Files
cgrates/config/tlscfg.go
2021-09-20 10:45:14 +02:00

141 lines
4.0 KiB
Go

/*
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
Copyright (C) ITsysCOM GmbH
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>
*/
package config
import (
"github.com/cgrates/birpc/context"
"github.com/cgrates/cgrates/utils"
)
// TLSCfg is the configuration for tls
type TLSCfg struct {
ServerCerificate string
ServerKey string
ServerPolicy int
ServerName string
ClientCerificate string
ClientKey string
CaCertificate string
}
// loadTLSCgrCfg loads the Tls section of the configuration
func (tls *TLSCfg) Load(ctx *context.Context, jsnCfg ConfigDB, _ *CGRConfig) (err error) {
jsnTLSCgrCfg := new(TlsJsonCfg)
if err = jsnCfg.GetSection(ctx, TlsJSON, jsnTLSCgrCfg); err != nil {
return
}
return tls.loadFromJSONCfg(jsnTLSCgrCfg)
}
func (tls *TLSCfg) loadFromJSONCfg(jsnCfg *TlsJsonCfg) (err error) {
if jsnCfg == nil {
return nil
}
if jsnCfg.Server_certificate != nil {
tls.ServerCerificate = *jsnCfg.Server_certificate
}
if jsnCfg.Server_key != nil {
tls.ServerKey = *jsnCfg.Server_key
}
if jsnCfg.Client_certificate != nil {
tls.ClientCerificate = *jsnCfg.Client_certificate
}
if jsnCfg.Client_key != nil {
tls.ClientKey = *jsnCfg.Client_key
}
if jsnCfg.Ca_certificate != nil {
tls.CaCertificate = *jsnCfg.Ca_certificate
}
if jsnCfg.Server_name != nil {
tls.ServerName = *jsnCfg.Server_name
}
if jsnCfg.Server_policy != nil {
tls.ServerPolicy = *jsnCfg.Server_policy
}
return
}
// AsMapInterface returns the config as a map[string]interface{}
func (tls TLSCfg) AsMapInterface(string) interface{} {
return map[string]interface{}{
utils.ServerCerificateCfg: tls.ServerCerificate,
utils.ServerKeyCfg: tls.ServerKey,
utils.ServerPolicyCfg: tls.ServerPolicy,
utils.ServerNameCfg: tls.ServerName,
utils.ClientCerificateCfg: tls.ClientCerificate,
utils.ClientKeyCfg: tls.ClientKey,
utils.CaCertificateCfg: tls.CaCertificate,
}
}
func (TLSCfg) SName() string { return TlsJSON }
func (tls TLSCfg) CloneSection() Section { return tls.Clone() }
// Clone returns a deep copy of TLSCfg
func (tls TLSCfg) Clone() *TLSCfg {
return &TLSCfg{
ServerCerificate: tls.ServerCerificate,
ServerKey: tls.ServerKey,
ServerPolicy: tls.ServerPolicy,
ServerName: tls.ServerName,
ClientCerificate: tls.ClientCerificate,
ClientKey: tls.ClientKey,
CaCertificate: tls.CaCertificate,
}
}
type TlsJsonCfg struct {
Server_certificate *string
Server_key *string
Server_policy *int
Server_name *string
Client_certificate *string
Client_key *string
Ca_certificate *string
}
func diffTlsJsonCfg(d *TlsJsonCfg, v1, v2 *TLSCfg) *TlsJsonCfg {
if d == nil {
d = new(TlsJsonCfg)
}
if v2.ServerCerificate != v1.ServerCerificate {
d.Server_certificate = utils.StringPointer(v2.ServerCerificate)
}
if v2.ServerKey != v1.ServerKey {
d.Server_key = utils.StringPointer(v2.ServerKey)
}
if v2.ServerPolicy != v1.ServerPolicy {
d.Server_policy = utils.IntPointer(v2.ServerPolicy)
}
if v2.ServerName != v1.ServerName {
d.Server_name = utils.StringPointer(v2.ServerName)
}
if v2.ClientCerificate != v1.ClientCerificate {
d.Client_certificate = utils.StringPointer(v2.ClientCerificate)
}
if v2.ClientKey != v1.ClientKey {
d.Client_key = utils.StringPointer(v2.ClientKey)
}
if v2.CaCertificate != v1.CaCertificate {
d.Ca_certificate = utils.StringPointer(v2.CaCertificate)
}
return d
}