issue.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219
  1. package cert
  2. import (
  3. "log"
  4. "os"
  5. "time"
  6. "github.com/0xJacky/Nginx-UI/internal/cert/dns"
  7. "github.com/0xJacky/Nginx-UI/internal/nginx"
  8. "github.com/0xJacky/Nginx-UI/internal/transport"
  9. "github.com/0xJacky/Nginx-UI/model"
  10. "github.com/0xJacky/Nginx-UI/query"
  11. "github.com/0xJacky/Nginx-UI/settings"
  12. "github.com/go-acme/lego/v4/challenge/dns01"
  13. "github.com/go-acme/lego/v4/challenge/http01"
  14. "github.com/go-acme/lego/v4/lego"
  15. legolog "github.com/go-acme/lego/v4/log"
  16. dnsproviders "github.com/go-acme/lego/v4/providers/dns"
  17. "github.com/pkg/errors"
  18. "github.com/uozi-tech/cosy/logger"
  19. cSettings "github.com/uozi-tech/cosy/settings"
  20. )
  21. const (
  22. HTTP01 = "http01"
  23. DNS01 = "dns01"
  24. )
  25. func IssueCert(payload *ConfigPayload, logChan chan string, errChan chan error) {
  26. defer func() {
  27. if err := recover(); err != nil {
  28. logger.Error(err)
  29. }
  30. }()
  31. // initial a channelWriter to receive logs
  32. cw := NewChannelWriter()
  33. defer close(errChan)
  34. defer close(cw.Ch)
  35. // initial a logger
  36. l := log.New(os.Stderr, "", log.LstdFlags)
  37. l.SetOutput(cw)
  38. // Hijack the (logger) of lego
  39. legolog.Logger = l
  40. // Restore the original logger, fix #876
  41. defer func() {
  42. legolog.Logger = log.New(os.Stderr, "", log.LstdFlags)
  43. }()
  44. l.Println("[INFO] [Nginx UI] Preparing lego configurations")
  45. user, err := payload.GetACMEUser()
  46. if err != nil {
  47. errChan <- errors.Wrap(err, "issue cert get acme user error")
  48. return
  49. }
  50. l.Printf("[INFO] [Nginx UI] ACME User: %s, Email: %s, CA Dir: %s\n", user.Name, user.Email, user.CADir)
  51. // Start a goroutine to fetch and process logs from channel
  52. go func() {
  53. for msg := range cw.Ch {
  54. logChan <- string(msg)
  55. }
  56. }()
  57. config := lego.NewConfig(user)
  58. config.CADirURL = user.CADir
  59. // Skip TLS check
  60. if config.HTTPClient != nil {
  61. t, err := transport.NewTransport(
  62. transport.WithProxy(user.Proxy))
  63. if err != nil {
  64. return
  65. }
  66. config.HTTPClient.Transport = t
  67. }
  68. config.Certificate.KeyType = payload.GetKeyType()
  69. l.Println("[INFO] [Nginx UI] Creating client facilitates communication with the CA server")
  70. // A client facilitates communication with the CA server.
  71. client, err := lego.NewClient(config)
  72. if err != nil {
  73. errChan <- errors.Wrap(err, "issue cert new client error")
  74. return
  75. }
  76. switch payload.ChallengeMethod {
  77. default:
  78. fallthrough
  79. case HTTP01:
  80. l.Println("[INFO] [Nginx UI] Setting HTTP01 challenge provider")
  81. err = client.Challenge.SetHTTP01Provider(
  82. http01.NewProviderServer("",
  83. settings.CertSettings.HTTPChallengePort,
  84. ),
  85. )
  86. case DNS01:
  87. d := query.DnsCredential
  88. dnsCredential, err := d.FirstByID(payload.DNSCredentialID)
  89. if err != nil {
  90. errChan <- errors.Wrap(err, "get dns credential error")
  91. return
  92. }
  93. l.Println("[INFO] [Nginx UI] Setting DNS01 challenge provider")
  94. code := dnsCredential.Config.Code
  95. pConfig, ok := dns.GetProvider(code)
  96. if !ok {
  97. errChan <- errors.Wrap(err, "provider not found")
  98. return
  99. }
  100. l.Println("[INFO] [Nginx UI] Setting environment variables")
  101. if dnsCredential.Config.Configuration != nil {
  102. err = pConfig.SetEnv(*dnsCredential.Config.Configuration)
  103. if err != nil {
  104. errChan <- errors.Wrap(err, "set env error")
  105. logger.Error(err)
  106. break
  107. }
  108. defer func() {
  109. pConfig.CleanEnv()
  110. l.Println("[INFO] [Nginx UI] Environment variables cleaned")
  111. }()
  112. provider, err := dnsproviders.NewDNSChallengeProviderByName(code)
  113. if err != nil {
  114. errChan <- errors.Wrap(err, "new dns challenge provider error")
  115. logger.Error(err)
  116. break
  117. }
  118. challengeOptions := make([]dns01.ChallengeOption, 0)
  119. if len(settings.CertSettings.RecursiveNameservers) > 0 {
  120. challengeOptions = append(challengeOptions,
  121. dns01.AddRecursiveNameservers(settings.CertSettings.RecursiveNameservers),
  122. )
  123. }
  124. err = client.Challenge.SetDNS01Provider(provider, challengeOptions...)
  125. } else {
  126. errChan <- errors.Wrap(err, "environment configuration is empty")
  127. return
  128. }
  129. }
  130. if err != nil {
  131. errChan <- errors.Wrap(err, "challenge error")
  132. return
  133. }
  134. // fix #407
  135. if payload.LegoDisableCNAMESupport {
  136. err = os.Setenv("LEGO_DISABLE_CNAME_SUPPORT", "true")
  137. if err != nil {
  138. errChan <- errors.Wrap(err, "set env flag to disable lego CNAME support error")
  139. return
  140. }
  141. defer func() {
  142. _ = os.Unsetenv("LEGO_DISABLE_CNAME_SUPPORT")
  143. }()
  144. }
  145. // Backup current certificate and key if RevokeOld is true
  146. var oldResource *model.CertificateResource
  147. if payload.RevokeOld && payload.Resource != nil && payload.Resource.Certificate != nil {
  148. l.Println("[INFO] [Nginx UI] Backing up current certificate for later revocation")
  149. // Save a copy of the old certificate and key
  150. oldResource = &model.CertificateResource{
  151. Resource: payload.Resource.Resource,
  152. Certificate: payload.Resource.Certificate,
  153. PrivateKey: payload.Resource.PrivateKey,
  154. }
  155. }
  156. if time.Now().Sub(payload.NotBefore).Hours()/24 <= 21 &&
  157. payload.Resource != nil && payload.Resource.Certificate != nil {
  158. renew(payload, client, l, errChan)
  159. } else {
  160. obtain(payload, client, l, errChan)
  161. }
  162. l.Println("[INFO] [Nginx UI] Reloading nginx")
  163. nginx.Reload()
  164. l.Println("[INFO] [Nginx UI] Finished")
  165. if payload.GetCertificatePath() == cSettings.ServerSettings.SSLCert &&
  166. payload.GetCertificateKeyPath() == cSettings.ServerSettings.SSLKey {
  167. ReloadServerTLSCertificate()
  168. }
  169. // Revoke old certificate if requested and we have a backup
  170. if payload.RevokeOld && oldResource != nil && len(oldResource.Certificate) > 0 {
  171. l.Println("[INFO] [Nginx UI] Revoking old certificate")
  172. // Create a payload for revocation using old certificate
  173. revokePayload := &ConfigPayload{
  174. CertID: payload.CertID,
  175. ServerName: payload.ServerName,
  176. ChallengeMethod: payload.ChallengeMethod,
  177. DNSCredentialID: payload.DNSCredentialID,
  178. ACMEUserID: payload.ACMEUserID,
  179. KeyType: payload.KeyType,
  180. Resource: oldResource,
  181. }
  182. // Revoke the old certificate
  183. revoke(revokePayload, client, l, errChan)
  184. }
  185. // Wait log to be written
  186. time.Sleep(2 * time.Second)
  187. }