2019-10-10 04:41:45 +03:00
|
|
|
package caddytls
|
|
|
|
|
|
|
|
import (
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"fmt"
|
|
|
|
"math/big"
|
|
|
|
|
|
|
|
"github.com/caddyserver/caddy/v2"
|
|
|
|
"github.com/mholt/certmagic"
|
|
|
|
)
|
|
|
|
|
|
|
|
func init() {
|
2020-02-06 22:55:26 +03:00
|
|
|
caddy.RegisterModule(CustomCertSelectionPolicy{})
|
2019-10-10 04:41:45 +03:00
|
|
|
}
|
|
|
|
|
2020-02-14 21:00:46 +03:00
|
|
|
// CustomCertSelectionPolicy represents a policy for selecting the certificate
|
|
|
|
// used to complete a handshake when there may be multiple options. All fields
|
2019-10-10 04:41:45 +03:00
|
|
|
// specified must match the candidate certificate for it to be chosen.
|
|
|
|
// This was needed to solve https://github.com/caddyserver/caddy/issues/2588.
|
2020-02-06 22:55:26 +03:00
|
|
|
type CustomCertSelectionPolicy struct {
|
2019-10-10 04:41:45 +03:00
|
|
|
SerialNumber *big.Int `json:"serial_number,omitempty"`
|
|
|
|
SubjectOrganization string `json:"subject_organization,omitempty"`
|
|
|
|
PublicKeyAlgorithm PublicKeyAlgorithm `json:"public_key_algorithm,omitempty"`
|
|
|
|
Tag string `json:"tag,omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
// CaddyModule returns the Caddy module information.
|
2020-02-06 22:55:26 +03:00
|
|
|
func (CustomCertSelectionPolicy) CaddyModule() caddy.ModuleInfo {
|
2019-10-10 04:41:45 +03:00
|
|
|
return caddy.ModuleInfo{
|
2019-12-10 23:36:46 +03:00
|
|
|
ID: "tls.certificate_selection.custom",
|
2020-02-06 22:55:26 +03:00
|
|
|
New: func() caddy.Module { return new(CustomCertSelectionPolicy) },
|
2019-10-10 04:41:45 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// SelectCertificate implements certmagic.CertificateSelector.
|
2020-02-06 22:55:26 +03:00
|
|
|
func (p CustomCertSelectionPolicy) SelectCertificate(_ *tls.ClientHelloInfo, choices []certmagic.Certificate) (certmagic.Certificate, error) {
|
2019-10-10 04:41:45 +03:00
|
|
|
for _, cert := range choices {
|
|
|
|
if p.SerialNumber != nil && cert.SerialNumber.Cmp(p.SerialNumber) != 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.PublicKeyAlgorithm != PublicKeyAlgorithm(x509.UnknownPublicKeyAlgorithm) &&
|
|
|
|
PublicKeyAlgorithm(cert.PublicKeyAlgorithm) != p.PublicKeyAlgorithm {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.SubjectOrganization != "" {
|
|
|
|
var matchOrg bool
|
|
|
|
for _, org := range cert.Subject.Organization {
|
|
|
|
if p.SubjectOrganization == org {
|
|
|
|
matchOrg = true
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !matchOrg {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if p.Tag != "" && !cert.HasTag(p.Tag) {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return cert, nil
|
|
|
|
}
|
|
|
|
return certmagic.Certificate{}, fmt.Errorf("no certificates matched custom selection policy")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Interface guard
|
2020-02-06 22:55:26 +03:00
|
|
|
var _ certmagic.CertificateSelector = (*CustomCertSelectionPolicy)(nil)
|