ssl.go 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203
  1. package ssl
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "github.com/go-acme/lego/v4/certificate"
  10. log "github.com/sirupsen/logrus"
  11. "github.com/spf13/cast"
  12. "os"
  13. "pmail/config"
  14. "pmail/services/setup"
  15. "pmail/signal"
  16. "pmail/utils/errors"
  17. "time"
  18. "github.com/go-acme/lego/v4/certcrypto"
  19. "github.com/go-acme/lego/v4/lego"
  20. "github.com/go-acme/lego/v4/registration"
  21. )
  22. type MyUser struct {
  23. Email string
  24. Registration *registration.Resource
  25. key crypto.PrivateKey
  26. }
  27. func (u *MyUser) GetEmail() string {
  28. return u.Email
  29. }
  30. func (u MyUser) GetRegistration() *registration.Resource {
  31. return u.Registration
  32. }
  33. func (u *MyUser) GetPrivateKey() crypto.PrivateKey {
  34. return u.key
  35. }
  36. func GetSSL() string {
  37. cfg, err := setup.ReadConfig()
  38. if err != nil {
  39. panic(err)
  40. }
  41. if cfg.SSLType == "" {
  42. return config.SSLTypeAuto
  43. }
  44. return cfg.SSLType
  45. }
  46. func SetSSL(sslType, priKey, crtKey string) error {
  47. cfg, err := setup.ReadConfig()
  48. if err != nil {
  49. panic(err)
  50. }
  51. if sslType == config.SSLTypeAuto || sslType == config.SSLTypeUser {
  52. cfg.SSLType = sslType
  53. } else {
  54. return errors.New("SSL Type Error!")
  55. }
  56. if cfg.SSLType == config.SSLTypeUser {
  57. cfg.SSLPrivateKeyPath = priKey
  58. cfg.SSLPublicKeyPath = crtKey
  59. }
  60. err = setup.WriteConfig(cfg)
  61. if err != nil {
  62. return errors.Wrap(err)
  63. }
  64. return nil
  65. }
  66. func GenSSL(update bool) error {
  67. cfg, err := setup.ReadConfig()
  68. if err != nil {
  69. panic(err)
  70. }
  71. if !update {
  72. privateFile, errpi := os.ReadFile(cfg.SSLPrivateKeyPath)
  73. public, errpu := os.ReadFile(cfg.SSLPublicKeyPath)
  74. // 当前存在证书数据,就不生成了
  75. if errpi == nil && errpu == nil && len(privateFile) > 0 && len(public) > 0 {
  76. return nil
  77. }
  78. }
  79. // Create a user. New accounts need an email and private key to start.
  80. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  81. if err != nil {
  82. return errors.Wrap(err)
  83. }
  84. myUser := MyUser{
  85. Email: "i@" + cfg.Domain,
  86. key: privateKey,
  87. }
  88. config := lego.NewConfig(&myUser)
  89. config.Certificate.KeyType = certcrypto.RSA2048
  90. // A client facilitates communication with the CA server.
  91. client, err := lego.NewClient(config)
  92. if err != nil {
  93. return errors.Wrap(err)
  94. }
  95. err = client.Challenge.SetHTTP01Provider(GetHttpChallengeInstance())
  96. if err != nil {
  97. return errors.Wrap(err)
  98. }
  99. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  100. if err != nil {
  101. return errors.Wrap(err)
  102. }
  103. myUser.Registration = reg
  104. request := certificate.ObtainRequest{
  105. Domains: []string{"smtp." + cfg.Domain, cfg.WebDomain, "pop." + cfg.Domain},
  106. Bundle: true,
  107. }
  108. certificates, err := client.Certificate.Obtain(request)
  109. if err != nil {
  110. return errors.Wrap(err)
  111. }
  112. err = os.WriteFile("./config/ssl/private.key", certificates.PrivateKey, 0666)
  113. if err != nil {
  114. return errors.Wrap(err)
  115. }
  116. err = os.WriteFile("./config/ssl/public.crt", certificates.Certificate, 0666)
  117. if err != nil {
  118. return errors.Wrap(err)
  119. }
  120. err = os.WriteFile("./config/ssl/issuerCert.crt", certificates.IssuerCertificate, 0666)
  121. if err != nil {
  122. return errors.Wrap(err)
  123. }
  124. return nil
  125. }
  126. // CheckSSLCrtInfo 返回证书过期剩余天数
  127. func CheckSSLCrtInfo() (int, time.Time, error) {
  128. cfg, err := setup.ReadConfig()
  129. if err != nil {
  130. panic(err)
  131. }
  132. // load cert and key by tls.LoadX509KeyPair
  133. tlsCert, err := tls.LoadX509KeyPair(cfg.SSLPublicKeyPath, cfg.SSLPrivateKeyPath)
  134. if err != nil {
  135. return -1, time.Now(), errors.Wrap(err)
  136. }
  137. cert, err := x509.ParseCertificate(tlsCert.Certificate[0])
  138. if err != nil {
  139. return -1, time.Now(), errors.Wrap(err)
  140. }
  141. // 检查过期时间
  142. hours := cert.NotAfter.Sub(time.Now()).Hours()
  143. if hours <= 0 {
  144. return -1, time.Now(), errors.New("Certificate has expired")
  145. }
  146. return cast.ToInt(hours / 24), cert.NotAfter, nil
  147. }
  148. func Update(needRestart bool) {
  149. if config.Instance != nil && config.Instance.IsInit && config.Instance.SSLType == "0" {
  150. days, _, err := CheckSSLCrtInfo()
  151. if days < 30 || err != nil {
  152. if err != nil {
  153. log.Errorf("SSL Check Error, Update SSL Certificate. Error Info :%+v", err)
  154. } else {
  155. log.Infof("SSL certificate remaining time is only %d days, renew SSL certificate.", days)
  156. }
  157. err = GenSSL(true)
  158. if err != nil {
  159. log.Errorf("SSL Update Error! %+v", err)
  160. }
  161. if needRestart {
  162. // 更新完证书,重启服务
  163. signal.RestartChan <- true
  164. }
  165. } else {
  166. log.Debugf("SSL Check.")
  167. }
  168. }
  169. }