cert.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183
  1. package tool
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "github.com/0xJacky/Nginx-UI/server/model"
  10. "github.com/0xJacky/Nginx-UI/server/settings"
  11. "github.com/0xJacky/Nginx-UI/server/tool/nginx"
  12. "github.com/go-acme/lego/v4/certcrypto"
  13. "github.com/go-acme/lego/v4/certificate"
  14. "github.com/go-acme/lego/v4/challenge/http01"
  15. "github.com/go-acme/lego/v4/lego"
  16. "github.com/go-acme/lego/v4/registration"
  17. "github.com/pkg/errors"
  18. "io"
  19. "io/ioutil"
  20. "log"
  21. "net"
  22. "net/http"
  23. "os"
  24. "path/filepath"
  25. "time"
  26. )
  27. // MyUser You'll need a user or account type that implements acme.User
  28. type MyUser struct {
  29. Email string
  30. Registration *registration.Resource
  31. key crypto.PrivateKey
  32. }
  33. func (u *MyUser) GetEmail() string {
  34. return u.Email
  35. }
  36. func (u MyUser) GetRegistration() *registration.Resource {
  37. return u.Registration
  38. }
  39. func (u *MyUser) GetPrivateKey() crypto.PrivateKey {
  40. return u.key
  41. }
  42. func AutoCert() {
  43. for {
  44. log.Println("[AutoCert] Start")
  45. autoCertList := model.GetAutoCertList()
  46. for i := range autoCertList {
  47. domain := autoCertList[i].Domain
  48. key, err := GetCertInfo(domain)
  49. if err != nil {
  50. log.Println("GetCertInfo Err", err)
  51. // 获取证书信息失败,本次跳过
  52. continue
  53. }
  54. // 未到一个月
  55. if time.Now().Before(key.NotBefore.AddDate(0, 1, 0)) {
  56. continue
  57. }
  58. // 过一个月了,重新申请证书
  59. err = IssueCert(domain)
  60. if err != nil {
  61. log.Println(err)
  62. }
  63. }
  64. time.Sleep(1 * time.Hour)
  65. }
  66. }
  67. func GetCertInfo(domain string) (key *x509.Certificate, err error) {
  68. var response *http.Response
  69. client := &http.Client{
  70. Transport: &http.Transport{
  71. DialContext: (&net.Dialer{
  72. Timeout: 5 * time.Second,
  73. }).DialContext,
  74. DisableKeepAlives: true,
  75. TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
  76. },
  77. Timeout: 5 * time.Second,
  78. }
  79. response, err = client.Get("https://" + domain)
  80. if err != nil {
  81. err = errors.Wrap(err, "get cert info error")
  82. return
  83. }
  84. defer func(Body io.ReadCloser) {
  85. err = Body.Close()
  86. if err != nil {
  87. log.Println(err)
  88. return
  89. }
  90. }(response.Body)
  91. key = response.TLS.PeerCertificates[0]
  92. return
  93. }
  94. func IssueCert(domain string) error {
  95. // Create a user. New accounts need an email and private key to start.
  96. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  97. if err != nil {
  98. return errors.Wrap(err, "issue cert generate key error")
  99. }
  100. myUser := MyUser{
  101. Email: settings.ServerSettings.Email,
  102. key: privateKey,
  103. }
  104. config := lego.NewConfig(&myUser)
  105. if settings.ServerSettings.Demo {
  106. config.CADirURL = "https://acme-staging-v02.api.letsencrypt.org/directory"
  107. }
  108. config.Certificate.KeyType = certcrypto.RSA2048
  109. // A client facilitates communication with the CA server.
  110. client, err := lego.NewClient(config)
  111. if err != nil {
  112. return errors.Wrap(err, "issue cert new client error")
  113. }
  114. err = client.Challenge.SetHTTP01Provider(
  115. http01.NewProviderServer("",
  116. settings.ServerSettings.HTTPChallengePort,
  117. ),
  118. )
  119. if err != nil {
  120. return errors.Wrap(err, "issue cert challenge fail")
  121. }
  122. // New users will need to register
  123. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  124. if err != nil {
  125. log.Println(err)
  126. return errors.Wrap(err, "issue cert register fail")
  127. }
  128. myUser.Registration = reg
  129. request := certificate.ObtainRequest{
  130. Domains: []string{domain},
  131. Bundle: true,
  132. }
  133. certificates, err := client.Certificate.Obtain(request)
  134. if err != nil {
  135. return errors.Wrap(err, "issue cert fail to obtain")
  136. }
  137. saveDir := nginx.GetNginxConfPath("ssl/" + domain)
  138. if _, err := os.Stat(saveDir); os.IsNotExist(err) {
  139. err = os.Mkdir(saveDir, 0755)
  140. if err != nil {
  141. return errors.Wrap(err, "issue cert fail to create")
  142. }
  143. }
  144. // Each certificate comes back with the cert bytes, the bytes of the client's
  145. // private key, and a certificate URL. SAVE THESE TO DISK.
  146. err = ioutil.WriteFile(filepath.Join(saveDir, "fullchain.cer"),
  147. certificates.Certificate, 0644)
  148. if err != nil {
  149. log.Println(err)
  150. return errors.Wrap(err, "issue cert write fullchain.cer fail")
  151. }
  152. err = ioutil.WriteFile(filepath.Join(saveDir, domain+".key"),
  153. certificates.PrivateKey, 0644)
  154. if err != nil {
  155. log.Println(err)
  156. return errors.Wrap(err, "issue cert write key fail")
  157. }
  158. nginx.ReloadNginx()
  159. return nil
  160. }