mirror of
				https://github.com/coredns/coredns.git
				synced 2025-11-04 03:03:14 -05:00 
			
		
		
		
	* make sure client CA and auth type are set if CA is explicitly specified. added some simple tests to confirm the effect. * test certificates (forgot to add them in the previous commit) * made client auth policy configurable with new client_auth option. README has been updated accordingly. * fix editorial in README
		
			
				
	
	
		
			77 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			77 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package tls
 | 
						|
 | 
						|
import (
 | 
						|
	ctls "crypto/tls"
 | 
						|
 | 
						|
	"github.com/coredns/coredns/core/dnsserver"
 | 
						|
	"github.com/coredns/coredns/plugin"
 | 
						|
	"github.com/coredns/coredns/plugin/pkg/tls"
 | 
						|
 | 
						|
	"github.com/mholt/caddy"
 | 
						|
)
 | 
						|
 | 
						|
func init() {
 | 
						|
	caddy.RegisterPlugin("tls", caddy.Plugin{
 | 
						|
		ServerType: "dns",
 | 
						|
		Action:     setup,
 | 
						|
	})
 | 
						|
}
 | 
						|
 | 
						|
func setup(c *caddy.Controller) error {
 | 
						|
	err := parseTLS(c)
 | 
						|
	if err != nil {
 | 
						|
		return plugin.Error("tls", err)
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func parseTLS(c *caddy.Controller) error {
 | 
						|
	config := dnsserver.GetConfig(c)
 | 
						|
 | 
						|
	if config.TLSConfig != nil {
 | 
						|
		return plugin.Error("tls", c.Errf("TLS already configured for this server instance"))
 | 
						|
	}
 | 
						|
 | 
						|
	for c.Next() {
 | 
						|
		args := c.RemainingArgs()
 | 
						|
		if len(args) < 2 || len(args) > 3 {
 | 
						|
			return plugin.Error("tls", c.ArgErr())
 | 
						|
		}
 | 
						|
		clientAuth := ctls.NoClientCert
 | 
						|
		for c.NextBlock() {
 | 
						|
			switch c.Val() {
 | 
						|
			case "client_auth":
 | 
						|
				authTypeArgs := c.RemainingArgs()
 | 
						|
				if len(authTypeArgs) != 1 {
 | 
						|
					return c.ArgErr()
 | 
						|
				}
 | 
						|
				switch authTypeArgs[0] {
 | 
						|
				case "nocert":
 | 
						|
					clientAuth = ctls.NoClientCert
 | 
						|
				case "request":
 | 
						|
					clientAuth = ctls.RequestClientCert
 | 
						|
				case "require":
 | 
						|
					clientAuth = ctls.RequireAnyClientCert
 | 
						|
				case "verify_if_given":
 | 
						|
					clientAuth = ctls.VerifyClientCertIfGiven
 | 
						|
				case "require_and_verify":
 | 
						|
					clientAuth = ctls.RequireAndVerifyClientCert
 | 
						|
				default:
 | 
						|
					return c.Errf("unknown authentication type '%s'", authTypeArgs[0])
 | 
						|
				}
 | 
						|
			default:
 | 
						|
				return c.Errf("unknown option '%s'", c.Val())
 | 
						|
			}
 | 
						|
		}
 | 
						|
		tls, err := tls.NewTLSConfigFromArgs(args...)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		tls.ClientAuth = clientAuth
 | 
						|
		// NewTLSConfigFromArgs only sets RootCAs, so we need to let ClientCAs refer to it.
 | 
						|
		tls.ClientCAs = tls.RootCAs
 | 
						|
		config.TLSConfig = tls
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 |