cert.go 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179
  1. package tool
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "github.com/0xJacky/Nginx-UI/server/model"
  10. "github.com/0xJacky/Nginx-UI/server/settings"
  11. "github.com/0xJacky/Nginx-UI/server/tool/nginx"
  12. "github.com/go-acme/lego/v4/certcrypto"
  13. "github.com/go-acme/lego/v4/certificate"
  14. "github.com/go-acme/lego/v4/challenge/http01"
  15. "github.com/go-acme/lego/v4/lego"
  16. "github.com/go-acme/lego/v4/registration"
  17. "io"
  18. "io/ioutil"
  19. "log"
  20. "net/http"
  21. "os"
  22. "path/filepath"
  23. "time"
  24. )
  25. // MyUser You'll need a user or account type that implements acme.User
  26. type MyUser struct {
  27. Email string
  28. Registration *registration.Resource
  29. key crypto.PrivateKey
  30. }
  31. func (u *MyUser) GetEmail() string {
  32. return u.Email
  33. }
  34. func (u MyUser) GetRegistration() *registration.Resource {
  35. return u.Registration
  36. }
  37. func (u *MyUser) GetPrivateKey() crypto.PrivateKey {
  38. return u.key
  39. }
  40. func AutoCert() {
  41. for {
  42. log.Println("[AutoCert] Start")
  43. autoCertList := model.GetAutoCertList()
  44. for i := range autoCertList {
  45. domain := autoCertList[i].Domain
  46. key, err := GetCertInfo(domain)
  47. if err != nil {
  48. // 获取证书信息失败,本次跳过
  49. continue
  50. }
  51. // 未到一个月
  52. if time.Now().Before(key.NotBefore.AddDate(0, 1, 0)) {
  53. continue
  54. }
  55. // 过一个月了,重新申请证书
  56. err = IssueCert(domain)
  57. if err != nil {
  58. log.Println(err)
  59. }
  60. }
  61. time.Sleep(1 * time.Hour)
  62. }
  63. }
  64. func GetCertInfo(domain string) (key *x509.Certificate, err error) {
  65. var response *http.Response
  66. ts := &http.Transport{
  67. TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
  68. }
  69. client := &http.Client{Transport: ts}
  70. response, err = client.Get("https://" + domain)
  71. if err != nil {
  72. return
  73. }
  74. defer func(Body io.ReadCloser) {
  75. err = Body.Close()
  76. if err != nil {
  77. log.Println(err)
  78. return
  79. }
  80. }(response.Body)
  81. key = response.TLS.PeerCertificates[0]
  82. return
  83. }
  84. func IssueCert(domain string) error {
  85. // Create a user. New accounts need an email and private key to start.
  86. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  87. if err != nil {
  88. log.Println(err)
  89. return err
  90. }
  91. myUser := MyUser{
  92. Email: settings.ServerSettings.Email,
  93. key: privateKey,
  94. }
  95. config := lego.NewConfig(&myUser)
  96. if settings.ServerSettings.Demo {
  97. config.CADirURL = "https://acme-staging-v02.api.letsencrypt.org/directory"
  98. }
  99. config.Certificate.KeyType = certcrypto.RSA2048
  100. // A client facilitates communication with the CA server.
  101. client, err := lego.NewClient(config)
  102. if err != nil {
  103. log.Println(err)
  104. return err
  105. }
  106. err = client.Challenge.SetHTTP01Provider(
  107. http01.NewProviderServer("",
  108. settings.ServerSettings.HTTPChallengePort,
  109. ),
  110. )
  111. if err != nil {
  112. log.Println(err)
  113. return err
  114. }
  115. // New users will need to register
  116. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  117. if err != nil {
  118. log.Println(err)
  119. return err
  120. }
  121. myUser.Registration = reg
  122. request := certificate.ObtainRequest{
  123. Domains: []string{domain},
  124. Bundle: true,
  125. }
  126. certificates, err := client.Certificate.Obtain(request)
  127. if err != nil {
  128. log.Println(err)
  129. return err
  130. }
  131. saveDir := nginx.GetNginxConfPath("ssl/" + domain)
  132. if _, err := os.Stat(saveDir); os.IsNotExist(err) {
  133. err = os.Mkdir(saveDir, 0755)
  134. if err != nil {
  135. log.Println("fail to create", saveDir)
  136. return err
  137. }
  138. }
  139. // Each certificate comes back with the cert bytes, the bytes of the client's
  140. // private key, and a certificate URL. SAVE THESE TO DISK.
  141. err = ioutil.WriteFile(filepath.Join(saveDir, "fullchain.cer"),
  142. certificates.Certificate, 0644)
  143. if err != nil {
  144. log.Println(err)
  145. return err
  146. }
  147. err = ioutil.WriteFile(filepath.Join(saveDir, domain+".key"),
  148. certificates.PrivateKey, 0644)
  149. if err != nil {
  150. log.Println(err)
  151. return err
  152. }
  153. nginx.ReloadNginx()
  154. return nil
  155. }