cert.go 8.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308
  1. package main
  2. import (
  3. "crypto/x509"
  4. "encoding/json"
  5. "encoding/pem"
  6. "fmt"
  7. "io"
  8. "net/http"
  9. "os"
  10. "path/filepath"
  11. "strings"
  12. "time"
  13. "imuslab.com/zoraxy/mod/utils"
  14. )
  15. // Check if the default certificates is correctly setup
  16. func handleDefaultCertCheck(w http.ResponseWriter, r *http.Request) {
  17. type CheckResult struct {
  18. DefaultPubExists bool
  19. DefaultPriExists bool
  20. }
  21. pub, pri := tlsCertManager.DefaultCertExistsSep()
  22. js, _ := json.Marshal(CheckResult{
  23. pub,
  24. pri,
  25. })
  26. utils.SendJSONResponse(w, string(js))
  27. }
  28. // Return a list of domains where the certificates covers
  29. func handleListCertificate(w http.ResponseWriter, r *http.Request) {
  30. filenames, err := tlsCertManager.ListCertDomains()
  31. if err != nil {
  32. http.Error(w, err.Error(), http.StatusInternalServerError)
  33. return
  34. }
  35. showDate, _ := utils.GetPara(r, "date")
  36. if showDate == "true" {
  37. type CertInfo struct {
  38. Domain string
  39. LastModifiedDate string
  40. ExpireDate string
  41. RemainingDays int
  42. }
  43. results := []*CertInfo{}
  44. for _, filename := range filenames {
  45. certFilepath := filepath.Join(tlsCertManager.CertStore, filename+".pem")
  46. //keyFilepath := filepath.Join(tlsCertManager.CertStore, filename+".key")
  47. fileInfo, err := os.Stat(certFilepath)
  48. if err != nil {
  49. utils.SendErrorResponse(w, "invalid domain certificate discovered: "+filename)
  50. return
  51. }
  52. modifiedTime := fileInfo.ModTime().Format("2006-01-02 15:04:05")
  53. certExpireTime := "Unknown"
  54. certBtyes, err := os.ReadFile(certFilepath)
  55. expiredIn := 0
  56. if err != nil {
  57. //Unable to load this file
  58. continue
  59. } else {
  60. //Cert loaded. Check its expire time
  61. block, _ := pem.Decode(certBtyes)
  62. if block != nil {
  63. cert, err := x509.ParseCertificate(block.Bytes)
  64. if err == nil {
  65. certExpireTime = cert.NotAfter.Format("2006-01-02 15:04:05")
  66. duration := cert.NotAfter.Sub(time.Now())
  67. // Convert the duration to days
  68. expiredIn = int(duration.Hours() / 24)
  69. }
  70. }
  71. }
  72. thisCertInfo := CertInfo{
  73. Domain: filename,
  74. LastModifiedDate: modifiedTime,
  75. ExpireDate: certExpireTime,
  76. RemainingDays: expiredIn,
  77. }
  78. results = append(results, &thisCertInfo)
  79. }
  80. js, _ := json.Marshal(results)
  81. w.Header().Set("Content-Type", "application/json")
  82. w.Write(js)
  83. } else {
  84. response, err := json.Marshal(filenames)
  85. if err != nil {
  86. http.Error(w, err.Error(), http.StatusInternalServerError)
  87. return
  88. }
  89. w.Header().Set("Content-Type", "application/json")
  90. w.Write(response)
  91. }
  92. }
  93. // List all certificates and map all their domains to the cert filename
  94. func handleListDomains(w http.ResponseWriter, r *http.Request) {
  95. filenames, err := os.ReadDir("./conf/certs/")
  96. if err != nil {
  97. utils.SendErrorResponse(w, err.Error())
  98. return
  99. }
  100. certnameToDomainMap := map[string]string{}
  101. for _, filename := range filenames {
  102. if filename.IsDir() {
  103. continue
  104. }
  105. certFilepath := filepath.Join("./conf/certs/", filename.Name())
  106. certBtyes, err := os.ReadFile(certFilepath)
  107. if err != nil {
  108. // Unable to load this file
  109. SystemWideLogger.PrintAndLog("TLS", "Unable to load certificate: "+certFilepath, err)
  110. continue
  111. } else {
  112. // Cert loaded. Check its expiry time
  113. block, _ := pem.Decode(certBtyes)
  114. if block != nil {
  115. cert, err := x509.ParseCertificate(block.Bytes)
  116. if err == nil {
  117. certname := strings.TrimSuffix(filepath.Base(certFilepath), filepath.Ext(certFilepath))
  118. for _, dnsName := range cert.DNSNames {
  119. certnameToDomainMap[dnsName] = certname
  120. }
  121. certnameToDomainMap[cert.Subject.CommonName] = certname
  122. }
  123. }
  124. }
  125. }
  126. requireCompact, _ := utils.GetPara(r, "compact")
  127. if requireCompact == "true" {
  128. result := make(map[string][]string)
  129. for key, value := range certnameToDomainMap {
  130. if _, ok := result[value]; !ok {
  131. result[value] = make([]string, 0)
  132. }
  133. result[value] = append(result[value], key)
  134. }
  135. js, _ := json.Marshal(result)
  136. utils.SendJSONResponse(w, string(js))
  137. return
  138. }
  139. js, _ := json.Marshal(certnameToDomainMap)
  140. utils.SendJSONResponse(w, string(js))
  141. }
  142. // Handle front-end toggling TLS mode
  143. func handleToggleTLSProxy(w http.ResponseWriter, r *http.Request) {
  144. currentTlsSetting := false
  145. if sysdb.KeyExists("settings", "usetls") {
  146. sysdb.Read("settings", "usetls", &currentTlsSetting)
  147. }
  148. newState, err := utils.PostPara(r, "set")
  149. if err != nil {
  150. //No setting. Get the current status
  151. js, _ := json.Marshal(currentTlsSetting)
  152. utils.SendJSONResponse(w, string(js))
  153. } else {
  154. if newState == "true" {
  155. sysdb.Write("settings", "usetls", true)
  156. SystemWideLogger.Println("Enabling TLS mode on reverse proxy")
  157. dynamicProxyRouter.UpdateTLSSetting(true)
  158. } else if newState == "false" {
  159. sysdb.Write("settings", "usetls", false)
  160. SystemWideLogger.Println("Disabling TLS mode on reverse proxy")
  161. dynamicProxyRouter.UpdateTLSSetting(false)
  162. } else {
  163. utils.SendErrorResponse(w, "invalid state given. Only support true or false")
  164. return
  165. }
  166. utils.SendOK(w)
  167. }
  168. }
  169. // Handle the GET and SET of reverse proxy TLS versions
  170. func handleSetTlsRequireLatest(w http.ResponseWriter, r *http.Request) {
  171. newState, err := utils.PostPara(r, "set")
  172. if err != nil {
  173. //GET
  174. var reqLatestTLS bool = false
  175. if sysdb.KeyExists("settings", "forceLatestTLS") {
  176. sysdb.Read("settings", "forceLatestTLS", &reqLatestTLS)
  177. }
  178. js, _ := json.Marshal(reqLatestTLS)
  179. utils.SendJSONResponse(w, string(js))
  180. } else {
  181. if newState == "true" {
  182. sysdb.Write("settings", "forceLatestTLS", true)
  183. SystemWideLogger.Println("Updating minimum TLS version to v1.2 or above")
  184. dynamicProxyRouter.UpdateTLSVersion(true)
  185. } else if newState == "false" {
  186. sysdb.Write("settings", "forceLatestTLS", false)
  187. SystemWideLogger.Println("Updating minimum TLS version to v1.0 or above")
  188. dynamicProxyRouter.UpdateTLSVersion(false)
  189. } else {
  190. utils.SendErrorResponse(w, "invalid state given")
  191. }
  192. }
  193. }
  194. // Handle upload of the certificate
  195. func handleCertUpload(w http.ResponseWriter, r *http.Request) {
  196. // check if request method is POST
  197. if r.Method != "POST" {
  198. http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
  199. return
  200. }
  201. // get the key type
  202. keytype, err := utils.GetPara(r, "ktype")
  203. overWriteFilename := ""
  204. if err != nil {
  205. http.Error(w, "Not defined key type (pub / pri)", http.StatusBadRequest)
  206. return
  207. }
  208. // get the domain
  209. domain, err := utils.GetPara(r, "domain")
  210. if err != nil {
  211. //Assume localhost
  212. domain = "default"
  213. }
  214. if keytype == "pub" {
  215. overWriteFilename = domain + ".pem"
  216. } else if keytype == "pri" {
  217. overWriteFilename = domain + ".key"
  218. } else {
  219. http.Error(w, "Not supported keytype: "+keytype, http.StatusBadRequest)
  220. return
  221. }
  222. // parse multipart form data
  223. err = r.ParseMultipartForm(10 << 20) // 10 MB
  224. if err != nil {
  225. http.Error(w, "Failed to parse form data", http.StatusBadRequest)
  226. return
  227. }
  228. // get file from form data
  229. file, _, err := r.FormFile("file")
  230. if err != nil {
  231. http.Error(w, "Failed to get file", http.StatusBadRequest)
  232. return
  233. }
  234. defer file.Close()
  235. // create file in upload directory
  236. os.MkdirAll("./conf/certs", 0775)
  237. f, err := os.Create(filepath.Join("./conf/certs", overWriteFilename))
  238. if err != nil {
  239. http.Error(w, "Failed to create file", http.StatusInternalServerError)
  240. return
  241. }
  242. defer f.Close()
  243. // copy file contents to destination file
  244. _, err = io.Copy(f, file)
  245. if err != nil {
  246. http.Error(w, "Failed to save file", http.StatusInternalServerError)
  247. return
  248. }
  249. //Update cert list
  250. tlsCertManager.UpdateLoadedCertList()
  251. // send response
  252. fmt.Fprintln(w, "File upload successful!")
  253. }
  254. // Handle cert remove
  255. func handleCertRemove(w http.ResponseWriter, r *http.Request) {
  256. domain, err := utils.PostPara(r, "domain")
  257. if err != nil {
  258. utils.SendErrorResponse(w, "invalid domain given")
  259. return
  260. }
  261. err = tlsCertManager.RemoveCert(domain)
  262. if err != nil {
  263. utils.SendErrorResponse(w, err.Error())
  264. }
  265. }