tarantool / go-tlsdialer

TLS dialers for the go-tarantool library
Other
0 stars 0 forks source link
go go-tarantool openssl tarantool

Go Reference Code Coverage

tlsdialer

This package allows creating a TLS dialer for go-tarantool. It serves as an interlayer between go-tarantool and go-openssl.

go-tlsdialer uses tarantool connection, but also types and methods from go-openssl.

Run tests

To run a default set of tests:

go test -v ./...

OpenSSLDialer

User can create a dialer by filling the struct:

// OpenSSLDialer allows to use SSL transport for connection.
type OpenSSLDialer struct {
    // Address is an address to connect.
    // It could be specified in following ways:
    //
    // - TCP connections (tcp://192.168.1.1:3013, tcp://my.host:3013,
    // tcp:192.168.1.1:3013, tcp:my.host:3013, 192.168.1.1:3013, my.host:3013)
    //
    // - Unix socket, first '/' or '.' indicates Unix socket
    // (unix:///abs/path/tt.sock, unix:path/tt.sock, /abs/path/tt.sock,
    // ./rel/path/tt.sock, unix/:path/tt.sock)
    Address string
    // Auth is an authentication method.
    Auth tarantool.Auth
    // Username for logging in to Tarantool.
    User string
    // User password for logging in to Tarantool.
    Password string
    // RequiredProtocol contains minimal protocol version and
    // list of protocol features that should be supported by
    // Tarantool server. By default, there are no restrictions.
    RequiredProtocolInfo tarantool.ProtocolInfo
    // SslKeyFile is a path to a private SSL key file.
    SslKeyFile string
    // SslCertFile is a path to an SSL certificate file.
    SslCertFile string
    // SslCaFile is a path to a trusted certificate authorities (CA) file.
    SslCaFile string
    // SslCiphers is a colon-separated (:) list of SSL cipher suites the connection
    // can use.
    //
    // We don't provide a list of supported ciphers. This is what OpenSSL
    // does. The only limitation is usage of TLSv1.2 (because other protocol
    // versions don't seem to support the GOST cipher). To add additional
    // ciphers (GOST cipher), you must configure OpenSSL.
    //
    // See also
    //
    // * https://www.openssl.org/docs/man1.1.1/man1/ciphers.html
    SslCiphers string
    // SslPassword is a password for decrypting the private SSL key file.
    // The priority is as follows: try to decrypt with SslPassword, then
    // try SslPasswordFile.
    SslPassword string
    // SslPasswordFile is a path to the list of passwords for decrypting
    // the private SSL key file. The connection tries every line from the
    // file as a password.
    SslPasswordFile string
}

To create a connection from the created dialer a Dial function could be used:

package tarantool

import (
    "context"
    "fmt"
    "time"

    "github.com/tarantool/go-tarantool/v2"
    "github.com/tarantool/go-tlsdialer"
)

func main() {
    dialer := tlsdialer.OpenSSLDialer{
        Address: "127.0.0.1:3301",
        User:    "guest",
    }
    opts := tarantool.Opts{
        Timeout: 5 * time.Second,
    }

    ctx, cancel := context.WithTimeout(context.Background(), 500*time.Millisecond)
    defer cancel()

    conn, err := tarantool.Connect(ctx, dialer, opts)
    if err != nil {
        fmt.Printf("Failed to create an example connection: %s", err)
        return
    }

    // Use the connection.
    data, err := conn.Do(tarantool.NewInsertRequest(999).
        Tuple([]interface{}{99999, "BB"}),
    ).Get()
    if err != nil {
        fmt.Printf("Error: %s", err)
    } else {
        fmt.Printf("Data: %v", data)
    }
}

Application build

Since tlsdialer uses OpenSSL for connection to the Tarantool-EE, Cgo should be enabled while building and OpenSSL libraries and includes should be available in build time.

Building with system OpenSSL

Build your application using the command:

  1. Static build.
    CGO_ENABLED=1 go build -ldflags "-linkmode external -extldflags '-static -lssl -lcrypto'" -o myapp main.go
  2. Dynamic build.
    CGO_ENABLED=1 go build -o myapp main.go

Building with a custom OpenSSL version

OpenSSL could be build in two ways. Both of them require downloading the source code of OpenSSL. It could be done from the official website or from the GitHub repository.

  1. Static build. Run this command from the installation directory to configure the OpenSSL:
    ./config no-shared --prefix=/tmp/openssl/
  2. Dynamic build. Run this command from the installation directory to configure the OpenSSL:
    ./config --prefix=/tmp/openssl/

    After configuring, run this command to install and build OpenSSL:

    make install

    And then build your application using the command:

  3. Static build.
    CGO_ENABLED=1 CGO_CFLAGS="-I/tmp/openssl/include" CGO_LDFLAGS="-L/tmp/openssl/lib" PKG_CONFIG_PATH="/tmp/openssl/lib/pkgconfig" go build -ldflags "-linkmode=external -extldflags '-static -lssl -lcrypto'" -o myapp main.go
  4. Dynamic build.
    CGO_ENABLED=1 CGO_CFLAGS="-I/tmp/openssl/include" CGO_LDFLAGS="-L/tmp/openssl/lib" PKG_CONFIG_PATH="/tmp/openssl/lib/pkgconfig" go build -o myapp main.go

    After compiling your Go application, you can run it as usual.