-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathremotetls.go
61 lines (55 loc) · 1.51 KB
/
remotetls.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
package main
import (
"crypto/tls"
"crypto/x509"
log "github.com/Sirupsen/logrus"
"github.com/olebedev/config"
)
func configRemoteTLS(cfg *config.Config) (tlsConf *tls.Config, err error) {
isTLS := cfg.UBool("remote.tls.enable", true)
cert := cfg.UString("remote.tls.cert")
key := cfg.UString("remote.tls.key")
ca := cfg.UString("remote.tls.ca")
doVerify := cfg.UBool("remote.tls.verify", false)
useSysRoots := cfg.UBool("remote.tls.sysroots", false)
if fileExists(cert) && fileExists(key) {
log.Debugf("Loading remote TLS config: [cert: %s, key: %s, ca: %s, SystemRoots: %v]", cert, key, ca, useSysRoots)
if tlsConf, err = LoadTLSConfigFromFiles(cert, key, ca, useSysRoots); err != nil {
return
}
log.Debugln("Loading remote TLS config succeeded")
} else if isTLS {
tlsConf = &tls.Config{}
}
if doVerify && useSysRoots {
var capool *x509.CertPool
// Just load system CAs
log.Debugf("Loading default remote TLS config [verify: %v, system roots: %v]", doVerify, useSysRoots)
if tlsConf == nil {
capool = x509.NewCertPool()
capool, err = SetSystemCAPool(capool)
if err != nil {
return
}
tlsConf = &tls.Config{
RootCAs: capool,
ClientCAs: capool,
}
} else {
capool, err = SetSystemCAPool(tlsConf.RootCAs)
if err != nil {
return
}
capool, err = SetSystemCAPool(tlsConf.ClientCAs)
if err != nil {
return
}
tlsConf.RootCAs = capool
tlsConf.ClientCAs = capool
}
}
if !doVerify && tlsConf != nil {
tlsConf.InsecureSkipVerify = true
}
return
}