acme.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495
  1. package acme
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "encoding/json"
  10. "encoding/pem"
  11. "errors"
  12. "fmt"
  13. "log"
  14. "net"
  15. "net/http"
  16. "os"
  17. "path/filepath"
  18. "strconv"
  19. "strings"
  20. "time"
  21. "github.com/go-acme/lego/v4/certcrypto"
  22. "github.com/go-acme/lego/v4/certificate"
  23. "github.com/go-acme/lego/v4/challenge/http01"
  24. "github.com/go-acme/lego/v4/lego"
  25. "github.com/go-acme/lego/v4/registration"
  26. "imuslab.com/zoraxy/mod/database"
  27. "imuslab.com/zoraxy/mod/utils"
  28. )
  29. type CertificateInfoJSON struct {
  30. AcmeName string `json:"acme_name"`
  31. AcmeUrl string `json:"acme_url"`
  32. SkipTLS bool `json:"skip_tls"`
  33. UseDNS bool `json:"dns"`
  34. }
  35. // ACMEUser represents a user in the ACME system.
  36. type ACMEUser struct {
  37. Email string
  38. Registration *registration.Resource
  39. key crypto.PrivateKey
  40. }
  41. type EABConfig struct {
  42. Kid string `json:"kid"`
  43. HmacKey string `json:"HmacKey"`
  44. }
  45. // GetEmail returns the email of the ACMEUser.
  46. func (u *ACMEUser) GetEmail() string {
  47. return u.Email
  48. }
  49. // GetRegistration returns the registration resource of the ACMEUser.
  50. func (u ACMEUser) GetRegistration() *registration.Resource {
  51. return u.Registration
  52. }
  53. // GetPrivateKey returns the private key of the ACMEUser.
  54. func (u *ACMEUser) GetPrivateKey() crypto.PrivateKey {
  55. return u.key
  56. }
  57. // ACMEHandler handles ACME-related operations.
  58. type ACMEHandler struct {
  59. DefaultAcmeServer string
  60. Port string
  61. Database *database.Database
  62. }
  63. // NewACME creates a new ACMEHandler instance.
  64. func NewACME(acmeServer string, port string, database *database.Database) *ACMEHandler {
  65. return &ACMEHandler{
  66. DefaultAcmeServer: acmeServer,
  67. Port: port,
  68. Database: database,
  69. }
  70. }
  71. // ObtainCert obtains a certificate for the specified domains.
  72. func (a *ACMEHandler) ObtainCert(domains []string, certificateName string, email string, caName string, caUrl string, skipTLS bool, useDNS bool) (bool, error) {
  73. log.Println("[ACME] Obtaining certificate...")
  74. // generate private key
  75. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  76. if err != nil {
  77. log.Println(err)
  78. return false, err
  79. }
  80. // create a admin user for our new generation
  81. adminUser := ACMEUser{
  82. Email: email,
  83. key: privateKey,
  84. }
  85. // create config
  86. config := lego.NewConfig(&adminUser)
  87. // skip TLS verify if need
  88. // Ref: https://github.com/go-acme/lego/blob/6af2c756ac73a9cb401621afca722d0f4112b1b8/lego/client_config.go#L74
  89. if skipTLS {
  90. log.Println("[INFO] Ignore TLS/SSL Verification Error for ACME Server")
  91. config.HTTPClient.Transport = &http.Transport{
  92. Proxy: http.ProxyFromEnvironment,
  93. DialContext: (&net.Dialer{
  94. Timeout: 30 * time.Second,
  95. KeepAlive: 30 * time.Second,
  96. }).DialContext,
  97. TLSHandshakeTimeout: 30 * time.Second,
  98. ResponseHeaderTimeout: 30 * time.Second,
  99. TLSClientConfig: &tls.Config{
  100. InsecureSkipVerify: true,
  101. },
  102. }
  103. }
  104. //Fallback to Let's Encrypt if it is not set
  105. if caName == "" {
  106. caName = "Let's Encrypt"
  107. }
  108. // setup the custom ACME url endpoint.
  109. if caUrl != "" {
  110. config.CADirURL = caUrl
  111. }
  112. // if not custom ACME url, load it from ca.json
  113. if caName == "custom" {
  114. log.Println("[INFO] Using Custom ACME " + caUrl + " for CA Directory URL")
  115. } else {
  116. caLinkOverwrite, err := loadCAApiServerFromName(caName)
  117. if err == nil {
  118. config.CADirURL = caLinkOverwrite
  119. log.Println("[INFO] Using " + caLinkOverwrite + " for CA Directory URL")
  120. } else {
  121. // (caName == "" || caUrl == "") will use default acme
  122. config.CADirURL = a.DefaultAcmeServer
  123. log.Println("[INFO] Using Default ACME " + a.DefaultAcmeServer + " for CA Directory URL")
  124. }
  125. }
  126. config.Certificate.KeyType = certcrypto.RSA2048
  127. client, err := lego.NewClient(config)
  128. if err != nil {
  129. log.Println(err)
  130. return false, err
  131. }
  132. // setup how to receive challenge
  133. if useDNS {
  134. if !a.Database.TableExists("acme") {
  135. a.Database.NewTable("acme")
  136. return false, errors.New("DNS Provider and DNS Credenital configuration required for ACME Provider (Error -1)")
  137. }
  138. if !a.Database.KeyExists("acme", certificateName+"_dns_provider") || !a.Database.KeyExists("acme", certificateName+"_dns_credentials") {
  139. return false, errors.New("DNS Provider and DNS Credenital configuration required for ACME Provider (Error -2)")
  140. }
  141. var dnsCredentials string
  142. err := a.Database.Read("acme", certificateName+"_dns_credentials", &dnsCredentials)
  143. if err != nil {
  144. log.Println(err)
  145. return false, err
  146. }
  147. var dnsProvider string
  148. err = a.Database.Read("acme", certificateName+"_dns_provider", &dnsProvider)
  149. if err != nil {
  150. log.Println(err)
  151. return false, err
  152. }
  153. provider, err := GetDnsChallengeProviderByName(dnsProvider, dnsCredentials)
  154. if err != nil {
  155. log.Println(err)
  156. return false, err
  157. }
  158. err = client.Challenge.SetDNS01Provider(provider)
  159. if err != nil {
  160. log.Println(err)
  161. return false, err
  162. }
  163. } else {
  164. err = client.Challenge.SetHTTP01Provider(http01.NewProviderServer("", a.Port))
  165. if err != nil {
  166. log.Println(err)
  167. return false, err
  168. }
  169. }
  170. // New users will need to register
  171. /*
  172. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  173. if err != nil {
  174. log.Println(err)
  175. return false, err
  176. }
  177. */
  178. var reg *registration.Resource
  179. // New users will need to register
  180. if client.GetExternalAccountRequired() {
  181. log.Println("External Account Required for this ACME Provider.")
  182. // IF KID and HmacEncoded is overidden
  183. if !a.Database.TableExists("acme") {
  184. a.Database.NewTable("acme")
  185. return false, errors.New("kid and HmacEncoded configuration required for ACME Provider (Error -1)")
  186. }
  187. if !a.Database.KeyExists("acme", config.CADirURL+"_kid") || !a.Database.KeyExists("acme", config.CADirURL+"_hmacEncoded") {
  188. return false, errors.New("kid and HmacEncoded configuration required for ACME Provider (Error -2)")
  189. }
  190. var kid string
  191. var hmacEncoded string
  192. err := a.Database.Read("acme", config.CADirURL+"_kid", &kid)
  193. if err != nil {
  194. log.Println(err)
  195. return false, err
  196. }
  197. err = a.Database.Read("acme", config.CADirURL+"_hmacEncoded", &hmacEncoded)
  198. if err != nil {
  199. log.Println(err)
  200. return false, err
  201. }
  202. log.Println("EAB Credential retrieved.", kid, hmacEncoded)
  203. if kid != "" && hmacEncoded != "" {
  204. reg, err = client.Registration.RegisterWithExternalAccountBinding(registration.RegisterEABOptions{
  205. TermsOfServiceAgreed: true,
  206. Kid: kid,
  207. HmacEncoded: hmacEncoded,
  208. })
  209. }
  210. if err != nil {
  211. log.Println(err)
  212. return false, err
  213. }
  214. //return false, errors.New("External Account Required for this ACME Provider.")
  215. } else {
  216. reg, err = client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  217. if err != nil {
  218. log.Println(err)
  219. return false, err
  220. }
  221. }
  222. adminUser.Registration = reg
  223. // obtain the certificate
  224. request := certificate.ObtainRequest{
  225. Domains: domains,
  226. Bundle: true,
  227. }
  228. certificates, err := client.Certificate.Obtain(request)
  229. if err != nil {
  230. log.Println(err)
  231. return false, err
  232. }
  233. // Each certificate comes back with the cert bytes, the bytes of the client's
  234. // private key, and a certificate URL.
  235. err = os.WriteFile("./conf/certs/"+certificateName+".pem", certificates.Certificate, 0777)
  236. if err != nil {
  237. log.Println(err)
  238. return false, err
  239. }
  240. err = os.WriteFile("./conf/certs/"+certificateName+".key", certificates.PrivateKey, 0777)
  241. if err != nil {
  242. log.Println(err)
  243. return false, err
  244. }
  245. // Save certificate's ACME info for renew usage
  246. certInfo := &CertificateInfoJSON{
  247. AcmeName: caName,
  248. AcmeUrl: caUrl,
  249. SkipTLS: skipTLS,
  250. UseDNS: useDNS,
  251. }
  252. certInfoBytes, err := json.Marshal(certInfo)
  253. if err != nil {
  254. log.Println(err)
  255. return false, err
  256. }
  257. err = os.WriteFile("./conf/certs/"+certificateName+".json", certInfoBytes, 0777)
  258. if err != nil {
  259. log.Println(err)
  260. return false, err
  261. }
  262. return true, nil
  263. }
  264. // CheckCertificate returns a list of domains that are in expired certificates.
  265. // It will return all domains that is in expired certificates
  266. // *** if there is a vaild certificate contains the domain and there is a expired certificate contains the same domain
  267. // it will said expired as well!
  268. func (a *ACMEHandler) CheckCertificate() []string {
  269. // read from dir
  270. filenames, err := os.ReadDir("./conf/certs/")
  271. expiredCerts := []string{}
  272. if err != nil {
  273. log.Println(err)
  274. return []string{}
  275. }
  276. for _, filename := range filenames {
  277. certFilepath := filepath.Join("./conf/certs/", filename.Name())
  278. certBytes, err := os.ReadFile(certFilepath)
  279. if err != nil {
  280. // Unable to load this file
  281. continue
  282. } else {
  283. // Cert loaded. Check its expiry time
  284. block, _ := pem.Decode(certBytes)
  285. if block != nil {
  286. cert, err := x509.ParseCertificate(block.Bytes)
  287. if err == nil {
  288. elapsed := time.Since(cert.NotAfter)
  289. if elapsed > 0 {
  290. // if it is expired then add it in
  291. // make sure it's uniqueless
  292. for _, dnsName := range cert.DNSNames {
  293. if !contains(expiredCerts, dnsName) {
  294. expiredCerts = append(expiredCerts, dnsName)
  295. }
  296. }
  297. if !contains(expiredCerts, cert.Subject.CommonName) {
  298. expiredCerts = append(expiredCerts, cert.Subject.CommonName)
  299. }
  300. }
  301. }
  302. }
  303. }
  304. }
  305. return expiredCerts
  306. }
  307. // return the current port number
  308. func (a *ACMEHandler) Getport() string {
  309. return a.Port
  310. }
  311. // contains checks if a string is present in a slice.
  312. func contains(slice []string, str string) bool {
  313. for _, s := range slice {
  314. if s == str {
  315. return true
  316. }
  317. }
  318. return false
  319. }
  320. // HandleGetExpiredDomains handles the HTTP GET request to retrieve the list of expired domains.
  321. // It calls the CheckCertificate method to obtain the expired domains and sends a JSON response
  322. // containing the list of expired domains.
  323. func (a *ACMEHandler) HandleGetExpiredDomains(w http.ResponseWriter, r *http.Request) {
  324. type ExpiredDomains struct {
  325. Domain []string `json:"domain"`
  326. }
  327. info := ExpiredDomains{
  328. Domain: a.CheckCertificate(),
  329. }
  330. js, _ := json.MarshalIndent(info, "", " ")
  331. utils.SendJSONResponse(w, string(js))
  332. }
  333. // HandleRenewCertificate handles the HTTP GET request to renew a certificate for the provided domains.
  334. // It retrieves the domains and filename parameters from the request, calls the ObtainCert method
  335. // to renew the certificate, and sends a JSON response indicating the result of the renewal process.
  336. func (a *ACMEHandler) HandleRenewCertificate(w http.ResponseWriter, r *http.Request) {
  337. domainPara, err := utils.PostPara(r, "domains")
  338. if err != nil {
  339. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  340. return
  341. }
  342. filename, err := utils.PostPara(r, "filename")
  343. if err != nil {
  344. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  345. return
  346. }
  347. //Make sure the wildcard * do not goes into the filename
  348. filename = strings.ReplaceAll(filename, "*", "_")
  349. email, err := utils.PostPara(r, "email")
  350. if err != nil {
  351. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  352. return
  353. }
  354. var caUrl string
  355. ca, err := utils.PostPara(r, "ca")
  356. if err != nil {
  357. log.Println("[INFO] CA not set. Using default")
  358. ca, caUrl = "", ""
  359. }
  360. if ca == "custom" {
  361. caUrl, err = utils.PostPara(r, "caURL")
  362. if err != nil {
  363. log.Println("[INFO] Custom CA set but no URL provide, Using default")
  364. ca, caUrl = "", ""
  365. }
  366. }
  367. if ca == "" {
  368. //default. Use Let's Encrypt
  369. ca = "Let's Encrypt"
  370. }
  371. var skipTLS bool
  372. if skipTLSString, err := utils.PostPara(r, "skipTLS"); err != nil {
  373. skipTLS = false
  374. } else if skipTLSString != "true" {
  375. skipTLS = false
  376. } else {
  377. skipTLS = true
  378. }
  379. var dns bool
  380. if dnsString, err := utils.PostPara(r, "dns"); err != nil {
  381. dns = false
  382. } else if dnsString != "true" {
  383. dns = false
  384. } else {
  385. dns = true
  386. }
  387. domains := strings.Split(domainPara, ",")
  388. result, err := a.ObtainCert(domains, filename, email, ca, caUrl, skipTLS, dns)
  389. if err != nil {
  390. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  391. return
  392. }
  393. utils.SendJSONResponse(w, strconv.FormatBool(result))
  394. }
  395. // Escape JSON string
  396. func jsonEscape(i string) string {
  397. b, err := json.Marshal(i)
  398. if err != nil {
  399. log.Println("Unable to escape json data: " + err.Error())
  400. return i
  401. }
  402. s := string(b)
  403. return s[1 : len(s)-1]
  404. }
  405. // Helper function to check if a port is in use
  406. func IsPortInUse(port int) bool {
  407. address := fmt.Sprintf(":%d", port)
  408. listener, err := net.Listen("tcp", address)
  409. if err != nil {
  410. return true // Port is in use
  411. }
  412. defer listener.Close()
  413. return false // Port is not in use
  414. }
  415. // Load cert information from json file
  416. func LoadCertInfoJSON(filename string) (*CertificateInfoJSON, error) {
  417. certInfoBytes, err := os.ReadFile(filename)
  418. if err != nil {
  419. return nil, err
  420. }
  421. certInfo := &CertificateInfoJSON{}
  422. if err = json.Unmarshal(certInfoBytes, certInfo); err != nil {
  423. return nil, err
  424. }
  425. return certInfo, nil
  426. }