mirror of
https://github.com/TeaOSLab/EdgeAPI.git
synced 2025-11-10 04:20:26 +08:00
OCSP支持过期时间
This commit is contained in:
@@ -26,5 +26,5 @@ const (
|
||||
ReportNodeVersion = "0.1.0"
|
||||
|
||||
// SQLVersion SQL版本号
|
||||
SQLVersion = "4"
|
||||
SQLVersion = "5"
|
||||
)
|
||||
|
||||
@@ -1,6 +1,7 @@
|
||||
package models
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"github.com/TeaOSLab/EdgeAPI/internal/utils"
|
||||
@@ -138,7 +139,18 @@ func (this *SSLCertDAO) UpdateCert(tx *dbs.Tx,
|
||||
if certId <= 0 {
|
||||
return errors.New("invalid certId")
|
||||
}
|
||||
op := NewSSLCertOperator()
|
||||
|
||||
oldOne, err := this.Query(tx).Find()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if oldOne == nil {
|
||||
return nil
|
||||
}
|
||||
var oldCert = oldOne.(*SSLCert)
|
||||
var dataIsChanged = bytes.Compare(certData, []byte(oldCert.CertData)) != 0 || bytes.Compare(keyData, []byte(oldCert.KeyData)) != 0
|
||||
|
||||
var op = NewSSLCertOperator()
|
||||
op.Id = certId
|
||||
op.IsOn = isOn
|
||||
op.Name = name
|
||||
@@ -169,7 +181,15 @@ func (this *SSLCertDAO) UpdateCert(tx *dbs.Tx,
|
||||
}
|
||||
op.CommonNames = commonNamesJSON
|
||||
|
||||
op.OcspIsUpdated = false
|
||||
// OCSP
|
||||
if dataIsChanged {
|
||||
op.OcspIsUpdated = 0
|
||||
op.Ocsp = ""
|
||||
op.OcspUpdatedAt = 0
|
||||
op.OcspError = ""
|
||||
op.OcspTries = 0
|
||||
op.OcspExpiresAt = 0
|
||||
}
|
||||
|
||||
err = this.Save(tx, op)
|
||||
if err != nil {
|
||||
@@ -209,7 +229,12 @@ func (this *SSLCertDAO) ComposeCertConfig(tx *dbs.Tx, certId int64, cacheMap *ut
|
||||
config.ServerName = cert.ServerName
|
||||
config.TimeBeginAt = int64(cert.TimeBeginAt)
|
||||
config.TimeEndAt = int64(cert.TimeEndAt)
|
||||
|
||||
// OCSP
|
||||
if int64(cert.OcspExpiresAt) > time.Now().Unix() {
|
||||
config.OCSP = []byte(cert.Ocsp)
|
||||
config.OCSPExpiresAt = int64(cert.OcspExpiresAt)
|
||||
}
|
||||
config.OCSPError = cert.OcspError
|
||||
|
||||
if IsNotNull(cert.DnsNames) {
|
||||
@@ -374,15 +399,14 @@ func (this *SSLCertDAO) CheckUserCert(tx *dbs.Tx, certId int64, userId int64) er
|
||||
}
|
||||
|
||||
// ListCertsToUpdateOCSP 查找需要更新OCSP的证书
|
||||
func (this *SSLCertDAO) ListCertsToUpdateOCSP(tx *dbs.Tx, maxAge int, size int64) (result []*SSLCert, err error) {
|
||||
if maxAge <= 0 {
|
||||
maxAge = 7200
|
||||
}
|
||||
|
||||
func (this *SSLCertDAO) ListCertsToUpdateOCSP(tx *dbs.Tx, maxTries int, size int64) (result []*SSLCert, err error) {
|
||||
var nowTime = time.Now().Unix()
|
||||
var query = this.Query(tx).
|
||||
State(SSLCertStateEnabled).
|
||||
Where("ocspUpdatedAt<:timestamp").
|
||||
Param("timestamp", time.Now().Unix()-int64(maxAge))
|
||||
Lt("ocspExpiresAt", nowTime+120). // 提前 N 秒钟准备更新
|
||||
Lt("ocspTries", maxTries).
|
||||
Lt("timeBeginAt", nowTime).
|
||||
Gt("timeEndAt", nowTime)
|
||||
|
||||
// TODO 需要排除没有被server使用的policy,或许可以增加一个字段记录policy最近使用时间
|
||||
|
||||
@@ -411,7 +435,7 @@ func (this *SSLCertDAO) ListCertsToUpdateOCSP(tx *dbs.Tx, maxAge int, size int64
|
||||
func (this *SSLCertDAO) ListCertOCSPAfterVersion(tx *dbs.Tx, version int64, size int64) (result []*SSLCert, err error) {
|
||||
// 不需要判断ocsp是否为空
|
||||
_, err = this.Query(tx).
|
||||
Result("id", "ocsp", "ocspUpdatedVersion").
|
||||
Result("id", "ocsp", "ocspUpdatedVersion", "ocspExpiresAt").
|
||||
State(SSLCertStateEnabled).
|
||||
Attr("ocspIsUpdated", 1).
|
||||
Gt("ocspUpdatedVersion", version).
|
||||
@@ -441,7 +465,11 @@ func (this *SSLCertDAO) PrepareCertOCSPUpdating(tx *dbs.Tx, certId int64) error
|
||||
}
|
||||
|
||||
// UpdateCertOCSP 修改OCSP
|
||||
func (this *SSLCertDAO) UpdateCertOCSP(tx *dbs.Tx, certId int64, ocsp []byte, errString string) error {
|
||||
func (this *SSLCertDAO) UpdateCertOCSP(tx *dbs.Tx, certId int64, ocsp []byte, expiresAt int64, hasErr bool, errString string) error {
|
||||
if hasErr && len(errString) == 0 {
|
||||
errString = "failed"
|
||||
}
|
||||
|
||||
version, err := SharedSysLockerDAO.Increase(tx, "SSL_CERT_OCSP_VERSION", 1)
|
||||
if err != nil {
|
||||
return err
|
||||
@@ -456,14 +484,22 @@ func (this *SSLCertDAO) UpdateCertOCSP(tx *dbs.Tx, certId int64, ocsp []byte, er
|
||||
errString = errString[:300]
|
||||
}
|
||||
|
||||
err = this.Query(tx).
|
||||
var query = this.Query(tx).
|
||||
Pk(certId).
|
||||
Set("ocsp", ocsp).
|
||||
Set("ocspError", errString).
|
||||
Set("ocspIsUpdated", true).
|
||||
Set("ocspUpdatedAt", time.Now().Unix()).
|
||||
Set("ocspUpdatedVersion", version).
|
||||
UpdateQuickly()
|
||||
Set("ocspExpiresAt", expiresAt)
|
||||
|
||||
if hasErr {
|
||||
query.Set("ocspTries", dbs.SQL("ocspTries+1"))
|
||||
} else {
|
||||
query.Set("ocspTries", 0)
|
||||
}
|
||||
|
||||
err = query.UpdateQuickly()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
@@ -531,6 +567,7 @@ func (this *SSLCertDAO) ResetSSLCertsWithOCSPError(tx *dbs.Tx, certIds []int64)
|
||||
Set("ocspIsUpdated", 0).
|
||||
Set("ocspUpdatedAt", 0).
|
||||
Set("ocspError", "").
|
||||
Set("ocspTries", 0).
|
||||
UpdateQuickly()
|
||||
if err != nil {
|
||||
return err
|
||||
@@ -548,6 +585,7 @@ func (this *SSLCertDAO) ResetAllSSLCertsWithOCSPError(tx *dbs.Tx) error {
|
||||
Set("ocspIsUpdated", 0).
|
||||
Set("ocspUpdatedAt", 0).
|
||||
Set("ocspError", "").
|
||||
Set("ocspTries", 0).
|
||||
UpdateQuickly()
|
||||
}
|
||||
|
||||
|
||||
@@ -25,9 +25,11 @@ type SSLCert struct {
|
||||
NotifiedAt uint64 `field:"notifiedAt"` // 最后通知时间
|
||||
Ocsp string `field:"ocsp"` // OCSP缓存
|
||||
OcspIsUpdated uint8 `field:"ocspIsUpdated"` // OCSP是否已更新
|
||||
OcspUpdatedAt uint32 `field:"ocspUpdatedAt"` // OCSP更新时间
|
||||
OcspUpdatedAt uint64 `field:"ocspUpdatedAt"` // OCSP更新时间
|
||||
OcspError string `field:"ocspError"` // OCSP更新错误
|
||||
OcspUpdatedVersion uint64 `field:"ocspUpdatedVersion"` // OCSP更新版本
|
||||
OcspExpiresAt uint64 `field:"ocspExpiresAt"` // OCSP过期时间(UTC)
|
||||
OcspTries uint32 `field:"ocspTries"` // OCSP尝试次数
|
||||
}
|
||||
|
||||
type SSLCertOperator struct {
|
||||
@@ -57,6 +59,8 @@ type SSLCertOperator struct {
|
||||
OcspUpdatedAt interface{} // OCSP更新时间
|
||||
OcspError interface{} // OCSP更新错误
|
||||
OcspUpdatedVersion interface{} // OCSP更新版本
|
||||
OcspExpiresAt interface{} // OCSP过期时间(UTC)
|
||||
OcspTries interface{} // OCSP尝试次数
|
||||
}
|
||||
|
||||
func NewSSLCertOperator() *SSLCertOperator {
|
||||
|
||||
@@ -300,7 +300,8 @@ func (this *SSLCertService) ListUpdatedSSLCertOCSP(ctx context.Context, req *pb.
|
||||
for _, cert := range certs {
|
||||
result = append(result, &pb.ListUpdatedSSLCertOCSPResponse_SSLCertOCSP{
|
||||
SslCertId: int64(cert.Id),
|
||||
Ocsp: []byte(cert.Ocsp),
|
||||
Data: []byte(cert.Ocsp),
|
||||
ExpiresAt: int64(cert.OcspExpiresAt),
|
||||
Version: int64(cert.OcspUpdatedVersion),
|
||||
})
|
||||
}
|
||||
|
||||
File diff suppressed because one or more lines are too long
@@ -63,8 +63,8 @@ func (this *SSLCertUpdateOCSPTask) Loop(checkLock bool) error {
|
||||
var tx *dbs.Tx
|
||||
// TODO 将来可以设置单次任务条数
|
||||
var size int64 = 60
|
||||
var maxAge = 7200
|
||||
certs, err := models.SharedSSLCertDAO.ListCertsToUpdateOCSP(tx, maxAge, size)
|
||||
var maxTries = 5
|
||||
certs, err := models.SharedSSLCertDAO.ListCertsToUpdateOCSP(tx, maxTries, size)
|
||||
if err != nil {
|
||||
return errors.New("list certs failed: " + err.Error())
|
||||
}
|
||||
@@ -82,14 +82,16 @@ func (this *SSLCertUpdateOCSPTask) Loop(checkLock bool) error {
|
||||
}
|
||||
|
||||
for _, cert := range certs {
|
||||
ocspData, err := this.UpdateCertOCSP(cert)
|
||||
ocspData, expiresAt, err := this.UpdateCertOCSP(cert)
|
||||
var errString = ""
|
||||
var hasErr = false
|
||||
if err != nil {
|
||||
errString = err.Error()
|
||||
hasErr = true
|
||||
|
||||
remotelogs.Warn("SSLCertUpdateOCSPTask", "update ocsp failed: "+errString)
|
||||
}
|
||||
err = models.SharedSSLCertDAO.UpdateCertOCSP(tx, int64(cert.Id), ocspData, errString)
|
||||
err = models.SharedSSLCertDAO.UpdateCertOCSP(tx, int64(cert.Id), ocspData, expiresAt, hasErr, errString)
|
||||
if err != nil {
|
||||
return errors.New("update ocsp failed: " + err.Error())
|
||||
}
|
||||
@@ -99,37 +101,37 @@ func (this *SSLCertUpdateOCSPTask) Loop(checkLock bool) error {
|
||||
}
|
||||
|
||||
// UpdateCertOCSP 更新单个证书OCSP
|
||||
func (this *SSLCertUpdateOCSPTask) UpdateCertOCSP(certOne *models.SSLCert) (ocspData []byte, err error) {
|
||||
func (this *SSLCertUpdateOCSPTask) UpdateCertOCSP(certOne *models.SSLCert) (ocspData []byte, expiresAt int64, err error) {
|
||||
if certOne.IsCA == 1 || len(certOne.CertData) == 0 || len(certOne.KeyData) == 0 {
|
||||
return
|
||||
}
|
||||
|
||||
keyPair, err := tls.X509KeyPair([]byte(certOne.CertData), []byte(certOne.KeyData))
|
||||
if err != nil {
|
||||
return nil, errors.New("parse certificate failed: " + err.Error())
|
||||
return nil, 0, errors.New("parse certificate failed: " + err.Error())
|
||||
}
|
||||
if len(keyPair.Certificate) == 0 {
|
||||
return nil, nil
|
||||
return nil, 0, nil
|
||||
}
|
||||
|
||||
var certData = keyPair.Certificate[0]
|
||||
cert, err := x509.ParseCertificate(certData)
|
||||
if err != nil {
|
||||
return nil, errors.New("parse certificate block failed: " + err.Error())
|
||||
return nil, 0, errors.New("parse certificate block failed: " + err.Error())
|
||||
}
|
||||
|
||||
// 是否已过期
|
||||
var now = time.Now()
|
||||
if cert.NotBefore.After(now) || cert.NotAfter.Before(now) {
|
||||
return nil, nil
|
||||
return nil, 0, nil
|
||||
}
|
||||
|
||||
if len(cert.IssuingCertificateURL) == 0 || len(cert.OCSPServer) == 0 {
|
||||
return nil, nil
|
||||
return nil, 0, nil
|
||||
}
|
||||
|
||||
if len(cert.DNSNames) == 0 {
|
||||
return nil, nil
|
||||
return nil, 0, nil
|
||||
}
|
||||
|
||||
var issuerURL = cert.IssuingCertificateURL[0]
|
||||
@@ -137,12 +139,12 @@ func (this *SSLCertUpdateOCSPTask) UpdateCertOCSP(certOne *models.SSLCert) (ocsp
|
||||
|
||||
issuerReq, err := http.NewRequest(http.MethodGet, issuerURL, nil)
|
||||
if err != nil {
|
||||
return nil, errors.New("request issuer certificate failed: " + err.Error())
|
||||
return nil, 0, errors.New("request issuer certificate failed: " + err.Error())
|
||||
}
|
||||
issuerReq.Header.Set("User-Agent", teaconst.ProductName+"/"+teaconst.Version)
|
||||
issuerResp, err := this.httpClient.Do(issuerReq)
|
||||
if err != nil {
|
||||
return nil, errors.New("request issuer certificate failed: '" + issuerURL + "': " + err.Error())
|
||||
return nil, 0, errors.New("request issuer certificate failed: '" + issuerURL + "': " + err.Error())
|
||||
}
|
||||
defer func() {
|
||||
_ = issuerResp.Body.Close()
|
||||
@@ -150,29 +152,29 @@ func (this *SSLCertUpdateOCSPTask) UpdateCertOCSP(certOne *models.SSLCert) (ocsp
|
||||
|
||||
issuerData, err := ioutil.ReadAll(issuerResp.Body)
|
||||
if err != nil {
|
||||
return nil, errors.New("read issuer certificate failed: '" + issuerURL + "': " + err.Error())
|
||||
return nil, 0, errors.New("read issuer certificate failed: '" + issuerURL + "': " + err.Error())
|
||||
}
|
||||
issuerCert, err := x509.ParseCertificate(issuerData)
|
||||
if err != nil {
|
||||
return nil, errors.New("parse issuer certificate failed: '" + issuerURL + "': " + err.Error())
|
||||
return nil, 0, errors.New("parse issuer certificate failed: '" + issuerURL + "': " + err.Error())
|
||||
}
|
||||
|
||||
buf, err := ocsp.CreateRequest(cert, issuerCert, &ocsp.RequestOptions{
|
||||
Hash: crypto.SHA1,
|
||||
})
|
||||
if err != nil {
|
||||
return nil, errors.New("create ocsp request failed: " + err.Error())
|
||||
return nil, 0, errors.New("create ocsp request failed: " + err.Error())
|
||||
}
|
||||
ocspReq, err := http.NewRequest(http.MethodPost, ocspServerURL, bytes.NewBuffer(buf))
|
||||
if err != nil {
|
||||
return nil, errors.New("request ocsp failed: " + err.Error())
|
||||
return nil, 0, errors.New("request ocsp failed: " + err.Error())
|
||||
}
|
||||
ocspReq.Header.Set("Content-Type", "application/ocsp-request")
|
||||
ocspReq.Header.Set("Accept", "application/ocsp-response")
|
||||
|
||||
ocspResp, err := this.httpClient.Do(ocspReq)
|
||||
if err != nil {
|
||||
return nil, errors.New("request ocsp failed: '" + ocspServerURL + "': " + err.Error())
|
||||
return nil, 0, errors.New("request ocsp failed: '" + ocspServerURL + "': " + err.Error())
|
||||
}
|
||||
|
||||
defer func() {
|
||||
@@ -181,17 +183,17 @@ func (this *SSLCertUpdateOCSPTask) UpdateCertOCSP(certOne *models.SSLCert) (ocsp
|
||||
|
||||
respData, err := ioutil.ReadAll(ocspResp.Body)
|
||||
if err != nil {
|
||||
return nil, errors.New("read ocsp failed: '" + ocspServerURL + "': " + err.Error())
|
||||
return nil, 0, errors.New("read ocsp failed: '" + ocspServerURL + "': " + err.Error())
|
||||
}
|
||||
|
||||
ocspResult, err := ocsp.ParseResponse(respData, issuerCert)
|
||||
if err != nil {
|
||||
return nil, errors.New("decode ocsp failed: " + err.Error())
|
||||
return nil, 0, errors.New("decode ocsp failed: " + err.Error())
|
||||
}
|
||||
|
||||
// 只返回Good的ocsp
|
||||
if ocspResult.Status == ocsp.Good {
|
||||
return respData, nil
|
||||
return respData, ocspResult.NextUpdate.Unix(), nil
|
||||
}
|
||||
return nil, nil
|
||||
return nil, 0, nil
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user