mirror of
https://github.com/cgrates/cgrates.git
synced 2026-02-12 18:46:24 +05:00
141 lines
4.0 KiB
Go
141 lines
4.0 KiB
Go
/*
|
|
Real-time Online/Offline Charging System (OCS) for Telecom & ISP environments
|
|
Copyright (C) ITsysCOM GmbH
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
*/
|
|
|
|
package config
|
|
|
|
import (
|
|
"github.com/cgrates/birpc/context"
|
|
"github.com/cgrates/cgrates/utils"
|
|
)
|
|
|
|
// TLSCfg is the configuration for tls
|
|
type TLSCfg struct {
|
|
ServerCerificate string
|
|
ServerKey string
|
|
ServerPolicy int
|
|
ServerName string
|
|
ClientCerificate string
|
|
ClientKey string
|
|
CaCertificate string
|
|
}
|
|
|
|
// loadTLSCgrCfg loads the Tls section of the configuration
|
|
func (tls *TLSCfg) Load(ctx *context.Context, jsnCfg ConfigDB, _ *CGRConfig) (err error) {
|
|
jsnTLSCgrCfg := new(TlsJsonCfg)
|
|
if err = jsnCfg.GetSection(ctx, TlsJSON, jsnTLSCgrCfg); err != nil {
|
|
return
|
|
}
|
|
return tls.loadFromJSONCfg(jsnTLSCgrCfg)
|
|
}
|
|
|
|
func (tls *TLSCfg) loadFromJSONCfg(jsnCfg *TlsJsonCfg) (err error) {
|
|
if jsnCfg == nil {
|
|
return nil
|
|
}
|
|
if jsnCfg.Server_certificate != nil {
|
|
tls.ServerCerificate = *jsnCfg.Server_certificate
|
|
}
|
|
if jsnCfg.Server_key != nil {
|
|
tls.ServerKey = *jsnCfg.Server_key
|
|
}
|
|
if jsnCfg.Client_certificate != nil {
|
|
tls.ClientCerificate = *jsnCfg.Client_certificate
|
|
}
|
|
if jsnCfg.Client_key != nil {
|
|
tls.ClientKey = *jsnCfg.Client_key
|
|
}
|
|
if jsnCfg.Ca_certificate != nil {
|
|
tls.CaCertificate = *jsnCfg.Ca_certificate
|
|
}
|
|
if jsnCfg.Server_name != nil {
|
|
tls.ServerName = *jsnCfg.Server_name
|
|
}
|
|
if jsnCfg.Server_policy != nil {
|
|
tls.ServerPolicy = *jsnCfg.Server_policy
|
|
}
|
|
return
|
|
}
|
|
|
|
// AsMapInterface returns the config as a map[string]interface{}
|
|
func (tls TLSCfg) AsMapInterface(string) interface{} {
|
|
return map[string]interface{}{
|
|
utils.ServerCerificateCfg: tls.ServerCerificate,
|
|
utils.ServerKeyCfg: tls.ServerKey,
|
|
utils.ServerPolicyCfg: tls.ServerPolicy,
|
|
utils.ServerNameCfg: tls.ServerName,
|
|
utils.ClientCerificateCfg: tls.ClientCerificate,
|
|
utils.ClientKeyCfg: tls.ClientKey,
|
|
utils.CaCertificateCfg: tls.CaCertificate,
|
|
}
|
|
|
|
}
|
|
|
|
func (TLSCfg) SName() string { return TlsJSON }
|
|
func (tls TLSCfg) CloneSection() Section { return tls.Clone() }
|
|
|
|
// Clone returns a deep copy of TLSCfg
|
|
func (tls TLSCfg) Clone() *TLSCfg {
|
|
return &TLSCfg{
|
|
ServerCerificate: tls.ServerCerificate,
|
|
ServerKey: tls.ServerKey,
|
|
ServerPolicy: tls.ServerPolicy,
|
|
ServerName: tls.ServerName,
|
|
ClientCerificate: tls.ClientCerificate,
|
|
ClientKey: tls.ClientKey,
|
|
CaCertificate: tls.CaCertificate,
|
|
}
|
|
}
|
|
|
|
type TlsJsonCfg struct {
|
|
Server_certificate *string
|
|
Server_key *string
|
|
Server_policy *int
|
|
Server_name *string
|
|
Client_certificate *string
|
|
Client_key *string
|
|
Ca_certificate *string
|
|
}
|
|
|
|
func diffTlsJsonCfg(d *TlsJsonCfg, v1, v2 *TLSCfg) *TlsJsonCfg {
|
|
if d == nil {
|
|
d = new(TlsJsonCfg)
|
|
}
|
|
if v2.ServerCerificate != v1.ServerCerificate {
|
|
d.Server_certificate = utils.StringPointer(v2.ServerCerificate)
|
|
}
|
|
if v2.ServerKey != v1.ServerKey {
|
|
d.Server_key = utils.StringPointer(v2.ServerKey)
|
|
}
|
|
if v2.ServerPolicy != v1.ServerPolicy {
|
|
d.Server_policy = utils.IntPointer(v2.ServerPolicy)
|
|
}
|
|
if v2.ServerName != v1.ServerName {
|
|
d.Server_name = utils.StringPointer(v2.ServerName)
|
|
}
|
|
if v2.ClientCerificate != v1.ClientCerificate {
|
|
d.Client_certificate = utils.StringPointer(v2.ClientCerificate)
|
|
}
|
|
if v2.ClientKey != v1.ClientKey {
|
|
d.Client_key = utils.StringPointer(v2.ClientKey)
|
|
}
|
|
if v2.CaCertificate != v1.CaCertificate {
|
|
d.Ca_certificate = utils.StringPointer(v2.CaCertificate)
|
|
}
|
|
return d
|
|
}
|