Skip to content

Commit

Permalink
chore: Clean up flags
Browse files Browse the repository at this point in the history
Run bf <cmd> --help for detailed help text.
  • Loading branch information
ananthb committed Mar 4, 2024
1 parent 6808b44 commit 9776486
Show file tree
Hide file tree
Showing 8 changed files with 36 additions and 39 deletions.
10 changes: 10 additions & 0 deletions certificate.go
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,16 @@ func ParseCertificate(asn1Data []byte) (*Certificate, error) {
// It checks for the correct signature algorithm, identity namespace, and identity.
// On success, it sets the ID, Namespace, and PublicKey fields.
func NewCertificate(cert *x509.Certificate) (*Certificate, error) {
if !cert.BasicConstraintsValid {
return nil, fmt.Errorf("%w: basic constraints not valid", ErrCertificateInvalid)
}

if cert.IsCA {
if cert.KeyUsage&x509.KeyUsageCertSign == 0 {
return nil, fmt.Errorf("%w: certificate is a CA but cannot sign", ErrCertificateInvalid)
}
}

// Check for bifrost signature algorithm
if cert.SignatureAlgorithm != SignatureAlgorithm {
return nil, fmt.Errorf(
Expand Down
8 changes: 4 additions & 4 deletions cmd/bf/ca.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ var (
Name: "host",
Usage: "listen on `HOST`",
Aliases: []string{"H"},
EnvVars: envvarNames("HOST"),
EnvVars: []string{"HOST"},
Value: "localhost",
Destination: &caHost,
Action: func(_ *cli.Context, h string) error {
Expand All @@ -42,7 +42,7 @@ var (
Name: "port",
Usage: "listen on `PORT`",
Aliases: []string{"p"},
EnvVars: envvarNames("PORT"),
EnvVars: []string{"PORT"},
Value: 8008,
Destination: &caPort,
Action: func(_ *cli.Context, p int) error {
Expand All @@ -56,13 +56,13 @@ var (
Name: "web",
Usage: "enable web interface",
Aliases: []string{"w"},
EnvVars: envvarNames("WEB"),
EnvVars: []string{"WEB"},
Destination: &webEnabled,
},
&cli.PathFlag{
Name: "web-static-path",
Usage: "read web static files from `PATH`",
EnvVars: envvarNames("WEB_STATIC_PATH"),
EnvVars: []string{"WEB_STATIC_PATH"},
Destination: &webStaticPath,
},
&cli.BoolFlag{
Expand Down
17 changes: 6 additions & 11 deletions cmd/bf/flags.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,19 +8,14 @@ import (
"github.com/urfave/cli/v2"
)

func envvarNames(s string) []string {
return []string{s, "BF_" + s}
}

// Flags
var (
namespace uuid.UUID
nsFlag = &cli.StringFlag{
Name: "namespace",
Usage: "namespace `UUID`",
Required: true,
Aliases: []string{"ns"},
EnvVars: envvarNames("NS"),
Name: "namespace",
Usage: "namespace `UUID`",
Aliases: []string{"ns"},
EnvVars: []string{"NS", "NAMESPACE"},
Action: func(_ *cli.Context, ns string) (err error) {
namespace, err = uuid.Parse(ns)
return err
Expand All @@ -32,7 +27,7 @@ var (
Name: "ca-certificate",
Usage: "read CA certificate from `FILE`",
Aliases: []string{"ca-cert"},
EnvVars: envvarNames("CA_CERT"),
EnvVars: []string{"CA_CERT", "CA_CRT", "CRT"},
TakesFile: true,
Value: "cert.pem",
Destination: &caCertUri,
Expand All @@ -43,7 +38,7 @@ var (
Name: "ca-private-key",
Usage: "read CA private key from `FILE`",
Aliases: []string{"ca-key"},
EnvVars: envvarNames("CA_PRIVKEY"),
EnvVars: []string{"CA_PRIVKEY", "CA_KEY", "KEY"},
TakesFile: true,
Value: "key.pem",
Destination: &caPrivKeyUri,
Expand Down
11 changes: 1 addition & 10 deletions cmd/bf/id.go
Original file line number Diff line number Diff line change
Expand Up @@ -18,16 +18,7 @@ var (
Name: "identity",
Aliases: []string{"id"},
Flags: []cli.Flag{
&cli.StringFlag{
Name: "namespace",
Usage: "Bifrost Namespace `UUID`",
Aliases: []string{"n", "ns"},
EnvVars: envvarNames("NS"),
Action: func(ctx *cli.Context, s string) (err error) {
bfns, err = uuid.Parse(s)
return
},
},
nsFlag,
},
Action: func(cliCtx *cli.Context) error {
ns, id, err := parseUUIDFromFile(bfns, cliCtx.Args().First())
Expand Down
2 changes: 1 addition & 1 deletion cmd/bf/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ func main() {
&cli.StringFlag{
Name: "log-level",
Aliases: []string{"l"},
EnvVars: envvarNames("LOG_LEVEL"),
EnvVars: []string{"LOG_LEVEL"},
Value: slog.LevelInfo.String(),
Action: func(_ *cli.Context, l string) error {
logLevel := new(slog.LevelVar)
Expand Down
12 changes: 6 additions & 6 deletions cmd/bf/new.go
Original file line number Diff line number Diff line change
Expand Up @@ -96,12 +96,12 @@ var newCmd = &cli.Command{
CommonName: key.UUID(namespace).String(),
Organization: []string{namespace.String()},
},
NotBefore: notBefore,
NotAfter: notAfter,
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
IsCA: true,
BasicConstraintsValid: true,
NotBefore: notBefore,
NotAfter: notAfter,
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
IsCA: true,
MaxPathLenZero: true,
}

certDer, err := x509.CreateCertificate(
Expand Down
4 changes: 2 additions & 2 deletions cmd/bf/proxy.go
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ var (
Name: "host",
Usage: "Listen on `HOST`",
Aliases: []string{"H"},
EnvVars: envvarNames("HOST"),
EnvVars: []string{"HOST"},
Value: "localhost",
Destination: &proxyHost,
Action: func(_ *cli.Context, h string) error {
Expand All @@ -60,7 +60,7 @@ var (
Name: "port",
Usage: "Listen on `PORT`",
Aliases: []string{"p"},
EnvVars: envvarNames("PORT"),
EnvVars: []string{"PORT"},
Value: 8443,
Destination: &proxyPort,
Action: func(_ *cli.Context, p int) error {
Expand Down
11 changes: 6 additions & 5 deletions tinyca/ca_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -226,11 +226,12 @@ func TestCA_ServeHTTP(t *testing.T) {
CommonName: id.String(),
Organization: []string{testns.String()},
},
NotBefore: time.Now(),
NotAfter: time.Now().Add(time.Hour * 24),
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
BasicConstraintsValid: true,
NotBefore: time.Now(),
NotAfter: time.Now().Add(time.Hour * 24),
KeyUsage: x509.KeyUsageKeyEncipherment | x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
IsCA: true,
MaxPathLenZero: true,
}

certDer, err := x509.CreateCertificate(
Expand Down

0 comments on commit 9776486

Please sign in to comment.