2023-06-26 11:56:21 +01:00
|
|
|
package http_acme
|
2023-06-21 23:09:33 +01:00
|
|
|
|
|
|
|
import (
|
2023-07-03 16:27:24 +01:00
|
|
|
"encoding/json"
|
2023-06-23 23:00:09 +01:00
|
|
|
"fmt"
|
2023-06-21 23:09:33 +01:00
|
|
|
"github.com/go-acme/lego/v4/challenge"
|
2023-07-07 15:47:38 +01:00
|
|
|
"gopkg.in/yaml.v3"
|
|
|
|
"log"
|
2023-06-23 23:00:09 +01:00
|
|
|
"net/http"
|
2023-07-07 15:47:38 +01:00
|
|
|
"os"
|
2023-06-23 23:00:09 +01:00
|
|
|
"strings"
|
2023-06-21 23:09:33 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
var _ challenge.Provider = &HttpAcmeProvider{}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// HttpAcmeProvider sends HTTP requests to an API updating the outputted
|
|
|
|
// `.wellknown/acme-challenges` data
|
2023-06-21 23:09:33 +01:00
|
|
|
type HttpAcmeProvider struct {
|
2023-07-07 15:47:38 +01:00
|
|
|
tokenFile string
|
2023-06-21 23:09:33 +01:00
|
|
|
accessToken, refreshToken string
|
|
|
|
apiUrlPresent, apiUrlCleanUp string
|
2023-07-03 16:27:24 +01:00
|
|
|
apiUrlRefreshToken string
|
2023-06-23 23:00:09 +01:00
|
|
|
trip http.RoundTripper
|
2023-06-21 23:09:33 +01:00
|
|
|
}
|
|
|
|
|
2023-07-07 15:47:38 +01:00
|
|
|
type AcmeLogin struct {
|
|
|
|
Access string `yaml:"access"`
|
|
|
|
Refresh string `yaml:"refresh"`
|
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// NewHttpAcmeProvider creates a new HttpAcmeProvider using http.DefaultTransport
|
|
|
|
// as the transport
|
2023-07-07 15:47:38 +01:00
|
|
|
func NewHttpAcmeProvider(tokenFile, apiUrlPresent, apiUrlCleanUp, apiUrlRefreshToken string) (*HttpAcmeProvider, error) {
|
|
|
|
// acme login token
|
|
|
|
openTokens, err := os.Open(tokenFile)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to load acme tokens: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var acmeLogins AcmeLogin
|
|
|
|
err = yaml.NewDecoder(openTokens).Decode(&acmeLogins)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("failed to load acme tokens: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &HttpAcmeProvider{tokenFile, acmeLogins.Access, acmeLogins.Refresh, apiUrlPresent, apiUrlCleanUp, apiUrlRefreshToken, http.DefaultTransport}, nil
|
2023-06-21 23:09:33 +01:00
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// Present implements challenge.Provider and sends a put request to the specified
|
|
|
|
// path along with a bearer token to authenticate
|
2023-06-21 23:09:33 +01:00
|
|
|
func (h *HttpAcmeProvider) Present(domain, token, keyAuth string) error {
|
2023-06-23 23:00:09 +01:00
|
|
|
// round trip
|
2023-07-03 16:27:24 +01:00
|
|
|
trip, err := h.authCheckRequest(http.MethodPut, h.apiUrlPresent, domain, token, keyAuth)
|
2023-06-23 23:00:09 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-07-11 14:23:28 +01:00
|
|
|
if trip.StatusCode != http.StatusAccepted {
|
2023-07-11 15:04:59 +01:00
|
|
|
return fmt.Errorf("trip response status code was not 202")
|
2023-06-23 23:00:09 +01:00
|
|
|
}
|
|
|
|
return nil
|
2023-06-21 23:09:33 +01:00
|
|
|
}
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// CleanUp implements challenge.Provider and sends a delete request to the
|
|
|
|
// specified path along with a bearer token to authenticate
|
2023-06-21 23:09:33 +01:00
|
|
|
func (h *HttpAcmeProvider) CleanUp(domain, token, keyAuth string) error {
|
2023-06-23 23:00:09 +01:00
|
|
|
// round trip
|
2023-07-03 16:27:24 +01:00
|
|
|
trip, err := h.authCheckRequest(http.MethodDelete, h.apiUrlCleanUp, domain, token, keyAuth)
|
2023-06-23 23:00:09 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2023-07-11 14:23:28 +01:00
|
|
|
if trip.StatusCode != http.StatusAccepted {
|
2023-07-11 15:04:59 +01:00
|
|
|
return fmt.Errorf("trip response status code was not 202")
|
2023-06-23 23:00:09 +01:00
|
|
|
}
|
|
|
|
return nil
|
2023-06-21 23:09:33 +01:00
|
|
|
}
|
2023-07-03 16:27:24 +01:00
|
|
|
|
|
|
|
// authCheckRequest call internalRequest and renews the access token if it is
|
|
|
|
// outdated and calls internalRequest again
|
|
|
|
func (h *HttpAcmeProvider) authCheckRequest(method, url, domain, token, keyAuth string) (*http.Response, error) {
|
|
|
|
// call internal request and check the status code
|
|
|
|
resp, err := h.internalRequest(method, url, domain, token, keyAuth)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
switch resp.StatusCode {
|
2023-07-11 15:04:59 +01:00
|
|
|
case http.StatusAccepted:
|
2023-07-03 16:27:24 +01:00
|
|
|
// just return
|
|
|
|
return resp, nil
|
|
|
|
case http.StatusForbidden:
|
|
|
|
// send request to get renewed access and refresh tokens
|
|
|
|
req, err := http.NewRequest(http.MethodPost, h.apiUrlRefreshToken, nil)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("refresh token request failed: %w", err)
|
|
|
|
}
|
|
|
|
req.Header.Set("Authorization", "Bearer "+h.refreshToken)
|
|
|
|
|
|
|
|
// round trip and status check
|
|
|
|
trip, err := h.trip.RoundTrip(req)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("refresh token request failed: %w", err)
|
|
|
|
}
|
2023-07-11 15:04:59 +01:00
|
|
|
if trip.StatusCode != http.StatusAccepted {
|
|
|
|
return nil, fmt.Errorf("refresh token request failed: due to invalid status code, expected 202 got %d", trip.StatusCode)
|
2023-07-03 16:27:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// parse tokens from response body
|
|
|
|
var tokens struct {
|
|
|
|
Access string `json:"access"`
|
|
|
|
Refresh string `json:"refresh"`
|
|
|
|
}
|
|
|
|
if json.NewDecoder(trip.Body).Decode(&tokens) != nil {
|
|
|
|
return nil, fmt.Errorf("refresh token parsing failed: %w", err)
|
|
|
|
}
|
|
|
|
h.accessToken = tokens.Access
|
|
|
|
h.refreshToken = tokens.Refresh
|
|
|
|
|
2023-07-07 15:47:38 +01:00
|
|
|
go h.saveLoginTokens()
|
|
|
|
|
2023-07-03 16:27:24 +01:00
|
|
|
// call internal request again
|
|
|
|
resp, err = h.internalRequest(method, url, domain, token, keyAuth)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2023-07-11 14:23:28 +01:00
|
|
|
if resp.StatusCode == http.StatusAccepted {
|
2023-07-03 16:27:24 +01:00
|
|
|
// just return
|
|
|
|
return resp, nil
|
|
|
|
}
|
2023-07-11 15:04:59 +01:00
|
|
|
return nil, fmt.Errorf("invalid status code, expected 202 got %d", resp.StatusCode)
|
2023-07-03 16:27:24 +01:00
|
|
|
}
|
|
|
|
// first request had an invalid status code
|
2023-07-11 15:04:59 +01:00
|
|
|
return nil, fmt.Errorf("invalid status code, expected 202/403 got %d", resp.StatusCode)
|
2023-07-03 16:27:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// internalRequest sends a request to the acme challenge hosting api
|
|
|
|
func (h *HttpAcmeProvider) internalRequest(method, url, domain, token, keyAuth string) (*http.Response, error) {
|
2023-07-07 15:47:38 +01:00
|
|
|
v := strings.NewReplacer("$domain", domain, "$token", token, "$content", keyAuth).Replace(url)
|
2023-07-03 16:27:24 +01:00
|
|
|
req, err := http.NewRequest(method, v, nil)
|
|
|
|
if err != nil {
|
2023-07-07 15:47:38 +01:00
|
|
|
return nil, err
|
2023-07-03 16:27:24 +01:00
|
|
|
}
|
|
|
|
req.Header.Set("Authorization", "Bearer "+h.accessToken)
|
|
|
|
return h.trip.RoundTrip(req)
|
|
|
|
}
|
2023-07-07 15:47:38 +01:00
|
|
|
|
|
|
|
func (h *HttpAcmeProvider) saveLoginTokens() {
|
|
|
|
// acme login token
|
|
|
|
openTokens, err := os.Create(h.tokenFile)
|
|
|
|
if err != nil {
|
|
|
|
log.Println("[Orchid] Failed to open token file:", err)
|
|
|
|
}
|
|
|
|
defer openTokens.Close()
|
|
|
|
|
|
|
|
err = yaml.NewEncoder(openTokens).Encode(AcmeLogin{Access: h.accessToken, Refresh: h.refreshToken})
|
|
|
|
if err != nil {
|
|
|
|
log.Println("[Orchid] Failed to write tokens file:", err)
|
|
|
|
}
|
|
|
|
}
|