| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950 |
- /*
- * Copyright (c) 2000-2018, 达梦数据库有限公司.
- * All rights reserved.
- */
- package security
- import (
- "crypto/tls"
- "errors"
- "flag"
- "net"
- "os"
- "sync"
- )
- var dmHome = flag.String("DM_HOME", "", "Where DMDB installed")
- var lock = sync.Mutex{}
- func NewTLSFromTCP(conn *net.TCPConn, sslCertPath string, sslKeyPath string, user string) (*tls.Conn, error) {
- if sslCertPath == "" && sslKeyPath == "" {
- func() {
- lock.Lock()
- defer lock.Unlock()
- flag.Parse()
- }()
- separator := string(os.PathSeparator)
- if *dmHome != "" {
- sslCertPath = *dmHome + separator + "bin" + separator + "client_ssl" + separator +
- user + separator + "client-cert.pem"
- sslKeyPath = *dmHome + separator + "bin" + separator + "client_ssl" + separator +
- user + separator + "client-key.pem"
- } else {
- return nil, errors.New("sslCertPath and sslKeyPath can not be empty!")
- }
- }
- cer, err := tls.LoadX509KeyPair(sslCertPath, sslKeyPath)
- if err != nil {
- return nil, err
- }
- conf := &tls.Config{
- InsecureSkipVerify: true,
- Certificates: []tls.Certificate{cer},
- }
- tlsConn := tls.Client(conn, conf)
- if err := tlsConn.Handshake(); err != nil {
- return nil, err
- }
- return tlsConn, nil
- }
|