mirror of
https://github.com/GothenburgBitFactory/taskwarrior.git
synced 2025-07-07 20:06:36 +02:00
Certificates
- Added certificate verification callback.
This commit is contained in:
parent
5a0dfa634c
commit
eda9ac56da
4 changed files with 69 additions and 12 deletions
|
@ -54,6 +54,39 @@ static void gnutls_log_function (int level, const char* message)
|
||||||
std::cout << "c: " << level << " " << message;
|
std::cout << "c: " << level << " " << message;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
|
static int verify_certificate_callback (gnutls_session_t session)
|
||||||
|
{
|
||||||
|
if (trust_override)
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
// Get the hostname from the session.
|
||||||
|
const char* hostname = (const char*) gnutls_session_get_ptr (session);
|
||||||
|
|
||||||
|
// This verification function uses the trusted CAs in the credentials
|
||||||
|
// structure. So you must have installed one or more CA certificates.
|
||||||
|
unsigned int status;
|
||||||
|
int ret = gnutls_certificate_verify_peers3 (session, hostname, &status);
|
||||||
|
if (ret < 0)
|
||||||
|
return GNUTLS_E_CERTIFICATE_ERROR;
|
||||||
|
|
||||||
|
gnutls_certificate_type_t type = gnutls_certificate_type_get (session);
|
||||||
|
gnutls_datum_t out;
|
||||||
|
ret = gnutls_certificate_verification_status_print (status, type, &out, 0);
|
||||||
|
if (ret < 0)
|
||||||
|
return GNUTLS_E_CERTIFICATE_ERROR;
|
||||||
|
|
||||||
|
std::cout << "c: INFO " << out.data << "\n";
|
||||||
|
|
||||||
|
gnutls_free (out.data);
|
||||||
|
|
||||||
|
if (status != 0)
|
||||||
|
return GNUTLS_E_CERTIFICATE_ERROR;
|
||||||
|
|
||||||
|
// Continue handshake.
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
////////////////////////////////////////////////////////////////////////////////
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
TLSClient::TLSClient ()
|
TLSClient::TLSClient ()
|
||||||
: _ca ("")
|
: _ca ("")
|
||||||
|
@ -109,16 +142,26 @@ void TLSClient::trust (bool value)
|
||||||
}
|
}
|
||||||
|
|
||||||
////////////////////////////////////////////////////////////////////////////////
|
////////////////////////////////////////////////////////////////////////////////
|
||||||
void TLSClient::init (const std::string& ca)
|
void TLSClient::init (
|
||||||
|
const std::string& cert,
|
||||||
|
const std::string& key)
|
||||||
{
|
{
|
||||||
_ca = ca;
|
_cert = cert;
|
||||||
File ca_file (_ca);
|
_key = key;
|
||||||
if (!ca_file.exists ())
|
|
||||||
throw std::string (STRING_CMD_SYNC_NO_CA);
|
|
||||||
|
|
||||||
gnutls_global_init ();
|
gnutls_global_init ();
|
||||||
gnutls_certificate_allocate_credentials (&_credentials);
|
gnutls_certificate_allocate_credentials (&_credentials);
|
||||||
gnutls_certificate_set_x509_trust_file (_credentials, _ca.c_str (), GNUTLS_X509_FMT_PEM);
|
|
||||||
|
if (_cert != "" &&
|
||||||
|
gnutls_certificate_set_x509_trust_file (_credentials, _cert.c_str (), GNUTLS_X509_FMT_PEM) < 0)
|
||||||
|
throw std::string ("Missing CA file.");
|
||||||
|
|
||||||
|
if (_cert != "" &&
|
||||||
|
_key != "" &&
|
||||||
|
gnutls_certificate_set_x509_key_file (_credentials, _cert.c_str (), _key.c_str (), GNUTLS_X509_FMT_PEM) < 0)
|
||||||
|
throw std::string ("Missing CERT file.");
|
||||||
|
|
||||||
|
gnutls_certificate_set_verify_function (_credentials, verify_certificate_callback);
|
||||||
gnutls_init (&_session, GNUTLS_CLIENT);
|
gnutls_init (&_session, GNUTLS_CLIENT);
|
||||||
|
|
||||||
// Use default priorities.
|
// Use default priorities.
|
||||||
|
|
|
@ -40,7 +40,7 @@ public:
|
||||||
void limit (int);
|
void limit (int);
|
||||||
void debug (int);
|
void debug (int);
|
||||||
void trust (bool);
|
void trust (bool);
|
||||||
void init (const std::string&);
|
void init (const std::string&, const std::string&);
|
||||||
void connect (const std::string&, const std::string&);
|
void connect (const std::string&, const std::string&);
|
||||||
void bye ();
|
void bye ();
|
||||||
|
|
||||||
|
@ -49,6 +49,8 @@ public:
|
||||||
|
|
||||||
private:
|
private:
|
||||||
std::string _ca;
|
std::string _ca;
|
||||||
|
std::string _cert;
|
||||||
|
std::string _key;
|
||||||
gnutls_certificate_credentials_t _credentials;
|
gnutls_certificate_credentials_t _credentials;
|
||||||
gnutls_session_t _session;
|
gnutls_session_t _session;
|
||||||
int _socket;
|
int _socket;
|
||||||
|
|
|
@ -88,10 +88,21 @@ int CmdSync::execute (std::string& output)
|
||||||
if (credentials.size () != 3)
|
if (credentials.size () != 3)
|
||||||
throw std::string (STRING_CMD_SYNC_BAD_CRED);
|
throw std::string (STRING_CMD_SYNC_BAD_CRED);
|
||||||
|
|
||||||
|
bool trust = context.config.getBoolean ("taskd.trust");
|
||||||
|
/*
|
||||||
|
File ca (context.config.get ("taskd.ca"));
|
||||||
|
if (ca._data != "" && ! ca.exists ())
|
||||||
|
throw std::string (STRING_CMD_SYNC_BAD_CA);
|
||||||
|
*/
|
||||||
|
|
||||||
File certificate (context.config.get ("taskd.certificate"));
|
File certificate (context.config.get ("taskd.certificate"));
|
||||||
if (! certificate.exists ())
|
if (! certificate.exists ())
|
||||||
throw std::string (STRING_CMD_SYNC_BAD_CERT);
|
throw std::string (STRING_CMD_SYNC_BAD_CERT);
|
||||||
|
|
||||||
|
File key (context.config.get ("taskd.key"));
|
||||||
|
if (! key.exists ())
|
||||||
|
throw std::string (STRING_CMD_SYNC_BAD_KEY);
|
||||||
|
|
||||||
// If this is a first-time initialization, send pending.data, not
|
// If this is a first-time initialization, send pending.data, not
|
||||||
// backlog.data.
|
// backlog.data.
|
||||||
std::string payload = "";
|
std::string payload = "";
|
||||||
|
@ -146,7 +157,7 @@ int CmdSync::execute (std::string& output)
|
||||||
signal (SIGUSR2, SIG_IGN);
|
signal (SIGUSR2, SIG_IGN);
|
||||||
|
|
||||||
Msg response;
|
Msg response;
|
||||||
if (send (connection, certificate._data, request, response))
|
if (send (connection, certificate._data, key._data, trust, request, response))
|
||||||
{
|
{
|
||||||
std::string code = response.get ("code");
|
std::string code = response.get ("code");
|
||||||
if (code == "200")
|
if (code == "200")
|
||||||
|
@ -304,6 +315,8 @@ int CmdSync::execute (std::string& output)
|
||||||
bool CmdSync::send (
|
bool CmdSync::send (
|
||||||
const std::string& to,
|
const std::string& to,
|
||||||
const std::string& certificate,
|
const std::string& certificate,
|
||||||
|
const std::string& key,
|
||||||
|
bool trust,
|
||||||
const Msg& request,
|
const Msg& request,
|
||||||
Msg& response)
|
Msg& response)
|
||||||
{
|
{
|
||||||
|
@ -315,14 +328,13 @@ bool CmdSync::send (
|
||||||
std::string server = to.substr (0, colon);
|
std::string server = to.substr (0, colon);
|
||||||
std::string port = to.substr (colon + 1);
|
std::string port = to.substr (colon + 1);
|
||||||
|
|
||||||
File cert (certificate);
|
|
||||||
|
|
||||||
try
|
try
|
||||||
{
|
{
|
||||||
// A very basic TLS client, with X.509 authentication.
|
// A very basic TLS client, with X.509 authentication.
|
||||||
TLSClient client;
|
TLSClient client;
|
||||||
client.debug (context.config.getInteger ("debug.tls"));
|
client.debug (context.config.getInteger ("debug.tls"));
|
||||||
client.init (cert);
|
client.trust (trust);
|
||||||
|
client.init (certificate, key);
|
||||||
client.connect (server, port);
|
client.connect (server, port);
|
||||||
|
|
||||||
client.send (request.serialize () + "\n");
|
client.send (request.serialize () + "\n");
|
||||||
|
|
|
@ -39,7 +39,7 @@ public:
|
||||||
int execute (std::string&);
|
int execute (std::string&);
|
||||||
|
|
||||||
private:
|
private:
|
||||||
bool send (const std::string&, const std::string&, const Msg&, Msg&);
|
bool send (const std::string&, const std::string&, const std::string&, bool, const Msg&, Msg&);
|
||||||
};
|
};
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue