mirror of
https://github.com/VictoriaMetrics/VictoriaMetrics.git
synced 2024-12-12 12:46:23 +01:00
26ae50ec26
* lib/httpserver: added tlsCipherSuites flag * lib/httpserver: compare lower case strings * lib/httpserver: use EqualFold * lib/httpserver: used flagutil.NewArray, supported only strings cipher suites * lib/httpserver: updated flag description, added flag to documentation * Update lib/httpserver/httpserver.go Co-authored-by: Aliaksandr Valialkin <valyala@victoriametrics.com>
79 lines
2.5 KiB
Go
79 lines
2.5 KiB
Go
package netutil
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"fmt"
|
|
"strings"
|
|
"sync"
|
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fasttime"
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/fs"
|
|
)
|
|
|
|
// GetServerTLSConfig returns TLS config for the server with possible client verification (mTLS) if tlsCAFile isn't empty.
|
|
func GetServerTLSConfig(tlsCAFile, tlsCertFile, tlsKeyFile string, tlsCipherSuites []string) (*tls.Config, error) {
|
|
var certLock sync.Mutex
|
|
var certDeadline uint64
|
|
var cert *tls.Certificate
|
|
c, err := tls.LoadX509KeyPair(tlsCertFile, tlsKeyFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("cannot load TLS cert from certFile=%q, keyFile=%q: %w", tlsCertFile, tlsKeyFile, err)
|
|
}
|
|
cipherSuites, err := collectCipherSuites(tlsCipherSuites)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("cannot use TLS cipher suites from tlsCipherSuites=%q: %w", tlsCipherSuites, err)
|
|
}
|
|
cert = &c
|
|
cfg := &tls.Config{
|
|
MinVersion: tls.VersionTLS12,
|
|
PreferServerCipherSuites: true,
|
|
GetCertificate: func(info *tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
certLock.Lock()
|
|
defer certLock.Unlock()
|
|
if fasttime.UnixTimestamp() > certDeadline {
|
|
c, err = tls.LoadX509KeyPair(tlsCertFile, tlsKeyFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("cannot load TLS cert from certFile=%q, keyFile=%q: %w", tlsCertFile, tlsKeyFile, err)
|
|
}
|
|
certDeadline = fasttime.UnixTimestamp() + 1
|
|
cert = &c
|
|
}
|
|
return cert, nil
|
|
},
|
|
CipherSuites: cipherSuites,
|
|
}
|
|
if tlsCAFile != "" {
|
|
// Enable mTLS ( https://en.wikipedia.org/wiki/Mutual_authentication#mTLS )
|
|
cfg.ClientAuth = tls.RequireAndVerifyClientCert
|
|
cp := x509.NewCertPool()
|
|
caPEM, err := fs.ReadFileOrHTTP(tlsCAFile)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("cannot read tlsCAFile=%q: %w", tlsCAFile, err)
|
|
}
|
|
if !cp.AppendCertsFromPEM(caPEM) {
|
|
return nil, fmt.Errorf("cannot parse data for tlsCAFile=%q: %s", tlsCAFile, caPEM)
|
|
}
|
|
cfg.ClientCAs = cp
|
|
}
|
|
return cfg, nil
|
|
}
|
|
|
|
func collectCipherSuites(definedCipherSuites []string) ([]uint16, error) {
|
|
var cipherSuites []uint16
|
|
|
|
supportedCipherSuites := tls.CipherSuites()
|
|
supportedCipherSuitesMap := make(map[string]uint16, len(supportedCipherSuites))
|
|
for _, scf := range supportedCipherSuites {
|
|
supportedCipherSuitesMap[strings.ToLower(scf.Name)] = scf.ID
|
|
}
|
|
for _, gotSuite := range definedCipherSuites {
|
|
id, ok := supportedCipherSuitesMap[strings.ToLower(gotSuite)]
|
|
if !ok {
|
|
return nil, fmt.Errorf("got unsupported cipher suite name: %s", gotSuite)
|
|
}
|
|
cipherSuites = append(cipherSuites, id)
|
|
}
|
|
return cipherSuites, nil
|
|
}
|