Compare commits
3 Commits
afd3088cee
...
ba3795e3f2
Author | SHA1 | Date | |
---|---|---|---|
ba3795e3f2 | |||
32099b7541 | |||
e410cef1f4 |
@ -41,11 +41,10 @@ CN=CA openssl req -config openssl.cnf -x509 -new -nodes -key ca.key -sha256 -day
|
||||
# create example client CSR for testing (check openssl.cnf against "psk" file)
|
||||
CN=rotuer openssl req -config openssl.cnf -newkey rsa:2048 -nodes -keyout client.key -out client.csr
|
||||
|
||||
# start the server
|
||||
bin/certifix
|
||||
# build and start the server
|
||||
nix-build && result/bin/certifix --challenge-password psk --certificate ca.crt --private-key ca.key localhost:19613
|
||||
|
||||
# send it
|
||||
|
||||
curl -v -H 'content-type: application/x-pem-file' --data-binary @client.csr http://localhost:8201/sign
|
||||
```
|
||||
|
||||
|
68
main.fnl
68
main.fnl
@ -33,14 +33,40 @@
|
||||
false)
|
||||
(out:write_chunk text true))
|
||||
|
||||
(fn not-found [out] (send-error out 404 "not found"))
|
||||
|
||||
(fn slurp [filename]
|
||||
(with-open [f (io.open filename "r")] (f:read "*a")))
|
||||
|
||||
(local ca-key (pkey.new (slurp "ca.key")))
|
||||
(local ca-crt (x509.new (slurp "ca.crt")))
|
||||
(local psk (with-open [f (io.open "psk" "r")] (f:read "l")))
|
||||
(fn read-line [filename]
|
||||
(with-open [f (io.open filename "r")] (f:read "l")))
|
||||
|
||||
(fn assoc [tbl k v & more]
|
||||
(tset tbl k v)
|
||||
(case more
|
||||
[k v] (assoc tbl k v)
|
||||
_ tbl))
|
||||
|
||||
(fn parse-args [args]
|
||||
(match args
|
||||
["--certificate" f & rest]
|
||||
(assoc (parse-args rest) :certificate (slurp f))
|
||||
["--private-key" f & rest]
|
||||
(assoc (parse-args rest) :private-key (slurp f))
|
||||
["--challenge-password" f & rest]
|
||||
(assoc (parse-args rest) :challenge-password (read-line f))
|
||||
[bind-address] { : bind-address }
|
||||
_ {}))
|
||||
|
||||
(local options
|
||||
(doto
|
||||
(parse-args arg)
|
||||
(case
|
||||
{: certificate : private-key : challenge-password : bind-address}
|
||||
true
|
||||
_
|
||||
(assert nil "missing required command line params"))))
|
||||
|
||||
(local ca-key (pkey.new options.private-key))
|
||||
(local ca-crt (x509.new options.certificate))
|
||||
|
||||
(fn new-crt [csr]
|
||||
(let [crt
|
||||
@ -58,7 +84,7 @@
|
||||
(let [attr (csr:getAttributes)]
|
||||
(accumulate [found false
|
||||
_ v (ipairs (. attr "challengePassword"))]
|
||||
(or found (= v psk)))))
|
||||
(or found (= v options.challenge-password)))))
|
||||
|
||||
|
||||
(fn handle-sign-csr [out]
|
||||
@ -74,24 +100,30 @@
|
||||
(let [hdrs (out:get_headers)
|
||||
method (hdrs:get ":method")
|
||||
path (or (hdrs:get ":path") "/")]
|
||||
(print :path path)
|
||||
(case path
|
||||
"/sign"
|
||||
(handle-sign-csr out)
|
||||
_
|
||||
(not-found out))))
|
||||
(send-error out 404 "not found"))))
|
||||
|
||||
;; ncall is the opposite of pcall: "non-protected call"
|
||||
(macro ncall [f]
|
||||
`(case ,f
|
||||
ok# ok#
|
||||
(nil err#) (error err#)))
|
||||
|
||||
(fn new-server []
|
||||
(server.listen
|
||||
{
|
||||
:host :localhost
|
||||
:port 8201
|
||||
:onstream on-stream
|
||||
}))
|
||||
(let [(addr port) (string.match options.bind-address "(.+):(%d+)$")]
|
||||
(case (server.listen
|
||||
{
|
||||
:host addr
|
||||
:port (tonumber port)
|
||||
:onstream on-stream
|
||||
})
|
||||
f (doto f (print))
|
||||
(nil e) (error e))))
|
||||
|
||||
|
||||
(doto (new-server)
|
||||
(: :listen)
|
||||
(let [s (new-server)]
|
||||
(ncall (s:listen))
|
||||
(print "server ready")
|
||||
(: :loop))
|
||||
(ncall (s:loop)))
|
||||
|
Loading…
Reference in New Issue
Block a user