1
- # Example
1
+ # Examples
2
2
3
- # Bootstrap Client & Server
3
+ ## Basic client usage
4
+
5
+ The basic-client example shows the use of the most of the functioanlity of the
6
+ ` ca.Client ` , those methods works as an SDK for integrating other services with
7
+ the Certificate Authority (CA).
8
+
9
+ In [ basic-client/client.go] ( /examples/basic-client/client.go ) we first can see
10
+ the initialization of the client:
11
+
12
+ ``` go
13
+ client , err := ca.NewClient (" https://localhost:9000" , ca.WithRootSHA256 (" 84a033e84196f73bd593fad7a63e509e57fd982f02084359c4e8c5c864efc27d" ))
14
+ ```
15
+
16
+ The previous code uses the CA address and the root certificate fingerprint.
17
+ The CA url will be present in the token, and the root fingerprint can be present
18
+ too if the ` --root root_ca.crt ` option is use in the creation of the token. If
19
+ this is the case is simpler to rely in the token and use just:
20
+
21
+ ``` go
22
+ client , err := ca.Bootstrap (token)
23
+ ```
24
+
25
+ After the initialization there're examples of all the client methods, they are
26
+ just a convenient way to use the CA API endpoints. The first method ` Health `
27
+ returns the status of the CA server, on the first implementation if the server
28
+ is up it will return just ok.
29
+
30
+ ``` go
31
+ health , err := client.Health ()
32
+ // Health is a struct created from the JSON response {"status": "ok"}
33
+ ```
34
+
35
+ The next method ` Root ` is used to get and verify the root certificate. We will
36
+ pass a finger print, it will download the root certificate from the CA and it
37
+ will make sure that the fingerprint matches. This method uses an insecure HTTP
38
+ client as it might be used in the initialization of the client, but the response
39
+ is considered secure because we have compared against the given digest.
40
+
41
+ ``` go
42
+ root , err := client.Root (" 84a033e84196f73bd593fad7a63e509e57fd982f02084359c4e8c5c864efc27d" )
43
+ ```
44
+
45
+ After Root we have the most important method ` Sign ` , this is used to sign a
46
+ Certificate Signing Request that we provide. To secure this request we use
47
+ the one-time-token. You can build your own certificate request and add it in
48
+ the ` *api.SignRequest ` , but the ca package contains a method that will create a
49
+ secure random key, and create the CSR based on the information in the token.
50
+
51
+ ``` go
52
+ // Create a CSR from token and return the sign request, the private key and an
53
+ // error if something failed.
54
+ req , pk , err := ca.CreateSignRequest (token)
55
+ if err != nil { ... }
56
+
57
+ // Do the sign request and return the signed certificate
58
+ sign , err := client.Sign (req)
59
+ if err != nil { ... }
60
+ ```
61
+
62
+ To renew the certificate we can use the ` Renew ` method, the certificate renewal
63
+ relies on a mTLS connection with a previous certificate, so we will need to pass
64
+ a transport with the previous certificate.
65
+
66
+ ``` go
67
+ // Get a cancelable context to stop the renewal goroutines and timers.
68
+ ctx , cancel := context.WithCancel (context.Background ())
69
+ defer cancel ()
70
+ // Create a transport from with the sign response and the private key.
71
+ tr , err := client.Transport (ctx, sign, pk)
72
+ if err != nil { ... }
73
+ // Renew the certificate and get the new ones.
74
+ // The return type are equivalent to ones in the Sign method.
75
+ renew , err := client.Renew (tr)
76
+ if err != nil { ... }
77
+ ```
78
+
79
+ All the previous methods map with one endpoint in the CA API, but the API
80
+ provides a couple more that are used for creating the tokens. For those we have
81
+ a couple of methods, one that returns a list of provisioners and one that
82
+ returns the encrypted key of one provisioner.
83
+
84
+ ``` go
85
+ // Without options it will return the first 20 provisioners
86
+ provisioners , err := client.Provisioners ()
87
+ // We can also set a limit up to 100
88
+ provisioners , err := client.Provisioners (ca.WithProvisionerLimit (100 ))
89
+ // With a pagination cursor
90
+ provisioners , err := client.Provisioners (ca.WithProvisionerCursor (" 1f18c1ecffe54770e9107ce7b39b39735" ))
91
+ // Or combining both
92
+ provisioners , err := client.Provisioners (
93
+ ca.WithProvisionerCursor (" 1f18c1ecffe54770e9107ce7b39b39735" ),
94
+ ca.WithProvisionerLimit (100 ),
95
+ )
96
+
97
+ // Return the encrypted key of one of the returned provisioners. The key
98
+ // returned is an encrypted JWE with the private key used to sign tokens.
99
+ key , err := client.ProvisionerKey (" DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk" )
100
+ ```
101
+
102
+ The example shows also the use of some helper methods used to get configured
103
+ tls.Config objects that can be injected in servers and clients. These methods,
104
+ are also configured to auto-renew the certificate once two thirds of the
105
+ duration of the certificate has passed, approximately.
106
+
107
+ ``` go
108
+ // Get a cancelable context to stop the renewal goroutines and timers.
109
+ ctx , cancel := context.WithCancel (context.Background ())
110
+ defer cancel ()
111
+ // Get tls.Config for a server
112
+ tlsConfig , err := client.GetClientTLSConfig (ctx, sign, pk)
113
+ // Get tls.Config for a client
114
+ tlsConfig , err := client.GetClientTLSConfig (ctx, sign, pk)
115
+ // Get an http.Transport for a client, this can be used as a http.RoundTripper
116
+ // in an http.Client
117
+ tr , err := client.Transport (ctx, sign, pk)
118
+ ```
119
+
120
+ To run the example you need to start the certificate authority:
121
+
122
+ ```
123
+ certificates $ bin/step-ca examples/pki/config/ca.json
124
+ 2018/11/02 18:29:25 Serving HTTPS on :9000 ...
125
+ ```
126
+
127
+ And just run the client.go with a new token:
128
+ ```
129
+ certificates $ export STEPPATH=examples/pki
130
+ certificates $ export STEP_CA_URL=https://localhost:9000
131
+ certificates $ go run examples/basic-client/client.go $(step ca new-token client.smallstep.com))
132
+ ```
133
+
134
+ ## Bootstrap Client & Server
4
135
5
136
On this example we are going to see the Certificate Authority running, as well
6
137
as a simple Server using TLS and a simple client doing TLS requests to the
@@ -18,7 +149,7 @@ certificates $ bin/step-ca examples/pki/config/ca.json
18
149
We will start the server and we will type ` password ` when step asks for the
19
150
provisioner password:
20
151
```
21
- certificates $ export STEPPATH=examples/pki
152
+ certificates $ export STEPPATH=examples/pki
22
153
certificates $ export STEP_CA_URL=https://localhost:9000
23
154
certificates $ go run examples/bootstrap-server/server.go $(step ca new-token localhost))
24
155
✔ Key ID: DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk (mariano@smallstep.com)
@@ -56,7 +187,7 @@ detected a TLS client configuration.
56
187
57
188
But if we the client with the certificate name Mike we'll see:
58
189
```
59
- certificates $ export STEPPATH=examples/pki
190
+ certificates $ export STEPPATH=examples/pki
60
191
certificates $ export STEP_CA_URL=https://localhost:9000
61
192
certificates $ go run examples/bootstrap-client/client.go $(step ca new-token Mike)
62
193
✔ Key ID: DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk (mariano@smallstep.com)
0 commit comments