mirror of
https://github.com/pomerium/pomerium.git
synced 2025-08-03 08:50:42 +02:00
Add an option to request certificate with Must-Staple. (#697)
This commit is contained in:
parent
8856577f39
commit
8fc1e9cca8
5 changed files with 92 additions and 23 deletions
|
@ -11,6 +11,31 @@ import (
|
|||
"github.com/pomerium/pomerium/internal/log"
|
||||
)
|
||||
|
||||
// AutocertOptions contains the options to control the behavior of autocert.
|
||||
type AutocertOptions struct {
|
||||
// Enable enables fully automated certificate management including issuance
|
||||
// and renewal from LetsEncrypt. Must be used in conjunction with Folder.
|
||||
Enable bool `mapstructure:"autocert" yaml:"autocert,omitempty"`
|
||||
|
||||
// UseStaging tells autocert to use Let's Encrypt's staging CA which
|
||||
// has less strict usage limits then the (default) production CA.
|
||||
//
|
||||
// https://letsencrypt.org/docs/staging-environment/
|
||||
UseStaging bool `mapstructure:"autocert_use_staging" yaml:"autocert_use_staging,omitempty"`
|
||||
|
||||
// MustStaple will cause autocert to request a certificate with
|
||||
// status_request extension. This will allow the TLS client (the browser)
|
||||
// to fail immediately if Pomerium failed to get an OCSP staple.
|
||||
// See also https://tools.ietf.org/html/rfc7633
|
||||
// Only used when Enable is true.
|
||||
MustStaple bool `mapstructure:"autocert_must_staple" yaml:"autocert_must_staple,omitempty"`
|
||||
|
||||
// Folder specifies the location to store, and load autocert managed
|
||||
// TLS certificates.
|
||||
// defaults to $XDG_DATA_HOME/pomerium
|
||||
Folder string `mapstructure:"autocert_dir" yaml:"autocert_dir,omitempty"`
|
||||
}
|
||||
|
||||
// AutocertManager manages Let's Encrypt certificates based on configuration options.
|
||||
var AutocertManager = newAutocertManager()
|
||||
|
||||
|
@ -32,10 +57,11 @@ func (mgr *autocertManager) getConfig(options *Options) (*certmagic.Config, erro
|
|||
cm := mgr.certmagic
|
||||
if cm == nil {
|
||||
cm = certmagic.NewDefault()
|
||||
cm.MustStaple = options.AutocertOptions.MustStaple
|
||||
}
|
||||
|
||||
cm.OnDemand = nil // disable on-demand
|
||||
cm.Storage = &certmagic.FileStorage{Path: options.AutoCertFolder}
|
||||
cm.Storage = &certmagic.FileStorage{Path: options.AutocertOptions.Folder}
|
||||
// add existing certs to the cache, and staple OCSP
|
||||
for _, cert := range options.Certificates {
|
||||
if err := cm.CacheUnmanagedTLSCertificate(cert, nil); err != nil {
|
||||
|
@ -44,7 +70,7 @@ func (mgr *autocertManager) getConfig(options *Options) (*certmagic.Config, erro
|
|||
}
|
||||
acmeMgr := certmagic.NewACMEManager(cm, certmagic.DefaultACME)
|
||||
acmeMgr.Agreed = true
|
||||
if options.AutoCertUseStaging {
|
||||
if options.AutocertOptions.UseStaging {
|
||||
acmeMgr.CA = certmagic.LetsEncryptStagingCA
|
||||
}
|
||||
acmeMgr.DisableTLSALPNChallenge = true
|
||||
|
@ -55,7 +81,7 @@ func (mgr *autocertManager) getConfig(options *Options) (*certmagic.Config, erro
|
|||
}
|
||||
|
||||
func (mgr *autocertManager) update(options *Options) error {
|
||||
if !options.AutoCert {
|
||||
if !options.AutocertOptions.Enable {
|
||||
return nil
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue