/* * Copyright (c) 2000-2018, 达梦数据库有限公司. * All rights reserved. */ package security import ( "crypto/tls" "errors" "flag" "net" "os" "sync" ) var dmHome = flag.String("DM_HOME", "", "Where DMDB installed") var lock = sync.Mutex{} func NewTLSFromTCP(conn *net.TCPConn, sslCertPath string, sslKeyPath string, user string) (*tls.Conn, error) { if sslCertPath == "" && sslKeyPath == "" { func() { lock.Lock() defer lock.Unlock() flag.Parse() }() separator := string(os.PathSeparator) if *dmHome != "" { sslCertPath = *dmHome + separator + "bin" + separator + "client_ssl" + separator + user + separator + "client-cert.pem" sslKeyPath = *dmHome + separator + "bin" + separator + "client_ssl" + separator + user + separator + "client-key.pem" } else { return nil, errors.New("sslCertPath and sslKeyPath can not be empty!") } } cer, err := tls.LoadX509KeyPair(sslCertPath, sslKeyPath) if err != nil { return nil, err } conf := &tls.Config{ InsecureSkipVerify: true, Certificates: []tls.Certificate{cer}, } tlsConn := tls.Client(conn, conf) if err := tlsConn.Handshake(); err != nil { return nil, err } return tlsConn, nil }