ssl.go 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. package ssl
  2. import (
  3. "crypto"
  4. "crypto/ecdsa"
  5. "crypto/elliptic"
  6. "crypto/rand"
  7. "crypto/tls"
  8. "crypto/x509"
  9. "github.com/go-acme/lego/v4/certificate"
  10. "github.com/spf13/cast"
  11. "os"
  12. "pmail/config"
  13. "pmail/services/setup"
  14. "pmail/utils/errors"
  15. "time"
  16. "github.com/go-acme/lego/v4/certcrypto"
  17. "github.com/go-acme/lego/v4/lego"
  18. "github.com/go-acme/lego/v4/registration"
  19. )
  20. type MyUser struct {
  21. Email string
  22. Registration *registration.Resource
  23. key crypto.PrivateKey
  24. }
  25. func (u *MyUser) GetEmail() string {
  26. return u.Email
  27. }
  28. func (u MyUser) GetRegistration() *registration.Resource {
  29. return u.Registration
  30. }
  31. func (u *MyUser) GetPrivateKey() crypto.PrivateKey {
  32. return u.key
  33. }
  34. func GetSSL() string {
  35. cfg, err := setup.ReadConfig()
  36. if err != nil {
  37. panic(err)
  38. }
  39. if cfg.SSLType == "" {
  40. return config.SSLTypeAuto
  41. }
  42. return cfg.SSLType
  43. }
  44. func SetSSL(sslType string) error {
  45. cfg, err := setup.ReadConfig()
  46. if err != nil {
  47. panic(err)
  48. }
  49. if sslType == config.SSLTypeAuto || sslType == config.SSLTypeUser {
  50. cfg.SSLType = sslType
  51. } else {
  52. return errors.New("SSL Type Error!")
  53. }
  54. err = setup.WriteConfig(cfg)
  55. if err != nil {
  56. return errors.Wrap(err)
  57. }
  58. return nil
  59. }
  60. func GenSSL(update bool) error {
  61. cfg, err := setup.ReadConfig()
  62. if err != nil {
  63. panic(err)
  64. }
  65. if !update {
  66. privateFile, errpi := os.ReadFile(cfg.SSLPrivateKeyPath)
  67. public, errpu := os.ReadFile(cfg.SSLPublicKeyPath)
  68. // 当前存在证书数据,就不生成了
  69. if errpi == nil && errpu == nil && len(privateFile) > 0 && len(public) > 0 {
  70. return nil
  71. }
  72. }
  73. // Create a user. New accounts need an email and private key to start.
  74. privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
  75. if err != nil {
  76. return errors.Wrap(err)
  77. }
  78. myUser := MyUser{
  79. Email: "i@" + cfg.Domain,
  80. key: privateKey,
  81. }
  82. config := lego.NewConfig(&myUser)
  83. config.Certificate.KeyType = certcrypto.RSA2048
  84. // A client facilitates communication with the CA server.
  85. client, err := lego.NewClient(config)
  86. if err != nil {
  87. return errors.Wrap(err)
  88. }
  89. err = client.Challenge.SetHTTP01Provider(GetHttpChallengeInstance())
  90. if err != nil {
  91. return errors.Wrap(err)
  92. }
  93. reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
  94. if err != nil {
  95. return errors.Wrap(err)
  96. }
  97. myUser.Registration = reg
  98. request := certificate.ObtainRequest{
  99. Domains: []string{"smtp." + cfg.Domain, cfg.WebDomain},
  100. Bundle: true,
  101. }
  102. certificates, err := client.Certificate.Obtain(request)
  103. if err != nil {
  104. return errors.Wrap(err)
  105. }
  106. err = os.WriteFile("./config/ssl/private.key", certificates.PrivateKey, 0666)
  107. if err != nil {
  108. return errors.Wrap(err)
  109. }
  110. err = os.WriteFile("./config/ssl/public.crt", certificates.Certificate, 0666)
  111. if err != nil {
  112. return errors.Wrap(err)
  113. }
  114. err = os.WriteFile("./config/ssl/issuerCert.crt", certificates.IssuerCertificate, 0666)
  115. if err != nil {
  116. return errors.Wrap(err)
  117. }
  118. return nil
  119. }
  120. // CheckSSLCrtInfo 返回证书过期剩余天数
  121. func CheckSSLCrtInfo() (int, time.Time, error) {
  122. cfg, err := setup.ReadConfig()
  123. if err != nil {
  124. panic(err)
  125. }
  126. // load cert and key by tls.LoadX509KeyPair
  127. tlsCert, err := tls.LoadX509KeyPair(cfg.SSLPublicKeyPath, cfg.SSLPrivateKeyPath)
  128. if err != nil {
  129. return -1, time.Now(), errors.Wrap(err)
  130. }
  131. cert, err := x509.ParseCertificate(tlsCert.Certificate[0])
  132. if err != nil {
  133. return -1, time.Now(), errors.Wrap(err)
  134. }
  135. // 检查过期时间
  136. hours := cert.NotAfter.Sub(time.Now()).Hours()
  137. if hours <= 0 {
  138. return -1, time.Now(), errors.New("Certificate has expired")
  139. }
  140. return cast.ToInt(hours / 24), cert.NotAfter, nil
  141. }