2023-06-26 11:56:21 +01:00
|
|
|
package renewal
|
|
|
|
|
|
|
|
import (
|
2023-06-29 02:37:00 +01:00
|
|
|
"bytes"
|
2023-06-26 11:56:21 +01:00
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/tls"
|
|
|
|
"crypto/x509"
|
|
|
|
"database/sql"
|
|
|
|
_ "embed"
|
2023-06-29 02:37:00 +01:00
|
|
|
"encoding/pem"
|
2023-06-26 11:56:21 +01:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2023-06-29 02:37:00 +01:00
|
|
|
"github.com/MrMelon54/orchid/pebble"
|
2023-06-26 11:56:21 +01:00
|
|
|
"github.com/go-acme/lego/v4/certificate"
|
|
|
|
"github.com/go-acme/lego/v4/challenge"
|
2023-06-29 02:37:00 +01:00
|
|
|
"github.com/go-acme/lego/v4/challenge/dns01"
|
2023-06-26 11:56:21 +01:00
|
|
|
"github.com/go-acme/lego/v4/lego"
|
2023-06-30 00:06:46 +01:00
|
|
|
"github.com/go-acme/lego/v4/providers/dns/duckdns"
|
2023-06-26 11:56:21 +01:00
|
|
|
"github.com/go-acme/lego/v4/providers/dns/namesilo"
|
|
|
|
"github.com/go-acme/lego/v4/registration"
|
|
|
|
"io"
|
|
|
|
"log"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
ErrUnsupportedDNSProvider = errors.New("unsupported DNS provider")
|
|
|
|
//go:embed find-next-cert.sql
|
|
|
|
findNextCertSql string
|
|
|
|
//go:embed create-tables.sql
|
|
|
|
createTableCertificates string
|
|
|
|
)
|
|
|
|
|
2023-07-10 17:51:14 +01:00
|
|
|
const (
|
|
|
|
DomainStateNormal = 0
|
|
|
|
DomainStateAdded = 1
|
|
|
|
DomainStateRemoved = 2
|
|
|
|
)
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// overrides only used in testing
|
2023-06-29 02:37:00 +01:00
|
|
|
var testDnsOptions interface {
|
|
|
|
challenge.Provider
|
|
|
|
GetDnsAddrs() []string
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// Service manages the scheduled renewal of certificates stored in the database
|
|
|
|
// and outputs the latest certificates to the certDir folder. If the certificate
|
|
|
|
// does not have a key already defined in keyDir then a new key is generated.
|
|
|
|
//
|
|
|
|
// The service makes use of an HTTP ACME challenge provider, and a DNS ACME
|
|
|
|
// challenge provider. These ensure the `.wellknown/acme-challenges` files and
|
|
|
|
// `_acme-challenges` TXT records are updated to validate the ownership of the
|
|
|
|
// specified domains.
|
2023-06-26 11:56:21 +01:00
|
|
|
type Service struct {
|
|
|
|
db *sql.DB
|
2023-06-29 02:37:00 +01:00
|
|
|
httpAcme challenge.Provider
|
2023-06-26 11:56:21 +01:00
|
|
|
certTicker *time.Ticker
|
|
|
|
certDone chan struct{}
|
|
|
|
caAddr string
|
|
|
|
caCert []byte
|
2023-06-29 02:37:00 +01:00
|
|
|
transport http.RoundTripper
|
2023-06-26 11:56:21 +01:00
|
|
|
renewLock *sync.Mutex
|
|
|
|
leAccount *Account
|
|
|
|
certDir string
|
|
|
|
keyDir string
|
2023-06-29 02:37:00 +01:00
|
|
|
insecure bool
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// NewService creates a new certificate renewal service.
|
|
|
|
func NewService(wg *sync.WaitGroup, db *sql.DB, httpAcme challenge.Provider, leConfig LetsEncryptConfig, certDir, keyDir string) (*Service, error) {
|
2023-06-26 11:56:21 +01:00
|
|
|
r := &Service{
|
|
|
|
db: db,
|
|
|
|
httpAcme: httpAcme,
|
|
|
|
certTicker: time.NewTicker(time.Minute * 10),
|
|
|
|
certDone: make(chan struct{}),
|
|
|
|
renewLock: &sync.Mutex{},
|
|
|
|
leAccount: &Account{
|
|
|
|
email: leConfig.Account.Email,
|
|
|
|
},
|
2023-06-29 02:37:00 +01:00
|
|
|
certDir: certDir,
|
|
|
|
keyDir: keyDir,
|
|
|
|
insecure: leConfig.insecure,
|
|
|
|
}
|
|
|
|
|
|
|
|
// make certDir and keyDir
|
|
|
|
err := os.MkdirAll(certDir, os.ModePerm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create certDir '%s': %w", certDir, err)
|
|
|
|
}
|
|
|
|
err = os.MkdirAll(keyDir, os.ModePerm)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create certDir '%s': %w", certDir, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// load lets encrypt private key
|
|
|
|
err = r.resolveLEPrivKey(leConfig.Account.PrivateKey)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to resolve LetsEncrypt account private key: %w", err)
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// init domains table
|
2023-06-29 02:37:00 +01:00
|
|
|
_, err = r.db.Exec(createTableCertificates)
|
2023-06-26 11:56:21 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to create certificates table: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// resolve CA information
|
2023-06-29 02:37:00 +01:00
|
|
|
r.resolveCADirectory(leConfig.Directory)
|
|
|
|
err = r.resolveCACertificate(leConfig.Certificate)
|
2023-06-26 11:56:21 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to resolve CA certificate: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// start the background routine
|
2023-06-26 11:56:21 +01:00
|
|
|
wg.Add(1)
|
|
|
|
go r.renewalRoutine(wg)
|
|
|
|
return r, nil
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// Shutdown the renewal service.
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) Shutdown() {
|
|
|
|
log.Println("[Renewal] Shutting down certificate renewal service")
|
|
|
|
close(s.certDone)
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// resolveLEPrivKey resolves the private key for the LetsEncrypt account.
|
|
|
|
// If the string is a path to a file then the contents of the file is read.
|
2023-06-29 02:37:00 +01:00
|
|
|
func (s *Service) resolveLEPrivKey(a string) error {
|
2023-07-07 15:47:38 +01:00
|
|
|
p, _ := pem.Decode([]byte(a))
|
|
|
|
if p == nil {
|
|
|
|
return fmt.Errorf("failed to parse pem encoding")
|
|
|
|
}
|
|
|
|
if p.Type != "RSA PRIVATE KEY" {
|
|
|
|
return fmt.Errorf("invalid key types: %s", p.Type)
|
|
|
|
}
|
|
|
|
key, err := x509.ParsePKCS1PrivateKey(p.Bytes)
|
2023-06-29 02:37:00 +01:00
|
|
|
if err != nil {
|
2023-07-07 15:47:38 +01:00
|
|
|
return fmt.Errorf("failed to parse key: %w", err)
|
2023-06-29 02:37:00 +01:00
|
|
|
}
|
|
|
|
s.leAccount.key = key
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// resolveCADirectory resolves the certificate authority directory URL.
|
|
|
|
//
|
|
|
|
// If "production" or "prod" then the LetsEncrypt production directory is used.
|
|
|
|
//
|
|
|
|
// If "staging" then the LetsEncrypt staging directory is used.
|
|
|
|
//
|
|
|
|
// Otherwise, the string is assumed to be a value directory URL (used for testing
|
|
|
|
// with pebble).
|
2023-06-29 02:37:00 +01:00
|
|
|
func (s *Service) resolveCADirectory(dir string) {
|
|
|
|
switch dir {
|
2023-06-26 11:56:21 +01:00
|
|
|
case "production", "prod":
|
|
|
|
s.caAddr = lego.LEDirectoryProduction
|
|
|
|
case "staging":
|
|
|
|
s.caAddr = lego.LEDirectoryStaging
|
|
|
|
default:
|
2023-06-29 02:37:00 +01:00
|
|
|
s.caAddr = dir
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// resolveCACertificate resolves the certificate authority root certificate.
|
|
|
|
//
|
|
|
|
// If "default" is used then the internal library lego defaults to the
|
|
|
|
// LetsEncrypt production root certificate.
|
|
|
|
//
|
|
|
|
// If "pebble" is used then the pebble certificate is used.
|
2023-06-29 02:37:00 +01:00
|
|
|
func (s *Service) resolveCACertificate(cert string) error {
|
|
|
|
switch cert {
|
2023-06-26 11:56:21 +01:00
|
|
|
case "default":
|
|
|
|
// no nothing
|
|
|
|
case "pebble":
|
2023-06-29 02:37:00 +01:00
|
|
|
s.caCert = pebble.RawCert
|
|
|
|
case "insecure":
|
|
|
|
s.caCert = []byte{0x00}
|
2023-06-26 11:56:21 +01:00
|
|
|
default:
|
2023-06-29 02:37:00 +01:00
|
|
|
s.caCert = []byte(cert)
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
if s.caCert != nil {
|
2023-06-29 02:37:00 +01:00
|
|
|
if bytes.Compare([]byte{0x00}, s.caCert) == 0 {
|
|
|
|
t := http.DefaultTransport.(*http.Transport).Clone()
|
|
|
|
t.TLSClientConfig.InsecureSkipVerify = true
|
|
|
|
s.transport = t
|
|
|
|
} else {
|
|
|
|
caPool := x509.NewCertPool()
|
|
|
|
if !caPool.AppendCertsFromPEM(s.caCert) {
|
|
|
|
return fmt.Errorf("failed to add certificate to CA cert pool")
|
|
|
|
}
|
|
|
|
t := http.DefaultTransport.(*http.Transport).Clone()
|
|
|
|
t.TLSClientConfig = &tls.Config{RootCAs: caPool}
|
|
|
|
s.transport = t
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
var ErrAlreadyRenewing = errors.New("already renewing")
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// renewalRoutine is the main loop which makes used of certTicker to constantly
|
|
|
|
// check if the existing certificates are up-to-date.
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) renewalRoutine(wg *sync.WaitGroup) {
|
2023-07-03 16:27:24 +01:00
|
|
|
// Upon leaving the function stop the ticker and clear the WaitGroup.
|
2023-06-26 11:56:21 +01:00
|
|
|
defer func() {
|
|
|
|
s.certTicker.Stop()
|
|
|
|
log.Println("[Renewal] Stopped certificate renewal service")
|
|
|
|
wg.Done()
|
|
|
|
}()
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// Do an initial check and refuse to start if any errors occur.
|
2023-06-26 11:56:21 +01:00
|
|
|
log.Println("[Renewal] Doing quick certificate check before starting...")
|
|
|
|
err := s.renewalCheck()
|
|
|
|
if err != nil {
|
|
|
|
log.Println("[Renewal] Certificate check, should not error first try: ", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// Logging or something
|
|
|
|
log.Println("[Renewal] Initial check complete, continually checking every 10 minutes...")
|
|
|
|
|
|
|
|
// Main loop
|
2023-06-26 11:56:21 +01:00
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-s.certDone:
|
2023-07-03 16:27:24 +01:00
|
|
|
// Exit if certDone has closed
|
2023-06-26 11:56:21 +01:00
|
|
|
return
|
|
|
|
case <-s.certTicker.C:
|
2023-07-03 16:27:24 +01:00
|
|
|
// Start a new check in a separate routine
|
2023-06-26 11:56:21 +01:00
|
|
|
go func() {
|
2023-07-03 16:27:24 +01:00
|
|
|
// run a renewal check and log errors, but ignore ErrAlreadyRenewing
|
2023-06-26 11:56:21 +01:00
|
|
|
err := s.renewalCheck()
|
|
|
|
if err != nil && err != ErrAlreadyRenewing {
|
|
|
|
log.Println("[Renewal] Certificate check, an error occurred: ", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// renewalCheck runs a locked renewal check, this only returns and unlocks once a
|
|
|
|
// renewal finishes or if no certificate needs to renew.
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) renewalCheck() error {
|
|
|
|
if !s.renewLock.TryLock() {
|
|
|
|
return ErrAlreadyRenewing
|
|
|
|
}
|
|
|
|
defer s.renewLock.Unlock()
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// check for running out certificates in the database
|
2023-06-26 11:56:21 +01:00
|
|
|
localData, err := s.findNextCertificateToRenew()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to find a certificate to renew: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// no certificates to update
|
|
|
|
if localData == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// renew the certificate from the collected data
|
2023-06-29 02:37:00 +01:00
|
|
|
err = s.renewCert(localData)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-07-03 16:27:24 +01:00
|
|
|
|
|
|
|
// renew succeeded
|
2023-06-29 02:37:00 +01:00
|
|
|
log.Printf("[Renewal] Updated certificate %d successfully\n", localData.id)
|
|
|
|
return nil
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// findNextCertificateToRenew finds a certificate to update
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) findNextCertificateToRenew() (*localCertData, error) {
|
|
|
|
d := &localCertData{}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// sql or something, the query is in `find-next-cert.sql`
|
|
|
|
row, err := s.db.Query(findNextCertSql)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to run query: %w", err)
|
|
|
|
}
|
|
|
|
defer row.Close()
|
|
|
|
|
|
|
|
// if next fails no rows were found
|
|
|
|
if !row.Next() {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// scan the first row
|
2023-07-10 17:51:14 +01:00
|
|
|
err = row.Scan(&d.id, &d.notAfter, &d.dns.name, &d.dns.token, &d.tempParent)
|
2023-06-26 11:56:21 +01:00
|
|
|
switch err {
|
|
|
|
case nil:
|
|
|
|
// no nothing
|
|
|
|
break
|
|
|
|
case io.EOF:
|
|
|
|
// no certificate to update
|
|
|
|
return nil, nil
|
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("failed to scan table row: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return d, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Service) fetchDomains(localData *localCertData) ([]string, error) {
|
2023-07-03 16:27:24 +01:00
|
|
|
// more sql: this one just grabs all the domains for a certificate
|
2023-07-10 17:51:14 +01:00
|
|
|
query, err := s.db.Query(`SELECT domain FROM certificate_domains WHERE cert_id = ?`, resolveTempParent(localData))
|
2023-06-26 11:56:21 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to fetch domains for certificate: %d: %w", localData.id, err)
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// convert query responses to a string slice
|
2023-06-26 11:56:21 +01:00
|
|
|
domains := make([]string, 0)
|
|
|
|
for query.Next() {
|
|
|
|
var domain string
|
|
|
|
err := query.Scan(&domain)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to scan row from domains table: %d: %w", localData.id, err)
|
|
|
|
}
|
|
|
|
domains = append(domains, domain)
|
|
|
|
}
|
2023-07-03 16:27:24 +01:00
|
|
|
// if no domains were found then the renewal will fail
|
2023-06-26 11:56:21 +01:00
|
|
|
if len(domains) == 0 {
|
|
|
|
return nil, fmt.Errorf("no domains registered for certificate: %d", localData.id)
|
|
|
|
}
|
|
|
|
return domains, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *Service) setupLegoClient(localData *localCertData) (*lego.Client, error) {
|
2023-07-03 16:27:24 +01:00
|
|
|
// create lego config and change the certificate authority directory URL and the
|
|
|
|
// http.Client transport if an alternative is provided
|
2023-06-26 11:56:21 +01:00
|
|
|
config := lego.NewConfig(s.leAccount)
|
|
|
|
config.CADirURL = s.caAddr
|
|
|
|
if s.transport != nil {
|
|
|
|
config.HTTPClient.Transport = s.transport
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// create lego client from the config
|
2023-06-26 11:56:21 +01:00
|
|
|
client, err := lego.NewClient(config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to generate client: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-06-29 02:37:00 +01:00
|
|
|
// set http challenge provider
|
2023-06-26 11:56:21 +01:00
|
|
|
_ = client.Challenge.SetHTTP01Provider(s.httpAcme)
|
2023-06-29 02:37:00 +01:00
|
|
|
|
|
|
|
// if testDnsOptions is defined then set up the test provider
|
|
|
|
if testDnsOptions != nil {
|
2023-07-03 16:27:24 +01:00
|
|
|
// set up the dns provider used during tests and disable propagation as no dns
|
|
|
|
// will validate these tests
|
2023-07-10 17:51:14 +01:00
|
|
|
dnsAddr := testDnsOptions.GetDnsAddrs()
|
|
|
|
log.Printf("Using testDnsOptions with DNS server: %v\n", dnsAddr)
|
|
|
|
_ = client.Challenge.SetDNS01Provider(testDnsOptions, dns01.AddRecursiveNameservers(dnsAddr), dns01.DisableCompletePropagationRequirement())
|
2023-06-29 02:37:00 +01:00
|
|
|
} else if localData.dns.name.Valid && localData.dns.token.Valid {
|
|
|
|
// if the dns name and token are "valid" meaning non-null in this case
|
|
|
|
// set up the specific dns provider requested
|
|
|
|
dnsProv, err := s.getDnsProvider(localData.dns.name.String, localData.dns.token.String)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to resolve dns provider: %w", err)
|
|
|
|
}
|
|
|
|
_ = client.Challenge.SetDNS01Provider(dnsProv)
|
|
|
|
}
|
2023-06-26 11:56:21 +01:00
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// make sure the LetsEncrypt account is registered
|
2023-06-26 11:56:21 +01:00
|
|
|
register, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to update account registration: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// return and use the client
|
2023-06-26 11:56:21 +01:00
|
|
|
s.leAccount.reg = register
|
|
|
|
return client, nil
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// getDnsProvider loads a DNS challenge provider using the provided name and
|
|
|
|
// token
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) getDnsProvider(name, token string) (challenge.Provider, error) {
|
|
|
|
switch name {
|
2023-06-30 00:06:46 +01:00
|
|
|
case "duckdns":
|
|
|
|
config := duckdns.NewDefaultConfig()
|
|
|
|
config.Token = token
|
|
|
|
return duckdns.NewDNSProviderConfig(config)
|
2023-06-26 11:56:21 +01:00
|
|
|
case "namesilo":
|
2023-06-30 00:06:46 +01:00
|
|
|
config := namesilo.NewDefaultConfig()
|
|
|
|
config.APIKey = token
|
|
|
|
return namesilo.NewDNSProviderConfig(config)
|
2023-06-26 11:56:21 +01:00
|
|
|
default:
|
|
|
|
return nil, ErrUnsupportedDNSProvider
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// getPrivateKey reads the private key for the specified certificate id
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) getPrivateKey(id uint64) (*rsa.PrivateKey, error) {
|
|
|
|
privKeyBytes, err := os.ReadFile(filepath.Join(s.keyDir, fmt.Sprintf("%d.key.pem", id)))
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return x509.ParsePKCS1PrivateKey(privKeyBytes)
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// renewCert sets the renewing state in the database, calls renewCertInternal,
|
|
|
|
// updates the NotAfter/NotBefore columns in the database and writes the
|
|
|
|
// certificate to the certDir directory.
|
2023-06-29 02:37:00 +01:00
|
|
|
func (s *Service) renewCert(localData *localCertData) error {
|
2023-07-03 16:27:24 +01:00
|
|
|
// database synchronous state
|
2023-06-26 11:56:21 +01:00
|
|
|
s.setRenewing(localData.id, true, false)
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// run internal renewal code and log errors
|
2023-06-26 11:56:21 +01:00
|
|
|
cert, certBytes, err := s.renewCertInternal(localData)
|
|
|
|
if err != nil {
|
|
|
|
s.setRenewing(localData.id, false, true)
|
2023-06-29 02:37:00 +01:00
|
|
|
return fmt.Errorf("failed to renew cert %d: %w", localData.id, err)
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// set the NotAfter/NotBefore in the database
|
2023-06-26 11:56:21 +01:00
|
|
|
_, err = s.db.Exec(`UPDATE certificates SET renewing = 0, renew_failed = 0, not_after = ?, updated_at = ? WHERE id = ?`, cert.NotAfter, cert.NotBefore, localData.id)
|
|
|
|
if err != nil {
|
2023-06-29 02:37:00 +01:00
|
|
|
return fmt.Errorf("failed to update cert %d in database: %w", localData.id, err)
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
2023-07-10 17:51:14 +01:00
|
|
|
// set domains to normal state
|
|
|
|
_, err = s.db.Exec(`UPDATE certificate_domains SET state = ? WHERE cert_id = ?`, DomainStateNormal, localData.id)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to update domains for %d in database: %w", localData.id, err)
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// write out the certificate file
|
2023-06-29 02:37:00 +01:00
|
|
|
err = s.writeCertFile(localData.id, certBytes)
|
2023-06-26 11:56:21 +01:00
|
|
|
if err != nil {
|
2023-06-29 02:37:00 +01:00
|
|
|
return fmt.Errorf("failed to write cert file: %w", err)
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
2023-06-29 02:37:00 +01:00
|
|
|
return nil
|
2023-06-26 11:56:21 +01:00
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// renewCertInternal handles each stage of fetching the certificate private key,
|
|
|
|
// fetching the domains slice, setting up the lego client, obtaining a renewed
|
|
|
|
// certificate, decoding and parsing the certificate.
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) renewCertInternal(localData *localCertData) (*x509.Certificate, []byte, error) {
|
|
|
|
// read private key file
|
|
|
|
privKey, err := s.getPrivateKey(localData.id)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to open private key: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// fetch domains for this certificate
|
|
|
|
domains, err := s.fetchDomains(localData)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to update cert: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// setup client for requesting a new certificate
|
|
|
|
client, err := s.setupLegoClient(localData)
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to generate a client: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-06-29 02:37:00 +01:00
|
|
|
// obtain new certificate - this call will hang until a certificate is ready
|
2023-06-26 11:56:21 +01:00
|
|
|
obtain, err := client.Certificate.Obtain(certificate.ObtainRequest{
|
|
|
|
Domains: domains,
|
|
|
|
PrivateKey: privKey,
|
|
|
|
Bundle: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to obtain replacement certificate: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-06-29 02:37:00 +01:00
|
|
|
// extract the certificate data from pem encoding
|
|
|
|
p, _ := pem.Decode(obtain.Certificate)
|
|
|
|
if p.Type != "CERTIFICATE" {
|
|
|
|
return nil, nil, fmt.Errorf("invalid certificate type '%s'", p.Type)
|
|
|
|
}
|
|
|
|
|
|
|
|
// parse the obtained certificate
|
|
|
|
parseCert, err := x509.ParseCertificate(p.Bytes)
|
2023-06-26 11:56:21 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, nil, fmt.Errorf("failed to parse new certificate: %w", err)
|
|
|
|
}
|
|
|
|
|
2023-06-29 02:37:00 +01:00
|
|
|
// return the parsed and raw bytes
|
2023-06-26 11:56:21 +01:00
|
|
|
return parseCert, obtain.Certificate, nil
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// setRenewing sets the renewing and failed states in the database for a
|
|
|
|
// specified certifcate id.
|
2023-06-26 11:56:21 +01:00
|
|
|
func (s *Service) setRenewing(id uint64, renewing, failed bool) {
|
|
|
|
_, err := s.db.Exec("UPDATE certificates SET renewing = ?, renew_failed = ? WHERE id = ?", renewing, failed, id)
|
|
|
|
if err != nil {
|
|
|
|
log.Printf("[Renewal] Failed to set renewing/failed mode in database %d: %s\n", id, err)
|
|
|
|
}
|
|
|
|
}
|
2023-06-29 02:37:00 +01:00
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// writeCertFile writes the output certificate file and renames the current one
|
|
|
|
// to include `-old` in the name.
|
2023-06-29 02:37:00 +01:00
|
|
|
func (s *Service) writeCertFile(id uint64, certBytes []byte) error {
|
|
|
|
oldPath := filepath.Join(s.certDir, fmt.Sprintf("%d-old.cert.pem", id))
|
|
|
|
newPath := filepath.Join(s.certDir, fmt.Sprintf("%d.cert.pem", id))
|
|
|
|
|
|
|
|
// move certificate file to old name
|
|
|
|
err := os.Rename(newPath, oldPath)
|
|
|
|
if err != nil && !os.IsNotExist(err) {
|
|
|
|
return fmt.Errorf("failed to rename cert file '%s' => '%s': %w", newPath, oldPath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// create new certificate file
|
|
|
|
openCertFile, err := os.Create(newPath)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to create cert file '%s': %s", newPath, err)
|
|
|
|
}
|
|
|
|
defer openCertFile.Close()
|
|
|
|
|
|
|
|
// write certificate bytes
|
|
|
|
_, err = openCertFile.Write(certBytes)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to write cert file '%s': %s", newPath, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2023-07-10 17:51:14 +01:00
|
|
|
|
|
|
|
func resolveTempParent(local *localCertData) uint64 {
|
|
|
|
if local.tempParent > 0 {
|
|
|
|
return local.tempParent
|
|
|
|
}
|
|
|
|
return local.id
|
|
|
|
}
|