2016-01-15 04:06:25 +00:00
|
|
|
package acme
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
2016-02-14 15:56:14 +00:00
|
|
|
// HTTPProviderServer implements ChallengeProvider for `http-01` challenge
|
|
|
|
// It may be instantiated without using the NewHTTPProviderServer function if
|
|
|
|
// you want only to use the default values.
|
|
|
|
type HTTPProviderServer struct {
|
2016-01-15 04:06:25 +00:00
|
|
|
iface string
|
|
|
|
port string
|
|
|
|
done chan bool
|
|
|
|
listener net.Listener
|
|
|
|
}
|
|
|
|
|
2016-02-14 15:56:14 +00:00
|
|
|
// NewHTTPProviderServer creates a new HTTPProviderServer on the selected interface and port.
|
|
|
|
// Setting iface and / or port to an empty string will make the server fall back to
|
|
|
|
// the "any" interface and port 80 respectively.
|
|
|
|
func NewHTTPProviderServer(iface, port string) *HTTPProviderServer {
|
|
|
|
return &HTTPProviderServer{iface: iface, port: port}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Present starts a web server and makes the token available at `HTTP01ChallengePath(token)` for web requests.
|
|
|
|
func (s *HTTPProviderServer) Present(domain, token, keyAuth string) error {
|
2016-01-15 04:06:25 +00:00
|
|
|
if s.port == "" {
|
|
|
|
s.port = "80"
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
s.listener, err = net.Listen("tcp", net.JoinHostPort(s.iface, s.port))
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Could not start HTTP server for challenge -> %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
s.done = make(chan bool)
|
|
|
|
go s.serve(domain, token, keyAuth)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-14 15:56:14 +00:00
|
|
|
// CleanUp closes the HTTP server and removes the token from `HTTP01ChallengePath(token)`
|
|
|
|
func (s *HTTPProviderServer) CleanUp(domain, token, keyAuth string) error {
|
2016-01-15 04:06:25 +00:00
|
|
|
if s.listener == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
s.listener.Close()
|
|
|
|
<-s.done
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-02-14 15:56:14 +00:00
|
|
|
func (s *HTTPProviderServer) serve(domain, token, keyAuth string) {
|
2016-01-15 04:06:25 +00:00
|
|
|
path := HTTP01ChallengePath(token)
|
|
|
|
|
|
|
|
// The handler validates the HOST header and request type.
|
|
|
|
// For validation it then writes the token the server returned with the challenge
|
|
|
|
mux := http.NewServeMux()
|
|
|
|
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if strings.HasPrefix(r.Host, domain) && r.Method == "GET" {
|
|
|
|
w.Header().Add("Content-Type", "text/plain")
|
|
|
|
w.Write([]byte(keyAuth))
|
|
|
|
logf("[INFO][%s] Served key authentication", domain)
|
|
|
|
} else {
|
|
|
|
logf("[INFO] Received request for domain %s with method %s", r.Host, r.Method)
|
|
|
|
w.Write([]byte("TEST"))
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2016-02-07 13:25:31 +00:00
|
|
|
httpServer := &http.Server{
|
|
|
|
Handler: mux,
|
|
|
|
}
|
|
|
|
// Once httpServer is shut down we don't want any lingering
|
|
|
|
// connections, so disable KeepAlives.
|
|
|
|
httpServer.SetKeepAlivesEnabled(false)
|
|
|
|
httpServer.Serve(s.listener)
|
2016-01-15 04:06:25 +00:00
|
|
|
s.done <- true
|
|
|
|
}
|