acme.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582
  1. package acme
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "encoding/json"
  10. "encoding/pem"
  11. "errors"
  12. "fmt"
  13. "net"
  14. "net/http"
  15. "os"
  16. "path/filepath"
  17. "strconv"
  18. "strings"
  19. "time"
  20. "github.com/go-acme/lego/v4/certcrypto"
  21. "github.com/go-acme/lego/v4/certificate"
  22. "github.com/go-acme/lego/v4/challenge/dns01"
  23. "github.com/go-acme/lego/v4/challenge/http01"
  24. "github.com/go-acme/lego/v4/lego"
  25. "github.com/go-acme/lego/v4/registration"
  26. "imuslab.com/zoraxy/mod/database"
  27. "imuslab.com/zoraxy/mod/info/logger"
  28. "imuslab.com/zoraxy/mod/utils"
  29. )
  30. var defaultNameservers = []string{
  31. "8.8.8.8:53", // Google DNS
  32. "8.8.4.4:53", // Google DNS
  33. "1.1.1.1:53", // Cloudflare DNS
  34. "1.0.0.1:53", // Cloudflare DNS
  35. }
  36. type CertificateInfoJSON struct {
  37. AcmeName string `json:"acme_name"` //ACME provider name
  38. AcmeUrl string `json:"acme_url"` //Custom ACME URL (if any)
  39. SkipTLS bool `json:"skip_tls"` //Skip TLS verification of upstream
  40. UseDNS bool `json:"dns"` //Use DNS challenge
  41. PropTimeout int `json:"prop_time"` //Propagation timeout
  42. DNSServers []string `json:"dnsServers"` // DNS servers
  43. }
  44. // ACMEUser represents a user in the ACME system.
  45. type ACMEUser struct {
  46. Email string
  47. Registration *registration.Resource
  48. key crypto.PrivateKey
  49. }
  50. type EABConfig struct {
  51. Kid string `json:"kid"`
  52. HmacKey string `json:"HmacKey"`
  53. }
  54. // GetEmail returns the email of the ACMEUser.
  55. func (u *ACMEUser) GetEmail() string {
  56. return u.Email
  57. }
  58. // GetRegistration returns the registration resource of the ACMEUser.
  59. func (u ACMEUser) GetRegistration() *registration.Resource {
  60. return u.Registration
  61. }
  62. // GetPrivateKey returns the private key of the ACMEUser.
  63. func (u *ACMEUser) GetPrivateKey() crypto.PrivateKey {
  64. return u.key
  65. }
  66. // ACMEHandler handles ACME-related operations.
  67. type ACMEHandler struct {
  68. DefaultAcmeServer string
  69. Port string
  70. Database *database.Database
  71. Logger *logger.Logger
  72. }
  73. // NewACME creates a new ACMEHandler instance.
  74. func NewACME(defaultAcmeServer string, port string, database *database.Database, logger *logger.Logger) *ACMEHandler {
  75. return &ACMEHandler{
  76. DefaultAcmeServer: defaultAcmeServer,
  77. Port: port,
  78. Database: database,
  79. Logger: logger,
  80. }
  81. }
  82. func (a *ACMEHandler) Logf(message string, err error) {
  83. a.Logger.PrintAndLog("ACME", message, err)
  84. }
  85. // Close closes the ACMEHandler.
  86. // ACME Handler does not need to close anything
  87. // Function defined for future compatibility
  88. func (a *ACMEHandler) Close() error {
  89. return nil
  90. }
  91. // ObtainCert obtains a certificate for the specified domains.
  92. func (a *ACMEHandler) ObtainCert(domains []string, certificateName string, email string, caName string, caUrl string, skipTLS bool, useDNS bool, propagationTimeout int, dnsServers string) (bool, error) {
  93. a.Logf("Obtaining certificate for: "+strings.Join(domains, ", "), nil)
  94. // generate private key
  95. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  96. if err != nil {
  97. a.Logf("Private key generation failed", err)
  98. return false, err
  99. }
  100. // create a admin user for our new generation
  101. adminUser := ACMEUser{
  102. Email: email,
  103. key: privateKey,
  104. }
  105. // create config
  106. config := lego.NewConfig(&adminUser)
  107. // skip TLS verify if need
  108. // Ref: https://github.com/go-acme/lego/blob/6af2c756ac73a9cb401621afca722d0f4112b1b8/lego/client_config.go#L74
  109. if skipTLS {
  110. a.Logf("Ignoring TLS/SSL Verification Error for ACME Server", nil)
  111. config.HTTPClient.Transport = &http.Transport{
  112. Proxy: http.ProxyFromEnvironment,
  113. DialContext: (&net.Dialer{
  114. Timeout: 30 * time.Second,
  115. KeepAlive: 30 * time.Second,
  116. }).DialContext,
  117. TLSHandshakeTimeout: 30 * time.Second,
  118. ResponseHeaderTimeout: 30 * time.Second,
  119. TLSClientConfig: &tls.Config{
  120. InsecureSkipVerify: true,
  121. },
  122. }
  123. }
  124. //Fallback to Let's Encrypt if it is not set
  125. if caName == "" {
  126. caName = "Let's Encrypt"
  127. }
  128. // setup the custom ACME url endpoint.
  129. if caUrl != "" {
  130. config.CADirURL = caUrl
  131. }
  132. // if not custom ACME url, load it from ca.json
  133. if caName == "custom" {
  134. a.Logf("Using Custom ACME "+caUrl+" for CA Directory URL", nil)
  135. } else {
  136. caLinkOverwrite, err := loadCAApiServerFromName(caName)
  137. if err == nil {
  138. config.CADirURL = caLinkOverwrite
  139. a.Logf("Using "+caLinkOverwrite+" for CA Directory URL", nil)
  140. } else {
  141. // (caName == "" || caUrl == "") will use default acme
  142. config.CADirURL = a.DefaultAcmeServer
  143. a.Logf("Using Default ACME "+a.DefaultAcmeServer+" for CA Directory URL", nil)
  144. }
  145. }
  146. config.Certificate.KeyType = certcrypto.RSA2048
  147. client, err := lego.NewClient(config)
  148. if err != nil {
  149. a.Logf("Failed to spawn new ACME client from current config", err)
  150. return false, err
  151. }
  152. // Load certificate info from JSON file
  153. certInfo, err := LoadCertInfoJSON(fmt.Sprintf("./conf/certs/%s.json", certificateName))
  154. if err == nil {
  155. useDNS = certInfo.UseDNS
  156. if dnsServers == "" && certInfo.DNSServers != nil && len(certInfo.DNSServers) > 0 {
  157. dnsServers = strings.Join(certInfo.DNSServers, ",")
  158. }
  159. propagationTimeout = certInfo.PropTimeout
  160. }
  161. // Clean DNS servers
  162. dnsNameservers := strings.Split(dnsServers, ",")
  163. for i := range dnsNameservers {
  164. dnsNameservers[i] = strings.TrimSpace(dnsNameservers[i])
  165. }
  166. // setup how to receive challenge
  167. if useDNS {
  168. if !a.Database.TableExists("acme") {
  169. a.Database.NewTable("acme")
  170. return false, errors.New("DNS Provider and DNS Credential configuration required for ACME Provider (Error -1)")
  171. }
  172. if !a.Database.KeyExists("acme", certificateName+"_dns_provider") || !a.Database.KeyExists("acme", certificateName+"_dns_credentials") {
  173. return false, errors.New("DNS Provider and DNS Credential configuration required for ACME Provider (Error -2)")
  174. }
  175. var dnsCredentials string
  176. err := a.Database.Read("acme", certificateName+"_dns_credentials", &dnsCredentials)
  177. if err != nil {
  178. a.Logf("Read DNS credential failed", err)
  179. return false, err
  180. }
  181. var dnsProvider string
  182. err = a.Database.Read("acme", certificateName+"_dns_provider", &dnsProvider)
  183. if err != nil {
  184. a.Logf("Read DNS Provider failed", err)
  185. return false, err
  186. }
  187. provider, err := GetDnsChallengeProviderByName(dnsProvider, dnsCredentials, propagationTimeout)
  188. if err != nil {
  189. a.Logf("Unable to resolve DNS challenge provider", err)
  190. return false, err
  191. }
  192. if len(dnsNameservers) > 0 && dnsNameservers[0] != "" {
  193. a.Logf("Using DNS servers: "+strings.Join(dnsNameservers, ", "), nil)
  194. err = client.Challenge.SetDNS01Provider(provider, dns01.AddRecursiveNameservers(dnsNameservers))
  195. } else {
  196. // Use default DNS-01 nameservers if dnsServers is empty
  197. err = client.Challenge.SetDNS01Provider(provider, dns01.AddRecursiveNameservers(defaultNameservers))
  198. }
  199. if err != nil {
  200. a.Logf("Failed to resolve DNS01 Provider", err)
  201. return false, err
  202. }
  203. } else {
  204. err = client.Challenge.SetHTTP01Provider(http01.NewProviderServer("", a.Port))
  205. if err != nil {
  206. a.Logf("Failed to resolve HTTP01 Provider", err)
  207. return false, err
  208. }
  209. }
  210. // New users will need to register
  211. /*
  212. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  213. if err != nil {
  214. log.Println(err)
  215. return false, err
  216. }
  217. */
  218. var reg *registration.Resource
  219. // New users will need to register
  220. if client.GetExternalAccountRequired() {
  221. a.Logf("External Account Required for this ACME Provider", nil)
  222. // IF KID and HmacEncoded is overidden
  223. if !a.Database.TableExists("acme") {
  224. a.Database.NewTable("acme")
  225. return false, errors.New("kid and HmacEncoded configuration required for ACME Provider (Error -1)")
  226. }
  227. if !a.Database.KeyExists("acme", config.CADirURL+"_kid") || !a.Database.KeyExists("acme", config.CADirURL+"_hmacEncoded") {
  228. return false, errors.New("kid and HmacEncoded configuration required for ACME Provider (Error -2)")
  229. }
  230. var kid string
  231. var hmacEncoded string
  232. err := a.Database.Read("acme", config.CADirURL+"_kid", &kid)
  233. if err != nil {
  234. a.Logf("Failed to read kid from database", err)
  235. return false, err
  236. }
  237. err = a.Database.Read("acme", config.CADirURL+"_hmacEncoded", &hmacEncoded)
  238. if err != nil {
  239. a.Logf("Failed to read HMAC from database", err)
  240. return false, err
  241. }
  242. a.Logf("EAB Credential retrieved: "+kid+" / "+hmacEncoded, nil)
  243. if kid != "" && hmacEncoded != "" {
  244. reg, err = client.Registration.RegisterWithExternalAccountBinding(registration.RegisterEABOptions{
  245. TermsOfServiceAgreed: true,
  246. Kid: kid,
  247. HmacEncoded: hmacEncoded,
  248. })
  249. }
  250. if err != nil {
  251. a.Logf("Register with external account binder failed", err)
  252. return false, err
  253. }
  254. //return false, errors.New("External Account Required for this ACME Provider.")
  255. } else {
  256. reg, err = client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  257. if err != nil {
  258. a.Logf("Unable to register client", err)
  259. return false, err
  260. }
  261. }
  262. adminUser.Registration = reg
  263. // obtain the certificate
  264. request := certificate.ObtainRequest{
  265. Domains: domains,
  266. Bundle: true,
  267. }
  268. certificates, err := client.Certificate.Obtain(request)
  269. if err != nil {
  270. a.Logf("Obtain certificate failed", err)
  271. return false, err
  272. }
  273. // Each certificate comes back with the cert bytes, the bytes of the client's
  274. // private key, and a certificate URL.
  275. err = os.WriteFile("./conf/certs/"+certificateName+".pem", certificates.Certificate, 0777)
  276. if err != nil {
  277. a.Logf("Failed to write public key to disk", err)
  278. return false, err
  279. }
  280. err = os.WriteFile("./conf/certs/"+certificateName+".key", certificates.PrivateKey, 0777)
  281. if err != nil {
  282. a.Logf("Failed to write private key to disk", err)
  283. return false, err
  284. }
  285. // Save certificate's ACME info for renew usage
  286. certInfo = &CertificateInfoJSON{
  287. AcmeName: caName,
  288. AcmeUrl: caUrl,
  289. SkipTLS: skipTLS,
  290. UseDNS: useDNS,
  291. PropTimeout: propagationTimeout,
  292. DNSServers: dnsNameservers,
  293. }
  294. certInfoBytes, err := json.Marshal(certInfo)
  295. if err != nil {
  296. a.Logf("Marshal certificate renew config failed", err)
  297. return false, err
  298. }
  299. err = os.WriteFile("./conf/certs/"+certificateName+".json", certInfoBytes, 0777)
  300. if err != nil {
  301. a.Logf("Failed to write certificate renew config to file", err)
  302. return false, err
  303. }
  304. return true, nil
  305. }
  306. // CheckCertificate returns a list of domains that are in expired certificates.
  307. // It will return all domains that is in expired certificates
  308. // *** if there is a vaild certificate contains the domain and there is a expired certificate contains the same domain
  309. // it will said expired as well!
  310. func (a *ACMEHandler) CheckCertificate() []string {
  311. // read from dir
  312. filenames, err := os.ReadDir("./conf/certs/")
  313. expiredCerts := []string{}
  314. if err != nil {
  315. a.Logf("Failed to load certificate folder", err)
  316. return []string{}
  317. }
  318. for _, filename := range filenames {
  319. certFilepath := filepath.Join("./conf/certs/", filename.Name())
  320. certBytes, err := os.ReadFile(certFilepath)
  321. if err != nil {
  322. // Unable to load this file
  323. continue
  324. } else {
  325. // Cert loaded. Check its expiry time
  326. block, _ := pem.Decode(certBytes)
  327. if block != nil {
  328. cert, err := x509.ParseCertificate(block.Bytes)
  329. if err == nil {
  330. elapsed := time.Since(cert.NotAfter)
  331. if elapsed > 0 {
  332. // if it is expired then add it in
  333. // make sure it's uniqueless
  334. for _, dnsName := range cert.DNSNames {
  335. if !contains(expiredCerts, dnsName) {
  336. expiredCerts = append(expiredCerts, dnsName)
  337. }
  338. }
  339. if !contains(expiredCerts, cert.Subject.CommonName) {
  340. expiredCerts = append(expiredCerts, cert.Subject.CommonName)
  341. }
  342. }
  343. }
  344. }
  345. }
  346. }
  347. return expiredCerts
  348. }
  349. // return the current port number
  350. func (a *ACMEHandler) Getport() string {
  351. return a.Port
  352. }
  353. // contains checks if a string is present in a slice.
  354. func contains(slice []string, str string) bool {
  355. for _, s := range slice {
  356. if s == str {
  357. return true
  358. }
  359. }
  360. return false
  361. }
  362. // HandleGetExpiredDomains handles the HTTP GET request to retrieve the list of expired domains.
  363. // It calls the CheckCertificate method to obtain the expired domains and sends a JSON response
  364. // containing the list of expired domains.
  365. func (a *ACMEHandler) HandleGetExpiredDomains(w http.ResponseWriter, r *http.Request) {
  366. type ExpiredDomains struct {
  367. Domain []string `json:"domain"`
  368. }
  369. info := ExpiredDomains{
  370. Domain: a.CheckCertificate(),
  371. }
  372. js, _ := json.MarshalIndent(info, "", " ")
  373. utils.SendJSONResponse(w, string(js))
  374. }
  375. // HandleRenewCertificate handles the HTTP GET request to renew a certificate for the provided domains.
  376. // It retrieves the domains and filename parameters from the request, calls the ObtainCert method
  377. // to renew the certificate, and sends a JSON response indicating the result of the renewal process.
  378. func (a *ACMEHandler) HandleRenewCertificate(w http.ResponseWriter, r *http.Request) {
  379. domainPara, err := utils.PostPara(r, "domains")
  380. if err != nil {
  381. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  382. return
  383. }
  384. filename, err := utils.PostPara(r, "filename")
  385. if err != nil {
  386. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  387. return
  388. }
  389. //Make sure the wildcard * do not goes into the filename
  390. filename = strings.ReplaceAll(filename, "*", "_")
  391. email, err := utils.PostPara(r, "email")
  392. if err != nil {
  393. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  394. return
  395. }
  396. var caUrl string
  397. ca, err := utils.PostPara(r, "ca")
  398. if err != nil {
  399. a.Logf("CA not set. Using default", nil)
  400. ca, caUrl = "", ""
  401. }
  402. if ca == "custom" {
  403. caUrl, err = utils.PostPara(r, "caURL")
  404. if err != nil {
  405. a.Logf("Custom CA set but no URL provide, Using default", nil)
  406. ca, caUrl = "", ""
  407. }
  408. }
  409. if ca == "" {
  410. //default. Use Let's Encrypt
  411. ca = "Let's Encrypt"
  412. }
  413. var skipTLS bool
  414. if skipTLSString, err := utils.PostPara(r, "skipTLS"); err != nil {
  415. skipTLS = false
  416. } else if skipTLSString != "true" {
  417. skipTLS = false
  418. } else {
  419. skipTLS = true
  420. }
  421. var dns bool
  422. if dnsString, err := utils.PostPara(r, "dns"); err != nil {
  423. dns = false
  424. } else if dnsString != "true" {
  425. dns = false
  426. } else {
  427. dns = true
  428. }
  429. domains := strings.Split(domainPara, ",")
  430. // Default propagation timeout is 300 seconds
  431. propagationTimeout := 300
  432. if dns {
  433. ppgTimeout, err := utils.PostPara(r, "ppgTimeout")
  434. if err == nil {
  435. propagationTimeout, err = strconv.Atoi(ppgTimeout)
  436. if err != nil {
  437. utils.SendErrorResponse(w, "Invalid propagation timeout value")
  438. return
  439. }
  440. if propagationTimeout < 60 {
  441. //Minimum propagation timeout is 60 seconds
  442. propagationTimeout = 60
  443. }
  444. }
  445. }
  446. //Clean spaces in front or behind each domain
  447. cleanedDomains := []string{}
  448. for _, domain := range domains {
  449. cleanedDomains = append(cleanedDomains, strings.TrimSpace(domain))
  450. }
  451. // Extract DNS servers from the request
  452. var dnsServers []string
  453. dnsServersPara, err := utils.PostPara(r, "dnsServers")
  454. if err == nil && dnsServersPara != "" {
  455. dnsServers = strings.Split(dnsServersPara, ",")
  456. for i := range dnsServers {
  457. dnsServers[i] = strings.TrimSpace(dnsServers[i])
  458. }
  459. }
  460. // Convert DNS servers slice to a single string
  461. dnsServersString := strings.Join(dnsServers, ",")
  462. result, err := a.ObtainCert(cleanedDomains, filename, email, ca, caUrl, skipTLS, dns, propagationTimeout, dnsServersString)
  463. if err != nil {
  464. utils.SendErrorResponse(w, jsonEscape(err.Error()))
  465. return
  466. }
  467. utils.SendJSONResponse(w, strconv.FormatBool(result))
  468. }
  469. // Escape JSON string
  470. func jsonEscape(i string) string {
  471. b, err := json.Marshal(i)
  472. if err != nil {
  473. //log.Println("Unable to escape json data: " + err.Error())
  474. return i
  475. }
  476. s := string(b)
  477. return s[1 : len(s)-1]
  478. }
  479. // Helper function to check if a port is in use
  480. func IsPortInUse(port int) bool {
  481. address := fmt.Sprintf(":%d", port)
  482. listener, err := net.Listen("tcp", address)
  483. if err != nil {
  484. return true // Port is in use
  485. }
  486. defer listener.Close()
  487. return false // Port is not in use
  488. }
  489. // Load cert information from json file
  490. func LoadCertInfoJSON(filename string) (*CertificateInfoJSON, error) {
  491. certInfoBytes, err := os.ReadFile(filename)
  492. if err != nil {
  493. return nil, err
  494. }
  495. certInfo := &CertificateInfoJSON{}
  496. if err = json.Unmarshal(certInfoBytes, certInfo); err != nil {
  497. return nil, err
  498. }
  499. // Clean DNS servers
  500. for i := range certInfo.DNSServers {
  501. certInfo.DNSServers[i] = strings.TrimSpace(certInfo.DNSServers[i])
  502. }
  503. return certInfo, nil
  504. }