You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
228 lines
4.5 KiB
Go
228 lines
4.5 KiB
Go
package proxy
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"crypto/rsa"
|
|
"crypto/x509"
|
|
"crypto/x509/pkix"
|
|
"encoding/pem"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"log"
|
|
"math/big"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
)
|
|
|
|
var caErrNotFound = errors.New("ca not found")
|
|
|
|
type CA struct {
|
|
rsa.PrivateKey
|
|
RootCert x509.Certificate
|
|
StorePath string
|
|
}
|
|
|
|
func NewCA(path string) (*CA, error) {
|
|
storePath, err := getStorePath(path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
ca := &CA{StorePath: storePath}
|
|
|
|
if err := ca.load(); err != nil {
|
|
if err != caErrNotFound {
|
|
return nil, err
|
|
}
|
|
} else {
|
|
return ca, nil
|
|
}
|
|
|
|
log.Println("begin create ca")
|
|
if err := ca.create(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return ca, nil
|
|
}
|
|
|
|
func getStorePath(path string) (string, error) {
|
|
if path == "" {
|
|
homeDir, err := os.UserHomeDir()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
path = filepath.Join(homeDir, ".go_mitmproxy")
|
|
}
|
|
|
|
if !filepath.IsAbs(path) {
|
|
dir, err := os.Getwd()
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
path = filepath.Join(dir, path)
|
|
}
|
|
|
|
stat, err := os.Stat(path)
|
|
if err != nil {
|
|
if os.IsNotExist(err) {
|
|
err = os.MkdirAll(path, os.ModePerm)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
} else {
|
|
return "", err
|
|
}
|
|
} else {
|
|
if !stat.Mode().IsDir() {
|
|
return "", fmt.Errorf("路径 %v 不是文件夹,请移除此文件重试", path)
|
|
}
|
|
}
|
|
|
|
return path, nil
|
|
}
|
|
|
|
// The certificate and the private key in PEM format.
|
|
func (ca *CA) caFile() string {
|
|
return filepath.Join(ca.StorePath, "mitmproxy-ca.pem")
|
|
}
|
|
|
|
// The certificate in PEM format.
|
|
func (ca *CA) caCertFile() string {
|
|
return filepath.Join(ca.StorePath, "mitmproxy-ca-cert.pem")
|
|
}
|
|
|
|
func (ca *CA) load() error {
|
|
caFile := ca.caFile()
|
|
stat, err := os.Stat(caFile)
|
|
if err != nil {
|
|
if os.IsNotExist(err) {
|
|
return caErrNotFound
|
|
}
|
|
return err
|
|
}
|
|
|
|
if !stat.Mode().IsRegular() {
|
|
return fmt.Errorf("%v 不是文件", caFile)
|
|
}
|
|
|
|
data, err := ioutil.ReadFile(caFile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
keyDERBlock, data := pem.Decode(data)
|
|
if keyDERBlock == nil {
|
|
return fmt.Errorf("%v 中不存在 PRIVATE KEY", caFile)
|
|
}
|
|
certDERBlock, _ := pem.Decode(data)
|
|
if certDERBlock == nil {
|
|
return fmt.Errorf("%v 中不存在 CERTIFICATE", caFile)
|
|
}
|
|
|
|
key, err := x509.ParsePKCS8PrivateKey(keyDERBlock.Bytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if v, ok := key.(*rsa.PrivateKey); ok {
|
|
ca.PrivateKey = *v
|
|
} else {
|
|
return errors.New("found unknown rsa private key type in PKCS#8 wrapping")
|
|
}
|
|
|
|
x509Cert, err := x509.ParseCertificate(certDERBlock.Bytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ca.RootCert = *x509Cert
|
|
|
|
return nil
|
|
}
|
|
|
|
func (ca *CA) create() error {
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ca.PrivateKey = *key
|
|
|
|
template := &x509.Certificate{
|
|
SerialNumber: big.NewInt(time.Now().UnixNano() / 100000),
|
|
Subject: pkix.Name{
|
|
CommonName: "mitmproxy",
|
|
Organization: []string{"mitmproxy"},
|
|
},
|
|
NotBefore: time.Now().Add(-time.Hour * 48),
|
|
NotAfter: time.Now().Add(time.Hour * 24 * 365 * 3),
|
|
BasicConstraintsValid: true,
|
|
IsCA: true,
|
|
SignatureAlgorithm: x509.SHA256WithRSA,
|
|
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
|
|
ExtKeyUsage: []x509.ExtKeyUsage{
|
|
x509.ExtKeyUsageServerAuth,
|
|
x509.ExtKeyUsageClientAuth,
|
|
x509.ExtKeyUsageEmailProtection,
|
|
x509.ExtKeyUsageTimeStamping,
|
|
x509.ExtKeyUsageCodeSigning,
|
|
x509.ExtKeyUsageMicrosoftCommercialCodeSigning,
|
|
x509.ExtKeyUsageMicrosoftServerGatedCrypto,
|
|
x509.ExtKeyUsageNetscapeServerGatedCrypto,
|
|
},
|
|
}
|
|
|
|
certBytes, err := x509.CreateCertificate(rand.Reader, template, template, &key.PublicKey, key)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
cert, err := x509.ParseCertificate(certBytes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ca.RootCert = *cert
|
|
|
|
if err := ca.save(); err != nil {
|
|
return err
|
|
}
|
|
return ca.saveCert()
|
|
}
|
|
|
|
func (ca *CA) saveTo(out io.Writer) error {
|
|
keyBytes, err := x509.MarshalPKCS8PrivateKey(&ca.PrivateKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = pem.Encode(out, &pem.Block{Type: "PRIVATE KEY", Bytes: keyBytes})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return pem.Encode(out, &pem.Block{Type: "CERTIFICATE", Bytes: ca.RootCert.Raw})
|
|
}
|
|
|
|
func (ca *CA) saveCertTo(out io.Writer) error {
|
|
return pem.Encode(out, &pem.Block{Type: "CERTIFICATE", Bytes: ca.RootCert.Raw})
|
|
}
|
|
|
|
func (ca *CA) save() error {
|
|
file, err := os.Create(ca.caFile())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer file.Close()
|
|
|
|
return ca.saveTo(file)
|
|
}
|
|
|
|
func (ca *CA) saveCert() error {
|
|
file, err := os.Create(ca.caCertFile())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer file.Close()
|
|
|
|
return ca.saveCertTo(file)
|
|
}
|