boulder/test/cert-ceremonies/generate.go

172 lines
6.9 KiB
Go

// generate.go is a helper utility for integration tests.
package main
import (
"errors"
"fmt"
"os"
"os/exec"
"regexp"
"text/template"
"github.com/letsencrypt/boulder/cmd"
blog "github.com/letsencrypt/boulder/log"
)
// createSlot initializes a SoftHSM slot and token. SoftHSM chooses the highest empty
// slot, initializes it, and then assigns it a new randomly chosen slot ID. Since we can't
// predict this ID we need to parse out the new ID so that we can use it in the ceremony
// configs.
func createSlot(label string) (string, error) {
output, err := exec.Command("softhsm2-util", "--init-token", "--free", "--label", label, "--pin", "1234", "--so-pin", "5678").CombinedOutput()
if err != nil {
return "", err
}
re := regexp.MustCompile(`to slot (\d+)`)
matches := re.FindSubmatch(output)
if len(matches) != 2 {
return "", errors.New("unexpected number of slot matches")
}
return string(matches[1]), nil
}
// genKey is used to run a key ceremony with a given config, replacing SlotID in
// the YAML with a specific slot ID.
func genKey(path string, inSlot string) error {
tmpPath, err := rewriteConfig(path, map[string]string{"SlotID": inSlot})
if err != nil {
return err
}
output, err := exec.Command("bin/ceremony", "-config", tmpPath).CombinedOutput()
if err != nil {
return fmt.Errorf("error running ceremony for %s: %s:\n%s", tmpPath, err, string(output))
}
return nil
}
// rewriteConfig creates a temporary config based on the template at path
// using the variables in rewrites.
func rewriteConfig(path string, rewrites map[string]string) (string, error) {
tmplBytes, err := os.ReadFile(path)
if err != nil {
return "", err
}
tmp, err := os.CreateTemp(os.TempDir(), "ceremony-config")
if err != nil {
return "", err
}
defer tmp.Close()
tmpl, err := template.New("config").Parse(string(tmplBytes))
if err != nil {
return "", err
}
err = tmpl.Execute(tmp, rewrites)
if err != nil {
return "", err
}
return tmp.Name(), nil
}
// genCert is used to run ceremony when we don't actually care about,
// any of the output and only want to verify it exits cleanly
func genCert(path string) error {
return exec.Command("bin/ceremony", "-config", path).Run()
}
func main() {
_ = blog.Set(blog.StdoutLogger(6))
defer cmd.AuditPanic()
// If one of the output files already exists, assume this ran once
// already for the container and don't re-run.
outputFile := "/hierarchy/root-signing-pub-rsa.pem"
if loc, err := os.Stat(outputFile); err == nil && loc.Mode().IsRegular() {
fmt.Println("skipping certificate generation: already exists")
return
} else if err == nil && !loc.Mode().IsRegular() {
cmd.Fail(fmt.Sprintf("statting %q: not a regular file", outputFile))
} else if err != nil && !os.IsNotExist(err) {
cmd.Fail(fmt.Sprintf("statting %q: %s", outputFile, err))
}
// Create SoftHSM slots for the root signing keys
rsaRootKeySlot, err := createSlot("root signing key (rsa)")
cmd.FailOnError(err, "failed creating softhsm2 slot for RSA root key")
ecdsaRootKeySlot, err := createSlot("root signing key (ecdsa)")
cmd.FailOnError(err, "failed creating softhsm2 slot for root key")
// Generate the root signing keys and certificates
err = genKey("test/cert-ceremonies/root-ceremony-rsa.yaml", rsaRootKeySlot)
cmd.FailOnError(err, "failed to generate RSA root key + root cert")
err = genKey("test/cert-ceremonies/root-ceremony-ecdsa.yaml", ecdsaRootKeySlot)
cmd.FailOnError(err, "failed to generate ECDSA root key + root cert")
// Create SoftHSM slots for the intermediate signing keys
rsaIntermediateKeySlot, err := createSlot("intermediate signing key (rsa)")
cmd.FailOnError(err, "failed to create softhsm2 slot for RSA intermediate key")
ecdsaIntermediateKeySlot, err := createSlot("intermediate signing key (ecdsa)")
cmd.FailOnError(err, "failed to create softhsm2 slot for ECDSA intermediate key")
// Generate the intermediate signing keys
err = genKey("test/cert-ceremonies/intermediate-key-ceremony-rsa.yaml", rsaIntermediateKeySlot)
cmd.FailOnError(err, "failed to generate RSA intermediate key")
err = genKey("test/cert-ceremonies/intermediate-key-ceremony-ecdsa.yaml", ecdsaIntermediateKeySlot)
cmd.FailOnError(err, "failed to generate ECDSA intermediate key")
// Create the A intermediate ceremony config files with the root
// signing key slots and IDs
rsaTmpIntermediateA, err := rewriteConfig("test/cert-ceremonies/intermediate-ceremony-rsa.yaml", map[string]string{
"SlotID": rsaRootKeySlot,
"CertPath": "/hierarchy/intermediate-cert-rsa-a.pem",
"CommonName": "CA intermediate (RSA) A",
})
cmd.FailOnError(err, "failed to rewrite RSA intermediate cert config with key ID")
ecdsaTmpIntermediateA, err := rewriteConfig("test/cert-ceremonies/intermediate-ceremony-ecdsa.yaml", map[string]string{
"SlotID": ecdsaRootKeySlot,
"CertPath": "/hierarchy/intermediate-cert-ecdsa-a.pem",
"CommonName": "CA intermediate (ECDSA) A",
})
cmd.FailOnError(err, "failed to rewrite ECDSA intermediate cert config with key ID")
// Create the A intermediate certificates
err = genCert(rsaTmpIntermediateA)
cmd.FailOnError(err, "failed to generate RSA intermediate cert")
err = genCert(ecdsaTmpIntermediateA)
cmd.FailOnError(err, "failed to generate ECDSA intermediate cert")
// Create the B intermediate ceremony config files with the root
// signing key slots and IDs
rsaTmpIntermediateB, err := rewriteConfig("test/cert-ceremonies/intermediate-ceremony-rsa.yaml", map[string]string{
"SlotID": rsaRootKeySlot,
"CertPath": "/hierarchy/intermediate-cert-rsa-b.pem",
"CommonName": "CA intermediate (RSA) B",
})
cmd.FailOnError(err, "failed to rewrite RSA intermediate cert config with key ID")
ecdsaTmpIntermediateB, err := rewriteConfig("test/cert-ceremonies/intermediate-ceremony-ecdsa.yaml", map[string]string{
"SlotID": ecdsaRootKeySlot,
"CertPath": "/hierarchy/intermediate-cert-ecdsa-b.pem",
"CommonName": "CA intermediate (ECDSA) B",
})
cmd.FailOnError(err, "failed to rewrite ECDSA intermediate cert config with key ID")
// Create the B intermediate certificates
err = genCert(rsaTmpIntermediateB)
cmd.FailOnError(err, "failed to generate RSA intermediate cert")
err = genCert(ecdsaTmpIntermediateB)
cmd.FailOnError(err, "failed to generate ECDSA intermediate cert")
// Create CRLs stating that the intermediates are not revoked.
rsaTmpCRLConfig, err := rewriteConfig("test/cert-ceremonies/root-crl-rsa.yaml", map[string]string{
"SlotID": rsaRootKeySlot,
})
cmd.FailOnError(err, "failed to rewrite RSA root CRL config with key ID")
err = genCert(rsaTmpCRLConfig)
cmd.FailOnError(err, "failed to generate RSA root CRL")
ecdsaTmpCRLConfig, err := rewriteConfig("test/cert-ceremonies/root-crl-ecdsa.yaml", map[string]string{
"SlotID": ecdsaRootKeySlot,
})
cmd.FailOnError(err, "failed to rewrite ECDSA root CRL config with key ID")
err = genCert(ecdsaTmpCRLConfig)
cmd.FailOnError(err, "failed to generate ECDSA root CRL")
}