|
| 1 | +package erservercli |
| 2 | + |
| 3 | +import ( |
| 4 | + "errors" |
| 5 | + "fmt" |
| 6 | + "io/ioutil" |
| 7 | + "os" |
| 8 | + "os/exec" |
| 9 | + "path/filepath" |
| 10 | + |
| 11 | + "github.com/function61/gokit/osutil" |
| 12 | + "github.com/spf13/cobra" |
| 13 | +) |
| 14 | + |
| 15 | +func setupDevCertsEntry(opts Options) *cobra.Command { |
| 16 | + cmd := &cobra.Command{ |
| 17 | + Use: "setup-devcerts", |
| 18 | + Short: "mkcert utility shortcuts for generating CA and server cert for development purposes", |
| 19 | + } |
| 20 | + |
| 21 | + cmd.AddCommand(&cobra.Command{ |
| 22 | + Use: "ca-install", |
| 23 | + Short: "Install local-trust-only CA certificate into system trust stores", |
| 24 | + Args: cobra.NoArgs, |
| 25 | + Run: func(cmd *cobra.Command, args []string) { |
| 26 | + mkcert := exec.Command("mkcert", "-install") |
| 27 | + mkcert.Stdout = os.Stdout |
| 28 | + mkcert.Stderr = os.Stderr |
| 29 | + osutil.ExitIfError(translateIfMkcertNotInstalledError(mkcert.Run())) |
| 30 | + }, |
| 31 | + }) |
| 32 | + |
| 33 | + cmd.AddCommand(&cobra.Command{ |
| 34 | + Use: "servercert-generate [hostname]", |
| 35 | + Short: "Generate server cert. Example hostname: *.dev.example.com", |
| 36 | + Args: cobra.ExactArgs(1), |
| 37 | + Run: func(cmd *cobra.Command, args []string) { |
| 38 | + osutil.ExitIfError(serverCertGenerate(args[0], opts)) |
| 39 | + }, |
| 40 | + }) |
| 41 | + |
| 42 | + return cmd |
| 43 | +} |
| 44 | + |
| 45 | +func serverCertGenerate(hostname string, opts Options) error { |
| 46 | + tempDir, err := ioutil.TempDir("", "edgerouter-mkcert-*") |
| 47 | + if err != nil { |
| 48 | + return err |
| 49 | + } |
| 50 | + defer os.RemoveAll(tempDir) |
| 51 | + |
| 52 | + if err := os.MkdirAll(filepath.Dir(opts.ConfigDir().DevelopmentCertificate()), 0750); err != nil { |
| 53 | + return translateIfSudoError(err) |
| 54 | + } |
| 55 | + |
| 56 | + // unfortunately, you can't ask mkcert where or for which name to store the certs under |
| 57 | + |
| 58 | + mkcert := exec.Command("mkcert", hostname) |
| 59 | + mkcert.Dir = tempDir |
| 60 | + mkcert.Stdout = os.Stdout |
| 61 | + mkcert.Stderr = os.Stderr |
| 62 | + if err := mkcert.Run(); err != nil { |
| 63 | + return translateIfMkcertNotInstalledError(err) |
| 64 | + } |
| 65 | + |
| 66 | + // *.dev.fn61.net would generate these names |
| 67 | + // _wildcard.dev.fn61.net.pem |
| 68 | + // _wildcard.dev.fn61.net-key.pem |
| 69 | + fmt.Println("\nServer cert generated.") |
| 70 | + |
| 71 | + key, err := findReadAndDeleteFile(filepath.Join(tempDir, "*-key.pem")) |
| 72 | + if err != nil { |
| 73 | + return err |
| 74 | + } |
| 75 | + |
| 76 | + cert, err := findReadAndDeleteFile(filepath.Join(tempDir, "*.pem")) |
| 77 | + if err != nil { |
| 78 | + return err |
| 79 | + } |
| 80 | + |
| 81 | + if err := translateIfSudoError(ioutil.WriteFile( |
| 82 | + opts.ConfigDir().DevelopmentCertificate(), |
| 83 | + append(cert, key...), |
| 84 | + 0600), |
| 85 | + ); err != nil { |
| 86 | + return err |
| 87 | + } |
| 88 | + |
| 89 | + fmt.Printf( |
| 90 | + "Server cert written to '%s' - will be picked up on Edgerouter start\n", |
| 91 | + opts.ConfigDir().DevelopmentCertificate()) |
| 92 | + |
| 93 | + return nil |
| 94 | +} |
| 95 | + |
| 96 | +func translateIfMkcertNotInstalledError(err error) error { |
| 97 | + if err != nil && errors.Is(err, exec.ErrNotFound) { |
| 98 | + return errors.New("mkcert not installed? See https://github.com/FiloSottile/mkcert#installation") |
| 99 | + } |
| 100 | + |
| 101 | + return err |
| 102 | +} |
| 103 | + |
| 104 | +func translateIfSudoError(err error) error { |
| 105 | + if err != nil && errors.Is(err, os.ErrPermission) { |
| 106 | + return fmt.Errorf("(probably need '$ sudo ...') %w", err) |
| 107 | + } |
| 108 | + |
| 109 | + return err |
| 110 | +} |
| 111 | + |
| 112 | +func findReadAndDeleteFile(globPattern string) ([]byte, error) { |
| 113 | + globMatches, err := filepath.Glob(globPattern) |
| 114 | + if err != nil { |
| 115 | + return nil, err |
| 116 | + } |
| 117 | + |
| 118 | + if len(globMatches) != 1 { |
| 119 | + return nil, fmt.Errorf("findReadAndDeleteFile: expected 1 match; got %d", len(globMatches)) |
| 120 | + } |
| 121 | + |
| 122 | + content, err := ioutil.ReadFile(globMatches[0]) |
| 123 | + if err != nil { |
| 124 | + return nil, err |
| 125 | + } |
| 126 | + |
| 127 | + if err := os.Remove(globMatches[0]); err != nil { |
| 128 | + return nil, err |
| 129 | + } |
| 130 | + |
| 131 | + return content, nil |
| 132 | +} |
0 commit comments