
 | 
						|
		return errors.NewBadRequestString("Unable to parse sign request")
 | 
						|
	}
 | 
						|
 | 
						|
	cert, err := helpers.ParseCertificatePEM([]byte(req.Certificate))
 | 
						|
	if err != nil {
 | 
						|
		log.Error("Error from ParseCertificatePEM", err)
 | 
						|
		return errors.NewBadRequestString("Malformed certificate")
 | 
						|
	}
 | 
						|
 | 
						|
	signReq := ocsp.SignRequest{
 | 
						|
		Certificate: cert,
 | 
						|
		Status:      req.Status,
 | 
						|
	}
 | 
						|
	// We need to convert the time from being a string to a time.Time
 | 
						|
	if req.Status == "revoked" {
 | 
						|
		signReq.Reason = req.Reason
 | 
						|
		// "now" is accepted and the default on the cli so default that here
 | 
						|
		if req.RevokedAt == "" || req.RevokedAt == "now" {
 | 
						|
			signReq.RevokedAt = time.Now()
 | 
						|
		} else {
 | 
						|
			signReq.RevokedAt, err = time.Parse("2006-01-02", req.RevokedAt)
 | 
						|
			if err != nil {
 | 
						|
				return errors.NewBadRequestString("Malformed revocation time")
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if req.IssuerHash != "" {
 | 
						|
		issuerHash, ok := nameToHash[req.IssuerHash]
 | 
						|
		if !ok {
 | 
						|
			return errors.NewBadRequestString("Unsupported hash algorithm in request")
 | 
						|
		}
 | 
						|
		signReq.IssuerHash = issuerHash
 | 
						|
	}
 | 
						|
 | 
						|
	resp, err := h.signer.Sign(signReq)
 | 
						|
	if err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	b64Resp := base64.StdEncoding.EncodeToString(resp)
 | 
						|
	result := map[string]string{"ocspResponse": b64Resp}
 | 
						|
	return api.SendResponse(w, result)
 | 
						|
}
 |