LEFT | RIGHT |
(no file at all) | |
1 package juju | 1 package juju |
2 | 2 |
3 import ( | 3 import ( |
4 "bytes" | 4 "bytes" |
5 "crypto/rand" | 5 "crypto/rand" |
6 "crypto/rsa" | 6 "crypto/rsa" |
7 "crypto/sha1" | 7 "crypto/sha1" |
8 "crypto/tls" | 8 "crypto/tls" |
9 "crypto/x509" | 9 "crypto/x509" |
10 "crypto/x509/pkix" | 10 "crypto/x509/pkix" |
(...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
67 // TODO quote the environment name when we start using | 67 // TODO quote the environment name when we start using |
68 // Go version 1.1. See Go issue 3791. | 68 // Go version 1.1. See Go issue 3791. |
69 CommonName: fmt.Sprintf("juju-generated CA for environ
ment %s", envName), | 69 CommonName: fmt.Sprintf("juju-generated CA for environ
ment %s", envName), |
70 Organization: []string{"juju"}, | 70 Organization: []string{"juju"}, |
71 }, | 71 }, |
72 NotBefore: now.UTC().Add(-5 * time.Minute), | 72 NotBefore: now.UTC().Add(-5 * time.Minute), |
73 NotAfter: now.UTC().AddDate(10, 0, 0), // 10 years
hence. | 73 NotAfter: now.UTC().AddDate(10, 0, 0), // 10 years
hence. |
74 SubjectKeyId: bigIntHash(priv.N), | 74 SubjectKeyId: bigIntHash(priv.N), |
75 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUs
ageDigitalSignature | x509.KeyUsageCertSign, | 75 KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUs
ageDigitalSignature | x509.KeyUsageCertSign, |
76 BasicConstraintsValid: true, | 76 BasicConstraintsValid: true, |
77 » » IsCA: true, | 77 » » IsCA: true, |
78 » » MaxPathLen: 0, // Disallow delegation for now. | 78 » » MaxPathLen: 0, // Disallow delegation for now. |
79 } | 79 } |
80 certDER, err := x509.CreateCertificate(rand.Reader, template, template,
&priv.PublicKey, priv) | 80 certDER, err := x509.CreateCertificate(rand.Reader, template, template,
&priv.PublicKey, priv) |
81 if err != nil { | 81 if err != nil { |
82 return nil, fmt.Errorf("canot create certificate: %v", err) | 82 return nil, fmt.Errorf("canot create certificate: %v", err) |
83 } | 83 } |
84 var b bytes.Buffer | 84 var b bytes.Buffer |
85 pem.Encode(&b, &pem.Block{ | 85 pem.Encode(&b, &pem.Block{ |
86 Type: "CERTIFICATE", | 86 Type: "CERTIFICATE", |
87 Bytes: certDER, | 87 Bytes: certDER, |
88 }) | 88 }) |
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
184 tlsCert, err := tls.X509KeyPair(pem.EncodeToMemory(certBlock), pem.Encod
eToMemory(keyBlock)) | 184 tlsCert, err := tls.X509KeyPair(pem.EncodeToMemory(certBlock), pem.Encod
eToMemory(keyBlock)) |
185 if err != nil { | 185 if err != nil { |
186 return nil, nil, err | 186 return nil, nil, err |
187 } | 187 } |
188 priv, ok := tlsCert.PrivateKey.(*rsa.PrivateKey) | 188 priv, ok := tlsCert.PrivateKey.(*rsa.PrivateKey) |
189 if !ok { | 189 if !ok { |
190 return nil, nil, fmt.Errorf("CA private key has unexpected type
%T", tlsCert.PrivateKey) | 190 return nil, nil, fmt.Errorf("CA private key has unexpected type
%T", tlsCert.PrivateKey) |
191 } | 191 } |
192 return cert, priv, nil | 192 return cert, priv, nil |
193 } | 193 } |
LEFT | RIGHT |