| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103 | package modelimport (	"github.com/0xJacky/Nginx-UI/internal/nginx"	"github.com/go-acme/lego/v4/certcrypto"	"github.com/lib/pq"	"os")const (	AutoCertEnabled           = 1	AutoCertDisabled          = -1	CertChallengeMethodHTTP01 = "http01"	CertChallengeMethodDNS01  = "dns01")type CertDomains []stringtype Cert struct {	Model	Name                  string             `json:"name"`	Domains               pq.StringArray     `json:"domains" gorm:"type:text[]"`	Filename              string             `json:"filename"`	SSLCertificatePath    string             `json:"ssl_certificate_path"`	SSLCertificateKeyPath string             `json:"ssl_certificate_key_path"`	AutoCert              int                `json:"auto_cert"`	ChallengeMethod       string             `json:"challenge_method"`	DnsCredentialID       int                `json:"dns_credential_id"`	DnsCredential         *DnsCredential     `json:"dns_credential,omitempty"`	KeyType               certcrypto.KeyType `json:"key_type"`	Log                   string             `json:"log"`}func FirstCert(confName string) (c Cert, err error) {	err = db.First(&c, &Cert{		Filename: confName,	}).Error	return}func FirstOrCreateCert(confName string) (c Cert, err error) {	// Filename is used to check whether this site is enabled	err = db.FirstOrCreate(&c, &Cert{Name: confName, Filename: confName}).Error	return}func (c *Cert) Insert() error {	return db.Create(c).Error}func GetAutoCertList() (c []*Cert) {	var t []*Cert	if db == nil {		return	}	db.Where("auto_cert", AutoCertEnabled).Find(&t)	// check if this domain is enabled	enabledConfig, err := os.ReadDir(nginx.GetConfPath("sites-enabled"))	if err != nil {		return	}	enabledConfigMap := make(map[string]bool)	for i := range enabledConfig {		enabledConfigMap[enabledConfig[i].Name()] = true	}	for _, v := range t {		if v.ChallengeMethod == CertChallengeMethodDNS01 || enabledConfigMap[v.Filename] == true {			c = append(c, v)		}	}	return}func (c *Cert) Updates(n *Cert) error {	return db.Model(&Cert{}).Where("id", c.ID).Updates(n).Error}func (c *Cert) ClearLog() {	db.Model(&Cert{}).Where("id", c.ID).Update("log", "")}func (c *Cert) Remove() error {	if c.Filename == "" {		return db.Delete(c).Error	}	return db.Where("filename", c.Filename).Delete(c).Error}func (c *Cert) GetKeyType() certcrypto.KeyType {	switch c.KeyType {	case certcrypto.RSA2048, certcrypto.RSA3072, certcrypto.RSA4096,		certcrypto.EC256, certcrypto.EC384:		return c.KeyType	}	return certcrypto.RSA2048}
 |