mirror of
https://github.com/1Panel-dev/1Panel.git
synced 2025-10-08 22:46:51 +08:00
202 lines
5.2 KiB
Go
202 lines
5.2 KiB
Go
package ssl
|
|
|
|
import (
|
|
"crypto"
|
|
"github.com/1Panel-dev/1Panel/agent/app/dto"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/1Panel-dev/1Panel/agent/app/model"
|
|
"github.com/go-acme/lego/v4/acme"
|
|
"github.com/go-acme/lego/v4/acme/api"
|
|
"github.com/go-acme/lego/v4/certificate"
|
|
"github.com/go-acme/lego/v4/challenge"
|
|
"github.com/go-acme/lego/v4/challenge/dns01"
|
|
"github.com/go-acme/lego/v4/lego"
|
|
"github.com/go-acme/lego/v4/providers/http/webroot"
|
|
"github.com/pkg/errors"
|
|
)
|
|
|
|
type AcmeClientOption func(*AcmeClientOptions)
|
|
|
|
type AcmeClientOptions struct {
|
|
SystemProxy *dto.SystemProxy
|
|
}
|
|
|
|
type AcmeClient struct {
|
|
Config *lego.Config
|
|
Client *lego.Client
|
|
User *AcmeUser
|
|
ProxyURL string
|
|
}
|
|
|
|
func NewAcmeClient(acmeAccount *model.WebsiteAcmeAccount, systemProxy *dto.SystemProxy) (*AcmeClient, error) {
|
|
if acmeAccount.Email == "" {
|
|
return nil, errors.New("email can not blank")
|
|
}
|
|
|
|
client, err := NewRegisterClient(acmeAccount, systemProxy)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return client, nil
|
|
}
|
|
|
|
func (c *AcmeClient) UseDns(dnsType DnsType, params string, websiteSSL model.WebsiteSSL) error {
|
|
p, err := getDNSProviderConfig(dnsType, params)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var nameservers []string
|
|
if websiteSSL.Nameserver1 != "" {
|
|
nameservers = append(nameservers, websiteSSL.Nameserver1)
|
|
}
|
|
if websiteSSL.Nameserver2 != "" {
|
|
nameservers = append(nameservers, websiteSSL.Nameserver2)
|
|
}
|
|
if websiteSSL.DisableCNAME {
|
|
_ = os.Setenv("LEGO_DISABLE_CNAME_SUPPORT", "true")
|
|
} else {
|
|
_ = os.Setenv("LEGO_DISABLE_CNAME_SUPPORT", "false")
|
|
}
|
|
|
|
return c.Client.Challenge.SetDNS01Provider(p,
|
|
dns01.CondOption(len(nameservers) > 0,
|
|
dns01.AddRecursiveNameservers(nameservers)),
|
|
dns01.CondOption(websiteSSL.SkipDNS,
|
|
dns01.DisableAuthoritativeNssPropagationRequirement()),
|
|
dns01.AddDNSTimeout(dnsTimeOut),
|
|
)
|
|
}
|
|
|
|
func (c *AcmeClient) UseManualDns(websiteSSL model.WebsiteSSL) error {
|
|
p, err := NewCustomDNSProviderManual(&ManualConfig{
|
|
PropagationTimeout: 20 * time.Minute,
|
|
PollingInterval: pollingInterval,
|
|
TTL: ttl,
|
|
})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var nameservers []string
|
|
if websiteSSL.Nameserver1 != "" {
|
|
nameservers = append(nameservers, websiteSSL.Nameserver1)
|
|
}
|
|
if websiteSSL.Nameserver2 != "" {
|
|
nameservers = append(nameservers, websiteSSL.Nameserver2)
|
|
}
|
|
if websiteSSL.DisableCNAME {
|
|
_ = os.Setenv("LEGO_DISABLE_CNAME_SUPPORT", "true")
|
|
} else {
|
|
_ = os.Setenv("LEGO_DISABLE_CNAME_SUPPORT", "false")
|
|
}
|
|
if err = c.Client.Challenge.SetDNS01Provider(p,
|
|
dns01.CondOption(len(nameservers) > 0,
|
|
dns01.AddRecursiveNameservers(nameservers)),
|
|
dns01.CondOption(websiteSSL.SkipDNS,
|
|
dns01.DisableAuthoritativeNssPropagationRequirement()),
|
|
dns01.AddDNSTimeout(dnsTimeOut)); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *AcmeClient) UseHTTP(path string) error {
|
|
httpProvider, err := webroot.NewHTTPProvider(path)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = c.Client.Challenge.SetHTTP01Provider(httpProvider)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (c *AcmeClient) ObtainSSL(domains []string, privateKey crypto.PrivateKey) (certificate.Resource, error) {
|
|
request := certificate.ObtainRequest{
|
|
Domains: domains,
|
|
Bundle: true,
|
|
PrivateKey: privateKey,
|
|
}
|
|
|
|
certificates, err := c.Client.Certificate.Obtain(request)
|
|
if err != nil {
|
|
return certificate.Resource{}, err
|
|
}
|
|
|
|
return *certificates, nil
|
|
}
|
|
|
|
func (c *AcmeClient) RevokeSSL(pemSSL []byte) error {
|
|
return c.Client.Certificate.Revoke(pemSSL)
|
|
}
|
|
|
|
type Resolve struct {
|
|
Key string
|
|
Value string
|
|
Err string
|
|
}
|
|
|
|
func (c *AcmeClient) GetDNSResolve(domains []string) (map[string]Resolve, error) {
|
|
core, err := api.New(c.Config.HTTPClient, c.Config.UserAgent, c.Config.CADirURL, c.User.Registration.URI, c.User.Key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
order, err := core.Orders.New(domains)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
resolves := make(map[string]Resolve)
|
|
resc, errc := make(chan acme.Authorization), make(chan domainError)
|
|
for _, authzURL := range order.Authorizations {
|
|
go func(authzURL string) {
|
|
authz, err := core.Authorizations.Get(authzURL)
|
|
if err != nil {
|
|
errc <- domainError{Domain: authz.Identifier.Value, Error: err}
|
|
return
|
|
}
|
|
resc <- authz
|
|
}(authzURL)
|
|
}
|
|
|
|
var responses []acme.Authorization
|
|
for i := 0; i < len(order.Authorizations); i++ {
|
|
select {
|
|
case res := <-resc:
|
|
responses = append(responses, res)
|
|
case err := <-errc:
|
|
resolves[err.Domain] = Resolve{Err: err.Error.Error()}
|
|
}
|
|
}
|
|
close(resc)
|
|
close(errc)
|
|
|
|
for _, auth := range responses {
|
|
domain := challenge.GetTargetedDomain(auth)
|
|
chlng, err := challenge.FindChallenge(challenge.DNS01, auth)
|
|
if err != nil {
|
|
resolves[domain] = Resolve{Err: err.Error()}
|
|
continue
|
|
}
|
|
keyAuth, err := core.GetKeyAuthorization(chlng.Token)
|
|
if err != nil {
|
|
resolves[domain] = Resolve{Err: err.Error()}
|
|
continue
|
|
}
|
|
challengeInfo := dns01.GetChallengeInfo(domain, keyAuth)
|
|
fqdn := challengeInfo.FQDN
|
|
if strings.HasPrefix(domain, "*.") && strings.Contains(fqdn, "*.") {
|
|
fqdn = strings.Replace(fqdn, "*.", "", 1)
|
|
}
|
|
_, _ = dns01.FindZoneByFqdn(challengeInfo.EffectiveFQDN)
|
|
resolves[domain] = Resolve{
|
|
Key: fqdn,
|
|
Value: challengeInfo.Value,
|
|
}
|
|
}
|
|
|
|
return resolves, nil
|
|
}
|