Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
C
caddy
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
caddy
Commits
96ae288c
Commit
96ae288c
authored
Oct 17, 2015
by
Matthew Holt
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
More refactoring; cleaning up code, preparing for tests
parent
a3a82657
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
186 additions
and
164 deletions
+186
-164
config/letsencrypt/letsencrypt.go
config/letsencrypt/letsencrypt.go
+133
-121
config/letsencrypt/storage.go
config/letsencrypt/storage.go
+0
-40
config/letsencrypt/user.go
config/letsencrypt/user.go
+53
-3
No files found.
config/letsencrypt/letsencrypt.go
View file @
96ae288c
package
letsencrypt
import
(
"bufio"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"os"
"strings"
"github.com/mholt/caddy/middleware"
"github.com/mholt/caddy/middleware/redirect"
...
...
@@ -20,27 +17,97 @@ import (
// as needed. It only skips the config if the cert and key
// are already provided or if plaintext http is explicitly
// specified as the port.
//
// This function may prompt the user to provide an email
// address if none is available through other means. It
// prefers the email address specified in the config, but
// if that is not available it will check the command line
// argument. If absent, it will use the most recent email
// address from last time. If there isn't one, the user
// will be prompted. If the user leaves email blank, <TODO>.
func
Activate
(
configs
[]
server
.
Config
)
([]
server
.
Config
,
error
)
{
// populate map of email address to server configs that use that email address for TLS.
// this will help us reduce roundtrips when getting the certs.
// Group configs by LE email address; this will help us
// reduce round-trips when getting the certs.
initMap
,
err
:=
groupConfigsByEmail
(
configs
)
if
err
!=
nil
{
return
configs
,
err
}
// Loop through each email address and obtain certs; we can obtain more
// than one certificate per email address, and still save them individually.
for
leEmail
,
serverConfigs
:=
range
initMap
{
// make client to service this email address with CA server
client
,
err
:=
newClient
(
leEmail
)
if
err
!=
nil
{
return
configs
,
err
}
// client is ready, so let's get free, trusted SSL certificates! yeah!
certificates
,
err
:=
obtainCertificates
(
client
,
serverConfigs
)
if
err
!=
nil
{
return
configs
,
err
}
// ... that's it. save the certs, keys, and metadata files to disk
err
=
saveCertsAndKeys
(
certificates
)
if
err
!=
nil
{
return
configs
,
err
}
// it all comes down to this: filling in the file path of a valid certificate automatically
for
_
,
cfg
:=
range
serverConfigs
{
cfg
.
TLS
.
Certificate
=
storage
.
SiteCertFile
(
cfg
.
Host
)
cfg
.
TLS
.
Key
=
storage
.
SiteKeyFile
(
cfg
.
Host
)
cfg
.
TLS
.
Enabled
=
true
cfg
.
Port
=
"https"
// Is there a plaintext HTTP config for the same host? If not, make
// one and have it redirect all requests to this HTTPS host.
var
plaintextHostFound
bool
for
_
,
otherCfg
:=
range
configs
{
if
cfg
.
Host
==
otherCfg
.
Host
&&
otherCfg
.
Port
==
"http"
{
plaintextHostFound
=
true
break
}
}
if
!
plaintextHostFound
{
// Make one that redirects to HTTPS for all requests
configs
=
append
(
configs
,
redirPlaintextHost
(
*
cfg
))
}
}
}
return
configs
,
nil
}
// groupConfigsByEmail groups configs by the Let's Encrypt email address
// associated to them or to the default Let's Encrypt email address. If the
// default email is not available, the user will be prompted to provide one.
func
groupConfigsByEmail
(
configs
[]
server
.
Config
)
(
map
[
string
][]
*
server
.
Config
,
error
)
{
initMap
:=
make
(
map
[
string
][]
*
server
.
Config
)
for
i
:=
0
;
i
<
len
(
configs
);
i
++
{
if
configs
[
i
]
.
TLS
.
Certificate
==
""
&&
configs
[
i
]
.
TLS
.
Key
==
""
&&
configs
[
i
]
.
Port
!=
"http"
{
// TODO: && !cfg.Host.IsLoopback()
leEmail
:=
getEmail
(
configs
[
i
])
if
leEmail
==
""
{
return
configs
,
errors
.
New
(
"cannot serve HTTPS without email address OR
certificate and key"
)
return
nil
,
errors
.
New
(
"must have email address to serve HTTPS without existing
certificate and key"
)
}
initMap
[
leEmail
]
=
append
(
initMap
[
leEmail
],
&
configs
[
i
])
}
}
return
initMap
,
nil
}
// Loop through each email address and obtain certs; we can obtain more
// than one certificate per email address, and still save them individually.
for
leEmail
,
serverConfigs
:=
range
initMap
{
// newClient creates a new ACME client to facilitate communication
// with the Let's Encrypt CA server on behalf of the user specified
// by leEmail. As part of this process, a user will be loaded from
// disk (if already exists) or created new and registered via ACME
// and saved to the file system for next time.
func
newClient
(
leEmail
string
)
(
*
acme
.
Client
,
error
)
{
// Look up or create the LE user account
leUser
,
err
:=
getUser
(
leEmail
)
if
err
!=
nil
{
return
configs
,
err
return
nil
,
err
}
// The client facilitates our communication with the CA server.
...
...
@@ -51,92 +118,80 @@ func Activate(configs []server.Config) ([]server.Config, error) {
if
leUser
.
Registration
==
nil
{
reg
,
err
:=
client
.
Register
()
if
err
!=
nil
{
return
configs
,
errors
.
New
(
"registration error: "
+
err
.
Error
())
return
nil
,
errors
.
New
(
"registration error: "
+
err
.
Error
())
}
leUser
.
Registration
=
reg
// TODO: we can just do the agreement once,
when registering, right?
// TODO: we can just do the agreement once:
when registering, right?
err
=
client
.
AgreeToTos
()
if
err
!=
nil
{
saveUser
(
leUser
)
// TODO: Might as well try, right? Error check?
return
configs
,
errors
.
New
(
"error agreeing to terms: "
+
err
.
Error
())
return
nil
,
errors
.
New
(
"error agreeing to terms: "
+
err
.
Error
())
}
// save user to the file system
err
=
saveUser
(
leUser
)
if
err
!=
nil
{
return
configs
,
errors
.
New
(
"could not save user: "
+
err
.
Error
())
return
nil
,
errors
.
New
(
"could not save user: "
+
err
.
Error
())
}
}
return
client
,
nil
}
// obtainCertificates obtains certificates from the CA server for
// the configurations in serverConfigs using client.
func
obtainCertificates
(
client
*
acme
.
Client
,
serverConfigs
[]
*
server
.
Config
)
([]
acme
.
CertificateResource
,
error
)
{
// collect all the hostnames into one slice
var
hosts
[]
string
for
_
,
cfg
:=
range
serverConfigs
{
hosts
=
append
(
hosts
,
cfg
.
Host
)
}
// showtime: let's get free, trusted SSL certificates! yeah!
certificates
,
err
:=
client
.
ObtainCertificates
(
hosts
)
if
err
!=
nil
{
return
configs
,
errors
.
New
(
"error obtaining certs: "
+
err
.
Error
())
return
nil
,
errors
.
New
(
"error obtaining certs: "
+
err
.
Error
())
}
// ... that's it. save the certs, keys, and update server configs.
return
certificates
,
nil
}
// saveCertificates saves each certificate resource to disk. This
// includes the certificate file itself, the private key, and the
// metadata file.
func
saveCertsAndKeys
(
certificates
[]
acme
.
CertificateResource
)
error
{
for
_
,
cert
:=
range
certificates
{
os
.
MkdirAll
(
storage
.
Site
(
cert
.
Domain
),
0700
)
// Save cert
err
=
saveCertificate
(
cert
.
Certificate
,
storage
.
SiteCertFile
(
cert
.
Domain
))
err
:
=
saveCertificate
(
cert
.
Certificate
,
storage
.
SiteCertFile
(
cert
.
Domain
))
if
err
!=
nil
{
return
configs
,
err
return
err
}
// Save private key
err
=
ioutil
.
WriteFile
(
storage
.
SiteKeyFile
(
cert
.
Domain
),
cert
.
PrivateKey
,
0600
)
if
err
!=
nil
{
return
configs
,
err
return
err
}
// Save cert metadata
jsonBytes
,
err
:=
json
.
MarshalIndent
(
&
CertificateMeta
{
URL
:
cert
.
CertURL
,
Domain
:
cert
.
Domain
},
""
,
"
\t
"
)
if
err
!=
nil
{
return
configs
,
err
return
err
}
err
=
ioutil
.
WriteFile
(
storage
.
SiteMetaFile
(
cert
.
Domain
),
jsonBytes
,
0600
)
if
err
!=
nil
{
return
configs
,
err
}
}
// it all comes down to this: filling in the file path of a valid certificate automatically
for
_
,
cfg
:=
range
serverConfigs
{
cfg
.
TLS
.
Certificate
=
storage
.
SiteCertFile
(
cfg
.
Host
)
cfg
.
TLS
.
Key
=
storage
.
SiteKeyFile
(
cfg
.
Host
)
cfg
.
TLS
.
Enabled
=
true
cfg
.
Port
=
"https"
// Is there a plaintext HTTP config for the same host? If not, make
// one and have it redirect all requests to this HTTPS host.
var
plaintextHostFound
bool
for
_
,
otherCfg
:=
range
configs
{
if
cfg
.
Host
==
otherCfg
.
Host
&&
otherCfg
.
Port
==
"http"
{
plaintextHostFound
=
true
break
}
}
if
!
plaintextHostFound
{
// Make one that redirects to HTTPS for all requests
configs
=
append
(
configs
,
redirPlaintextHost
(
*
cfg
))
return
err
}
}
}
return
configs
,
nil
return
nil
}
// redirPlaintextHost returns a new virtualhost configuration for a server
// that redirects the plaintext HTTP host of cfg to cfg, which is assumed
// to be the secure (HTTPS) host.
// redirPlaintextHost returns a new plaintext HTTP configuration for
// a virtualHost that simply redirects to cfg, which is assumed to
// be the HTTPS configuration. The returned configuration is set
// to listen on the "http" port (port 80).
func
redirPlaintextHost
(
cfg
server
.
Config
)
server
.
Config
{
redirMidware
:=
func
(
next
middleware
.
Handler
)
middleware
.
Handler
{
return
redirect
.
Redirect
{
Next
:
next
,
Rules
:
[]
redirect
.
Rule
{
...
...
@@ -158,49 +213,6 @@ func redirPlaintextHost(cfg server.Config) server.Config {
}
}
// getEmail does everything it can to obtain an email
// address from the user to use for TLS for cfg. If it
// cannot get an email address, it returns empty string.
func
getEmail
(
cfg
server
.
Config
)
string
{
// First try the tls directive from the Caddyfile
leEmail
:=
cfg
.
TLS
.
LetsEncryptEmail
if
leEmail
==
""
{
// Then try memory (command line flag or typed by user previously)
leEmail
=
DefaultEmail
}
if
leEmail
==
""
{
// Then try to get most recent user email ~/.caddy/users file
// TODO: Probably better to open the user's json file and read the email out of there...
userDirs
,
err
:=
ioutil
.
ReadDir
(
storage
.
Users
())
if
err
==
nil
{
var
mostRecent
os
.
FileInfo
for
_
,
dir
:=
range
userDirs
{
if
!
dir
.
IsDir
()
{
continue
}
if
mostRecent
==
nil
||
dir
.
ModTime
()
.
After
(
mostRecent
.
ModTime
())
{
mostRecent
=
dir
}
}
if
mostRecent
!=
nil
{
leEmail
=
mostRecent
.
Name
()
}
}
}
if
leEmail
==
""
{
// Alas, we must bother the user and ask for an email address
reader
:=
bufio
.
NewReader
(
os
.
Stdin
)
fmt
.
Print
(
"Email address: "
)
// TODO: More explanation probably, and show ToS?
var
err
error
leEmail
,
err
=
reader
.
ReadString
(
'\n'
)
if
err
!=
nil
{
return
""
}
DefaultEmail
=
leEmail
}
return
strings
.
TrimSpace
(
leEmail
)
}
var
(
// Let's Encrypt account email to use if none provided
DefaultEmail
string
...
...
config/letsencrypt/storage.go
View file @
96ae288c
...
...
@@ -86,43 +86,3 @@ func emailUsername(email string) string {
}
return
email
[
:
at
]
}
/*
// StorageDir is the full path to the folder where this Let's
// Encrypt client will set up camp. In other words, where it
// stores user account information, keys, and certificates.
// All files will be contained in a 'letsencrypt' folder
// within StorageDir.
//
// Changing this after the program has accessed this folder
// will result in undefined behavior.
var StorageDir = "."
// Values related to persisting things on the file system
const (
// ContainerDir is the name of the folder within StorageDir
// in which files or folders are placed.
ContainerDir = "letsencrypt"
// File that contains information about the user's LE account
UserRegistrationFile = "registration.json"
)
// BaseDir returns the full path to the base directory in which
// files or folders may be placed, e.g. "<StorageDir>/letsencrypt".
func BaseDir() string {
return filepath.Join(StorageDir, ContainerDir)
}
// AccountsDir returns the full path to the directory where account
// information is stored for LE users.
func AccountsDir() string {
return filepath.Join(BaseDir(), "users")
}
// AccountsDir gets the full path to the directory for a certain
// user with the email address email.
func AccountDir(email string) string {
return filepath.Join(AccountsDir(), email)
}
*/
config/letsencrypt/user.go
View file @
96ae288c
package
letsencrypt
import
(
"bufio"
"crypto/rand"
"crypto/rsa"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"os"
"strings"
"github.com/mholt/caddy/server"
"github.com/xenolf/lego/acme"
)
...
...
@@ -29,6 +33,7 @@ func (u User) GetPrivateKey() *rsa.PrivateKey {
}
// getUser loads the user with the given email from disk.
// If the user does not exist, it will create a new one.
func
getUser
(
email
string
)
(
User
,
error
)
{
var
user
User
...
...
@@ -59,7 +64,7 @@ func getUser(email string) (User, error) {
}
// saveUser persists a user's key and account registration
// to the file system.
// to the file system.
It does NOT register the user via ACME.
func
saveUser
(
user
User
)
error
{
// make user account folder
err
:=
os
.
MkdirAll
(
storage
.
User
(
user
.
Email
),
0700
)
...
...
@@ -84,8 +89,10 @@ func saveUser(user User) error {
}
// newUser creates a new User for the given email address
// with a new private key. This function does not register
// the user via ACME.
// with a new private key. This function does NOT save the
// user to disk or register it via ACME. If you want to use
// a user account that might already exist, call getUser
// instead.
func
newUser
(
email
string
)
(
User
,
error
)
{
user
:=
User
{
Email
:
email
}
privateKey
,
err
:=
rsa
.
GenerateKey
(
rand
.
Reader
,
rsaKeySize
)
...
...
@@ -95,3 +102,46 @@ func newUser(email string) (User, error) {
user
.
key
=
privateKey
return
user
,
nil
}
// getEmail does everything it can to obtain an email
// address from the user to use for TLS for cfg. If it
// cannot get an email address, it returns empty string.
func
getEmail
(
cfg
server
.
Config
)
string
{
// First try the tls directive from the Caddyfile
leEmail
:=
cfg
.
TLS
.
LetsEncryptEmail
if
leEmail
==
""
{
// Then try memory (command line flag or typed by user previously)
leEmail
=
DefaultEmail
}
if
leEmail
==
""
{
// Then try to get most recent user email ~/.caddy/users file
// TODO: Probably better to open the user's json file and read the email out of there...
userDirs
,
err
:=
ioutil
.
ReadDir
(
storage
.
Users
())
if
err
==
nil
{
var
mostRecent
os
.
FileInfo
for
_
,
dir
:=
range
userDirs
{
if
!
dir
.
IsDir
()
{
continue
}
if
mostRecent
==
nil
||
dir
.
ModTime
()
.
After
(
mostRecent
.
ModTime
())
{
mostRecent
=
dir
}
}
if
mostRecent
!=
nil
{
leEmail
=
mostRecent
.
Name
()
}
}
}
if
leEmail
==
""
{
// Alas, we must bother the user and ask for an email address
reader
:=
bufio
.
NewReader
(
os
.
Stdin
)
fmt
.
Print
(
"Email address: "
)
// TODO: More explanation probably, and show ToS?
var
err
error
leEmail
,
err
=
reader
.
ReadString
(
'\n'
)
if
err
!=
nil
{
return
""
}
DefaultEmail
=
leEmail
}
return
strings
.
TrimSpace
(
leEmail
)
}
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment