2019-03-11 18:56:48 +02:00
|
|
|
package cmd
|
2018-12-06 23:50:17 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2021-12-25 20:36:01 +02:00
|
|
|
"crypto"
|
|
|
|
"crypto/rand"
|
2018-12-06 23:50:17 +02:00
|
|
|
"crypto/x509"
|
|
|
|
"encoding/json"
|
2021-12-25 20:36:01 +02:00
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
2018-12-06 23:50:17 +02:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2020-09-02 03:20:01 +02:00
|
|
|
"github.com/go-acme/lego/v4/certcrypto"
|
|
|
|
"github.com/go-acme/lego/v4/certificate"
|
|
|
|
"github.com/go-acme/lego/v4/log"
|
2022-02-13 13:28:51 +02:00
|
|
|
"github.com/urfave/cli/v2"
|
2018-12-06 23:50:17 +02:00
|
|
|
"golang.org/x/net/idna"
|
2021-12-25 20:36:01 +02:00
|
|
|
"software.sslmate.com/src/go-pkcs12"
|
2018-12-06 23:50:17 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
baseCertificatesFolderName = "certificates"
|
|
|
|
baseArchivesFolderName = "archives"
|
|
|
|
)
|
|
|
|
|
2023-05-06 00:14:07 +02:00
|
|
|
const (
|
|
|
|
issuerExt = ".issuer.crt"
|
|
|
|
certExt = ".crt"
|
|
|
|
keyExt = ".key"
|
|
|
|
pemExt = ".pem"
|
|
|
|
pfxExt = ".pfx"
|
|
|
|
resourceExt = ".json"
|
|
|
|
)
|
|
|
|
|
2022-08-22 17:05:31 +02:00
|
|
|
// CertificatesStorage a certificates' storage.
|
2018-12-06 23:50:17 +02:00
|
|
|
//
|
|
|
|
// rootPath:
|
|
|
|
//
|
2022-08-22 17:05:31 +02:00
|
|
|
// ./.lego/certificates/
|
|
|
|
// │ └── root certificates directory
|
|
|
|
// └── "path" option
|
2018-12-06 23:50:17 +02:00
|
|
|
//
|
|
|
|
// archivePath:
|
|
|
|
//
|
2022-08-22 17:05:31 +02:00
|
|
|
// ./.lego/archives/
|
|
|
|
// │ └── archived certificates directory
|
|
|
|
// └── "path" option
|
2018-12-06 23:50:17 +02:00
|
|
|
type CertificatesStorage struct {
|
|
|
|
rootPath string
|
|
|
|
archivePath string
|
|
|
|
pem bool
|
2021-12-25 20:36:01 +02:00
|
|
|
pfx bool
|
|
|
|
pfxPassword string
|
2018-12-06 23:50:17 +02:00
|
|
|
filename string // Deprecated
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewCertificatesStorage create a new certificates storage.
|
|
|
|
func NewCertificatesStorage(ctx *cli.Context) *CertificatesStorage {
|
|
|
|
return &CertificatesStorage{
|
2022-02-13 13:28:51 +02:00
|
|
|
rootPath: filepath.Join(ctx.String("path"), baseCertificatesFolderName),
|
|
|
|
archivePath: filepath.Join(ctx.String("path"), baseArchivesFolderName),
|
|
|
|
pem: ctx.Bool("pem"),
|
|
|
|
pfx: ctx.Bool("pfx"),
|
|
|
|
pfxPassword: ctx.String("pfx.pass"),
|
|
|
|
filename: ctx.String("filename"),
|
2018-12-06 23:50:17 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) CreateRootFolder() {
|
|
|
|
err := createNonExistingFolder(s.rootPath)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Could not check/create path: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) CreateArchiveFolder() {
|
|
|
|
err := createNonExistingFolder(s.archivePath)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Could not check/create path: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) GetRootPath() string {
|
|
|
|
return s.rootPath
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) SaveResource(certRes *certificate.Resource) {
|
|
|
|
domain := certRes.Domain
|
|
|
|
|
|
|
|
// We store the certificate, private key and metadata in different files
|
|
|
|
// as web servers would not be able to work with a combined file.
|
2023-05-06 00:14:07 +02:00
|
|
|
err := s.WriteFile(domain, certExt, certRes.Certificate)
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to save Certificate for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if certRes.IssuerCertificate != nil {
|
2023-05-06 00:14:07 +02:00
|
|
|
err = s.WriteFile(domain, issuerExt, certRes.IssuerCertificate)
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to save IssuerCertificate for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-12-25 20:36:01 +02:00
|
|
|
// if we were given a CSR, we don't know the private key
|
2018-12-06 23:50:17 +02:00
|
|
|
if certRes.PrivateKey != nil {
|
2021-12-25 20:36:01 +02:00
|
|
|
err = s.WriteCertificateFiles(domain, certRes)
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to save PrivateKey for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
2021-12-25 20:36:01 +02:00
|
|
|
} else if s.pem || s.pfx {
|
|
|
|
// we don't have the private key; can't write the .pem or .pfx file
|
|
|
|
log.Fatalf("Unable to save PEM or PFX without private key for domain %s. Are you using a CSR?", domain)
|
2018-12-06 23:50:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
jsonBytes, err := json.MarshalIndent(certRes, "", "\t")
|
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to marshal CertResource for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
|
|
|
|
2023-05-06 00:14:07 +02:00
|
|
|
err = s.WriteFile(domain, resourceExt, jsonBytes)
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Unable to save CertResource for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) ReadResource(domain string) certificate.Resource {
|
2023-05-06 00:14:07 +02:00
|
|
|
raw, err := s.ReadFile(domain, resourceExt)
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatalf("Error while loading the meta data for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
var resource certificate.Resource
|
|
|
|
if err = json.Unmarshal(raw, &resource); err != nil {
|
|
|
|
log.Fatalf("Error while marshaling the meta data for domain %s\n\t%v", domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resource
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) ExistsFile(domain, extension string) bool {
|
2020-04-11 14:57:06 +02:00
|
|
|
filePath := s.GetFileName(domain, extension)
|
2018-12-06 23:50:17 +02:00
|
|
|
|
|
|
|
if _, err := os.Stat(filePath); os.IsNotExist(err) {
|
|
|
|
return false
|
|
|
|
} else if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) ReadFile(domain, extension string) ([]byte, error) {
|
2021-08-25 11:44:11 +02:00
|
|
|
return os.ReadFile(s.GetFileName(domain, extension))
|
2020-04-11 14:57:06 +02:00
|
|
|
}
|
2018-12-06 23:50:17 +02:00
|
|
|
|
2020-04-11 14:57:06 +02:00
|
|
|
func (s *CertificatesStorage) GetFileName(domain, extension string) string {
|
|
|
|
filename := sanitizedDomain(domain) + extension
|
|
|
|
return filepath.Join(s.rootPath, filename)
|
2018-12-06 23:50:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) ReadCertificate(domain, extension string) ([]*x509.Certificate, error) {
|
|
|
|
content, err := s.ReadFile(domain, extension)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// The input may be a bundle or a single certificate.
|
|
|
|
return certcrypto.ParsePEMBundle(content)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) WriteFile(domain, extension string, data []byte) error {
|
|
|
|
var baseFileName string
|
|
|
|
if s.filename != "" {
|
|
|
|
baseFileName = s.filename
|
|
|
|
} else {
|
|
|
|
baseFileName = sanitizedDomain(domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
filePath := filepath.Join(s.rootPath, baseFileName+extension)
|
|
|
|
|
2021-08-25 11:44:11 +02:00
|
|
|
return os.WriteFile(filePath, data, filePerm)
|
2018-12-06 23:50:17 +02:00
|
|
|
}
|
|
|
|
|
2021-12-25 20:36:01 +02:00
|
|
|
func (s *CertificatesStorage) WriteCertificateFiles(domain string, certRes *certificate.Resource) error {
|
2023-05-06 00:14:07 +02:00
|
|
|
err := s.WriteFile(domain, keyExt, certRes.PrivateKey)
|
2021-12-25 20:36:01 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to save key file: %w", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.pem {
|
2023-05-06 00:14:07 +02:00
|
|
|
err = s.WriteFile(domain, pemExt, bytes.Join([][]byte{certRes.Certificate, certRes.PrivateKey}, nil))
|
2021-12-25 20:36:01 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to save PEM file: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if s.pfx {
|
|
|
|
err = s.WritePFXFile(domain, certRes)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to save PFX file: %w", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *CertificatesStorage) WritePFXFile(domain string, certRes *certificate.Resource) error {
|
|
|
|
certPemBlock, _ := pem.Decode(certRes.Certificate)
|
|
|
|
if certPemBlock == nil {
|
|
|
|
return fmt.Errorf("unable to parse Certificate for domain %s", domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
cert, err := x509.ParseCertificate(certPemBlock.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to load Certificate for domain %s: %w", domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
issuerCertPemBlock, _ := pem.Decode(certRes.IssuerCertificate)
|
|
|
|
if issuerCertPemBlock == nil {
|
|
|
|
return fmt.Errorf("unable to parse Issuer Certificate for domain %s", domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
issuerCert, err := x509.ParseCertificate(issuerCertPemBlock.Bytes)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to load Issuer Certificate for domain %s: %w", domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
keyPemBlock, _ := pem.Decode(certRes.PrivateKey)
|
|
|
|
if keyPemBlock == nil {
|
|
|
|
return fmt.Errorf("unable to parse PrivateKey for domain %s", domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
var privateKey crypto.Signer
|
|
|
|
var keyErr error
|
|
|
|
|
|
|
|
switch keyPemBlock.Type {
|
|
|
|
case "RSA PRIVATE KEY":
|
|
|
|
privateKey, keyErr = x509.ParsePKCS1PrivateKey(keyPemBlock.Bytes)
|
|
|
|
if keyErr != nil {
|
|
|
|
return fmt.Errorf("unable to load RSA PrivateKey for domain %s: %w", domain, keyErr)
|
|
|
|
}
|
|
|
|
case "EC PRIVATE KEY":
|
|
|
|
privateKey, keyErr = x509.ParseECPrivateKey(keyPemBlock.Bytes)
|
|
|
|
if keyErr != nil {
|
|
|
|
return fmt.Errorf("unable to load EC PrivateKey for domain %s: %w", domain, keyErr)
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return fmt.Errorf("unsupported PrivateKey type '%s' for domain %s", keyPemBlock.Type, domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
pfxBytes, err := pkcs12.Encode(rand.Reader, privateKey, cert, []*x509.Certificate{issuerCert}, s.pfxPassword)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("unable to encode PFX data for domain %s: %w", domain, err)
|
|
|
|
}
|
|
|
|
|
2023-05-06 00:14:07 +02:00
|
|
|
return s.WriteFile(domain, pfxExt, pfxBytes)
|
2021-12-25 20:36:01 +02:00
|
|
|
}
|
|
|
|
|
2018-12-06 23:50:17 +02:00
|
|
|
func (s *CertificatesStorage) MoveToArchive(domain string) error {
|
2023-05-06 00:14:07 +02:00
|
|
|
baseFilename := filepath.Join(s.rootPath, sanitizedDomain(domain))
|
|
|
|
|
|
|
|
matches, err := filepath.Glob(baseFilename + ".*")
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, oldFile := range matches {
|
2023-05-06 00:14:07 +02:00
|
|
|
if strings.TrimSuffix(oldFile, filepath.Ext(oldFile)) != baseFilename && oldFile != baseFilename+issuerExt {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2018-12-06 23:50:17 +02:00
|
|
|
date := strconv.FormatInt(time.Now().Unix(), 10)
|
|
|
|
filename := date + "." + filepath.Base(oldFile)
|
|
|
|
newFile := filepath.Join(s.archivePath, filename)
|
|
|
|
|
|
|
|
err = os.Rename(oldFile, newFile)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-05-08 19:35:25 +02:00
|
|
|
// sanitizedDomain Make sure no funny chars are in the cert names (like wildcards ;)).
|
2018-12-06 23:50:17 +02:00
|
|
|
func sanitizedDomain(domain string) string {
|
2023-05-02 19:02:18 +02:00
|
|
|
safe, err := idna.ToASCII(strings.NewReplacer(":", "-", "*", "_").Replace(domain))
|
2018-12-06 23:50:17 +02:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
return safe
|
|
|
|
}
|