2015-06-08 21:54:15 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
2015-10-18 22:40:59 +00:00
|
|
|
"encoding/json"
|
2015-06-13 01:56:34 +00:00
|
|
|
"io/ioutil"
|
2015-06-08 21:54:15 +00:00
|
|
|
"os"
|
2015-06-13 01:56:34 +00:00
|
|
|
"path"
|
2015-06-08 21:54:15 +00:00
|
|
|
"strings"
|
2015-12-06 21:35:52 +00:00
|
|
|
"time"
|
2015-06-08 21:54:15 +00:00
|
|
|
|
|
|
|
"github.com/codegangsta/cli"
|
|
|
|
"github.com/xenolf/lego/acme"
|
|
|
|
)
|
|
|
|
|
|
|
|
func checkFolder(path string) error {
|
|
|
|
if _, err := os.Stat(path); os.IsNotExist(err) {
|
|
|
|
return os.MkdirAll(path, 0700)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-10-18 22:40:59 +00:00
|
|
|
func setup(c *cli.Context) (*Configuration, *Account, *acme.Client) {
|
2015-06-12 21:34:49 +00:00
|
|
|
err := checkFolder(c.GlobalString("path"))
|
2015-06-08 21:54:15 +00:00
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Cound not check/create path: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
conf := NewConfiguration(c)
|
|
|
|
if !c.GlobalIsSet("email") {
|
|
|
|
logger().Fatal("You have to pass an account (email address) to the program using --email or -m")
|
|
|
|
}
|
|
|
|
|
2015-10-18 22:40:59 +00:00
|
|
|
//TODO: move to account struct? Currently MUST pass email.
|
2015-06-08 21:54:15 +00:00
|
|
|
acc := NewAccount(c.GlobalString("email"), conf)
|
2015-10-27 23:05:40 +00:00
|
|
|
|
|
|
|
client, err := acme.NewClient(c.GlobalString("server"), acc, conf.RsaBits(), conf.OptPort())
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatal("Could not create client:", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return conf, acc, client
|
2015-10-18 22:40:59 +00:00
|
|
|
}
|
|
|
|
|
2015-10-19 01:18:06 +00:00
|
|
|
func saveCertRes(certRes acme.CertificateResource, conf *Configuration) {
|
2015-10-18 22:40:59 +00:00
|
|
|
// We store the certificate, private key and metadata in different files
|
|
|
|
// as web servers would not be able to work with a combined file.
|
|
|
|
certOut := path.Join(conf.CertPath(), certRes.Domain+".crt")
|
|
|
|
privOut := path.Join(conf.CertPath(), certRes.Domain+".key")
|
|
|
|
metaOut := path.Join(conf.CertPath(), certRes.Domain+".json")
|
|
|
|
|
|
|
|
err := ioutil.WriteFile(certOut, certRes.Certificate, 0600)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Unable to save Certificate for domain %s\n\t%v", certRes.Domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(privOut, certRes.PrivateKey, 0600)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Unable to save PrivateKey for domain %s\n\t%v", certRes.Domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
jsonBytes, err := json.MarshalIndent(certRes, "", "\t")
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Unable to marshal CertResource for domain %s\n\t%v", certRes.Domain, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(metaOut, jsonBytes, 0600)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Unable to save CertResource for domain %s\n\t%v", certRes.Domain, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func run(c *cli.Context) {
|
|
|
|
conf, acc, client := setup(c)
|
2015-06-08 21:54:15 +00:00
|
|
|
if acc.Registration == nil {
|
|
|
|
reg, err := client.Register()
|
|
|
|
if err != nil {
|
2015-09-26 17:45:52 +00:00
|
|
|
logger().Fatalf("Could not complete registration\n\t%v", err)
|
2015-06-08 21:54:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
acc.Registration = reg
|
|
|
|
acc.Save()
|
|
|
|
|
|
|
|
logger().Print("!!!! HEADS UP !!!!")
|
|
|
|
logger().Printf(`
|
2015-09-26 18:00:19 +00:00
|
|
|
Your account credentials have been saved in your Let's Encrypt
|
|
|
|
configuration directory at "%s".
|
|
|
|
You should make a secure backup of this folder now. This
|
|
|
|
configuration directory will also contain certificates and
|
|
|
|
private keys obtained from Let's Encrypt so making regular
|
|
|
|
backups of this folder is ideal.`, conf.AccountPath(c.GlobalString("email")))
|
2015-06-08 21:54:15 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if acc.Registration.Body.Agreement == "" {
|
2015-09-26 18:00:19 +00:00
|
|
|
reader := bufio.NewReader(os.Stdin)
|
|
|
|
logger().Printf("Please review the TOS at %s", acc.Registration.TosURL)
|
|
|
|
|
|
|
|
for {
|
|
|
|
logger().Println("Do you accept the TOS? Y/n")
|
|
|
|
text, err := reader.ReadString('\n')
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Could not read from console -> %v", err)
|
|
|
|
}
|
2015-06-08 21:54:15 +00:00
|
|
|
|
2015-09-26 18:00:19 +00:00
|
|
|
text = strings.Trim(text, "\r\n")
|
2015-06-08 21:54:15 +00:00
|
|
|
|
2015-09-26 18:00:19 +00:00
|
|
|
if text == "n" {
|
|
|
|
logger().Fatal("You did not accept the TOS. Unable to proceed.")
|
|
|
|
}
|
2015-06-08 21:54:15 +00:00
|
|
|
|
2015-09-26 18:00:19 +00:00
|
|
|
if text == "Y" || text == "y" || text == "" {
|
2015-10-23 08:23:06 +00:00
|
|
|
err = client.AgreeToTOS()
|
2015-09-26 18:00:19 +00:00
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Could not agree to tos -> %v", err)
|
2015-06-08 21:54:15 +00:00
|
|
|
}
|
2015-09-26 18:00:19 +00:00
|
|
|
acc.Save()
|
|
|
|
break
|
2015-06-08 21:54:15 +00:00
|
|
|
}
|
2015-09-26 18:00:19 +00:00
|
|
|
|
|
|
|
logger().Println("Your input was invalid. Please answer with one of Y/y, n or by pressing enter.")
|
2015-06-08 21:54:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !c.GlobalIsSet("domains") {
|
|
|
|
logger().Fatal("Please specify --domains")
|
|
|
|
}
|
|
|
|
|
2015-11-11 17:05:09 +00:00
|
|
|
cert, failures := client.ObtainSANCertificate(c.GlobalStringSlice("domains"), true)
|
2015-11-02 00:01:00 +00:00
|
|
|
if len(failures) > 0 {
|
|
|
|
for k, v := range failures {
|
2015-11-10 23:10:08 +00:00
|
|
|
logger().Printf("[%s] Could not obtain certificates\n\t%v", k, v)
|
2015-11-02 00:01:00 +00:00
|
|
|
}
|
2015-06-13 01:56:34 +00:00
|
|
|
}
|
|
|
|
|
2015-11-02 00:01:00 +00:00
|
|
|
err := checkFolder(conf.CertPath())
|
2015-06-13 01:56:34 +00:00
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Cound not check/create path: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-11-11 17:05:09 +00:00
|
|
|
saveCertRes(cert, conf)
|
2015-06-08 21:54:15 +00:00
|
|
|
}
|
2015-09-27 12:51:44 +00:00
|
|
|
|
|
|
|
func revoke(c *cli.Context) {
|
|
|
|
|
2015-10-18 22:40:59 +00:00
|
|
|
conf, _, client := setup(c)
|
2015-09-27 12:51:44 +00:00
|
|
|
|
2015-10-18 22:40:59 +00:00
|
|
|
err := checkFolder(conf.CertPath())
|
2015-09-27 12:51:44 +00:00
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Cound not check/create path: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, domain := range c.GlobalStringSlice("domains") {
|
|
|
|
logger().Printf("Trying to revoke certificate for domain %s", domain)
|
|
|
|
|
|
|
|
certPath := path.Join(conf.CertPath(), domain+".crt")
|
|
|
|
certBytes, err := ioutil.ReadFile(certPath)
|
|
|
|
|
|
|
|
err = client.RevokeCertificate(certBytes)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Error while revoking the certificate for domain %s\n\t%v", domain, err)
|
|
|
|
} else {
|
|
|
|
logger().Print("Certificate was revoked.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-10-18 22:42:04 +00:00
|
|
|
|
|
|
|
func renew(c *cli.Context) {
|
|
|
|
conf, _, client := setup(c)
|
|
|
|
|
|
|
|
for _, domain := range c.GlobalStringSlice("domains") {
|
|
|
|
// load the cert resource from files.
|
|
|
|
// We store the certificate, private key and metadata in different files
|
|
|
|
// as web servers would not be able to work with a combined file.
|
|
|
|
certPath := path.Join(conf.CertPath(), domain+".crt")
|
|
|
|
privPath := path.Join(conf.CertPath(), domain+".key")
|
|
|
|
metaPath := path.Join(conf.CertPath(), domain+".json")
|
|
|
|
|
|
|
|
certBytes, err := ioutil.ReadFile(certPath)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Error while loading the certificate for domain %s\n\t%v", domain, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-12-06 21:35:52 +00:00
|
|
|
if c.IsSet("days") {
|
|
|
|
expTime, err := acme.GetPEMCertExpiration(certBytes)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Could not get Certification expiration for domain %s", domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
if int(expTime.Sub(time.Now()).Hours() / 24.0) <= c.Int("days") {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-18 22:42:04 +00:00
|
|
|
keyBytes, err := ioutil.ReadFile(privPath)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Error while loading the private key for domain %s\n\t%v", domain, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
metaBytes, err := ioutil.ReadFile(metaPath)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Error while loading the meta data for domain %s\n\t%v", domain, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var certRes acme.CertificateResource
|
|
|
|
err = json.Unmarshal(metaBytes, &certRes)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Error while marshalling the meta data for domain %s\n\t%v", domain, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
certRes.PrivateKey = keyBytes
|
|
|
|
certRes.Certificate = certBytes
|
|
|
|
|
2015-10-24 01:55:18 +00:00
|
|
|
newCert, err := client.RenewCertificate(certRes, true, true)
|
2015-10-18 22:42:04 +00:00
|
|
|
if err != nil {
|
|
|
|
logger().Printf("%v", err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
saveCertRes(newCert, conf)
|
|
|
|
}
|
|
|
|
}
|