use async_trait::async_trait;
use openssl::ssl::{SniError, SslRef};
use pingora::listeners::TlsAccept;
use pingora_openssl::{ext, pkey::PKey, ssl::NameType, x509::X509};
use crate::stores::certificates::CertificateStore;
#[derive(Debug, Clone)]
pub struct CertStore {
store: CertificateStore,
}
impl CertStore {
pub fn new(store: CertificateStore) -> Self {
CertStore { store }
}
pub fn sni_callback(ssl_ref: &mut SslRef, store: &CertificateStore) -> Result<(), SniError> {
let servername = ssl_ref.servername(NameType::HOST_NAME).unwrap_or("");
tracing::debug!("Received SNI: {}", servername);
if store.get(servername).is_some() {
return Ok(());
}
Err(SniError::ALERT_FATAL)
}
}
#[async_trait]
impl TlsAccept for CertStore {
async fn certificate_callback(&self, ssl: &mut pingora::tls::ssl::SslRef) {
let host_name = ssl.servername(NameType::HOST_NAME);
let certificate = self.store.get(host_name.unwrap_or_default());
if certificate.is_none() {
tracing::debug!("No certificate found for host: {:?}", host_name);
return;
}
let result = certificate.unwrap();
let cert = &result.value();
let crt_value = X509::from_pem(&cert.certificate).unwrap();
let key_value = PKey::private_key_from_pem(&cert.key).unwrap();
ext::ssl_use_certificate(ssl, &crt_value).unwrap();
ext::ssl_use_private_key(ssl, &key_value).unwrap();
}
}