2017-08-28 12:27:45 -04:00
/ * *
* @ description Certificate generator
* @ author Joko Sastriawan / Ylian Saint - Hilaire
2018-01-04 15:15:21 -05:00
* @ copyright Intel Corporation 2018
* @ license Apache - 2.0
2017-08-28 12:27:45 -04:00
* @ version v0 . 0.1
* /
2018-01-04 15:15:21 -05:00
2017-08-28 12:27:45 -04:00
module . exports . CertificateOperations = function ( ) {
var obj = { } ;
obj . fs = require ( 'fs' ) ;
obj . forge = require ( 'node-forge' ) ;
obj . pki = obj . forge . pki ;
obj . dirExists = function ( filePath ) { try { return obj . fs . statSync ( filePath ) . isDirectory ( ) ; } catch ( err ) { return false ; } }
obj . getFilesizeInBytes = function ( filename ) { try { return obj . fs . statSync ( filename ) [ "size" ] ; } catch ( err ) { return - 1 ; } }
obj . fileExists = function ( filePath ) { try { return obj . fs . statSync ( filePath ) . isFile ( ) ; } catch ( err ) { return false ; } }
2017-10-15 02:22:19 -04:00
// Return the SHA386 hash of the certificate public key
obj . getPublicKeyHash = function ( cert ) {
var publickey = obj . pki . certificateFromPem ( cert ) . publicKey ;
return obj . pki . getPublicKeyFingerprint ( publickey , { encoding : 'hex' , md : obj . forge . md . sha384 . create ( ) } ) ;
2017-09-29 17:26:51 -04:00
}
2017-08-28 12:27:45 -04:00
// Create a self-signed certificate
2017-10-18 19:28:05 -04:00
obj . GenerateRootCertificate = function ( addThumbPrintToName , commonName , country , organization , strong ) {
var keys = obj . pki . rsa . generateKeyPair ( ( strong == true ) ? 3072 : 2048 ) ;
2017-08-28 12:27:45 -04:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
cert . serialNumber = '' + Math . floor ( ( Math . random ( ) * 100000 ) + 1 ) ; ;
cert . validity . notBefore = new Date ( ) ;
cert . validity . notBefore . setFullYear ( cert . validity . notBefore . getFullYear ( ) - 1 ) ; // Create a certificate that is valid one year before, to make sure out-of-sync clocks don't reject this cert.
cert . validity . notAfter = new Date ( ) ;
cert . validity . notAfter . setFullYear ( cert . validity . notAfter . getFullYear ( ) + 30 ) ;
if ( addThumbPrintToName == true ) { commonName += '-' + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
2017-10-02 17:12:29 -04:00
if ( country == undefined ) { country = 'unknown' ; }
if ( organization == undefined ) { organization = 'unknown' ; }
var attrs = [ { name : 'commonName' , value : commonName } , { name : 'organizationName' , value : organization } , { name : 'countryName' , value : country } ] ;
2017-08-28 12:27:45 -04:00
cert . setSubject ( attrs ) ;
cert . setIssuer ( attrs ) ;
2017-10-02 17:12:29 -04:00
// Create a root certificate
cert . setExtensions ( [ {
name : 'basicConstraints' ,
cA : true
} , {
2017-08-28 12:27:45 -04:00
name : 'nsCertType' ,
sslCA : true ,
2017-10-02 17:12:29 -04:00
emailCA : true ,
2017-08-28 12:27:45 -04:00
objCA : true
2017-10-02 17:12:29 -04:00
} , {
name : 'subjectKeyIdentifier'
} ] ) ;
2017-10-15 02:22:19 -04:00
cert . sign ( keys . privateKey , obj . forge . md . sha384 . create ( ) ) ;
2017-08-28 12:27:45 -04:00
return { cert : cert , key : keys . privateKey } ;
}
// Issue a certificate from a root
2017-10-15 02:22:19 -04:00
obj . IssueWebServerCertificate = function ( rootcert , addThumbPrintToName , commonName , country , organization , extKeyUsage , strong ) {
var keys = obj . pki . rsa . generateKeyPair ( ( strong == true ) ? 3072 : 2048 ) ;
2017-08-28 12:27:45 -04:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
cert . serialNumber = '' + Math . floor ( ( Math . random ( ) * 100000 ) + 1 ) ; ;
cert . validity . notBefore = new Date ( ) ;
cert . validity . notBefore . setFullYear ( cert . validity . notAfter . getFullYear ( ) - 1 ) ; // Create a certificate that is valid one year before, to make sure out-of-sync clocks don't reject this cert.
cert . validity . notAfter = new Date ( ) ;
cert . validity . notAfter . setFullYear ( cert . validity . notAfter . getFullYear ( ) + 30 ) ;
if ( addThumbPrintToName == true ) { commonName += '-' + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
var attrs = [ { name : 'commonName' , value : commonName } ] ;
if ( country != undefined ) attrs . push ( { name : 'countryName' , value : country } ) ;
if ( organization != undefined ) attrs . push ( { name : 'organizationName' , value : organization } ) ;
cert . setSubject ( attrs ) ;
cert . setIssuer ( rootcert . cert . subject . attributes ) ;
2017-09-29 17:26:51 -04:00
if ( extKeyUsage == null ) { extKeyUsage = { name : 'extKeyUsage' , serverAuth : true , } } else { extKeyUsage . name = 'extKeyUsage' ; }
var subjectAltName = null ;
if ( extKeyUsage . serverAuth == true ) {
subjectAltName = {
name : 'subjectAltName' ,
altNames : [ {
type : 6 , // URI
value : 'http://' + commonName + '/'
} , {
type : 6 , // URL
value : 'http://localhost/'
} ]
}
}
/ *
{
name : 'extKeyUsage' ,
serverAuth : true ,
clientAuth : true ,
codeSigning : true ,
emailProtection : true ,
timeStamping : true ,
'2.16.840.1.113741.1.2.1' : true
}
* /
var extensions = [ {
name : 'basicConstraints' ,
cA : false
} , {
2017-08-28 12:27:45 -04:00
name : 'keyUsage' ,
keyCertSign : true ,
digitalSignature : true ,
nonRepudiation : true ,
keyEncipherment : true ,
dataEncipherment : true
2017-09-29 17:26:51 -04:00
} , extKeyUsage , {
2017-08-28 12:27:45 -04:00
name : 'nsCertType' ,
client : false ,
server : true ,
email : false ,
objsign : false ,
sslCA : false ,
emailCA : false ,
objCA : false
} , {
name : 'subjectKeyIdentifier'
2017-09-29 17:26:51 -04:00
} ]
if ( subjectAltName != null ) extensions . push ( subjectAltName ) ;
cert . setExtensions ( extensions ) ;
2017-10-15 02:22:19 -04:00
cert . sign ( rootcert . key , obj . forge . md . sha384 . create ( ) ) ;
2017-08-28 12:27:45 -04:00
return { cert : cert , key : keys . privateKey } ;
}
// Returns the web server TLS certificate and private key, if not present, create demonstration ones.
2018-01-02 19:52:49 -05:00
obj . GetMeshServerCertificate = function ( directory , args , config , func ) {
2017-10-02 17:12:29 -04:00
var certargs = args . cert ;
2017-10-18 19:28:05 -04:00
var strongCertificate = ( args . fastcert ? false : true ) ;
2018-01-02 19:52:49 -05:00
var rcountmax = 5 ;
2017-08-28 12:27:45 -04:00
// commonName, country, organization
// If the certificates directory does not exist, create it.
if ( ! obj . dirExists ( directory ) ) { obj . fs . mkdirSync ( directory ) ; }
var r = { } , rcount = 0 ;
// If the root certificate already exist, load it
if ( obj . fileExists ( directory + '/root-cert-public.crt' ) && obj . fileExists ( directory + '/root-cert-private.key' ) ) {
var rootCertificate = obj . fs . readFileSync ( directory + '/root-cert-public.crt' , 'utf8' ) ;
var rootPrivateKey = obj . fs . readFileSync ( directory + '/root-cert-private.key' , 'utf8' ) ;
r . root = { cert : rootCertificate , key : rootPrivateKey } ;
rcount ++ ;
}
2017-10-02 17:12:29 -04:00
if ( args . tlsoffload == true ) {
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
if ( obj . fileExists ( directory + '/webserver-cert-public.crt' ) ) {
var webCertificate = obj . fs . readFileSync ( directory + '/webserver-cert-public.crt' , 'utf8' ) ;
r . web = { cert : webCertificate } ;
rcount ++ ;
}
} else {
// If the web certificate already exist, load it. Load both certificate and private key
if ( obj . fileExists ( directory + '/webserver-cert-public.crt' ) && obj . fileExists ( directory + '/webserver-cert-private.key' ) ) {
var webCertificate = obj . fs . readFileSync ( directory + '/webserver-cert-public.crt' , 'utf8' ) ;
var webPrivateKey = obj . fs . readFileSync ( directory + '/webserver-cert-private.key' , 'utf8' ) ;
r . web = { cert : webCertificate , key : webPrivateKey } ;
rcount ++ ;
}
2017-08-28 12:27:45 -04:00
}
2017-10-02 17:12:29 -04:00
// If the mps certificate already exist, load it
2017-08-28 12:27:45 -04:00
if ( obj . fileExists ( directory + '/mpsserver-cert-public.crt' ) && obj . fileExists ( directory + '/mpsserver-cert-private.key' ) ) {
var mpsCertificate = obj . fs . readFileSync ( directory + '/mpsserver-cert-public.crt' , 'utf8' ) ;
var mpsPrivateKey = obj . fs . readFileSync ( directory + '/mpsserver-cert-private.key' , 'utf8' ) ;
r . mps = { cert : mpsCertificate , key : mpsPrivateKey } ;
rcount ++ ;
}
2017-10-02 17:12:29 -04:00
// If the agent certificate already exist, load it
2017-08-28 12:27:45 -04:00
if ( obj . fileExists ( directory + '/agentserver-cert-public.crt' ) && obj . fileExists ( directory + '/agentserver-cert-private.key' ) ) {
var agentCertificate = obj . fs . readFileSync ( directory + '/agentserver-cert-public.crt' , 'utf8' ) ;
var agentPrivateKey = obj . fs . readFileSync ( directory + '/agentserver-cert-private.key' , 'utf8' ) ;
r . agent = { cert : agentCertificate , key : agentPrivateKey } ;
rcount ++ ;
}
2017-09-07 19:01:44 -04:00
2017-10-02 17:12:29 -04:00
// If the console certificate already exist, load it
2017-09-29 17:26:51 -04:00
if ( obj . fileExists ( directory + '/amtconsole-cert-public.crt' ) && obj . fileExists ( directory + '/agentserver-cert-private.key' ) ) {
var amtConsoleCertificate = obj . fs . readFileSync ( directory + '/amtconsole-cert-public.crt' , 'utf8' ) ;
var amtConsolePrivateKey = obj . fs . readFileSync ( directory + '/amtconsole-cert-private.key' , 'utf8' ) ;
r . console = { cert : amtConsoleCertificate , key : amtConsolePrivateKey } ;
rcount ++ ;
}
2017-11-03 20:01:30 -04:00
// If the swarm server certificate exist, load it (This is an optional certificate)
if ( obj . fileExists ( directory + '/swarmserver-cert-public.crt' ) && obj . fileExists ( directory + '/swarmserver-cert-private.key' ) ) {
var swarmServerCertificate = obj . fs . readFileSync ( directory + '/swarmserver-cert-public.crt' , 'utf8' ) ;
var swarmServerPrivateKey = obj . fs . readFileSync ( directory + '/swarmserver-cert-private.key' , 'utf8' ) ;
r . swarmserver = { cert : swarmServerCertificate , key : swarmServerPrivateKey } ;
}
// If the swarm server root certificate exist, load it (This is an optional certificate)
if ( obj . fileExists ( directory + '/swarmserverroot-cert-public.crt' ) ) {
var swarmServerRootCertificate = obj . fs . readFileSync ( directory + '/swarmserverroot-cert-public.crt' , 'utf8' ) ;
r . swarmserverroot = { cert : swarmServerRootCertificate } ;
}
2017-09-07 19:01:44 -04:00
// If CA certificates are present, load them
var caok , caindex = 1 , calist = [ ] ;
do {
caok = false ;
if ( obj . fileExists ( directory + '/webserver-cert-chain' + caindex + '.crt' ) ) {
var caCertificate = obj . fs . readFileSync ( directory + '/webserver-cert-chain' + caindex + '.crt' , 'utf8' ) ;
calist . push ( caCertificate ) ;
caok = true ;
}
caindex ++ ;
} while ( caok == true ) ;
2018-01-02 19:52:49 -05:00
r . ca = calist ;
2017-08-28 12:27:45 -04:00
// Decode certificate arguments
2017-10-02 17:12:29 -04:00
var commonName = 'un-configured' , country , organization , forceWebCertGen = 0 ;
2017-08-28 12:27:45 -04:00
if ( certargs != undefined ) {
var args = certargs . split ( ',' ) ;
if ( args . length > 0 ) commonName = args [ 0 ] ;
if ( args . length > 1 ) country = args [ 1 ] ;
if ( args . length > 2 ) organization = args [ 2 ] ;
}
2017-10-02 17:12:29 -04:00
2018-01-02 19:52:49 -05:00
// Look for domains that have DNS names and load their certificates
r . dns = { } ;
for ( var i in config . domains ) {
if ( ( i != '' ) && ( config . domains [ i ] != null ) && ( config . domains [ i ] . dns != null ) ) {
var dnsname = config . domains [ i ] . dns ;
if ( args . tlsoffload == true ) {
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
if ( obj . fileExists ( directory + '/webserver-' + i + '-cert-public.crt' ) ) {
r . dns [ i ] = { cert : obj . fs . readFileSync ( directory + '/webserver-' + i + '-cert-public.crt' , 'utf8' ) } ;
config . domains [ i ] . certs = r . dns [ i ] ;
} else {
console . log ( 'WARNING: File "webserver-' + i + '-cert-public.crt" missing, domain "' + i + '" will not work correctly.' ) ;
}
} else {
// If the web certificate already exist, load it. Load both certificate and private key
if ( obj . fileExists ( directory + '/webserver-' + i + '-cert-public.crt' ) && obj . fileExists ( directory + '/webserver-' + i + '-cert-private.key' ) ) {
r . dns [ i ] = { cert : obj . fs . readFileSync ( directory + '/webserver-' + i + '-cert-public.crt' , 'utf8' ) , key : obj . fs . readFileSync ( directory + '/webserver-' + i + '-cert-private.key' , 'utf8' ) } ;
config . domains [ i ] . certs = r . dns [ i ] ;
// If CA certificates are present, load them
var caok , caindex = 1 , calist = [ ] ;
do {
caok = false ;
if ( obj . fileExists ( directory + '/webserver-' + i + '-cert-chain' + caindex + '.crt' ) ) {
var caCertificate = obj . fs . readFileSync ( directory + '/webserver-' + i + '-cert-chain' + caindex + '.crt' , 'utf8' ) ;
calist . push ( caCertificate ) ;
caok = true ;
}
caindex ++ ;
} while ( caok == true ) ;
r . dns [ i ] . ca = calist ;
} else {
rcountmax ++ ; // This certificate must be generated
}
}
}
}
if ( rcount == rcountmax ) {
2017-09-29 17:26:51 -04:00
// Fetch the Intel AMT console name
var consoleCertificate = obj . pki . certificateFromPem ( r . console . cert ) ;
r . AmtConsoleName = consoleCertificate . subject . getField ( 'CN' ) . value ;
2017-10-11 15:20:59 -04:00
// Fetch the Intel AMT MPS common name
var mpsCertificate = obj . pki . certificateFromPem ( r . mps . cert ) ;
r . AmtMpsName = mpsCertificate . subject . getField ( 'CN' ) . value ;
2017-08-28 12:27:45 -04:00
// Fetch the name of the server
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
r . CommonName = webCertificate . subject . getField ( 'CN' ) . value ;
var rootCertificate = obj . pki . certificateFromPem ( r . root . cert ) ;
r . RootName = rootCertificate . subject . getField ( 'CN' ) . value ;
if ( certargs == undefined ) { if ( func != undefined ) { func ( r ) ; } return r } ; // If no certificate arguments are given, keep the certificate
var xcountry , xcountryField = webCertificate . subject . getField ( 'C' ) ;
if ( xcountryField != null ) { xcountry = xcountryField . value ; }
var xorganization , xorganizationField = webCertificate . subject . getField ( 'O' ) ;
if ( xorganizationField != null ) { xorganization = xorganizationField . value ; }
2017-10-11 15:20:59 -04:00
if ( ( r . CommonName == commonName ) && ( xcountry == country ) && ( xorganization == organization ) && ( r . AmtMpsName == commonName ) ) { if ( func != undefined ) { func ( r ) ; } return r ; } else { forceWebCertGen = 1 ; } // If the certificate matches what we want, keep it.
2017-08-28 12:27:45 -04:00
}
2018-01-02 19:52:49 -05:00
console . log ( 'Generating certificates, may take a few minutes...' ) ;
2017-10-18 19:28:05 -04:00
// If a certificate is missing, but web certificate is present and --cert is not used, set the names to be the same as the web certificate
if ( ( certargs == null ) && ( r . web != null ) ) {
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
commonName = webCertificate . subject . getField ( 'CN' ) . value ;
var xcountryField = webCertificate . subject . getField ( 'C' ) ;
if ( xcountryField != null ) { country = xcountryField . value ; }
var xorganizationField = webCertificate . subject . getField ( 'O' ) ;
if ( xorganizationField != null ) { organization = xorganizationField . value ; }
}
2017-08-28 12:27:45 -04:00
var rootCertAndKey , rootCertificate , rootPrivateKey , rootName ;
if ( r . root == undefined ) {
// If the root certificate does not exist, create one
2017-10-18 19:28:05 -04:00
console . log ( 'Generating root certificate...' ) ;
rootCertAndKey = obj . GenerateRootCertificate ( true , 'MeshCentralRoot' , null , null , strongCertificate ) ;
2017-08-28 12:27:45 -04:00
rootCertificate = obj . pki . certificateToPem ( rootCertAndKey . cert ) ;
rootPrivateKey = obj . pki . privateKeyToPem ( rootCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/root-cert-public.crt' , rootCertificate ) ;
obj . fs . writeFileSync ( directory + '/root-cert-private.key' , rootPrivateKey ) ;
} else {
// Keep the root certificate we have
rootCertAndKey = { cert : obj . pki . certificateFromPem ( r . root . cert ) , key : obj . pki . privateKeyFromPem ( r . root . key ) } ;
rootCertificate = r . root . cert
rootPrivateKey = r . root . key
}
var rootName = rootCertAndKey . cert . subject . getField ( 'CN' ) . value ;
// If the web certificate does not exist, create one
var webCertAndKey , webCertificate , webPrivateKey ;
2017-10-11 15:20:59 -04:00
if ( ( r . web == null ) || ( forceWebCertGen == 1 ) ) {
2017-10-18 19:28:05 -04:00
console . log ( 'Generating HTTPS certificate...' ) ;
webCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , commonName , country , organization , null , strongCertificate ) ;
2017-09-29 17:26:51 -04:00
webCertificate = obj . pki . certificateToPem ( webCertAndKey . cert ) ;
webPrivateKey = obj . pki . privateKeyToPem ( webCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/webserver-cert-public.crt' , webCertificate ) ;
obj . fs . writeFileSync ( directory + '/webserver-cert-private.key' , webPrivateKey ) ;
} else {
// Keep the console certificate we have
webCertAndKey = { cert : obj . pki . certificateFromPem ( r . web . cert ) , key : obj . pki . privateKeyFromPem ( r . web . key ) } ;
webCertificate = r . web . cert
webPrivateKey = r . web . key
}
2017-10-18 19:28:05 -04:00
// If the mesh agent server certificate does not exist, create one
var agentCertAndKey , agentCertificate , agentPrivateKey ;
if ( r . agent == null ) {
console . log ( 'Generating MeshAgent certificate...' ) ;
agentCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , true , 'MeshCentralAgentServer' , null , strongCertificate ) ;
agentCertificate = obj . pki . certificateToPem ( agentCertAndKey . cert ) ;
agentPrivateKey = obj . pki . privateKeyToPem ( agentCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/agentserver-cert-public.crt' , agentCertificate ) ;
obj . fs . writeFileSync ( directory + '/agentserver-cert-private.key' , agentPrivateKey ) ;
} else {
// Keep the mesh agent server certificate we have
agentCertAndKey = { cert : obj . pki . certificateFromPem ( r . agent . cert ) , key : obj . pki . privateKeyFromPem ( r . agent . key ) } ;
agentCertificate = r . agent . cert
agentPrivateKey = r . agent . key
}
2017-08-28 12:27:45 -04:00
// If the Intel AMT MPS certificate does not exist, create one
var mpsCertAndKey , mpsCertificate , mpsPrivateKey ;
2017-10-11 15:20:59 -04:00
if ( ( r . mps == null ) || ( forceWebCertGen == 1 ) ) {
2017-10-18 19:28:05 -04:00
console . log ( 'Generating Intel AMT MPS certificate...' ) ;
2017-10-15 02:22:19 -04:00
mpsCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , commonName , country , organization , null , false ) ;
2017-09-29 17:26:51 -04:00
mpsCertificate = obj . pki . certificateToPem ( mpsCertAndKey . cert ) ;
mpsPrivateKey = obj . pki . privateKeyToPem ( mpsCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/mpsserver-cert-public.crt' , mpsCertificate ) ;
obj . fs . writeFileSync ( directory + '/mpsserver-cert-private.key' , mpsPrivateKey ) ;
} else {
// Keep the console certificate we have
mpsCertAndKey = { cert : obj . pki . certificateFromPem ( r . mps . cert ) , key : obj . pki . privateKeyFromPem ( r . mps . key ) } ;
mpsCertificate = r . mps . cert
mpsPrivateKey = r . mps . key
}
// If the Intel AMT console certificate does not exist, create one
2017-10-03 21:31:20 -04:00
var consoleCertAndKey , consoleCertificate , consolePrivateKey , amtConsoleName = 'MeshCentral' ;
2017-10-11 15:20:59 -04:00
if ( r . console == null ) {
2017-10-18 19:28:05 -04:00
console . log ( 'Generating Intel AMT console certificate...' ) ;
2017-10-15 02:22:19 -04:00
consoleCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , amtConsoleName , country , organization , { name : 'extKeyUsage' , clientAuth : true , '2.16.840.1.113741.1.2.1' : true , '2.16.840.1.113741.1.2.2' : true , '2.16.840.1.113741.1.2.3' : true } , false ) ; // Intel AMT Remote, Agent and Activation usages
2017-09-29 17:26:51 -04:00
consoleCertificate = obj . pki . certificateToPem ( consoleCertAndKey . cert ) ;
consolePrivateKey = obj . pki . privateKeyToPem ( consoleCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/amtconsole-cert-public.crt' , consoleCertificate ) ;
obj . fs . writeFileSync ( directory + '/amtconsole-cert-private.key' , consolePrivateKey ) ;
} else {
// Keep the console certificate we have
consoleCertAndKey = { cert : obj . pki . certificateFromPem ( r . console . cert ) , key : obj . pki . privateKeyFromPem ( r . console . key ) } ;
consoleCertificate = r . console . cert
consolePrivateKey = r . console . key
2017-10-03 21:31:20 -04:00
amtConsoleName = consoleCertAndKey . cert . subject . getField ( 'CN' ) . value ;
2017-09-29 17:26:51 -04:00
}
2018-01-02 19:52:49 -05:00
var r = { root : { cert : rootCertificate , key : rootPrivateKey } , web : { cert : webCertificate , key : webPrivateKey } , mps : { cert : mpsCertificate , key : mpsPrivateKey } , agent : { cert : agentCertificate , key : agentPrivateKey } , console : { cert : consoleCertificate , key : consolePrivateKey } , ca : calist , CommonName : commonName , RootName : rootName , AmtConsoleName : amtConsoleName , dns : { } } ;
// Look for domains with DNS names that have no certificates and generated them.
for ( var i in config . domains ) {
if ( ( i != '' ) && ( config . domains [ i ] != null ) && ( config . domains [ i ] . dns != null ) ) {
var dnsname = config . domains [ i ] . dns ;
if ( args . tlsoffload != true ) {
// If the web certificate does not exist, create it
if ( ( obj . fileExists ( directory + '/webserver-' + i + '-cert-public.crt' ) == false ) || ( obj . fileExists ( directory + '/webserver-' + i + '-cert-private.key' ) == false ) ) {
console . log ( 'Generating HTTPS certificate for ' + i + '...' ) ;
var xwebCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , dnsname , country , organization , null , strongCertificate ) ;
var xwebCertificate = obj . pki . certificateToPem ( xwebCertAndKey . cert ) ;
var xwebPrivateKey = obj . pki . privateKeyToPem ( xwebCertAndKey . key ) ;
obj . fs . writeFileSync ( directory + '/webserver-' + i + '-cert-public.crt' , xwebCertificate ) ;
obj . fs . writeFileSync ( directory + '/webserver-' + i + '-cert-private.key' , xwebPrivateKey ) ;
r . dns [ i ] = { cert : xwebCertificate , key : xwebPrivateKey } ;
config . domains [ i ] . certs = r . dns [ i ] ;
// If CA certificates are present, load them
var caok , caindex = 1 , calist = [ ] ;
do {
caok = false ;
if ( obj . fileExists ( directory + '/webserver-' + i + '-cert-chain' + caindex + '.crt' ) ) {
var caCertificate = obj . fs . readFileSync ( directory + '/webserver-' + i + '-cert-chain' + caindex + '.crt' , 'utf8' ) ;
calist . push ( caCertificate ) ;
caok = true ;
}
caindex ++ ;
} while ( caok == true ) ;
r . dns [ i ] . ca = calist ;
}
}
}
}
2017-08-28 12:27:45 -04:00
if ( func != undefined ) { func ( r ) ; }
return r ;
}
2018-01-09 23:13:41 -05:00
// Start accelerators
const fork = require ( 'child_process' ) . fork ;
const program = require ( 'path' ) . resolve ( 'meshaccelerator.js' ) ;
const acceleratorCreateCount = require ( 'os' ) . cpus ( ) . length ;
var freeAccelerators = [ ] ;
// Create a new accelerator module
obj . getAccelerator = function ( ) {
if ( freeAccelerators . length > 0 ) { return freeAccelerators . pop ( ) ; }
if ( acceleratorCreateCount > 0 ) {
var accelerator = fork ( program , [ ] , { stdio : [ 'pipe' , 'pipe' , 'pipe' , 'ipc' ] } ) ;
accelerator . on ( 'message' , function ( message ) { this . func ( message ) ; freeAccelerators . push ( this ) ; } ) ;
if ( obj . acceleratorCertStore != null ) { accelerator . send ( { action : 'setState' , certs : obj . acceleratorCertStore } ) ; }
return accelerator ;
}
return null ;
}
// Set the state of the accelerators. This way, we don't have to send certificate & keys to them each time.
obj . acceleratorCertStore = null ;
obj . acceleratorPerformSetState = function ( certificates ) {
obj . acceleratorCertStore = [ { cert : certificates . agent . cert , key : certificates . agent . key } ] ;
if ( certificates . swarmserver != null ) { obj . acceleratorCertStore . push ( { cert : certificates . swarmserver . cert , key : certificates . swarmserver . key } ) ; }
}
// Perform any RSA signature, just pass in the private key and data.
obj . acceleratorPerformSignature = function ( privatekey , data , func ) {
var acc = obj . getAccelerator ( ) ;
if ( acc == null ) {
// No accelerators available
if ( typeof privatekey == 'number' ) { privatekey = obj . acceleratorCertStore [ privatekey ] . key ; }
const sign = crypto . createSign ( 'SHA384' ) ;
sign . end ( new Buffer ( data , 'binary' ) ) ;
func ( sign . sign ( privatekey ) . toString ( 'binary' ) ) ;
} else {
// Use the accelerator
acc . func = func ;
acc . send ( { action : 'sign' , key : privatekey , data : data } ) ;
}
}
// Perform a RSA signature. This is time consuming
obj . acceleratorPerformVerify = function ( publickey , data , msg , func ) {
console . log ( 'Performing verification...' ) ;
func ( publickey . verify ( data , msg ) ) ;
}
2017-08-28 12:27:45 -04:00
return obj ;
} ;