mirror of
https://github.com/v2fly/v2ray-core.git
synced 2024-12-04 01:06:30 -05:00
147 lines
3.4 KiB
Go
147 lines
3.4 KiB
Go
package tls
|
|
|
|
import (
|
|
"context"
|
|
"crypto/x509"
|
|
"encoding/json"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/v2fly/v2ray-core/v5/common"
|
|
"github.com/v2fly/v2ray-core/v5/common/protocol/tls/cert"
|
|
"github.com/v2fly/v2ray-core/v5/common/task"
|
|
"github.com/v2fly/v2ray-core/v5/main/commands/base"
|
|
)
|
|
|
|
// cmdCert is the tls cert command
|
|
var cmdCert = &base.Command{
|
|
UsageLine: "{{.Exec}} tls cert [--ca] [--domain=v2fly.org] [--expire=240h]",
|
|
Short: "Generate TLS certificates",
|
|
Long: `
|
|
Generate TLS certificates.
|
|
|
|
Arguments:
|
|
|
|
-domain <domain_name>
|
|
The domain name for the certificate.
|
|
|
|
-name <common name>
|
|
The common name of this certificate
|
|
|
|
-org <organization>
|
|
The organization name for the certificate.
|
|
|
|
-ca
|
|
The certificate is a CA
|
|
|
|
-json
|
|
To output certificate to JSON
|
|
|
|
-file <path>
|
|
The certificate path to save.
|
|
|
|
-expire <days>
|
|
Expire days of the certificate. Default 90 days.
|
|
`,
|
|
}
|
|
|
|
func init() {
|
|
cmdCert.Run = executeCert // break init loop
|
|
}
|
|
|
|
var (
|
|
certDomainNames stringList
|
|
_ = func() bool {
|
|
cmdCert.Flag.Var(&certDomainNames, "domain", "Domain name for the certificate")
|
|
return true
|
|
}()
|
|
|
|
certCommonName = cmdCert.Flag.String("name", "V2Ray Inc", "")
|
|
certOrganization = cmdCert.Flag.String("org", "V2Ray Inc", "")
|
|
certIsCA = cmdCert.Flag.Bool("ca", false, "")
|
|
certJSONOutput = cmdCert.Flag.Bool("json", true, "")
|
|
certFileOutput = cmdCert.Flag.String("file", "", "")
|
|
certExpire = cmdCert.Flag.Uint("expire", 90, "")
|
|
)
|
|
|
|
func executeCert(cmd *base.Command, args []string) {
|
|
var opts []cert.Option
|
|
if *certIsCA {
|
|
opts = append(opts, cert.Authority(*certIsCA))
|
|
opts = append(opts, cert.KeyUsage(x509.KeyUsageCertSign|x509.KeyUsageKeyEncipherment|x509.KeyUsageDigitalSignature))
|
|
}
|
|
|
|
opts = append(opts, cert.NotAfter(time.Now().Add(time.Duration(*certExpire)*time.Hour*24)))
|
|
opts = append(opts, cert.CommonName(*certCommonName))
|
|
if len(certDomainNames) > 0 {
|
|
opts = append(opts, cert.DNSNames(certDomainNames...))
|
|
}
|
|
opts = append(opts, cert.Organization(*certOrganization))
|
|
|
|
cert, err := cert.Generate(nil, opts...)
|
|
if err != nil {
|
|
base.Fatalf("failed to generate TLS certificate: %s", err)
|
|
}
|
|
|
|
if *certJSONOutput {
|
|
printJSON(cert)
|
|
}
|
|
|
|
if len(*certFileOutput) > 0 {
|
|
if err := printFile(cert, *certFileOutput); err != nil {
|
|
base.Fatalf("failed to save file: %s", err)
|
|
}
|
|
}
|
|
}
|
|
|
|
func printJSON(certificate *cert.Certificate) {
|
|
certPEM, keyPEM := certificate.ToPEM()
|
|
jCert := &jsonCert{
|
|
Certificate: strings.Split(strings.TrimSpace(string(certPEM)), "\n"),
|
|
Key: strings.Split(strings.TrimSpace(string(keyPEM)), "\n"),
|
|
}
|
|
content, err := json.MarshalIndent(jCert, "", " ")
|
|
common.Must(err)
|
|
os.Stdout.Write(content)
|
|
os.Stdout.WriteString("\n")
|
|
}
|
|
|
|
func writeFile(content []byte, name string) error {
|
|
f, err := os.Create(name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer f.Close()
|
|
|
|
return common.Error2(f.Write(content))
|
|
}
|
|
|
|
func printFile(certificate *cert.Certificate, name string) error {
|
|
certPEM, keyPEM := certificate.ToPEM()
|
|
return task.Run(context.Background(), func() error {
|
|
return writeFile(certPEM, name+"_cert.pem")
|
|
}, func() error {
|
|
return writeFile(keyPEM, name+"_key.pem")
|
|
})
|
|
}
|
|
|
|
type stringList []string
|
|
|
|
func (l *stringList) String() string {
|
|
return "String list"
|
|
}
|
|
|
|
func (l *stringList) Set(v string) error {
|
|
if v == "" {
|
|
base.Fatalf("empty value")
|
|
}
|
|
*l = append(*l, v)
|
|
return nil
|
|
}
|
|
|
|
type jsonCert struct {
|
|
Certificate []string `json:"certificate"`
|
|
Key []string `json:"key"`
|
|
}
|