114 lines
2.9 KiB
Go
114 lines
2.9 KiB
Go
// Package ocsp implements the HTTP handler for the ocsp commands.
|
|
package ocsp
|
|
|
|
import (
|
|
"crypto"
|
|
"net/http"
|
|
|
|
"encoding/base64"
|
|
"encoding/json"
|
|
"io/ioutil"
|
|
"time"
|
|
|
|
"github.com/cloudflare/cfssl/api"
|
|
"github.com/cloudflare/cfssl/errors"
|
|
"github.com/cloudflare/cfssl/helpers"
|
|
"github.com/cloudflare/cfssl/log"
|
|
"github.com/cloudflare/cfssl/ocsp"
|
|
)
|
|
|
|
// A Handler accepts requests with a certficate parameter
|
|
// (which should be PEM-encoded) and returns a signed ocsp
|
|
// response.
|
|
type Handler struct {
|
|
signer ocsp.Signer
|
|
}
|
|
|
|
// NewHandler returns a new http.Handler that handles a ocspsign request.
|
|
func NewHandler(s ocsp.Signer) http.Handler {
|
|
return &api.HTTPHandler{
|
|
Handler: &Handler{
|
|
signer: s,
|
|
},
|
|
Methods: []string{"POST"},
|
|
}
|
|
}
|
|
|
|
// This type is meant to be unmarshalled from JSON
|
|
type jsonSignRequest struct {
|
|
Certificate string `json:"certificate"`
|
|
Status string `json:"status"`
|
|
Reason int `json:"reason,omitempty"`
|
|
RevokedAt string `json:"revoked_at,omitempty"`
|
|
IssuerHash string `json:"issuer_hash,omitempty"`
|
|
}
|
|
|
|
var nameToHash = map[string]crypto.Hash{
|
|
"MD5": crypto.MD5,
|
|
"SHA1": crypto.SHA1,
|
|
"SHA256": crypto.SHA256,
|
|
"SHA384": crypto.SHA384,
|
|
"SHA512": crypto.SHA512,
|
|
}
|
|
|
|
// Handle responds to requests for a ocsp signature. It creates and signs
|
|
// a ocsp response for the provided certificate and status. If the status
|
|
// is revoked then it also adds reason and revoked_at. The response is
|
|
// base64 encoded.
|
|
func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) error {
|
|
body, err := ioutil.ReadAll(r.Body)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
r.Body.Close()
|
|
|
|
// Default the status to good so it matches the cli
|
|
req := &jsonSignRequest{
|
|
Status: "good",
|
|
}
|
|
err = json.Unmarshal(body, req)
|
|
if err != nil {
|
|
return errors.NewBadRequestString("Unable to parse sign request")
|
|
}
|
|
|
|
cert, err := helpers.ParseCertificatePEM([]byte(req.Certificate))
|
|
if err != nil {
|
|
log.Error("Error from ParseCertificatePEM", err)
|
|
return errors.NewBadRequestString("Malformed certificate")
|
|
}
|
|
|
|
signReq := ocsp.SignRequest{
|
|
Certificate: cert,
|
|
Status: req.Status,
|
|
}
|
|
// We need to convert the time from being a string to a time.Time
|
|
if req.Status == "revoked" {
|
|
signReq.Reason = req.Reason
|
|
// "now" is accepted and the default on the cli so default that here
|
|
if req.RevokedAt == "" || req.RevokedAt == "now" {
|
|
signReq.RevokedAt = time.Now()
|
|
} else {
|
|
signReq.RevokedAt, err = time.Parse("2006-01-02", req.RevokedAt)
|
|
if err != nil {
|
|
return errors.NewBadRequestString("Malformed revocation time")
|
|
}
|
|
}
|
|
}
|
|
if req.IssuerHash != "" {
|
|
issuerHash, ok := nameToHash[req.IssuerHash]
|
|
if !ok {
|
|
return errors.NewBadRequestString("Unsupported hash algorithm in request")
|
|
}
|
|
signReq.IssuerHash = issuerHash
|
|
}
|
|
|
|
resp, err := h.signer.Sign(signReq)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
b64Resp := base64.StdEncoding.EncodeToString(resp)
|
|
result := map[string]string{"ocspResponse": b64Resp}
|
|
return api.SendResponse(w, result)
|
|
}
|