mirror of
https://github.com/openimsdk/open-im-server.git
synced 2025-04-06 04:15:46 +08:00
* optimization: change the configuration file from being read globally to being read independently. * optimization: change the configuration file from being read globally to being read independently. * optimization: change the configuration file from being read globally to being read independently. * optimization: config file changed to dependency injection. * fix: replace global config with dependency injection * fix: replace global config with dependency injection * fix: import the enough param * fix: import the enough param * fix: import the enough param * fix: fix the component check of path * fix: fix the kafka of tls is nil problem * fix: fix the TLS.CACrt is nil error * fix: fix the valiable shadows problem * fix: fix the comflect * optimization: message remove options. * fix: fix the param pass error * fix: find error * fix: find error * fix: find eror * fix: find error * fix: find error * fix: del the undifined func * fix: find error * fix: fix the error * fix: pass config * fix: find error * fix: find error * fix: find error * fix: find error * fix: find error * fix: fix the config * fix: fix the error * fix: fix the config pass error * fix: fix the eror * fix: fix the error * fix: fix the error * fix: fix the error * fix: find error * fix: fix the error * fix: fix the config * fix: add return err * fix: fix the err2 * fix: err * fix: fix the func * fix: del the chinese comment * fix: fix the func * fix: fix the gateway_test logic * fix: s3 * test * test * fix: not found --------- Co-authored-by: luhaoling <2198702716@qq.com> Co-authored-by: withchao <993506633@qq.com>
89 lines
2.4 KiB
Go
Executable File
89 lines
2.4 KiB
Go
Executable File
// Copyright © 2023 OpenIM. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package tls
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"encoding/pem"
|
|
"errors"
|
|
"os"
|
|
|
|
"github.com/OpenIMSDK/tools/errs"
|
|
)
|
|
|
|
// decryptPEM decrypts a PEM block using a password.
|
|
func decryptPEM(data []byte, passphrase []byte) ([]byte, error) {
|
|
if len(passphrase) == 0 {
|
|
return data, nil
|
|
}
|
|
b, _ := pem.Decode(data)
|
|
d, err := x509.DecryptPEMBlock(b, passphrase)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return pem.EncodeToMemory(&pem.Block{
|
|
Type: b.Type,
|
|
Bytes: d,
|
|
}), nil
|
|
}
|
|
|
|
func readEncryptablePEMBlock(path string, pwd []byte) ([]byte, error) {
|
|
data, err := os.ReadFile(path)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return decryptPEM(data, pwd)
|
|
}
|
|
|
|
// NewTLSConfig setup the TLS config from general config file.
|
|
func NewTLSConfig(clientCertFile, clientKeyFile, caCertFile string, keyPwd []byte, insecureSkipVerify bool) (*tls.Config,error) {
|
|
tlsConfig := tls.Config{}
|
|
|
|
if clientCertFile != "" && clientKeyFile != "" {
|
|
certPEMBlock, err := os.ReadFile(clientCertFile)
|
|
if err != nil {
|
|
return nil, errs.Wrap(err, "NewTLSConfig: failed to read client cert file")
|
|
}
|
|
keyPEMBlock, err := readEncryptablePEMBlock(clientKeyFile, keyPwd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
cert, err := tls.X509KeyPair(certPEMBlock, keyPEMBlock)
|
|
if err != nil {
|
|
return nil, errs.Wrap(err, "NewTLSConfig: failed to create X509 key pair")
|
|
}
|
|
tlsConfig.Certificates = []tls.Certificate{cert}
|
|
}
|
|
|
|
if caCertFile != "" {
|
|
caCert, err := os.ReadFile(caCertFile)
|
|
if err != nil {
|
|
return nil, errs.Wrap(err, "NewTLSConfig: failed to read CA cert file")
|
|
}
|
|
|
|
caCertPool := x509.NewCertPool()
|
|
if ok := caCertPool.AppendCertsFromPEM(caCert); !ok {
|
|
return nil, errors.New("NewTLSConfig: not a valid CA cert")
|
|
}
|
|
tlsConfig.RootCAs = caCertPool
|
|
}
|
|
|
|
tlsConfig.InsecureSkipVerify = insecureSkipVerify
|
|
|
|
return &tlsConfig, nil
|
|
}
|