189 lines
3.6 KiB
Go
189 lines
3.6 KiB
Go
package store
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"io"
|
|
|
|
"github.com/asdine/storm"
|
|
"github.com/coreos/bbolt"
|
|
)
|
|
|
|
type Interface interface {
|
|
Domain() string
|
|
TLS() tls.Certificate
|
|
TLSConfig() *tls.Config
|
|
|
|
SetDomain(string) error
|
|
SetTLS([]byte, []byte) error
|
|
|
|
CreateAccount(*Account) error
|
|
FindAccount(string) (*Account, error)
|
|
|
|
io.Closer
|
|
}
|
|
|
|
func New(ctx context.Context, filename string) (Interface, error) {
|
|
db, err := storm.Open(filename, storm.BoltOptions(0600, &bolt.Options{}))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
out := &concrete{
|
|
filename: filename,
|
|
storm: db,
|
|
}
|
|
|
|
if err := out.setup(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return out, nil
|
|
}
|
|
|
|
func Init(filename, domain string, certPEM, keyPEM []byte) error {
|
|
db, err := storm.Open(filename, storm.BoltOptions(0600, &bolt.Options{}))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
builder := &concrete{
|
|
filename: filename,
|
|
storm: db,
|
|
}
|
|
|
|
defer builder.Close()
|
|
|
|
if err := builder.SetDomain(domain); err != nil {
|
|
return fmt.Errorf("Couldn't set domain: %v", err)
|
|
}
|
|
|
|
if err := builder.SetTLS(certPEM, keyPEM); err != nil {
|
|
return fmt.Errorf("Couldn't set TLS: %v", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
type concrete struct {
|
|
filename string
|
|
storm *storm.DB
|
|
domainBucket storm.Node
|
|
|
|
// These are persisted in BoltDB, but we might as well keep them in memory
|
|
// for the duration. Calls to SetDomain/SetTLS will invalidate them.
|
|
domain string
|
|
cert tls.Certificate
|
|
}
|
|
|
|
func (c *concrete) Domain() string {
|
|
return c.domain
|
|
}
|
|
|
|
func (c *concrete) TLS() tls.Certificate {
|
|
return c.cert
|
|
}
|
|
|
|
func (c *concrete) TLSConfig() *tls.Config {
|
|
return &tls.Config{
|
|
GetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {
|
|
certCopy := c.TLS()
|
|
|
|
return &certCopy, nil
|
|
},
|
|
|
|
ServerName: c.Domain(),
|
|
}
|
|
}
|
|
|
|
func (c *concrete) SetDomain(domain string) error {
|
|
if err := c.storm.Set("config", "domain", domain); err != nil {
|
|
return err
|
|
}
|
|
|
|
c.domain = domain
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *concrete) SetTLS(certPEM, keyPEM []byte) error {
|
|
cert, err := tls.X509KeyPair(certPEM, keyPEM)
|
|
if err != nil {
|
|
return fmt.Errorf("Couldn't parse data as TLS keypair: %v", err)
|
|
}
|
|
|
|
if cert.PrivateKey == nil {
|
|
return fmt.Errorf("No private key for TLS certificate")
|
|
}
|
|
|
|
domainBucket := c.storm.From("domains").From(c.Domain())
|
|
|
|
tx, err := domainBucket.Begin(true)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := tx.Set("config", "cert", certPEM); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := tx.Set("config", "key", keyPEM); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := tx.Commit(); err != nil {
|
|
return err
|
|
}
|
|
|
|
c.cert = cert
|
|
|
|
return nil
|
|
}
|
|
|
|
func (c *concrete) CreateAccount(a *Account) error {
|
|
return c.storm.Save(a)
|
|
}
|
|
|
|
func (c *concrete) FindAccount(username string) (*Account, error) {
|
|
var a Account
|
|
|
|
return &a, c.storm.One("Username", username, &a)
|
|
}
|
|
|
|
func (c *concrete) Close() error {
|
|
return c.storm.Close()
|
|
}
|
|
|
|
// Bootstraps all cached values from storm
|
|
func (c *concrete) setup() error {
|
|
var domain string
|
|
var keyPEM []byte
|
|
var certPEM []byte
|
|
|
|
if err := c.storm.Get("config", "domain", &domain); err != nil {
|
|
return fmt.Errorf("Couldn't read config/domain: %v", err)
|
|
}
|
|
|
|
domainBucket := c.storm.From("domains").From(domain)
|
|
|
|
if err := domainBucket.Get("config", "cert", &certPEM); err != nil {
|
|
return fmt.Errorf("Couldn't read domains/%s/config/cert: %v", domain, err)
|
|
}
|
|
|
|
if err := domainBucket.Get("config", "key", &keyPEM); err != nil {
|
|
return fmt.Errorf("Couldn't read domains/%s/config/key: %v", domain, err)
|
|
}
|
|
|
|
cert, err := tls.X509KeyPair(certPEM, keyPEM)
|
|
if err != nil {
|
|
return fmt.Errorf("Couldn't parse key and certificate: %v", err)
|
|
}
|
|
|
|
c.domainBucket = domainBucket
|
|
c.domain = domain
|
|
c.cert = cert
|
|
|
|
return nil
|
|
}
|