1
0

cert.go 8.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. package main
  2. import (
  3. "crypto/x509"
  4. "encoding/json"
  5. "encoding/pem"
  6. "fmt"
  7. "io"
  8. "log"
  9. "net/http"
  10. "os"
  11. "path/filepath"
  12. "strings"
  13. "time"
  14. "imuslab.com/zoraxy/mod/utils"
  15. )
  16. // Check if the default certificates is correctly setup
  17. func handleDefaultCertCheck(w http.ResponseWriter, r *http.Request) {
  18. type CheckResult struct {
  19. DefaultPubExists bool
  20. DefaultPriExists bool
  21. }
  22. pub, pri := tlsCertManager.DefaultCertExistsSep()
  23. js, _ := json.Marshal(CheckResult{
  24. pub,
  25. pri,
  26. })
  27. utils.SendJSONResponse(w, string(js))
  28. }
  29. // Return a list of domains where the certificates covers
  30. func handleListCertificate(w http.ResponseWriter, r *http.Request) {
  31. filenames, err := tlsCertManager.ListCertDomains()
  32. if err != nil {
  33. http.Error(w, err.Error(), http.StatusInternalServerError)
  34. return
  35. }
  36. showDate, _ := utils.GetPara(r, "date")
  37. if showDate == "true" {
  38. type CertInfo struct {
  39. Domain string
  40. LastModifiedDate string
  41. ExpireDate string
  42. RemainingDays int
  43. }
  44. results := []*CertInfo{}
  45. for _, filename := range filenames {
  46. certFilepath := filepath.Join(tlsCertManager.CertStore, filename+".crt")
  47. //keyFilepath := filepath.Join(tlsCertManager.CertStore, filename+".key")
  48. fileInfo, err := os.Stat(certFilepath)
  49. if err != nil {
  50. utils.SendErrorResponse(w, "invalid domain certificate discovered: "+filename)
  51. return
  52. }
  53. modifiedTime := fileInfo.ModTime().Format("2006-01-02 15:04:05")
  54. certExpireTime := "Unknown"
  55. certBtyes, err := os.ReadFile(certFilepath)
  56. expiredIn := 0
  57. if err != nil {
  58. //Unable to load this file
  59. continue
  60. } else {
  61. //Cert loaded. Check its expire time
  62. block, _ := pem.Decode(certBtyes)
  63. if block != nil {
  64. cert, err := x509.ParseCertificate(block.Bytes)
  65. if err == nil {
  66. certExpireTime = cert.NotAfter.Format("2006-01-02 15:04:05")
  67. duration := cert.NotAfter.Sub(time.Now())
  68. // Convert the duration to days
  69. expiredIn = int(duration.Hours() / 24)
  70. }
  71. }
  72. }
  73. thisCertInfo := CertInfo{
  74. Domain: filename,
  75. LastModifiedDate: modifiedTime,
  76. ExpireDate: certExpireTime,
  77. RemainingDays: expiredIn,
  78. }
  79. results = append(results, &thisCertInfo)
  80. }
  81. js, _ := json.Marshal(results)
  82. w.Header().Set("Content-Type", "application/json")
  83. w.Write(js)
  84. } else {
  85. response, err := json.Marshal(filenames)
  86. if err != nil {
  87. http.Error(w, err.Error(), http.StatusInternalServerError)
  88. return
  89. }
  90. w.Header().Set("Content-Type", "application/json")
  91. w.Write(response)
  92. }
  93. }
  94. // List all certificates and map all their domains to the cert filename
  95. func handleListDomains(w http.ResponseWriter, r *http.Request) {
  96. filenames, err := os.ReadDir("./conf/certs/")
  97. if err != nil {
  98. utils.SendErrorResponse(w, err.Error())
  99. return
  100. }
  101. certnameToDomainMap := map[string]string{}
  102. for _, filename := range filenames {
  103. if filename.IsDir() {
  104. continue
  105. }
  106. certFilepath := filepath.Join("./conf/certs/", filename.Name())
  107. certBtyes, err := os.ReadFile(certFilepath)
  108. if err != nil {
  109. // Unable to load this file
  110. log.Println("Unable to load certificate: " + certFilepath)
  111. continue
  112. } else {
  113. // Cert loaded. Check its expiry time
  114. block, _ := pem.Decode(certBtyes)
  115. if block != nil {
  116. cert, err := x509.ParseCertificate(block.Bytes)
  117. if err == nil {
  118. certname := strings.TrimSuffix(filepath.Base(certFilepath), filepath.Ext(certFilepath))
  119. for _, dnsName := range cert.DNSNames {
  120. certnameToDomainMap[dnsName] = certname
  121. }
  122. certnameToDomainMap[cert.Subject.CommonName] = certname
  123. }
  124. }
  125. }
  126. }
  127. requireCompact, _ := utils.GetPara(r, "compact")
  128. if requireCompact == "true" {
  129. result := make(map[string][]string)
  130. for key, value := range certnameToDomainMap {
  131. if _, ok := result[value]; !ok {
  132. result[value] = make([]string, 0)
  133. }
  134. result[value] = append(result[value], key)
  135. }
  136. js, _ := json.Marshal(result)
  137. utils.SendJSONResponse(w, string(js))
  138. return
  139. }
  140. js, _ := json.Marshal(certnameToDomainMap)
  141. utils.SendJSONResponse(w, string(js))
  142. }
  143. // Handle front-end toggling TLS mode
  144. func handleToggleTLSProxy(w http.ResponseWriter, r *http.Request) {
  145. currentTlsSetting := false
  146. if sysdb.KeyExists("settings", "usetls") {
  147. sysdb.Read("settings", "usetls", &currentTlsSetting)
  148. }
  149. newState, err := utils.PostPara(r, "set")
  150. if err != nil {
  151. //No setting. Get the current status
  152. js, _ := json.Marshal(currentTlsSetting)
  153. utils.SendJSONResponse(w, string(js))
  154. } else {
  155. if newState == "true" {
  156. sysdb.Write("settings", "usetls", true)
  157. log.Println("Enabling TLS mode on reverse proxy")
  158. dynamicProxyRouter.UpdateTLSSetting(true)
  159. } else if newState == "false" {
  160. sysdb.Write("settings", "usetls", false)
  161. log.Println("Disabling TLS mode on reverse proxy")
  162. dynamicProxyRouter.UpdateTLSSetting(false)
  163. } else {
  164. utils.SendErrorResponse(w, "invalid state given. Only support true or false")
  165. return
  166. }
  167. utils.SendOK(w)
  168. }
  169. }
  170. // Handle the GET and SET of reverse proxy TLS versions
  171. func handleSetTlsRequireLatest(w http.ResponseWriter, r *http.Request) {
  172. newState, err := utils.PostPara(r, "set")
  173. if err != nil {
  174. //GET
  175. var reqLatestTLS bool = false
  176. if sysdb.KeyExists("settings", "forceLatestTLS") {
  177. sysdb.Read("settings", "forceLatestTLS", &reqLatestTLS)
  178. }
  179. js, _ := json.Marshal(reqLatestTLS)
  180. utils.SendJSONResponse(w, string(js))
  181. } else {
  182. if newState == "true" {
  183. sysdb.Write("settings", "forceLatestTLS", true)
  184. log.Println("Updating minimum TLS version to v1.2 or above")
  185. dynamicProxyRouter.UpdateTLSVersion(true)
  186. } else if newState == "false" {
  187. sysdb.Write("settings", "forceLatestTLS", false)
  188. log.Println("Updating minimum TLS version to v1.0 or above")
  189. dynamicProxyRouter.UpdateTLSVersion(false)
  190. } else {
  191. utils.SendErrorResponse(w, "invalid state given")
  192. }
  193. }
  194. }
  195. // Handle upload of the certificate
  196. func handleCertUpload(w http.ResponseWriter, r *http.Request) {
  197. // check if request method is POST
  198. if r.Method != "POST" {
  199. http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
  200. return
  201. }
  202. // get the key type
  203. keytype, err := utils.GetPara(r, "ktype")
  204. overWriteFilename := ""
  205. if err != nil {
  206. http.Error(w, "Not defined key type (pub / pri)", http.StatusBadRequest)
  207. return
  208. }
  209. // get the domain
  210. domain, err := utils.GetPara(r, "domain")
  211. if err != nil {
  212. //Assume localhost
  213. domain = "default"
  214. }
  215. if keytype == "pub" {
  216. overWriteFilename = domain + ".crt"
  217. } else if keytype == "pri" {
  218. overWriteFilename = domain + ".key"
  219. } else {
  220. http.Error(w, "Not supported keytype: "+keytype, http.StatusBadRequest)
  221. return
  222. }
  223. // parse multipart form data
  224. err = r.ParseMultipartForm(10 << 20) // 10 MB
  225. if err != nil {
  226. http.Error(w, "Failed to parse form data", http.StatusBadRequest)
  227. return
  228. }
  229. // get file from form data
  230. file, _, err := r.FormFile("file")
  231. if err != nil {
  232. http.Error(w, "Failed to get file", http.StatusBadRequest)
  233. return
  234. }
  235. defer file.Close()
  236. // create file in upload directory
  237. os.MkdirAll("./conf/certs", 0775)
  238. f, err := os.Create(filepath.Join("./conf/certs", overWriteFilename))
  239. if err != nil {
  240. http.Error(w, "Failed to create file", http.StatusInternalServerError)
  241. return
  242. }
  243. defer f.Close()
  244. // copy file contents to destination file
  245. _, err = io.Copy(f, file)
  246. if err != nil {
  247. http.Error(w, "Failed to save file", http.StatusInternalServerError)
  248. return
  249. }
  250. // send response
  251. fmt.Fprintln(w, "File upload successful!")
  252. }
  253. // Handle cert remove
  254. func handleCertRemove(w http.ResponseWriter, r *http.Request) {
  255. domain, err := utils.PostPara(r, "domain")
  256. if err != nil {
  257. utils.SendErrorResponse(w, "invalid domain given")
  258. return
  259. }
  260. err = tlsCertManager.RemoveCert(domain)
  261. if err != nil {
  262. utils.SendErrorResponse(w, err.Error())
  263. }
  264. }