1
0
mirror of https://github.com/go-acme/lego.git synced 2024-12-15 14:27:53 +02:00
lego/acme/dns_challenge.go

146 lines
3.3 KiB
Go
Raw Normal View History

package acme
2015-11-17 00:57:41 +02:00
import (
"crypto/sha256"
2016-01-01 15:36:30 +02:00
"encoding/base64"
2015-11-17 00:57:41 +02:00
"errors"
"fmt"
"log"
2016-01-01 15:36:30 +02:00
"strings"
2015-11-17 00:57:41 +02:00
"time"
"github.com/miekg/dns"
2015-11-17 00:57:41 +02:00
)
2016-01-22 03:25:27 +02:00
type preCheckDNSFunc func(domain, fqdn string) bool
2016-01-22 03:25:27 +02:00
var preCheckDNS preCheckDNSFunc = checkDNS
var preCheckDNSFallbackCount = 5
// DNS01Record returns a DNS record which will fulfill the `dns-01` challenge
func DNS01Record(domain, keyAuth string) (fqdn string, value string, ttl int) {
keyAuthShaBytes := sha256.Sum256([]byte(keyAuth))
// base64URL encoding without padding
keyAuthSha := base64.URLEncoding.EncodeToString(keyAuthShaBytes[:sha256.Size])
value = strings.TrimRight(keyAuthSha, "=")
ttl = 120
fqdn = fmt.Sprintf("_acme-challenge.%s.", domain)
return
}
2015-11-17 00:57:41 +02:00
// dnsChallenge implements the dns-01 challenge according to ACME 7.5
type dnsChallenge struct {
jws *jws
validate validateFunc
provider ChallengeProvider
2015-11-17 00:57:41 +02:00
}
func (s *dnsChallenge) Solve(chlng challenge, domain string) error {
Add missing domain name for consistency Before the change: 2016/01/30 00:23:37 [INFO][simonecarletti.com, foo1.simonecarletti.com, foo2.simonecarletti.com, foo3.simonecarletti.com] acme: Obtaining bundled SAN certificate 2016/01/30 00:23:38 [INFO][simonecarletti.com] acme: Could not find solver for: tls-sni-01 2016/01/30 00:23:38 [INFO] acme: Trying to solve DNS-01 2016/01/30 00:23:42 [INFO][simonecarletti.com] The server validated our request 2016/01/30 00:23:44 [INFO] acme: Trying to solve DNS-01 2016/01/30 00:23:47 [INFO][foo1.simonecarletti.com] The server validated our request 2016/01/30 00:23:49 [INFO][foo2.simonecarletti.com] acme: Could not find solver for: tls-sni-01 2016/01/30 00:23:49 [INFO][foo2.simonecarletti.com] acme: Could not find solver for: http-01 2016/01/30 00:23:49 [INFO] acme: Trying to solve DNS-01 2016/01/30 00:23:53 [INFO][foo3.simonecarletti.com] acme: Could not find solver for: http-01 2016/01/30 00:23:53 [INFO] acme: Trying to solve DNS-01 2016/01/30 00:23:56 [INFO][foo3.simonecarletti.com] The server validated our request After the change: 2016/01/30 00:27:58 [INFO][simonecarletti.com, foo1.simonecarletti.com, foo2.simonecarletti.com, foo3.simonecarletti.com] acme: Obtaining bundled SAN certificate 2016/01/30 00:27:59 [INFO][simonecarletti.com] acme: Could not find solver for: http-01 2016/01/30 00:27:59 [INFO][simonecarletti.com] acme: Trying to solve DNS-01 2016/01/30 00:28:12 [INFO][simonecarletti.com] The server validated our request 2016/01/30 00:28:14 [INFO][foo1.simonecarletti.com] acme: Could not find solver for: http-01 2016/01/30 00:28:14 [INFO][foo1.simonecarletti.com] acme: Trying to solve DNS-01 2016/01/30 00:28:19 [INFO][foo2.simonecarletti.com] acme: Could not find solver for: http-01 2016/01/30 00:28:19 [INFO][foo2.simonecarletti.com] acme: Could not find solver for: tls-sni-01 2016/01/30 00:28:19 [INFO][foo2.simonecarletti.com] acme: Trying to solve DNS-01 2016/01/30 00:28:22 [INFO][foo1.simonecarletti.com] The server validated our request
2016-01-30 23:17:41 +02:00
logf("[INFO][%s] acme: Trying to solve DNS-01", domain)
2015-11-17 00:57:41 +02:00
if s.provider == nil {
return errors.New("No DNS Provider configured")
}
2015-11-17 00:57:41 +02:00
// Generate the Key Authorization for the challenge
keyAuth, err := getKeyAuthorization(chlng.Token, &s.jws.privKey.PublicKey)
if err != nil {
return err
}
err = s.provider.Present(domain, chlng.Token, keyAuth)
if err != nil {
return fmt.Errorf("Error presenting token %s", err)
}
defer func() {
err := s.provider.CleanUp(domain, chlng.Token, keyAuth)
if err != nil {
log.Printf("Error cleaning up %s %v ", domain, err)
}
}()
fqdn, _, _ := DNS01Record(domain, keyAuth)
2015-11-17 00:57:41 +02:00
2016-01-22 03:25:27 +02:00
preCheckDNS(domain, fqdn)
2016-01-25 01:32:47 +02:00
return s.validate(s.jws, domain, chlng.URI, challenge{Resource: "challenge", Type: chlng.Type, Token: chlng.Token, KeyAuthorization: keyAuth})
2015-11-17 00:57:41 +02:00
}
2016-01-22 03:25:27 +02:00
func checkDNS(domain, fqdn string) bool {
// check if the expected DNS entry was created. If not wait for some time and try again.
m := new(dns.Msg)
m.SetQuestion(domain+".", dns.TypeSOA)
c := new(dns.Client)
in, _, err := c.Exchange(m, "google-public-dns-a.google.com:53")
2016-01-22 03:25:27 +02:00
if err != nil {
return false
}
var authorativeNS string
for _, answ := range in.Answer {
soa := answ.(*dns.SOA)
authorativeNS = soa.Ns
}
fallbackCnt := 0
for fallbackCnt < preCheckDNSFallbackCount {
m.SetQuestion(fqdn, dns.TypeTXT)
in, _, err = c.Exchange(m, authorativeNS+":53")
if err != nil {
return false
}
if len(in.Answer) > 0 {
return true
}
fallbackCnt++
if fallbackCnt >= preCheckDNSFallbackCount {
return false
}
time.Sleep(time.Second * time.Duration(fallbackCnt))
}
return false
}
// toFqdn converts the name into a fqdn appending a trailing dot.
func toFqdn(name string) string {
n := len(name)
if n == 0 || name[n-1] == '.' {
return name
}
return name + "."
}
// unFqdn converts the fqdn into a name removing the trailing dot.
func unFqdn(name string) string {
n := len(name)
if n != 0 && name[n-1] == '.' {
return name[:n-1]
}
return name
}
// waitFor polls the given function 'f', once per second, up to 'timeout' seconds.
func waitFor(timeout int, f func() (bool, error)) error {
start := time.Now().Second()
for {
time.Sleep(1 * time.Second)
if delta := time.Now().Second() - start; delta >= timeout {
return fmt.Errorf("Time limit exceeded (%d seconds)", delta)
}
stop, err := f()
if err != nil {
return err
}
if stop {
return nil
}
}
}