Add client certificate fields to the configuration struct

Add relevant logic
This commit is contained in:
Andrea Lusuardi - uovobw 2015-09-30 19:06:55 +02:00
parent 5eb5959c93
commit 7321b43f67

View File

@ -2,6 +2,8 @@ package app
import ( import (
"crypto/rand" "crypto/rand"
"crypto/tls"
"crypto/x509"
"encoding/base64" "encoding/base64"
"errors" "errors"
"io/ioutil" "io/ioutil"
@ -45,6 +47,9 @@ type Options struct {
EnableTLS bool `hcl:"enable_tls"` EnableTLS bool `hcl:"enable_tls"`
TLSCrtFile string `hcl:"tls_crt_file"` TLSCrtFile string `hcl:"tls_crt_file"`
TLSKeyFile string `hcl:"tls_key_file"` TLSKeyFile string `hcl:"tls_key_file"`
EnableClientCertificate bool `hcl:"enable_client_certificate"`
ClientCAFile string `hcl:"client_ca_file"`
EnableClientCertificateVerification bool `hcl:"enable_client_certificate_verification"`
TitleFormat string `hcl:"title_format"` TitleFormat string `hcl:"title_format"`
EnableReconnect bool `hcl:"enable_reconnect"` EnableReconnect bool `hcl:"enable_reconnect"`
ReconnectTime int `hcl:"reconnect_time"` ReconnectTime int `hcl:"reconnect_time"`
@ -64,6 +69,9 @@ var DefaultOptions = Options{
EnableTLS: false, EnableTLS: false,
TLSCrtFile: "~/.gotty.crt", TLSCrtFile: "~/.gotty.crt",
TLSKeyFile: "~/.gotty.key", TLSKeyFile: "~/.gotty.key",
EnableClientCertificate: false,
ClientCAFile: "~/.gotty.ca.crt",
EnableClientCertificateVerification: false,
TitleFormat: "GoTTY - {{ .Command }} ({{ .Hostname }})", TitleFormat: "GoTTY - {{ .Command }} ({{ .Hostname }})",
EnableReconnect: false, EnableReconnect: false,
ReconnectTime: 10, ReconnectTime: 10,
@ -195,6 +203,28 @@ func (app *App) Run() error {
keyFile := ExpandHomeDir(app.options.TLSKeyFile) keyFile := ExpandHomeDir(app.options.TLSKeyFile)
log.Printf("TLS crt file: " + crtFile) log.Printf("TLS crt file: " + crtFile)
log.Printf("TLS key file: " + keyFile) log.Printf("TLS key file: " + keyFile)
if app.options.EnableClientCertificate {
caFile := ExpandHomeDir(app.options.ClientCAFile)
log.Printf("Client CA file: " + caFile)
caCert, err := ioutil.ReadFile(caFile)
if err != nil {
return errors.New("Cannot open CA file " + caFile)
}
caCertPool := x509.NewCertPool()
if !caCertPool.AppendCertsFromPEM(caCert) {
return errors.New("Cannot parse CA file data in " + caFile)
}
tlsVerifyPolicy := tls.RequireAnyClientCert
if app.options.EnableClientCertificateVerification {
log.Print("Enabling verification of client certificate")
tlsVerifyPolicy = tls.RequireAndVerifyClientCert
}
tlsConfig := &tls.Config{
ClientCAs: caCertPool,
ClientAuth: tlsVerifyPolicy,
}
app.server.TLSConfig = tlsConfig
}
err = app.server.ListenAndServeTLS(crtFile, keyFile) err = app.server.ListenAndServeTLS(crtFile, keyFile)
} else { } else {
err = app.server.ListenAndServe() err = app.server.ListenAndServe()