support x.509

This commit is contained in:
ctlove0523 2021-12-27 21:54:37 +08:00
parent b3561bfbf4
commit 6376cbfa2a
1 changed files with 54 additions and 11 deletions

View File

@ -60,6 +60,11 @@ const (
PlatformEventToDeviceTopic string = "$oc/devices/{device_id}/sys/events/down" PlatformEventToDeviceTopic string = "$oc/devices/{device_id}/sys/events/down"
) )
const (
AUTH_TYPE_PASSWORD uint8 = 0
AUTH_TYPE_X509 uint8 = 1
)
type DeviceConfig struct { type DeviceConfig struct {
Id string Id string
Password string Password string
@ -117,10 +122,13 @@ func (lcc *LogCollectionConfig) getEndTime() string {
} }
type baseIotDevice struct { type baseIotDevice struct {
Id string Id string // 设备Id平台又称为deviceId
Password string Password string // 设备密码
AuthType uint8 // 鉴权类型0密码认证1x.509证书认证
ServerCaCert []byte // 平台CA证书
ClientCertFile string // 设备证书路径
ClientCetKeyFile string
Servers string Servers string
ServerCert []byte
Client mqtt.Client Client mqtt.Client
commandHandlers []CommandHandler commandHandlers []CommandHandler
messageHandlers []MessageHandler messageHandlers []MessageHandler
@ -167,18 +175,53 @@ func (device *baseIotDevice) Init() bool {
options.SetConnectTimeout(2 * time.Second) options.SetConnectTimeout(2 * time.Second)
if strings.Contains(device.Servers, "tls") || strings.Contains(device.Servers, "ssl") { if strings.Contains(device.Servers, "tls") || strings.Contains(device.Servers, "ssl") {
glog.Infof("server support tls connection") glog.Infof("server support tls connection")
if device.ServerCert != nil {
certPool := x509.NewCertPool() // 设备使用x.509证书认证
certPool.AppendCertsFromPEM(device.ServerCert) if device.AuthType == AUTH_TYPE_X509 {
options.SetTLSConfig(&tls.Config{ if len(device.ServerCaCert) == 0 || len(device.ClientCertFile) == 0 || len(device.ClientCetKeyFile) == 0 {
RootCAs: certPool, glog.Error("device use x.509 auth but not set cert")
InsecureSkipVerify: false, panic("not set cert")
}) }
} else {
serverCaPool := x509.NewCertPool()
serverCaPool.AppendCertsFromPEM(device.ServerCaCert)
deviceCert, err := tls.LoadX509KeyPair(device.ClientCertFile, device.ClientCetKeyFile)
if err != nil {
glog.Error("load device cert failed")
panic("load device cert failed")
}
var clientCerts []tls.Certificate
clientCerts = append(clientCerts, deviceCert)
cipherSuites := []uint16{
tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
tls.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
tls.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
tls.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
}
tlsConfig := &tls.Config{
RootCAs: serverCaPool,
Certificates: clientCerts,
InsecureSkipVerify: true,
MaxVersion: tls.VersionTLS12,
MinVersion: tls.VersionTLS12,
CipherSuites: cipherSuites,
}
options.SetTLSConfig(tlsConfig)
}
if device.AuthType == 0 {
options.SetTLSConfig(&tls.Config{ options.SetTLSConfig(&tls.Config{
InsecureSkipVerify: true, InsecureSkipVerify: true,
}) })
} }
} else { } else {
options.SetTLSConfig(&tls.Config{ options.SetTLSConfig(&tls.Config{
InsecureSkipVerify: true, InsecureSkipVerify: true,