2021-01-25 16:40:03 +08:00
|
|
|
|
package acme
|
2020-11-25 21:19:22 +08:00
|
|
|
|
|
|
|
|
|
|
import (
|
2021-06-24 09:27:39 +08:00
|
|
|
|
"bytes"
|
2020-11-25 21:19:22 +08:00
|
|
|
|
"encoding/json"
|
2021-10-03 13:09:29 +08:00
|
|
|
|
acmeutils "github.com/TeaOSLab/EdgeAPI/internal/acme"
|
2022-01-10 09:58:34 +08:00
|
|
|
|
teaconst "github.com/TeaOSLab/EdgeAPI/internal/const"
|
2021-01-25 16:40:03 +08:00
|
|
|
|
"github.com/TeaOSLab/EdgeAPI/internal/db/models"
|
|
|
|
|
|
"github.com/TeaOSLab/EdgeAPI/internal/db/models/dns"
|
|
|
|
|
|
dbutils "github.com/TeaOSLab/EdgeAPI/internal/db/utils"
|
2020-11-26 16:39:06 +08:00
|
|
|
|
"github.com/TeaOSLab/EdgeAPI/internal/dnsclients"
|
2020-11-25 21:19:22 +08:00
|
|
|
|
"github.com/TeaOSLab/EdgeAPI/internal/errors"
|
2021-06-24 09:27:39 +08:00
|
|
|
|
"github.com/TeaOSLab/EdgeAPI/internal/remotelogs"
|
|
|
|
|
|
"github.com/TeaOSLab/EdgeAPI/internal/utils"
|
2020-11-26 16:39:06 +08:00
|
|
|
|
"github.com/TeaOSLab/EdgeCommon/pkg/serverconfigs/sslconfigs"
|
|
|
|
|
|
"github.com/go-acme/lego/v4/registration"
|
2020-11-25 21:19:22 +08:00
|
|
|
|
_ "github.com/go-sql-driver/mysql"
|
|
|
|
|
|
"github.com/iwind/TeaGo/Tea"
|
|
|
|
|
|
"github.com/iwind/TeaGo/dbs"
|
2020-11-26 16:39:06 +08:00
|
|
|
|
"github.com/iwind/TeaGo/logs"
|
2021-06-24 09:27:39 +08:00
|
|
|
|
"github.com/iwind/TeaGo/maps"
|
2020-11-25 21:19:22 +08:00
|
|
|
|
"github.com/iwind/TeaGo/types"
|
2021-06-24 09:27:39 +08:00
|
|
|
|
"net/http"
|
2021-03-16 18:08:33 +08:00
|
|
|
|
"time"
|
2020-11-25 21:19:22 +08:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
const (
|
|
|
|
|
|
ACMETaskStateEnabled = 1 // 已启用
|
|
|
|
|
|
ACMETaskStateDisabled = 0 // 已禁用
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
type ACMETaskDAO dbs.DAO
|
|
|
|
|
|
|
|
|
|
|
|
func NewACMETaskDAO() *ACMETaskDAO {
|
|
|
|
|
|
return dbs.NewDAO(&ACMETaskDAO{
|
|
|
|
|
|
DAOObject: dbs.DAOObject{
|
|
|
|
|
|
DB: Tea.Env,
|
|
|
|
|
|
Table: "edgeACMETasks",
|
|
|
|
|
|
Model: new(ACMETask),
|
|
|
|
|
|
PkName: "id",
|
|
|
|
|
|
},
|
|
|
|
|
|
}).(*ACMETaskDAO)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
var SharedACMETaskDAO *ACMETaskDAO
|
|
|
|
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
|
|
dbs.OnReady(func() {
|
|
|
|
|
|
SharedACMETaskDAO = NewACMETaskDAO()
|
|
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// EnableACMETask 启用条目
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) EnableACMETask(tx *dbs.Tx, id int64) error {
|
|
|
|
|
|
_, err := this.Query(tx).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
Pk(id).
|
|
|
|
|
|
Set("state", ACMETaskStateEnabled).
|
|
|
|
|
|
Update()
|
|
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// DisableACMETask 禁用条目
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) DisableACMETask(tx *dbs.Tx, id int64) error {
|
|
|
|
|
|
_, err := this.Query(tx).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
Pk(id).
|
|
|
|
|
|
Set("state", ACMETaskStateDisabled).
|
|
|
|
|
|
Update()
|
|
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// FindEnabledACMETask 查找启用中的条目
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) FindEnabledACMETask(tx *dbs.Tx, id int64) (*ACMETask, error) {
|
|
|
|
|
|
result, err := this.Query(tx).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
Pk(id).
|
|
|
|
|
|
Attr("state", ACMETaskStateEnabled).
|
|
|
|
|
|
Find()
|
|
|
|
|
|
if result == nil {
|
|
|
|
|
|
return nil, err
|
|
|
|
|
|
}
|
|
|
|
|
|
return result.(*ACMETask), err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// CountACMETasksWithACMEUserId 计算某个ACME用户相关的任务数量
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) CountACMETasksWithACMEUserId(tx *dbs.Tx, acmeUserId int64) (int64, error) {
|
|
|
|
|
|
return this.Query(tx).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
State(ACMETaskStateEnabled).
|
|
|
|
|
|
Attr("acmeUserId", acmeUserId).
|
|
|
|
|
|
Count()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// CountACMETasksWithDNSProviderId 计算某个DNS服务商相关的任务数量
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) CountACMETasksWithDNSProviderId(tx *dbs.Tx, dnsProviderId int64) (int64, error) {
|
|
|
|
|
|
return this.Query(tx).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
State(ACMETaskStateEnabled).
|
|
|
|
|
|
Attr("dnsProviderId", dnsProviderId).
|
|
|
|
|
|
Count()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// DisableAllTasksWithCertId 停止某个证书相关任务
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) DisableAllTasksWithCertId(tx *dbs.Tx, certId int64) error {
|
|
|
|
|
|
_, err := this.Query(tx).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
Attr("certId", certId).
|
|
|
|
|
|
Set("state", ACMETaskStateDisabled).
|
|
|
|
|
|
Update()
|
|
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// CountAllEnabledACMETasks 计算所有任务数量
|
2021-03-16 18:08:33 +08:00
|
|
|
|
func (this *ACMETaskDAO) CountAllEnabledACMETasks(tx *dbs.Tx, adminId int64, userId int64, isAvailable bool, isExpired bool, expiringDays int64, keyword string) (int64, error) {
|
|
|
|
|
|
query := dbutils.NewQuery(tx, this, adminId, userId)
|
|
|
|
|
|
if isAvailable || isExpired || expiringDays > 0 {
|
|
|
|
|
|
query.Gt("certId", 0)
|
|
|
|
|
|
|
|
|
|
|
|
if isAvailable {
|
|
|
|
|
|
query.Where("certId IN (SELECT id FROM " + models.SharedSSLCertDAO.Table + " WHERE timeBeginAt<=UNIX_TIMESTAMP() AND timeEndAt>=UNIX_TIMESTAMP())")
|
|
|
|
|
|
}
|
|
|
|
|
|
if isExpired {
|
|
|
|
|
|
query.Where("certId IN (SELECT id FROM " + models.SharedSSLCertDAO.Table + " WHERE timeEndAt<UNIX_TIMESTAMP())")
|
|
|
|
|
|
}
|
|
|
|
|
|
if expiringDays > 0 {
|
|
|
|
|
|
query.Where("certId IN (SELECT id FROM "+models.SharedSSLCertDAO.Table+" WHERE timeEndAt>UNIX_TIMESTAMP() AND timeEndAt<:expiredAt)").
|
|
|
|
|
|
Param("expiredAt", time.Now().Unix()+expiringDays*86400)
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if len(keyword) > 0 {
|
|
|
|
|
|
query.Where("(domains LIKE :keyword)").
|
|
|
|
|
|
Param("keyword", "%"+keyword+"%")
|
|
|
|
|
|
}
|
|
|
|
|
|
if len(keyword) > 0 {
|
|
|
|
|
|
query.Where("domains LIKE :keyword").
|
|
|
|
|
|
Param("keyword", "%"+keyword+"%")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return query.State(ACMETaskStateEnabled).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
Count()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// ListEnabledACMETasks 列出单页任务
|
2021-03-16 18:08:33 +08:00
|
|
|
|
func (this *ACMETaskDAO) ListEnabledACMETasks(tx *dbs.Tx, adminId int64, userId int64, isAvailable bool, isExpired bool, expiringDays int64, keyword string, offset int64, size int64) (result []*ACMETask, err error) {
|
|
|
|
|
|
query := dbutils.NewQuery(tx, this, adminId, userId)
|
|
|
|
|
|
if isAvailable || isExpired || expiringDays > 0 {
|
|
|
|
|
|
query.Gt("certId", 0)
|
|
|
|
|
|
|
|
|
|
|
|
if isAvailable {
|
|
|
|
|
|
query.Where("certId IN (SELECT id FROM " + models.SharedSSLCertDAO.Table + " WHERE timeBeginAt<=UNIX_TIMESTAMP() AND timeEndAt>=UNIX_TIMESTAMP())")
|
|
|
|
|
|
}
|
|
|
|
|
|
if isExpired {
|
|
|
|
|
|
query.Where("certId IN (SELECT id FROM " + models.SharedSSLCertDAO.Table + " WHERE timeEndAt<UNIX_TIMESTAMP())")
|
|
|
|
|
|
}
|
|
|
|
|
|
if expiringDays > 0 {
|
|
|
|
|
|
query.Where("certId IN (SELECT id FROM "+models.SharedSSLCertDAO.Table+" WHERE timeEndAt>UNIX_TIMESTAMP() AND timeEndAt<:expiredAt)").
|
|
|
|
|
|
Param("expiredAt", time.Now().Unix()+expiringDays*86400)
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
if len(keyword) > 0 {
|
|
|
|
|
|
query.Where("(domains LIKE :keyword)").
|
|
|
|
|
|
Param("keyword", "%"+keyword+"%")
|
|
|
|
|
|
}
|
|
|
|
|
|
_, err = query.
|
2020-11-25 21:19:22 +08:00
|
|
|
|
State(ACMETaskStateEnabled).
|
|
|
|
|
|
DescPk().
|
|
|
|
|
|
Offset(offset).
|
|
|
|
|
|
Limit(size).
|
|
|
|
|
|
Slice(&result).
|
|
|
|
|
|
FindAll()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// CreateACMETask 创建任务
|
2021-10-03 13:09:29 +08:00
|
|
|
|
func (this *ACMETaskDAO) CreateACMETask(tx *dbs.Tx, adminId int64, userId int64, authType acmeutils.AuthType, acmeUserId int64, dnsProviderId int64, dnsDomain string, domains []string, autoRenew bool, authURL string) (int64, error) {
|
2020-11-25 21:19:22 +08:00
|
|
|
|
op := NewACMETaskOperator()
|
|
|
|
|
|
op.AdminId = adminId
|
|
|
|
|
|
op.UserId = userId
|
2020-12-03 18:19:22 +08:00
|
|
|
|
op.AuthType = authType
|
2020-11-25 21:19:22 +08:00
|
|
|
|
op.AcmeUserId = acmeUserId
|
|
|
|
|
|
op.DnsProviderId = dnsProviderId
|
|
|
|
|
|
op.DnsDomain = dnsDomain
|
|
|
|
|
|
|
|
|
|
|
|
if len(domains) > 0 {
|
|
|
|
|
|
domainsJSON, err := json.Marshal(domains)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return 0, err
|
|
|
|
|
|
}
|
|
|
|
|
|
op.Domains = domainsJSON
|
|
|
|
|
|
} else {
|
|
|
|
|
|
op.Domains = "[]"
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
op.AutoRenew = autoRenew
|
2021-06-24 09:27:39 +08:00
|
|
|
|
op.AuthURL = authURL
|
2020-11-25 21:19:22 +08:00
|
|
|
|
op.IsOn = true
|
|
|
|
|
|
op.State = ACMETaskStateEnabled
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err := this.Save(tx, op)
|
2020-11-25 21:19:22 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
return 0, err
|
|
|
|
|
|
}
|
|
|
|
|
|
return types.Int64(op.Id), nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// UpdateACMETask 修改任务
|
|
|
|
|
|
func (this *ACMETaskDAO) UpdateACMETask(tx *dbs.Tx, acmeTaskId int64, acmeUserId int64, dnsProviderId int64, dnsDomain string, domains []string, autoRenew bool, authURL string) error {
|
2020-11-25 21:19:22 +08:00
|
|
|
|
if acmeTaskId <= 0 {
|
|
|
|
|
|
return errors.New("invalid acmeTaskId")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
op := NewACMETaskOperator()
|
|
|
|
|
|
op.Id = acmeTaskId
|
|
|
|
|
|
op.AcmeUserId = acmeUserId
|
|
|
|
|
|
op.DnsProviderId = dnsProviderId
|
|
|
|
|
|
op.DnsDomain = dnsDomain
|
|
|
|
|
|
|
|
|
|
|
|
if len(domains) > 0 {
|
|
|
|
|
|
domainsJSON, err := json.Marshal(domains)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
op.Domains = domainsJSON
|
|
|
|
|
|
} else {
|
|
|
|
|
|
op.Domains = "[]"
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
op.AutoRenew = autoRenew
|
2021-06-24 09:27:39 +08:00
|
|
|
|
op.AuthURL = authURL
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err := this.Save(tx, op)
|
2020-11-25 21:19:22 +08:00
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// CheckACMETask 检查权限
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) CheckACMETask(tx *dbs.Tx, adminId int64, userId int64, acmeTaskId int64) (bool, error) {
|
2021-01-25 16:40:03 +08:00
|
|
|
|
return dbutils.NewQuery(tx, this, adminId, userId).
|
2020-11-25 21:19:22 +08:00
|
|
|
|
State(ACMETaskStateEnabled).
|
|
|
|
|
|
Pk(acmeTaskId).
|
|
|
|
|
|
Exist()
|
|
|
|
|
|
}
|
2020-11-26 16:39:06 +08:00
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// UpdateACMETaskCert 设置任务关联的证书
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) UpdateACMETaskCert(tx *dbs.Tx, taskId int64, certId int64) error {
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if taskId <= 0 {
|
|
|
|
|
|
return errors.New("invalid taskId")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
op := NewACMETaskOperator()
|
|
|
|
|
|
op.Id = taskId
|
|
|
|
|
|
op.CertId = certId
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err := this.Save(tx, op)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-06-24 09:27:39 +08:00
|
|
|
|
// RunTask 执行任务并记录日志
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) RunTask(tx *dbs.Tx, taskId int64) (isOk bool, errMsg string, resultCertId int64) {
|
|
|
|
|
|
isOk, errMsg, resultCertId = this.runTaskWithoutLog(tx, taskId)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
|
|
|
|
|
|
// 记录日志
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err := SharedACMETaskLogDAO.CreateACMETaskLog(tx, taskId, isOk, errMsg)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
logs.Error(err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 执行任务但并不记录日志
|
2021-01-01 23:31:30 +08:00
|
|
|
|
func (this *ACMETaskDAO) runTaskWithoutLog(tx *dbs.Tx, taskId int64) (isOk bool, errMsg string, resultCertId int64) {
|
|
|
|
|
|
task, err := this.FindEnabledACMETask(tx, taskId)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "查询任务信息时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if task == nil {
|
|
|
|
|
|
errMsg = "找不到要执行的任务"
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2022-03-22 21:45:07 +08:00
|
|
|
|
if !task.IsOn {
|
2020-11-26 16:39:06 +08:00
|
|
|
|
errMsg = "任务没有启用"
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// ACME用户
|
2021-01-01 23:31:30 +08:00
|
|
|
|
user, err := SharedACMEUserDAO.FindEnabledACMEUser(tx, int64(task.AcmeUserId))
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "查询ACME用户时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if user == nil {
|
|
|
|
|
|
errMsg = "找不到ACME用户"
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-10-03 13:09:29 +08:00
|
|
|
|
// 服务商
|
|
|
|
|
|
if len(user.ProviderCode) == 0 {
|
|
|
|
|
|
user.ProviderCode = acmeutils.DefaultProviderCode
|
|
|
|
|
|
}
|
|
|
|
|
|
var acmeProvider = acmeutils.FindProviderWithCode(user.ProviderCode)
|
|
|
|
|
|
if acmeProvider == nil {
|
|
|
|
|
|
errMsg = "服务商已不可用"
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 账号
|
|
|
|
|
|
var acmeAccount *acmeutils.Account
|
|
|
|
|
|
if user.AccountId > 0 {
|
|
|
|
|
|
account, err := SharedACMEProviderAccountDAO.FindEnabledACMEProviderAccount(tx, int64(user.AccountId))
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "查询ACME账号时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if account != nil {
|
|
|
|
|
|
acmeAccount = &acmeutils.Account{
|
|
|
|
|
|
EABKid: account.EabKid,
|
|
|
|
|
|
EABKey: account.EabKey,
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
privateKey, err := acmeutils.ParsePrivateKeyFromBase64(user.PrivateKey)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "解析私钥时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-10-03 13:09:29 +08:00
|
|
|
|
remoteUser := acmeutils.NewUser(user.Email, privateKey, func(resource *registration.Resource) error {
|
2020-11-26 16:39:06 +08:00
|
|
|
|
resourceJSON, err := json.Marshal(resource)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err = SharedACMEUserDAO.UpdateACMEUserRegistration(tx, int64(user.Id), resourceJSON)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
return err
|
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
|
|
if len(user.Registration) > 0 {
|
2022-03-22 19:30:30 +08:00
|
|
|
|
err = remoteUser.SetRegistration(user.Registration)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "设置注册信息时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-10-03 13:09:29 +08:00
|
|
|
|
var acmeTask *acmeutils.Task = nil
|
|
|
|
|
|
if task.AuthType == acmeutils.AuthTypeDNS {
|
2020-12-03 18:19:22 +08:00
|
|
|
|
// DNS服务商
|
2021-01-25 16:40:03 +08:00
|
|
|
|
dnsProvider, err := dns.SharedDNSProviderDAO.FindEnabledDNSProvider(tx, int64(task.DnsProviderId))
|
2020-12-03 18:19:22 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "查找DNS服务商账号信息时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if dnsProvider == nil {
|
|
|
|
|
|
errMsg = "找不到DNS服务商账号"
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
providerInterface := dnsclients.FindProvider(dnsProvider.Type)
|
|
|
|
|
|
if providerInterface == nil {
|
|
|
|
|
|
errMsg = "暂不支持此类型的DNS服务商 '" + dnsProvider.Type + "'"
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
apiParams, err := dnsProvider.DecodeAPIParams()
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "解析DNS服务商API参数时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
err = providerInterface.Auth(apiParams)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "校验DNS服务商API参数时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-10-03 13:09:29 +08:00
|
|
|
|
acmeTask = &acmeutils.Task{
|
2020-12-03 18:19:22 +08:00
|
|
|
|
User: remoteUser,
|
2021-10-03 13:09:29 +08:00
|
|
|
|
AuthType: acmeutils.AuthTypeDNS,
|
2020-12-03 18:19:22 +08:00
|
|
|
|
DNSProvider: providerInterface,
|
|
|
|
|
|
DNSDomain: task.DnsDomain,
|
|
|
|
|
|
Domains: task.DecodeDomains(),
|
|
|
|
|
|
}
|
2021-10-03 13:09:29 +08:00
|
|
|
|
} else if task.AuthType == acmeutils.AuthTypeHTTP {
|
|
|
|
|
|
acmeTask = &acmeutils.Task{
|
2020-12-03 18:19:22 +08:00
|
|
|
|
User: remoteUser,
|
2021-10-03 13:09:29 +08:00
|
|
|
|
AuthType: acmeutils.AuthTypeHTTP,
|
2020-12-03 18:19:22 +08:00
|
|
|
|
Domains: task.DecodeDomains(),
|
|
|
|
|
|
}
|
2020-11-26 16:39:06 +08:00
|
|
|
|
}
|
2021-10-03 13:09:29 +08:00
|
|
|
|
acmeTask.Provider = acmeProvider
|
|
|
|
|
|
acmeTask.Account = acmeAccount
|
2020-11-26 16:39:06 +08:00
|
|
|
|
|
2021-10-03 13:09:29 +08:00
|
|
|
|
acmeRequest := acmeutils.NewRequest(acmeTask)
|
2020-12-03 18:19:22 +08:00
|
|
|
|
acmeRequest.OnAuth(func(domain, token, keyAuth string) {
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err := SharedACMEAuthenticationDAO.CreateAuth(tx, taskId, domain, token, keyAuth)
|
2020-12-03 18:19:22 +08:00
|
|
|
|
if err != nil {
|
2021-06-24 09:27:39 +08:00
|
|
|
|
remotelogs.Error("ACME", "write authentication to database error: "+err.Error())
|
|
|
|
|
|
} else {
|
|
|
|
|
|
// 调用校验URL
|
|
|
|
|
|
if len(task.AuthURL) > 0 {
|
|
|
|
|
|
authJSON, err := json.Marshal(maps.Map{
|
|
|
|
|
|
"domain": domain,
|
|
|
|
|
|
"token": token,
|
|
|
|
|
|
"key": keyAuth,
|
|
|
|
|
|
})
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
remotelogs.Error("ACME", "encode auth data failed: '"+task.AuthURL+"'")
|
|
|
|
|
|
} else {
|
|
|
|
|
|
client := utils.SharedHttpClient(5 * time.Second)
|
|
|
|
|
|
req, err := http.NewRequest(http.MethodPost, task.AuthURL, bytes.NewReader(authJSON))
|
|
|
|
|
|
req.Header.Set("Content-Type", "application/json")
|
2022-01-10 09:58:34 +08:00
|
|
|
|
req.Header.Set("User-Agent", teaconst.ProductName+"/"+teaconst.Version)
|
2021-06-24 09:27:39 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
remotelogs.Error("ACME", "parse auth url failed '"+task.AuthURL+"': "+err.Error())
|
|
|
|
|
|
} else {
|
|
|
|
|
|
resp, err := client.Do(req)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
remotelogs.Error("ACME", "call auth url failed '"+task.AuthURL+"': "+err.Error())
|
|
|
|
|
|
} else {
|
|
|
|
|
|
_ = resp.Body.Close()
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2020-12-03 18:19:22 +08:00
|
|
|
|
}
|
2020-11-26 16:39:06 +08:00
|
|
|
|
})
|
|
|
|
|
|
certData, keyData, err := acmeRequest.Run()
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成失败:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 分析证书
|
|
|
|
|
|
sslConfig := &sslconfigs.SSLCertConfig{
|
|
|
|
|
|
CertData: certData,
|
|
|
|
|
|
KeyData: keyData,
|
|
|
|
|
|
}
|
|
|
|
|
|
err = sslConfig.Init()
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成成功,但是分析证书信息时发生错误:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 保存证书
|
|
|
|
|
|
resultCertId = int64(task.CertId)
|
|
|
|
|
|
if resultCertId > 0 {
|
2021-01-25 16:40:03 +08:00
|
|
|
|
cert, err := models.SharedSSLCertDAO.FindEnabledSSLCert(tx, resultCertId)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成成功,但查询已绑定的证书时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if cert == nil {
|
|
|
|
|
|
errMsg = "证书已被管理员或用户删除"
|
|
|
|
|
|
|
|
|
|
|
|
// 禁用
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err = SharedACMETaskDAO.DisableACMETask(tx, taskId)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "禁用失效的ACME任务出错:" + err.Error()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2022-03-22 21:45:07 +08:00
|
|
|
|
err = models.SharedSSLCertDAO.UpdateCert(tx, resultCertId, cert.IsOn, cert.Name, cert.Description, cert.ServerName, cert.IsCA == 1, certData, keyData, sslConfig.TimeBeginAt, sslConfig.TimeEndAt, sslConfig.DNSNames, sslConfig.CommonNames)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成成功,但是修改数据库中的证书信息时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
} else {
|
2021-01-25 16:40:03 +08:00
|
|
|
|
resultCertId, err = models.SharedSSLCertDAO.CreateCert(tx, int64(task.AdminId), int64(task.UserId), true, task.DnsDomain+"免费证书", "免费申请的证书", "", false, certData, keyData, sslConfig.TimeBeginAt, sslConfig.TimeEndAt, sslConfig.DNSNames, sslConfig.CommonNames)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成成功,但是保存到数据库失败:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2021-01-25 16:40:03 +08:00
|
|
|
|
err = models.SharedSSLCertDAO.UpdateCertACME(tx, resultCertId, int64(task.Id))
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成成功,修改证书ACME信息时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// 设置成功
|
2021-01-01 23:31:30 +08:00
|
|
|
|
err = SharedACMETaskDAO.UpdateACMETaskCert(tx, taskId, resultCertId)
|
2020-11-26 16:39:06 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
errMsg = "证书生成成功,设置任务关联的证书时出错:" + err.Error()
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
isOk = true
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|