revoke.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. package certificate
  2. import (
  3. "net/http"
  4. "github.com/0xJacky/Nginx-UI/internal/cert"
  5. "github.com/0xJacky/Nginx-UI/query"
  6. "github.com/gin-gonic/gin"
  7. "github.com/gorilla/websocket"
  8. "github.com/spf13/cast"
  9. "github.com/uozi-tech/cosy/logger"
  10. )
  11. type RevokeCertResponse struct {
  12. Status string `json:"status"`
  13. Message string `json:"message"`
  14. }
  15. func handleRevokeCertLogChan(conn *websocket.Conn, logChan chan string) {
  16. defer func() {
  17. if err := recover(); err != nil {
  18. logger.Error(err)
  19. }
  20. }()
  21. for logString := range logChan {
  22. err := conn.WriteJSON(RevokeCertResponse{
  23. Status: Info,
  24. Message: logString,
  25. })
  26. if err != nil {
  27. logger.Error(err)
  28. return
  29. }
  30. }
  31. }
  32. // RevokeCert handles certificate revocation through websocket connection
  33. func RevokeCert(c *gin.Context) {
  34. id := cast.ToUint64(c.Param("id"))
  35. var upGrader = websocket.Upgrader{
  36. CheckOrigin: func(r *http.Request) bool {
  37. return true
  38. },
  39. }
  40. // upgrade http to websocket
  41. ws, err := upGrader.Upgrade(c.Writer, c.Request, nil)
  42. if err != nil {
  43. logger.Error(err)
  44. return
  45. }
  46. defer func(ws *websocket.Conn) {
  47. _ = ws.Close()
  48. }(ws)
  49. // Get certificate from database
  50. certQuery := query.Cert
  51. certModel, err := certQuery.FirstByID(id)
  52. if err != nil {
  53. logger.Error(err)
  54. _ = ws.WriteJSON(RevokeCertResponse{
  55. Status: Error,
  56. Message: "Certificate not found: " + err.Error(),
  57. })
  58. return
  59. }
  60. // Create payload for revocation
  61. payload := &cert.ConfigPayload{
  62. CertID: id,
  63. ServerName: certModel.Domains,
  64. ChallengeMethod: certModel.ChallengeMethod,
  65. DNSCredentialID: certModel.DnsCredentialID,
  66. ACMEUserID: certModel.ACMEUserID,
  67. KeyType: certModel.KeyType,
  68. Resource: certModel.Resource,
  69. }
  70. logChan := make(chan string, 1)
  71. errChan := make(chan error, 1)
  72. go cert.RevokeCert(payload, logChan, errChan)
  73. go handleRevokeCertLogChan(ws, logChan)
  74. // block, until errChan closes
  75. for err = range errChan {
  76. logger.Error(err)
  77. err = ws.WriteJSON(RevokeCertResponse{
  78. Status: Error,
  79. Message: err.Error(),
  80. })
  81. if err != nil {
  82. logger.Error(err)
  83. return
  84. }
  85. return
  86. }
  87. // Update certificate status in database
  88. err = certModel.Remove()
  89. if err != nil {
  90. logger.Error(err)
  91. _ = ws.WriteJSON(RevokeCertResponse{
  92. Status: Error,
  93. Message: "Failed to delete certificate from database: " + err.Error(),
  94. })
  95. return
  96. }
  97. err = ws.WriteJSON(RevokeCertResponse{
  98. Status: Success,
  99. Message: "Certificate revoked successfully",
  100. })
  101. if err != nil {
  102. logger.Error(err)
  103. return
  104. }
  105. }