1
0

acme.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504
  1. package acme
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "encoding/json"
  10. "encoding/pem"
  11. "errors"
  12. "fmt"
  13. "net"
  14. "net/http"
  15. "os"
  16. "path/filepath"
  17. "strconv"
  18. "strings"
  19. "time"
  20. "github.com/go-acme/lego/v4/certcrypto"
  21. "github.com/go-acme/lego/v4/certificate"
  22. "github.com/go-acme/lego/v4/challenge/http01"
  23. "github.com/go-acme/lego/v4/lego"
  24. "github.com/go-acme/lego/v4/registration"
  25. "imuslab.com/zoraxy/mod/database"
  26. "imuslab.com/zoraxy/mod/info/logger"
  27. "imuslab.com/zoraxy/mod/utils"
  28. )
  29. type CertificateInfoJSON struct {
  30. AcmeName string `json:"acme_name"`
  31. AcmeUrl string `json:"acme_url"`
  32. SkipTLS bool `json:"skip_tls"`
  33. UseDNS bool `json:"dns"`
  34. }
  35. // ACMEUser represents a user in the ACME system.
  36. type ACMEUser struct {
  37. Email string
  38. Registration *registration.Resource
  39. key crypto.PrivateKey
  40. }
  41. type EABConfig struct {
  42. Kid string `json:"kid"`
  43. HmacKey string `json:"HmacKey"`
  44. }
  45. // GetEmail returns the email of the ACMEUser.
  46. func (u *ACMEUser) GetEmail() string {
  47. return u.Email
  48. }
  49. // GetRegistration returns the registration resource of the ACMEUser.
  50. func (u ACMEUser) GetRegistration() *registration.Resource {
  51. return u.Registration
  52. }
  53. // GetPrivateKey returns the private key of the ACMEUser.
  54. func (u *ACMEUser) GetPrivateKey() crypto.PrivateKey {
  55. return u.key
  56. }
  57. // ACMEHandler handles ACME-related operations.
  58. type ACMEHandler struct {
  59. DefaultAcmeServer string
  60. Port string
  61. Database *database.Database
  62. Logger *logger.Logger
  63. }
  64. // NewACME creates a new ACMEHandler instance.
  65. func NewACME(defaultAcmeServer string, port string, database *database.Database, logger *logger.Logger) *ACMEHandler {
  66. return &ACMEHandler{
  67. DefaultAcmeServer: defaultAcmeServer,
  68. Port: port,
  69. Database: database,
  70. Logger: logger,
  71. }
  72. }
  73. func (a *ACMEHandler) Logf(message string, err error) {
  74. a.Logger.PrintAndLog("ACME", message, err)
  75. }
  76. // ObtainCert obtains a certificate for the specified domains.
  77. func (a *ACMEHandler) ObtainCert(domains []string, certificateName string, email string, caName string, caUrl string, skipTLS bool, useDNS bool) (bool, error) {
  78. a.Logf("Obtaining certificate for: "+strings.Join(domains, ", "), nil)
  79. // generate private key
  80. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  81. if err != nil {
  82. a.Logf("Private key generation failed", err)
  83. return false, err
  84. }
  85. // create a admin user for our new generation
  86. adminUser := ACMEUser{
  87. Email: email,
  88. key: privateKey,
  89. }
  90. // create config
  91. config := lego.NewConfig(&adminUser)
  92. // skip TLS verify if need
  93. // Ref: https://github.com/go-acme/lego/blob/6af2c756ac73a9cb401621afca722d0f4112b1b8/lego/client_config.go#L74
  94. if skipTLS {
  95. a.Logf("Ignoring TLS/SSL Verification Error for ACME Server", nil)
  96. config.HTTPClient.Transport = &http.Transport{
  97. Proxy: http.ProxyFromEnvironment,
  98. DialContext: (&net.Dialer{
  99. Timeout: 30 * time.Second,
  100. KeepAlive: 30 * time.Second,
  101. }).DialContext,
  102. TLSHandshakeTimeout: 30 * time.Second,
  103. ResponseHeaderTimeout: 30 * time.Second,
  104. TLSClientConfig: &tls.Config{
  105. InsecureSkipVerify: true,
  106. },
  107. }
  108. }
  109. //Fallback to Let's Encrypt if it is not set
  110. if caName == "" {
  111. caName = "Let's Encrypt"
  112. }
  113. // setup the custom ACME url endpoint.
  114. if caUrl != "" {
  115. config.CADirURL = caUrl
  116. }
  117. // if not custom ACME url, load it from ca.json
  118. if caName == "custom" {
  119. a.Logf("Using Custom ACME "+caUrl+" for CA Directory URL", nil)
  120. } else {
  121. caLinkOverwrite, err := loadCAApiServerFromName(caName)
  122. if err == nil {
  123. config.CADirURL = caLinkOverwrite
  124. a.Logf("Using "+caLinkOverwrite+" for CA Directory URL", nil)
  125. } else {
  126. // (caName == "" || caUrl == "") will use default acme
  127. config.CADirURL = a.DefaultAcmeServer
  128. a.Logf("Using Default ACME "+a.DefaultAcmeServer+" for CA Directory URL", nil)
  129. }
  130. }
  131. config.Certificate.KeyType = certcrypto.RSA2048
  132. client, err := lego.NewClient(config)
  133. if err != nil {
  134. a.Logf("Failed to spawn new ACME client from current config", err)
  135. return false, err
  136. }
  137. // setup how to receive challenge
  138. if useDNS {
  139. if !a.Database.TableExists("acme") {
  140. a.Database.NewTable("acme")
  141. return false, errors.New("DNS Provider and DNS Credenital configuration required for ACME Provider (Error -1)")
  142. }
  143. if !a.Database.KeyExists("acme", certificateName+"_dns_provider") || !a.Database.KeyExists("acme", certificateName+"_dns_credentials") {
  144. return false, errors.New("DNS Provider and DNS Credenital configuration required for ACME Provider (Error -2)")
  145. }
  146. var dnsCredentials string
  147. err := a.Database.Read("acme", certificateName+"_dns_credentials", &dnsCredentials)
  148. if err != nil {
  149. a.Logf("Read DNS credential failed", err)
  150. return false, err
  151. }
  152. var dnsProvider string
  153. err = a.Database.Read("acme", certificateName+"_dns_provider", &dnsProvider)
  154. if err != nil {
  155. a.Logf("Read DNS Provider failed", err)
  156. return false, err
  157. }
  158. provider, err := GetDnsChallengeProviderByName(dnsProvider, dnsCredentials)
  159. if err != nil {
  160. a.Logf("Unable to resolve DNS challenge provider", err)
  161. return false, err
  162. }
  163. err = client.Challenge.SetDNS01Provider(provider)
  164. if err != nil {
  165. a.Logf("Failed to resolve DNS01 Provider", err)
  166. return false, err
  167. }
  168. } else {
  169. err = client.Challenge.SetHTTP01Provider(http01.NewProviderServer("", a.Port))
  170. if err != nil {
  171. a.Logf("Failed to resolve HTTP01 Provider", err)
  172. return false, err
  173. }
  174. }
  175. // New users will need to register
  176. /*
  177. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  178. if err != nil {
  179. log.Println(err)
  180. return false, err
  181. }
  182. */
  183. var reg *registration.Resource
  184. // New users will need to register
  185. if client.GetExternalAccountRequired() {
  186. a.Logf("External Account Required for this ACME Provider", nil)
  187. // IF KID and HmacEncoded is overidden
  188. if !a.Database.TableExists("acme") {
  189. a.Database.NewTable("acme")
  190. return false, errors.New("kid and HmacEncoded configuration required for ACME Provider (Error -1)")
  191. }
  192. if !a.Database.KeyExists("acme", config.CADirURL+"_kid") || !a.Database.KeyExists("acme", config.CADirURL+"_hmacEncoded") {
  193. return false, errors.New("kid and HmacEncoded configuration required for ACME Provider (Error -2)")
  194. }
  195. var kid string
  196. var hmacEncoded string
  197. err := a.Database.Read("acme", config.CADirURL+"_kid", &kid)
  198. if err != nil {
  199. a.Logf("Failed to read kid from database", err)
  200. return false, err
  201. }
  202. err = a.Database.Read("acme", config.CADirURL+"_hmacEncoded", &hmacEncoded)
  203. if err != nil {
  204. a.Logf("Failed to read HMAC from database", err)
  205. return false, err
  206. }
  207. a.Logf("EAB Credential retrieved: "+kid+" / "+hmacEncoded, nil)
  208. if kid != "" && hmacEncoded != "" {
  209. reg, err = client.Registration.RegisterWithExternalAccountBinding(registration.RegisterEABOptions{
  210. TermsOfServiceAgreed: true,
  211. Kid: kid,
  212. HmacEncoded: hmacEncoded,
  213. })
  214. }
  215. if err != nil {
  216. a.Logf("Register with external account binder failed", err)
  217. return false, err
  218. }
  219. //return false, errors.New("External Account Required for this ACME Provider.")
  220. } else {
  221. reg, err = client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  222. if err != nil {
  223. a.Logf("Unable to register client", err)
  224. return false, err
  225. }
  226. }
  227. adminUser.Registration = reg
  228. // obtain the certificate
  229. request := certificate.ObtainRequest{
  230. Domains: domains,
  231. Bundle: true,
  232. }
  233. certificates, err := client.Certificate.Obtain(request)
  234. if err != nil {
  235. a.Logf("Obtain certificate failed", err)
  236. return false, err
  237. }
  238. // Each certificate comes back with the cert bytes, the bytes of the client's
  239. // private key, and a certificate URL.
  240. err = os.WriteFile("./conf/certs/"+certificateName+".pem", certificates.Certificate, 0777)
  241. if err != nil {
  242. a.Logf("Failed to write public key to disk", err)
  243. return false, err
  244. }
  245. err = os.WriteFile("./conf/certs/"+certificateName+".key", certificates.PrivateKey, 0777)
  246. if err != nil {
  247. a.Logf("Failed to write private key to disk", err)
  248. return false, err
  249. }
  250. // Save certificate's ACME info for renew usage
  251. certInfo := &CertificateInfoJSON{
  252. AcmeName: caName,
  253. AcmeUrl: caUrl,
  254. SkipTLS: skipTLS,
  255. UseDNS: useDNS,
  256. }
  257. certInfoBytes, err := json.Marshal(certInfo)
  258. if err != nil {
  259. a.Logf("Marshal certificate renew config failed", err)
  260. return false, err
  261. }
  262. err = os.WriteFile("./conf/certs/"+certificateName+".json", certInfoBytes, 0777)
  263. if err != nil {
  264. a.Logf("Failed to write certificate renew config to file", err)
  265. return false, err
  266. }
  267. return true, nil
  268. }
  269. // CheckCertificate returns a list of domains that are in expired certificates.
  270. // It will return all domains that is in expired certificates
  271. // *** if there is a vaild certificate contains the domain and there is a expired certificate contains the same domain
  272. // it will said expired as well!
  273. func (a *ACMEHandler) CheckCertificate() []string {
  274. // read from dir
  275. filenames, err := os.ReadDir("./conf/certs/")
  276. expiredCerts := []string{}
  277. if err != nil {
  278. a.Logf("Failed to load certificate folder", err)
  279. return []string{}
  280. }
  281. for _, filename := range filenames {
  282. certFilepath := filepath.Join("./conf/certs/", filename.Name())
  283. certBytes, err := os.ReadFile(certFilepath)
  284. if err != nil {
  285. // Unable to load this file
  286. continue
  287. } else {
  288. // Cert loaded. Check its expiry time
  289. block, _ := pem.Decode(certBytes)
  290. if block != nil {
  291. cert, err := x509.ParseCertificate(block.Bytes)
  292. if err == nil {
  293. elapsed := time.Since(cert.NotAfter)
  294. if elapsed > 0 {
  295. // if it is expired then add it in
  296. // make sure it's uniqueless
  297. for _, dnsName := range cert.DNSNames {
  298. if !contains(expiredCerts, dnsName) {
  299. expiredCerts = append(expiredCerts, dnsName)
  300. }
  301. }
  302. if !contains(expiredCerts, cert.Subject.CommonName) {
  303. expiredCerts = append(expiredCerts, cert.Subject.CommonName)
  304. }
  305. }
  306. }
  307. }
  308. }
  309. }
  310. return expiredCerts
  311. }
  312. // return the current port number
  313. func (a *ACMEHandler) Getport() string {
  314. return a.Port
  315. }
  316. // contains checks if a string is present in a slice.
  317. func contains(slice []string, str string) bool {
  318. for _, s := range slice {
  319. if s == str {
  320. return true
  321. }
  322. }
  323. return false
  324. }
  325. // HandleGetExpiredDomains handles the HTTP GET request to retrieve the list of expired domains.
  326. // It calls the CheckCertificate method to obtain the expired domains and sends a JSON response
  327. // containing the list of expired domains.
  328. func (a *ACMEHandler) HandleGetExpiredDomains(w http.ResponseWriter, r *http.Request) {
  329. type ExpiredDomains struct {
  330. Domain []string `json:"domain"`
  331. }
  332. info := ExpiredDomains{
  333. Domain: a.CheckCertificate(),
  334. }
  335. js, _ := json.MarshalIndent(info, "", " ")
  336. utils.SendJSONResponse(w, string(js))
  337. }
  338. // HandleRenewCertificate handles the HTTP GET request to renew a certificate for the provided domains.
  339. // It retrieves the domains and filename parameters from the request, calls the ObtainCert method
  340. // to renew the certificate, and sends a JSON response indicating the result of the renewal process.
  341. func (a *ACMEHandler) HandleRenewCertificate(w http.ResponseWriter, r *http.Request) {
  342. domainPara, err := utils.PostPara(r, "domains")
  343. if err != nil {
  344. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  345. return
  346. }
  347. filename, err := utils.PostPara(r, "filename")
  348. if err != nil {
  349. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  350. return
  351. }
  352. //Make sure the wildcard * do not goes into the filename
  353. filename = strings.ReplaceAll(filename, "*", "_")
  354. email, err := utils.PostPara(r, "email")
  355. if err != nil {
  356. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  357. return
  358. }
  359. var caUrl string
  360. ca, err := utils.PostPara(r, "ca")
  361. if err != nil {
  362. a.Logf("CA not set. Using default", nil)
  363. ca, caUrl = "", ""
  364. }
  365. if ca == "custom" {
  366. caUrl, err = utils.PostPara(r, "caURL")
  367. if err != nil {
  368. a.Logf("Custom CA set but no URL provide, Using default", nil)
  369. ca, caUrl = "", ""
  370. }
  371. }
  372. if ca == "" {
  373. //default. Use Let's Encrypt
  374. ca = "Let's Encrypt"
  375. }
  376. var skipTLS bool
  377. if skipTLSString, err := utils.PostPara(r, "skipTLS"); err != nil {
  378. skipTLS = false
  379. } else if skipTLSString != "true" {
  380. skipTLS = false
  381. } else {
  382. skipTLS = true
  383. }
  384. var dns bool
  385. if dnsString, err := utils.PostPara(r, "dns"); err != nil {
  386. dns = false
  387. } else if dnsString != "true" {
  388. dns = false
  389. } else {
  390. dns = true
  391. }
  392. domains := strings.Split(domainPara, ",")
  393. //Clean spaces in front or behind each domain
  394. cleanedDomains := []string{}
  395. for _, domain := range domains {
  396. cleanedDomains = append(cleanedDomains, strings.TrimSpace(domain))
  397. }
  398. result, err := a.ObtainCert(cleanedDomains, filename, email, ca, caUrl, skipTLS, dns)
  399. if err != nil {
  400. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  401. return
  402. }
  403. utils.SendJSONResponse(w, strconv.FormatBool(result))
  404. }
  405. // Escape JSON string
  406. func jsonEscape(i string) string {
  407. b, err := json.Marshal(i)
  408. if err != nil {
  409. //log.Println("Unable to escape json data: " + err.Error())
  410. return i
  411. }
  412. s := string(b)
  413. return s[1 : len(s)-1]
  414. }
  415. // Helper function to check if a port is in use
  416. func IsPortInUse(port int) bool {
  417. address := fmt.Sprintf(":%d", port)
  418. listener, err := net.Listen("tcp", address)
  419. if err != nil {
  420. return true // Port is in use
  421. }
  422. defer listener.Close()
  423. return false // Port is not in use
  424. }
  425. // Load cert information from json file
  426. func LoadCertInfoJSON(filename string) (*CertificateInfoJSON, error) {
  427. certInfoBytes, err := os.ReadFile(filename)
  428. if err != nil {
  429. return nil, err
  430. }
  431. certInfo := &CertificateInfoJSON{}
  432. if err = json.Unmarshal(certInfoBytes, certInfo); err != nil {
  433. return nil, err
  434. }
  435. return certInfo, nil
  436. }