1
0

cert.go 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. package cert
  2. import (
  3. "log"
  4. "os"
  5. "time"
  6. "github.com/0xJacky/Nginx-UI/internal/cert/dns"
  7. "github.com/0xJacky/Nginx-UI/internal/nginx"
  8. "github.com/0xJacky/Nginx-UI/internal/transport"
  9. "github.com/0xJacky/Nginx-UI/query"
  10. "github.com/0xJacky/Nginx-UI/settings"
  11. "github.com/go-acme/lego/v4/challenge/dns01"
  12. "github.com/go-acme/lego/v4/challenge/http01"
  13. "github.com/go-acme/lego/v4/lego"
  14. legolog "github.com/go-acme/lego/v4/log"
  15. dnsproviders "github.com/go-acme/lego/v4/providers/dns"
  16. "github.com/pkg/errors"
  17. "github.com/uozi-tech/cosy/logger"
  18. cSettings "github.com/uozi-tech/cosy/settings"
  19. )
  20. const (
  21. HTTP01 = "http01"
  22. DNS01 = "dns01"
  23. )
  24. func IssueCert(payload *ConfigPayload, logChan chan string, errChan chan error) {
  25. defer func() {
  26. if err := recover(); err != nil {
  27. logger.Error(err)
  28. }
  29. }()
  30. // initial a channelWriter to receive logs
  31. cw := NewChannelWriter()
  32. defer close(errChan)
  33. defer close(cw.Ch)
  34. // initial a logger
  35. l := log.New(os.Stderr, "", log.LstdFlags)
  36. l.SetOutput(cw)
  37. // Hijack the (logger) of lego
  38. legolog.Logger = l
  39. // Restore the original logger, fix #876
  40. defer func() {
  41. legolog.Logger = log.New(os.Stderr, "", log.LstdFlags)
  42. }()
  43. l.Println("[INFO] [Nginx UI] Preparing lego configurations")
  44. user, err := payload.GetACMEUser()
  45. if err != nil {
  46. errChan <- errors.Wrap(err, "issue cert get acme user error")
  47. return
  48. }
  49. l.Printf("[INFO] [Nginx UI] ACME User: %s, Email: %s, CA Dir: %s\n", user.Name, user.Email, user.CADir)
  50. // Start a goroutine to fetch and process logs from channel
  51. go func() {
  52. for msg := range cw.Ch {
  53. logChan <- string(msg)
  54. }
  55. }()
  56. config := lego.NewConfig(user)
  57. config.CADirURL = user.CADir
  58. // Skip TLS check
  59. if config.HTTPClient != nil {
  60. t, err := transport.NewTransport(
  61. transport.WithProxy(user.Proxy))
  62. if err != nil {
  63. return
  64. }
  65. config.HTTPClient.Transport = t
  66. }
  67. config.Certificate.KeyType = payload.GetKeyType()
  68. l.Println("[INFO] [Nginx UI] Creating client facilitates communication with the CA server")
  69. // A client facilitates communication with the CA server.
  70. client, err := lego.NewClient(config)
  71. if err != nil {
  72. errChan <- errors.Wrap(err, "issue cert new client error")
  73. return
  74. }
  75. switch payload.ChallengeMethod {
  76. default:
  77. fallthrough
  78. case HTTP01:
  79. l.Println("[INFO] [Nginx UI] Setting HTTP01 challenge provider")
  80. err = client.Challenge.SetHTTP01Provider(
  81. http01.NewProviderServer("",
  82. settings.CertSettings.HTTPChallengePort,
  83. ),
  84. )
  85. case DNS01:
  86. d := query.DnsCredential
  87. dnsCredential, err := d.FirstByID(payload.DNSCredentialID)
  88. if err != nil {
  89. errChan <- errors.Wrap(err, "get dns credential error")
  90. return
  91. }
  92. l.Println("[INFO] [Nginx UI] Setting DNS01 challenge provider")
  93. code := dnsCredential.Config.Code
  94. pConfig, ok := dns.GetProvider(code)
  95. if !ok {
  96. errChan <- errors.Wrap(err, "provider not found")
  97. return
  98. }
  99. l.Println("[INFO] [Nginx UI] Setting environment variables")
  100. if dnsCredential.Config.Configuration != nil {
  101. err = pConfig.SetEnv(*dnsCredential.Config.Configuration)
  102. if err != nil {
  103. errChan <- errors.Wrap(err, "set env error")
  104. logger.Error(err)
  105. break
  106. }
  107. defer func() {
  108. pConfig.CleanEnv()
  109. l.Println("[INFO] [Nginx UI] Environment variables cleaned")
  110. }()
  111. provider, err := dnsproviders.NewDNSChallengeProviderByName(code)
  112. if err != nil {
  113. errChan <- errors.Wrap(err, "new dns challenge provider error")
  114. logger.Error(err)
  115. break
  116. }
  117. challengeOptions := make([]dns01.ChallengeOption, 0)
  118. if len(settings.CertSettings.RecursiveNameservers) > 0 {
  119. challengeOptions = append(challengeOptions,
  120. dns01.AddRecursiveNameservers(settings.CertSettings.RecursiveNameservers),
  121. )
  122. }
  123. err = client.Challenge.SetDNS01Provider(provider, challengeOptions...)
  124. } else {
  125. errChan <- errors.Wrap(err, "environment configuration is empty")
  126. return
  127. }
  128. }
  129. if err != nil {
  130. errChan <- errors.Wrap(err, "challenge error")
  131. return
  132. }
  133. // fix #407
  134. if payload.LegoDisableCNAMESupport {
  135. err = os.Setenv("LEGO_DISABLE_CNAME_SUPPORT", "true")
  136. if err != nil {
  137. errChan <- errors.Wrap(err, "set env flag to disable lego CNAME support error")
  138. return
  139. }
  140. defer func() {
  141. _ = os.Unsetenv("LEGO_DISABLE_CNAME_SUPPORT")
  142. }()
  143. }
  144. if time.Now().Sub(payload.NotBefore).Hours()/24 <= 21 &&
  145. payload.Resource != nil && payload.Resource.Certificate != nil {
  146. renew(payload, client, l, errChan)
  147. } else {
  148. obtain(payload, client, l, errChan)
  149. }
  150. l.Println("[INFO] [Nginx UI] Reloading nginx")
  151. nginx.Reload()
  152. l.Println("[INFO] [Nginx UI] Finished")
  153. if payload.GetCertificatePath() == cSettings.ServerSettings.SSLCert &&
  154. payload.GetCertificateKeyPath() == cSettings.ServerSettings.SSLKey {
  155. ReloadServerTLSCertificate()
  156. }
  157. // Wait log to be written
  158. time.Sleep(2 * time.Second)
  159. }