234 lines
		
	
	
		
			8.8 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
			
		
		
	
	
			234 lines
		
	
	
		
			8.8 KiB
		
	
	
	
		
			PHP
		
	
	
	
	
	
<?php
 | 
						|
 | 
						|
namespace App\Helpers;
 | 
						|
 | 
						|
use App\Models\Server;
 | 
						|
use App\Models\SslCertificate;
 | 
						|
use Carbon\CarbonImmutable;
 | 
						|
 | 
						|
class SslHelper
 | 
						|
{
 | 
						|
    private const DEFAULT_ORGANIZATION_NAME = 'Coolify';
 | 
						|
 | 
						|
    private const DEFAULT_COUNTRY_NAME = 'XX';
 | 
						|
 | 
						|
    private const DEFAULT_STATE_NAME = 'Default';
 | 
						|
 | 
						|
    public static function generateSslCertificate(
 | 
						|
        string $commonName,
 | 
						|
        array $subjectAlternativeNames = [],
 | 
						|
        ?string $resourceType = null,
 | 
						|
        ?int $resourceId = null,
 | 
						|
        ?int $serverId = null,
 | 
						|
        int $validityDays = 365,
 | 
						|
        ?string $caCert = null,
 | 
						|
        ?string $caKey = null,
 | 
						|
        bool $isCaCertificate = false,
 | 
						|
        ?string $configurationDir = null,
 | 
						|
        ?string $mountPath = null,
 | 
						|
        bool $isPemKeyFileRequired = false,
 | 
						|
    ): SslCertificate {
 | 
						|
        $organizationName = self::DEFAULT_ORGANIZATION_NAME;
 | 
						|
        $countryName = self::DEFAULT_COUNTRY_NAME;
 | 
						|
        $stateName = self::DEFAULT_STATE_NAME;
 | 
						|
 | 
						|
        try {
 | 
						|
            $privateKey = openssl_pkey_new([
 | 
						|
                'private_key_type' => OPENSSL_KEYTYPE_EC,
 | 
						|
                'curve_name' => 'secp521r1',
 | 
						|
            ]);
 | 
						|
 | 
						|
            if ($privateKey === false) {
 | 
						|
                throw new \RuntimeException('Failed to generate private key: '.openssl_error_string());
 | 
						|
            }
 | 
						|
 | 
						|
            if (! openssl_pkey_export($privateKey, $privateKeyStr)) {
 | 
						|
                throw new \RuntimeException('Failed to export private key: '.openssl_error_string());
 | 
						|
            }
 | 
						|
 | 
						|
            if (! is_null($serverId) && ! $isCaCertificate) {
 | 
						|
                $server = Server::find($serverId);
 | 
						|
                if ($server) {
 | 
						|
                    $ip = $server->getIp;
 | 
						|
                    if ($ip) {
 | 
						|
                        $type = filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4 | FILTER_FLAG_IPV6)
 | 
						|
                            ? 'IP'
 | 
						|
                            : 'DNS';
 | 
						|
                        $subjectAlternativeNames = array_unique(
 | 
						|
                            array_merge($subjectAlternativeNames, ["$type:$ip"])
 | 
						|
                        );
 | 
						|
                    }
 | 
						|
                }
 | 
						|
            }
 | 
						|
 | 
						|
            $basicConstraints = $isCaCertificate ? 'critical, CA:TRUE, pathlen:0' : 'critical, CA:FALSE';
 | 
						|
            $keyUsage = $isCaCertificate ? 'critical, keyCertSign, cRLSign' : 'critical, digitalSignature, keyAgreement';
 | 
						|
 | 
						|
            $subjectAltNameSection = '';
 | 
						|
            $extendedKeyUsageSection = '';
 | 
						|
 | 
						|
            if (! $isCaCertificate) {
 | 
						|
                $extendedKeyUsageSection = "\nextendedKeyUsage = serverAuth, clientAuth";
 | 
						|
 | 
						|
                $subjectAlternativeNames = array_values(
 | 
						|
                    array_unique(
 | 
						|
                        array_merge(["DNS:$commonName"], $subjectAlternativeNames)
 | 
						|
                    )
 | 
						|
                );
 | 
						|
 | 
						|
                $formattedSubjectAltNames = array_map(
 | 
						|
                    function ($index, $san) {
 | 
						|
                        [$type, $value] = explode(':', $san, 2);
 | 
						|
 | 
						|
                        return "{$type}.".($index + 1)." = $value";
 | 
						|
                    },
 | 
						|
                    array_keys($subjectAlternativeNames),
 | 
						|
                    $subjectAlternativeNames
 | 
						|
                );
 | 
						|
 | 
						|
                $subjectAltNameSection = "subjectAltName = @subject_alt_names\n\n[ subject_alt_names ]\n"
 | 
						|
                    .implode("\n", $formattedSubjectAltNames);
 | 
						|
            }
 | 
						|
 | 
						|
            $config = <<<CONF
 | 
						|
                [ req ]
 | 
						|
                prompt = no
 | 
						|
                distinguished_name = distinguished_name
 | 
						|
                req_extensions = req_ext
 | 
						|
 | 
						|
                [ distinguished_name ]
 | 
						|
                CN = $commonName
 | 
						|
                
 | 
						|
                [ req_ext ]
 | 
						|
                basicConstraints = $basicConstraints
 | 
						|
                keyUsage = $keyUsage
 | 
						|
                {$extendedKeyUsageSection}
 | 
						|
 | 
						|
                [ v3_req ]
 | 
						|
                basicConstraints = $basicConstraints
 | 
						|
                keyUsage = $keyUsage
 | 
						|
                {$extendedKeyUsageSection}
 | 
						|
                subjectKeyIdentifier = hash
 | 
						|
                {$subjectAltNameSection}
 | 
						|
            CONF;
 | 
						|
 | 
						|
            $tempConfig = tmpfile();
 | 
						|
            fwrite($tempConfig, $config);
 | 
						|
            $tempConfigPath = stream_get_meta_data($tempConfig)['uri'];
 | 
						|
 | 
						|
            $csr = openssl_csr_new([
 | 
						|
                'commonName' => $commonName,
 | 
						|
                'organizationName' => $organizationName,
 | 
						|
                'countryName' => $countryName,
 | 
						|
                'stateOrProvinceName' => $stateName,
 | 
						|
            ], $privateKey, [
 | 
						|
                'digest_alg' => 'sha512',
 | 
						|
                'config' => $tempConfigPath,
 | 
						|
                'req_extensions' => 'req_ext',
 | 
						|
            ]);
 | 
						|
 | 
						|
            if ($csr === false) {
 | 
						|
                throw new \RuntimeException('Failed to generate CSR: '.openssl_error_string());
 | 
						|
            }
 | 
						|
 | 
						|
            $certificate = openssl_csr_sign(
 | 
						|
                $csr,
 | 
						|
                $caCert ?? null,
 | 
						|
                $caKey ?? $privateKey,
 | 
						|
                $validityDays,
 | 
						|
                [
 | 
						|
                    'digest_alg' => 'sha512',
 | 
						|
                    'config' => $tempConfigPath,
 | 
						|
                    'x509_extensions' => 'v3_req',
 | 
						|
                ],
 | 
						|
                random_int(1, PHP_INT_MAX)
 | 
						|
            );
 | 
						|
 | 
						|
            if ($certificate === false) {
 | 
						|
                throw new \RuntimeException('Failed to sign certificate: '.openssl_error_string());
 | 
						|
            }
 | 
						|
 | 
						|
            if (! openssl_x509_export($certificate, $certificateStr)) {
 | 
						|
                throw new \RuntimeException('Failed to export certificate: '.openssl_error_string());
 | 
						|
            }
 | 
						|
 | 
						|
            SslCertificate::query()
 | 
						|
                ->where('resource_type', $resourceType)
 | 
						|
                ->where('resource_id', $resourceId)
 | 
						|
                ->where('server_id', $serverId)
 | 
						|
                ->delete();
 | 
						|
 | 
						|
            $sslCertificate = SslCertificate::create([
 | 
						|
                'ssl_certificate' => $certificateStr,
 | 
						|
                'ssl_private_key' => $privateKeyStr,
 | 
						|
                'resource_type' => $resourceType,
 | 
						|
                'resource_id' => $resourceId,
 | 
						|
                'server_id' => $serverId,
 | 
						|
                'configuration_dir' => $configurationDir,
 | 
						|
                'mount_path' => $mountPath,
 | 
						|
                'valid_until' => CarbonImmutable::now()->addDays($validityDays),
 | 
						|
                'is_ca_certificate' => $isCaCertificate,
 | 
						|
                'common_name' => $commonName,
 | 
						|
                'subject_alternative_names' => $subjectAlternativeNames,
 | 
						|
            ]);
 | 
						|
 | 
						|
            if ($configurationDir && $mountPath && $resourceType && $resourceId) {
 | 
						|
                $model = app($resourceType)->find($resourceId);
 | 
						|
 | 
						|
                $model->fileStorages()
 | 
						|
                    ->where('resource_type', $model->getMorphClass())
 | 
						|
                    ->where('resource_id', $model->id)
 | 
						|
                    ->get()
 | 
						|
                    ->filter(function ($storage) use ($mountPath) {
 | 
						|
                        return in_array($storage->mount_path, [
 | 
						|
                            $mountPath.'/server.crt',
 | 
						|
                            $mountPath.'/server.key',
 | 
						|
                            $mountPath.'/server.pem',
 | 
						|
                        ]);
 | 
						|
                    })
 | 
						|
                    ->each(function ($storage) {
 | 
						|
                        $storage->delete();
 | 
						|
                    });
 | 
						|
 | 
						|
                if ($isPemKeyFileRequired) {
 | 
						|
                    $model->fileStorages()->create([
 | 
						|
                        'fs_path' => $configurationDir.'/ssl/server.pem',
 | 
						|
                        'mount_path' => $mountPath.'/server.pem',
 | 
						|
                        'content' => $certificateStr."\n".$privateKeyStr,
 | 
						|
                        'is_directory' => false,
 | 
						|
                        'chmod' => '600',
 | 
						|
                        'resource_type' => $resourceType,
 | 
						|
                        'resource_id' => $resourceId,
 | 
						|
                    ]);
 | 
						|
                } else {
 | 
						|
                    $model->fileStorages()->create([
 | 
						|
                        'fs_path' => $configurationDir.'/ssl/server.crt',
 | 
						|
                        'mount_path' => $mountPath.'/server.crt',
 | 
						|
                        'content' => $certificateStr,
 | 
						|
                        'is_directory' => false,
 | 
						|
                        'chmod' => '644',
 | 
						|
                        'resource_type' => $resourceType,
 | 
						|
                        'resource_id' => $resourceId,
 | 
						|
                    ]);
 | 
						|
 | 
						|
                    $model->fileStorages()->create([
 | 
						|
                        'fs_path' => $configurationDir.'/ssl/server.key',
 | 
						|
                        'mount_path' => $mountPath.'/server.key',
 | 
						|
                        'content' => $privateKeyStr,
 | 
						|
                        'is_directory' => false,
 | 
						|
                        'chmod' => '600',
 | 
						|
                        'resource_type' => $resourceType,
 | 
						|
                        'resource_id' => $resourceId,
 | 
						|
                    ]);
 | 
						|
                }
 | 
						|
            }
 | 
						|
 | 
						|
            return $sslCertificate;
 | 
						|
        } catch (\Throwable $e) {
 | 
						|
            throw new \RuntimeException('SSL Certificate generation failed: '.$e->getMessage(), 0, $e);
 | 
						|
        } finally {
 | 
						|
            fclose($tempConfig);
 | 
						|
        }
 | 
						|
    }
 | 
						|
}
 |