package tlstest import ( "bytes" "crypto/rand" "crypto/rsa" "crypto/tls" "crypto/x509" "crypto/x509/pkix" "encoding/pem" "math/big" "net" "time" ) func GetTLSConfigs() (serverTLSConf, clientTLSConf *tls.Config, err error) { // set up our CA certificate ca := &x509.Certificate{ SerialNumber: big.NewInt(2021), Subject: pkix.Name{ Organization: []string{"Fiber"}, Country: []string{"NL"}, Province: []string{""}, Locality: []string{"Amsterdam"}, StreetAddress: []string{"Huidenstraat"}, PostalCode: []string{"1011 AA"}, }, NotBefore: time.Now(), NotAfter: time.Now().AddDate(10, 0, 0), IsCA: true, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}, KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign, BasicConstraintsValid: true, } // create our private and public key caPrivateKey, err := rsa.GenerateKey(rand.Reader, 4096) if err != nil { return nil, nil, err } // create the CA caBytes, err := x509.CreateCertificate(rand.Reader, ca, ca, &caPrivateKey.PublicKey, caPrivateKey) if err != nil { return nil, nil, err } // pem encode var caPEM bytes.Buffer _ = pem.Encode(&caPEM, &pem.Block{ Type: "CERTIFICATE", Bytes: caBytes, }) var caPrivKeyPEM bytes.Buffer _ = pem.Encode(&caPrivKeyPEM, &pem.Block{ Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(caPrivateKey), }) // set up our server certificate cert := &x509.Certificate{ SerialNumber: big.NewInt(2021), Subject: pkix.Name{ Organization: []string{"Fiber"}, Country: []string{"NL"}, Province: []string{""}, Locality: []string{"Amsterdam"}, StreetAddress: []string{"Huidenstraat"}, PostalCode: []string{"1011 AA"}, }, IPAddresses: []net.IP{net.IPv4(127, 0, 0, 1), net.IPv6loopback}, NotBefore: time.Now(), NotAfter: time.Now().AddDate(10, 0, 0), SubjectKeyId: []byte{1, 2, 3, 4, 6}, ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth}, KeyUsage: x509.KeyUsageDigitalSignature, } certPrivateKey, err := rsa.GenerateKey(rand.Reader, 4096) if err != nil { return nil, nil, err } certBytes, err := x509.CreateCertificate(rand.Reader, cert, ca, &certPrivateKey.PublicKey, caPrivateKey) if err != nil { return nil, nil, err } var certPEM bytes.Buffer _ = pem.Encode(&certPEM, &pem.Block{ Type: "CERTIFICATE", Bytes: certBytes, }) var certPrivateKeyPEM bytes.Buffer _ = pem.Encode(&certPrivateKeyPEM, &pem.Block{ Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(certPrivateKey), }) serverCert, err := tls.X509KeyPair(certPEM.Bytes(), certPrivateKeyPEM.Bytes()) if err != nil { return nil, nil, err } serverTLSConf = &tls.Config{ Certificates: []tls.Certificate{serverCert}, } certPool := x509.NewCertPool() certPool.AppendCertsFromPEM(caPEM.Bytes()) clientTLSConf = &tls.Config{ RootCAs: certPool, } return serverTLSConf, clientTLSConf, nil }