cert.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189
  1. package main
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "io"
  6. "log"
  7. "net/http"
  8. "os"
  9. "path/filepath"
  10. "imuslab.com/arozos/ReverseProxy/mod/utils"
  11. )
  12. // Check if the default certificates is correctly setup
  13. func handleDefaultCertCheck(w http.ResponseWriter, r *http.Request) {
  14. type CheckResult struct {
  15. DefaultPubExists bool
  16. DefaultPriExists bool
  17. }
  18. pub, pri := tlsCertManager.DefaultCertExistsSep()
  19. js, _ := json.Marshal(CheckResult{
  20. pub,
  21. pri,
  22. })
  23. utils.SendJSONResponse(w, string(js))
  24. }
  25. // Return a list of domains where the certificates covers
  26. func handleListCertificate(w http.ResponseWriter, r *http.Request) {
  27. filenames, err := tlsCertManager.ListCertDomains()
  28. if err != nil {
  29. http.Error(w, err.Error(), http.StatusInternalServerError)
  30. return
  31. }
  32. showDate, _ := utils.GetPara(r, "date")
  33. if showDate == "true" {
  34. type CertInfo struct {
  35. Domain string
  36. LastModifiedDate string
  37. }
  38. results := []*CertInfo{}
  39. for _, filename := range filenames {
  40. fileInfo, err := os.Stat(filepath.Join(tlsCertManager.CertStore, filename+".crt"))
  41. if err != nil {
  42. utils.SendErrorResponse(w, "invalid domain certificate discovered: "+filename)
  43. return
  44. }
  45. modifiedTime := fileInfo.ModTime().Format("2006-01-02 15:04:05")
  46. thisCertInfo := CertInfo{
  47. Domain: filename,
  48. LastModifiedDate: modifiedTime,
  49. }
  50. results = append(results, &thisCertInfo)
  51. }
  52. js, _ := json.Marshal(results)
  53. w.Header().Set("Content-Type", "application/json")
  54. w.Write(js)
  55. } else {
  56. response, err := json.Marshal(filenames)
  57. if err != nil {
  58. http.Error(w, err.Error(), http.StatusInternalServerError)
  59. return
  60. }
  61. w.Header().Set("Content-Type", "application/json")
  62. w.Write(response)
  63. }
  64. }
  65. // Handle front-end toggling TLS mode
  66. func handleToggleTLSProxy(w http.ResponseWriter, r *http.Request) {
  67. currentTlsSetting := false
  68. if sysdb.KeyExists("settings", "usetls") {
  69. sysdb.Read("settings", "usetls", &currentTlsSetting)
  70. }
  71. newState, err := utils.PostPara(r, "set")
  72. if err != nil {
  73. //No setting. Get the current status
  74. js, _ := json.Marshal(currentTlsSetting)
  75. utils.SendJSONResponse(w, string(js))
  76. } else {
  77. if newState == "true" {
  78. sysdb.Write("settings", "usetls", true)
  79. log.Println("Enabling TLS mode on reverse proxy")
  80. dynamicProxyRouter.UpdateTLSSetting(true)
  81. } else if newState == "false" {
  82. sysdb.Write("settings", "usetls", false)
  83. log.Println("Disabling TLS mode on reverse proxy")
  84. dynamicProxyRouter.UpdateTLSSetting(false)
  85. } else {
  86. utils.SendErrorResponse(w, "invalid state given. Only support true or false")
  87. return
  88. }
  89. utils.SendOK(w)
  90. }
  91. }
  92. // Handle upload of the certificate
  93. func handleCertUpload(w http.ResponseWriter, r *http.Request) {
  94. // check if request method is POST
  95. if r.Method != "POST" {
  96. http.Error(w, "Method not allowed", http.StatusMethodNotAllowed)
  97. return
  98. }
  99. // get the key type
  100. keytype, err := utils.GetPara(r, "ktype")
  101. overWriteFilename := ""
  102. if err != nil {
  103. http.Error(w, "Not defined key type (pub / pri)", http.StatusBadRequest)
  104. return
  105. }
  106. // get the domain
  107. domain, err := utils.GetPara(r, "domain")
  108. if err != nil {
  109. //Assume localhost
  110. domain = "default"
  111. }
  112. if keytype == "pub" {
  113. overWriteFilename = domain + ".crt"
  114. } else if keytype == "pri" {
  115. overWriteFilename = domain + ".key"
  116. } else {
  117. http.Error(w, "Not supported keytype: "+keytype, http.StatusBadRequest)
  118. return
  119. }
  120. // parse multipart form data
  121. err = r.ParseMultipartForm(10 << 20) // 10 MB
  122. if err != nil {
  123. http.Error(w, "Failed to parse form data", http.StatusBadRequest)
  124. return
  125. }
  126. // get file from form data
  127. file, _, err := r.FormFile("file")
  128. if err != nil {
  129. http.Error(w, "Failed to get file", http.StatusBadRequest)
  130. return
  131. }
  132. defer file.Close()
  133. // create file in upload directory
  134. os.MkdirAll("./certs", 0775)
  135. f, err := os.Create(filepath.Join("./certs", overWriteFilename))
  136. if err != nil {
  137. http.Error(w, "Failed to create file", http.StatusInternalServerError)
  138. return
  139. }
  140. defer f.Close()
  141. // copy file contents to destination file
  142. _, err = io.Copy(f, file)
  143. if err != nil {
  144. http.Error(w, "Failed to save file", http.StatusInternalServerError)
  145. return
  146. }
  147. // send response
  148. fmt.Fprintln(w, "File upload successful!")
  149. }
  150. // Handle cert remove
  151. func handleCertRemove(w http.ResponseWriter, r *http.Request) {
  152. domain, err := utils.PostPara(r, "domain")
  153. if err != nil {
  154. utils.SendErrorResponse(w, "invalid domain given")
  155. return
  156. }
  157. err = tlsCertManager.RemoveCert(domain)
  158. if err != nil {
  159. utils.SendErrorResponse(w, err.Error())
  160. }
  161. }