Compare commits

...

3 Commits

Author SHA1 Message Date
ba3795e3f2 bind to address provided on command line
bonus: and print an error if we couldn't
2024-09-26 22:08:29 +01:00
32099b7541 parse command-line for options instead of hardcoding
note port is still hardcoded
2024-09-26 22:05:13 +01:00
e410cef1f4 inline not-found function 2024-09-26 21:34:37 +01:00
2 changed files with 52 additions and 21 deletions

View File

@ -41,11 +41,10 @@ CN=CA openssl req -config openssl.cnf -x509 -new -nodes -key ca.key -sha256 -day
# create example client CSR for testing (check openssl.cnf against "psk" file) # create example client CSR for testing (check openssl.cnf against "psk" file)
CN=rotuer openssl req -config openssl.cnf -newkey rsa:2048 -nodes -keyout client.key -out client.csr CN=rotuer openssl req -config openssl.cnf -newkey rsa:2048 -nodes -keyout client.key -out client.csr
# start the server # build and start the server
bin/certifix nix-build && result/bin/certifix --challenge-password psk --certificate ca.crt --private-key ca.key localhost:19613
# send it # send it
curl -v -H 'content-type: application/x-pem-file' --data-binary @client.csr http://localhost:8201/sign curl -v -H 'content-type: application/x-pem-file' --data-binary @client.csr http://localhost:8201/sign
``` ```

View File

@ -33,14 +33,40 @@
false) false)
(out:write_chunk text true)) (out:write_chunk text true))
(fn not-found [out] (send-error out 404 "not found"))
(fn slurp [filename] (fn slurp [filename]
(with-open [f (io.open filename "r")] (f:read "*a"))) (with-open [f (io.open filename "r")] (f:read "*a")))
(local ca-key (pkey.new (slurp "ca.key"))) (fn read-line [filename]
(local ca-crt (x509.new (slurp "ca.crt"))) (with-open [f (io.open filename "r")] (f:read "l")))
(local psk (with-open [f (io.open "psk" "r")] (f:read "l")))
(fn assoc [tbl k v & more]
(tset tbl k v)
(case more
[k v] (assoc tbl k v)
_ tbl))
(fn parse-args [args]
(match args
["--certificate" f & rest]
(assoc (parse-args rest) :certificate (slurp f))
["--private-key" f & rest]
(assoc (parse-args rest) :private-key (slurp f))
["--challenge-password" f & rest]
(assoc (parse-args rest) :challenge-password (read-line f))
[bind-address] { : bind-address }
_ {}))
(local options
(doto
(parse-args arg)
(case
{: certificate : private-key : challenge-password : bind-address}
true
_
(assert nil "missing required command line params"))))
(local ca-key (pkey.new options.private-key))
(local ca-crt (x509.new options.certificate))
(fn new-crt [csr] (fn new-crt [csr]
(let [crt (let [crt
@ -58,7 +84,7 @@
(let [attr (csr:getAttributes)] (let [attr (csr:getAttributes)]
(accumulate [found false (accumulate [found false
_ v (ipairs (. attr "challengePassword"))] _ v (ipairs (. attr "challengePassword"))]
(or found (= v psk))))) (or found (= v options.challenge-password)))))
(fn handle-sign-csr [out] (fn handle-sign-csr [out]
@ -74,24 +100,30 @@
(let [hdrs (out:get_headers) (let [hdrs (out:get_headers)
method (hdrs:get ":method") method (hdrs:get ":method")
path (or (hdrs:get ":path") "/")] path (or (hdrs:get ":path") "/")]
(print :path path)
(case path (case path
"/sign" "/sign"
(handle-sign-csr out) (handle-sign-csr out)
_ _
(not-found out)))) (send-error out 404 "not found"))))
;; ncall is the opposite of pcall: "non-protected call"
(macro ncall [f]
`(case ,f
ok# ok#
(nil err#) (error err#)))
(fn new-server [] (fn new-server []
(server.listen (let [(addr port) (string.match options.bind-address "(.+):(%d+)$")]
{ (case (server.listen
:host :localhost {
:port 8201 :host addr
:onstream on-stream :port (tonumber port)
})) :onstream on-stream
})
f (doto f (print))
(nil e) (error e))))
(let [s (new-server)]
(doto (new-server) (ncall (s:listen))
(: :listen)
(print "server ready") (print "server ready")
(: :loop)) (ncall (s:loop)))