2023-11-27 12:04:09 +08:00
|
|
|
package service
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"crypto/ecdsa"
|
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/x509"
|
|
|
|
"crypto/x509/pkix"
|
|
|
|
"encoding/pem"
|
2023-11-27 14:00:09 +08:00
|
|
|
"fmt"
|
2023-11-27 12:04:09 +08:00
|
|
|
"github.com/1Panel-dev/1Panel/backend/app/dto/request"
|
|
|
|
"github.com/1Panel-dev/1Panel/backend/app/dto/response"
|
|
|
|
"github.com/1Panel-dev/1Panel/backend/app/model"
|
|
|
|
"github.com/1Panel-dev/1Panel/backend/buserr"
|
|
|
|
"github.com/1Panel-dev/1Panel/backend/constant"
|
2023-11-27 14:00:09 +08:00
|
|
|
"github.com/1Panel-dev/1Panel/backend/i18n"
|
2023-11-27 12:04:09 +08:00
|
|
|
"github.com/1Panel-dev/1Panel/backend/utils/common"
|
2023-11-27 14:00:09 +08:00
|
|
|
"github.com/1Panel-dev/1Panel/backend/utils/files"
|
2023-11-27 12:04:09 +08:00
|
|
|
"github.com/1Panel-dev/1Panel/backend/utils/ssl"
|
|
|
|
"github.com/go-acme/lego/v4/certcrypto"
|
2023-11-27 14:00:09 +08:00
|
|
|
"log"
|
2023-11-27 12:04:09 +08:00
|
|
|
"math/big"
|
|
|
|
"net"
|
2023-11-27 14:00:09 +08:00
|
|
|
"os"
|
|
|
|
"path"
|
2023-11-27 12:04:09 +08:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
type WebsiteCAService struct {
|
|
|
|
}
|
|
|
|
|
|
|
|
type IWebsiteCAService interface {
|
|
|
|
Page(search request.WebsiteCASearch) (int64, []response.WebsiteCADTO, error)
|
|
|
|
Create(create request.WebsiteCACreate) (*request.WebsiteCACreate, error)
|
2023-11-29 16:12:09 +08:00
|
|
|
GetCA(id uint) (*response.WebsiteCADTO, error)
|
2023-11-27 12:04:09 +08:00
|
|
|
Delete(id uint) error
|
2023-11-29 22:04:08 +08:00
|
|
|
ObtainSSL(req request.WebsiteCAObtain) (*model.WebsiteSSL, error)
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func NewIWebsiteCAService() IWebsiteCAService {
|
|
|
|
return &WebsiteCAService{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w WebsiteCAService) Page(search request.WebsiteCASearch) (int64, []response.WebsiteCADTO, error) {
|
|
|
|
total, cas, err := websiteCARepo.Page(search.Page, search.PageSize, commonRepo.WithOrderBy("created_at desc"))
|
|
|
|
if err != nil {
|
|
|
|
return 0, nil, err
|
|
|
|
}
|
|
|
|
var caDTOs []response.WebsiteCADTO
|
|
|
|
for _, ca := range cas {
|
|
|
|
caDTOs = append(caDTOs, response.WebsiteCADTO{
|
|
|
|
WebsiteCA: ca,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return total, caDTOs, err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w WebsiteCAService) Create(create request.WebsiteCACreate) (*request.WebsiteCACreate, error) {
|
|
|
|
if exist, _ := websiteCARepo.GetFirst(commonRepo.WithByName(create.Name)); exist.ID > 0 {
|
|
|
|
return nil, buserr.New(constant.ErrNameIsExist)
|
|
|
|
}
|
|
|
|
|
|
|
|
ca := &model.WebsiteCA{
|
|
|
|
Name: create.Name,
|
|
|
|
KeyType: create.KeyType,
|
|
|
|
}
|
|
|
|
|
|
|
|
pkixName := pkix.Name{
|
2023-11-29 16:12:09 +08:00
|
|
|
CommonName: create.CommonName,
|
|
|
|
Country: []string{create.Country},
|
|
|
|
Organization: []string{create.Organization},
|
|
|
|
OrganizationalUnit: []string{create.OrganizationUint},
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
if create.Province != "" {
|
|
|
|
pkixName.Province = []string{create.Province}
|
|
|
|
}
|
|
|
|
if create.City != "" {
|
|
|
|
pkixName.Locality = []string{create.City}
|
|
|
|
}
|
|
|
|
|
|
|
|
rootCA := &x509.Certificate{
|
2024-05-08 18:48:23 +08:00
|
|
|
SerialNumber: big.NewInt(time.Now().Unix() + 1),
|
2023-11-27 12:04:09 +08:00
|
|
|
Subject: pkixName,
|
|
|
|
NotBefore: time.Now(),
|
|
|
|
NotAfter: time.Now().AddDate(10, 0, 0),
|
|
|
|
BasicConstraintsValid: true,
|
|
|
|
IsCA: true,
|
|
|
|
MaxPathLen: 1,
|
|
|
|
MaxPathLenZero: false,
|
|
|
|
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
|
|
|
}
|
|
|
|
|
2023-12-08 17:58:09 +08:00
|
|
|
interPrivateKey, interPublicKey, privateBytes, err := createPrivateKey(create.KeyType)
|
2023-11-27 12:04:09 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-12-08 17:58:09 +08:00
|
|
|
ca.PrivateKey = string(privateBytes)
|
2023-11-27 12:04:09 +08:00
|
|
|
|
2023-12-18 12:04:12 +08:00
|
|
|
rootDer, err := x509.CreateCertificate(rand.Reader, rootCA, rootCA, interPublicKey, interPrivateKey)
|
2023-11-27 12:04:09 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-12-18 12:04:12 +08:00
|
|
|
rootCert, err := x509.ParseCertificate(rootDer)
|
2023-12-18 17:54:15 +08:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-11-27 12:04:09 +08:00
|
|
|
certBlock := &pem.Block{
|
|
|
|
Type: "CERTIFICATE",
|
2023-12-18 12:04:12 +08:00
|
|
|
Bytes: rootCert.Raw,
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
pemData := pem.EncodeToMemory(certBlock)
|
|
|
|
ca.CSR = string(pemData)
|
|
|
|
|
|
|
|
if err := websiteCARepo.Create(context.Background(), ca); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &create, nil
|
|
|
|
}
|
|
|
|
|
2023-11-29 16:12:09 +08:00
|
|
|
func (w WebsiteCAService) GetCA(id uint) (*response.WebsiteCADTO, error) {
|
|
|
|
res := &response.WebsiteCADTO{}
|
2023-11-27 12:04:09 +08:00
|
|
|
ca, err := websiteCARepo.GetFirst(commonRepo.WithByID(id))
|
|
|
|
if err != nil {
|
2023-11-29 16:12:09 +08:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
res.WebsiteCA = ca
|
|
|
|
certBlock, _ := pem.Decode([]byte(ca.CSR))
|
|
|
|
if certBlock == nil {
|
|
|
|
return nil, buserr.New("ErrSSLCertificateFormat")
|
|
|
|
}
|
|
|
|
cert, err := x509.ParseCertificate(certBlock.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
2023-11-29 16:12:09 +08:00
|
|
|
res.CommonName = cert.Issuer.CommonName
|
|
|
|
res.Organization = strings.Join(cert.Issuer.Organization, ",")
|
|
|
|
res.Country = strings.Join(cert.Issuer.Country, ",")
|
|
|
|
res.Province = strings.Join(cert.Issuer.Province, ",")
|
|
|
|
res.City = strings.Join(cert.Issuer.Locality, ",")
|
|
|
|
res.OrganizationUint = strings.Join(cert.Issuer.OrganizationalUnit, ",")
|
|
|
|
|
|
|
|
return res, nil
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func (w WebsiteCAService) Delete(id uint) error {
|
2023-11-27 18:36:10 +08:00
|
|
|
ssls, _ := websiteSSLRepo.List(websiteSSLRepo.WithByCAID(id))
|
|
|
|
if len(ssls) > 0 {
|
|
|
|
return buserr.New("ErrDeleteCAWithSSL")
|
|
|
|
}
|
2023-11-29 22:04:08 +08:00
|
|
|
exist, err := websiteCARepo.GetFirst(commonRepo.WithByID(id))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if exist.Name == "1Panel" {
|
|
|
|
return buserr.New("ErrDefaultCA")
|
|
|
|
}
|
2023-11-27 12:04:09 +08:00
|
|
|
return websiteCARepo.DeleteBy(commonRepo.WithByID(id))
|
|
|
|
}
|
|
|
|
|
2023-11-29 22:04:08 +08:00
|
|
|
func (w WebsiteCAService) ObtainSSL(req request.WebsiteCAObtain) (*model.WebsiteSSL, error) {
|
2023-11-27 12:04:09 +08:00
|
|
|
var (
|
2023-11-27 18:36:10 +08:00
|
|
|
domains []string
|
|
|
|
ips []net.IP
|
|
|
|
websiteSSL = &model.WebsiteSSL{}
|
|
|
|
err error
|
|
|
|
ca model.WebsiteCA
|
2023-11-27 12:04:09 +08:00
|
|
|
)
|
2023-11-27 18:36:10 +08:00
|
|
|
if req.Renew {
|
|
|
|
websiteSSL, err = websiteSSLRepo.GetFirst(commonRepo.WithByID(req.SSLID))
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
|
|
|
ca, err = websiteCARepo.GetFirst(commonRepo.WithByID(websiteSSL.CaID))
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
|
|
|
existDomains := []string{websiteSSL.PrimaryDomain}
|
|
|
|
if websiteSSL.Domains != "" {
|
|
|
|
existDomains = append(existDomains, strings.Split(websiteSSL.Domains, ",")...)
|
|
|
|
}
|
|
|
|
for _, domain := range existDomains {
|
|
|
|
if ipAddress := net.ParseIP(domain); ipAddress == nil {
|
|
|
|
domains = append(domains, domain)
|
2023-11-27 12:04:09 +08:00
|
|
|
} else {
|
2023-11-27 18:36:10 +08:00
|
|
|
ips = append(ips, ipAddress)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ca, err = websiteCARepo.GetFirst(commonRepo.WithByID(req.ID))
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
|
|
|
websiteSSL = &model.WebsiteSSL{
|
2023-11-30 14:08:08 +08:00
|
|
|
Provider: constant.SelfSigned,
|
|
|
|
KeyType: req.KeyType,
|
|
|
|
PushDir: req.PushDir,
|
|
|
|
CaID: ca.ID,
|
|
|
|
AutoRenew: req.AutoRenew,
|
|
|
|
Description: req.Description,
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
|
|
|
if req.PushDir {
|
|
|
|
if !files.NewFileOp().Stat(req.Dir) {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, buserr.New(constant.ErrLinkPathNotFound)
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
|
|
|
websiteSSL.Dir = req.Dir
|
|
|
|
}
|
|
|
|
if req.Domains != "" {
|
|
|
|
domainArray := strings.Split(req.Domains, "\n")
|
|
|
|
for _, domain := range domainArray {
|
|
|
|
if !common.IsValidDomain(domain) {
|
|
|
|
err = buserr.WithName("ErrDomainFormat", domain)
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
} else {
|
2023-11-27 18:36:10 +08:00
|
|
|
if ipAddress := net.ParseIP(domain); ipAddress == nil {
|
|
|
|
domains = append(domains, domain)
|
|
|
|
} else {
|
|
|
|
ips = append(ips, ipAddress)
|
|
|
|
}
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
}
|
2023-11-27 18:36:10 +08:00
|
|
|
if len(domains) > 0 {
|
|
|
|
websiteSSL.PrimaryDomain = domains[0]
|
|
|
|
websiteSSL.Domains = strings.Join(domains[1:], ",")
|
|
|
|
}
|
2023-12-06 17:00:11 +08:00
|
|
|
ipStrings := make([]string, len(ips))
|
|
|
|
for i, ip := range ips {
|
|
|
|
ipStrings[i] = ip.String()
|
|
|
|
}
|
|
|
|
if websiteSSL.PrimaryDomain == "" && len(ips) > 0 {
|
|
|
|
websiteSSL.PrimaryDomain = ipStrings[0]
|
|
|
|
ipStrings = ipStrings[1:]
|
|
|
|
}
|
|
|
|
if len(ipStrings) > 0 {
|
|
|
|
if websiteSSL.Domains != "" {
|
|
|
|
websiteSSL.Domains += ","
|
|
|
|
}
|
|
|
|
websiteSSL.Domains += strings.Join(ipStrings, ",")
|
|
|
|
}
|
|
|
|
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rootCertBlock, _ := pem.Decode([]byte(ca.CSR))
|
|
|
|
if rootCertBlock == nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, buserr.New("ErrSSLCertificateFormat")
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
rootCsr, err := x509.ParseCertificate(rootCertBlock.Bytes)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
rootPrivateKeyBlock, _ := pem.Decode([]byte(ca.PrivateKey))
|
|
|
|
if rootPrivateKeyBlock == nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, buserr.New("ErrSSLCertificateFormat")
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
var rootPrivateKey any
|
2023-12-06 18:42:41 +08:00
|
|
|
if ssl.KeyType(ca.KeyType) == certcrypto.EC256 || ssl.KeyType(ca.KeyType) == certcrypto.EC384 {
|
2023-11-27 12:04:09 +08:00
|
|
|
rootPrivateKey, err = x509.ParseECPrivateKey(rootPrivateKeyBlock.Bytes)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
rootPrivateKey, err = x509.ParsePKCS1PrivateKey(rootPrivateKeyBlock.Bytes)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
}
|
2023-11-27 18:36:10 +08:00
|
|
|
interPrivateKey, interPublicKey, _, err := createPrivateKey(websiteSSL.KeyType)
|
2023-11-27 12:04:09 +08:00
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
notAfter := time.Now()
|
|
|
|
if req.Unit == "year" {
|
|
|
|
notAfter = notAfter.AddDate(req.Time, 0, 0)
|
|
|
|
} else {
|
|
|
|
notAfter = notAfter.AddDate(0, 0, req.Time)
|
|
|
|
}
|
|
|
|
interCsr := &x509.Certificate{
|
2024-05-08 18:48:23 +08:00
|
|
|
SerialNumber: big.NewInt(time.Now().Unix() + 2),
|
2023-11-27 12:04:09 +08:00
|
|
|
Subject: rootCsr.Subject,
|
|
|
|
NotBefore: time.Now(),
|
|
|
|
NotAfter: notAfter,
|
|
|
|
BasicConstraintsValid: true,
|
|
|
|
IsCA: true,
|
|
|
|
MaxPathLen: 0,
|
|
|
|
MaxPathLenZero: true,
|
|
|
|
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
|
|
|
}
|
|
|
|
interDer, err := x509.CreateCertificate(rand.Reader, interCsr, rootCsr, interPublicKey, rootPrivateKey)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
interCert, err := x509.ParseCertificate(interDer)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
2023-12-18 12:04:12 +08:00
|
|
|
interCertBlock := &pem.Block{
|
|
|
|
Type: "CERTIFICATE",
|
|
|
|
Bytes: interCert.Raw,
|
|
|
|
}
|
2023-11-27 18:36:10 +08:00
|
|
|
_, publicKey, privateKeyBytes, err := createPrivateKey(websiteSSL.KeyType)
|
2023-11-27 12:04:09 +08:00
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
2023-12-18 12:04:12 +08:00
|
|
|
commonName := ""
|
|
|
|
if len(domains) > 0 {
|
|
|
|
commonName = domains[0]
|
|
|
|
}
|
|
|
|
if len(ips) > 0 {
|
|
|
|
commonName = ips[0].String()
|
|
|
|
}
|
|
|
|
subject := rootCsr.Subject
|
|
|
|
subject.CommonName = commonName
|
2023-11-27 12:04:09 +08:00
|
|
|
csr := &x509.Certificate{
|
2024-05-08 18:48:23 +08:00
|
|
|
SerialNumber: big.NewInt(time.Now().Unix() + 3),
|
2023-12-18 12:04:12 +08:00
|
|
|
Subject: subject,
|
2023-11-27 12:04:09 +08:00
|
|
|
NotBefore: time.Now(),
|
|
|
|
NotAfter: notAfter,
|
|
|
|
BasicConstraintsValid: true,
|
|
|
|
IsCA: false,
|
|
|
|
KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment,
|
|
|
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
|
|
|
|
DNSNames: domains,
|
|
|
|
IPAddresses: ips,
|
|
|
|
}
|
|
|
|
|
|
|
|
der, err := x509.CreateCertificate(rand.Reader, csr, interCert, publicKey, interPrivateKey)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
cert, err := x509.ParseCertificate(der)
|
|
|
|
if err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
certBlock := &pem.Block{
|
|
|
|
Type: "CERTIFICATE",
|
|
|
|
Bytes: cert.Raw,
|
|
|
|
}
|
2023-12-18 12:04:12 +08:00
|
|
|
websiteSSL.Pem = string(pem.EncodeToMemory(certBlock)) + string(pem.EncodeToMemory(rootCertBlock)) + string(pem.EncodeToMemory(interCertBlock))
|
2023-11-27 18:36:10 +08:00
|
|
|
websiteSSL.PrivateKey = string(privateKeyBytes)
|
|
|
|
websiteSSL.ExpireDate = cert.NotAfter
|
|
|
|
websiteSSL.StartDate = cert.NotBefore
|
|
|
|
websiteSSL.Type = cert.Issuer.CommonName
|
|
|
|
websiteSSL.Organization = rootCsr.Subject.Organization[0]
|
2024-05-07 18:01:00 +08:00
|
|
|
websiteSSL.Status = constant.SSLReady
|
2023-11-27 12:04:09 +08:00
|
|
|
|
2023-11-27 18:36:10 +08:00
|
|
|
if req.Renew {
|
|
|
|
if err := websiteSSLRepo.Save(websiteSSL); err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if err := websiteSSLRepo.Create(context.Background(), websiteSSL); err != nil {
|
2023-11-29 22:04:08 +08:00
|
|
|
return nil, err
|
2023-11-27 18:36:10 +08:00
|
|
|
}
|
2023-11-27 14:00:09 +08:00
|
|
|
}
|
2023-11-27 18:36:10 +08:00
|
|
|
|
|
|
|
logFile, _ := os.OpenFile(path.Join(constant.SSLLogDir, fmt.Sprintf("%s-ssl-%d.log", websiteSSL.PrimaryDomain, websiteSSL.ID)), os.O_CREATE|os.O_WRONLY|os.O_TRUNC, 0666)
|
2023-11-27 14:00:09 +08:00
|
|
|
defer logFile.Close()
|
|
|
|
logger := log.New(logFile, "", log.LstdFlags)
|
|
|
|
logger.Println(i18n.GetMsgWithMap("ApplySSLSuccess", map[string]interface{}{"domain": strings.Join(domains, ",")}))
|
2023-11-27 18:36:10 +08:00
|
|
|
saveCertificateFile(websiteSSL, logger)
|
2023-11-29 22:04:08 +08:00
|
|
|
return websiteSSL, nil
|
2023-11-27 12:04:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
func createPrivateKey(keyType string) (privateKey any, publicKey any, privateKeyBytes []byte, err error) {
|
|
|
|
privateKey, err = certcrypto.GeneratePrivateKey(ssl.KeyType(keyType))
|
|
|
|
if err != nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
var (
|
|
|
|
caPrivateKeyPEM = new(bytes.Buffer)
|
|
|
|
)
|
|
|
|
if ssl.KeyType(keyType) == certcrypto.EC256 || ssl.KeyType(keyType) == certcrypto.EC384 {
|
|
|
|
publicKey = &privateKey.(*ecdsa.PrivateKey).PublicKey
|
|
|
|
publicKey = publicKey.(*ecdsa.PublicKey)
|
|
|
|
block := &pem.Block{
|
|
|
|
Type: "EC PRIVATE KEY",
|
|
|
|
}
|
|
|
|
privateBytes, sErr := x509.MarshalECPrivateKey(privateKey.(*ecdsa.PrivateKey))
|
|
|
|
if sErr != nil {
|
|
|
|
err = sErr
|
|
|
|
return
|
|
|
|
}
|
|
|
|
block.Bytes = privateBytes
|
|
|
|
_ = pem.Encode(caPrivateKeyPEM, block)
|
|
|
|
} else {
|
2023-12-06 18:42:41 +08:00
|
|
|
publicKey = &privateKey.(*rsa.PrivateKey).PublicKey
|
2023-11-27 12:04:09 +08:00
|
|
|
_ = pem.Encode(caPrivateKeyPEM, &pem.Block{
|
|
|
|
Type: "RSA PRIVATE KEY",
|
|
|
|
Bytes: x509.MarshalPKCS1PrivateKey(privateKey.(*rsa.PrivateKey)),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
privateKeyBytes = caPrivateKeyPEM.Bytes()
|
|
|
|
return
|
|
|
|
}
|