2016-03-29 10:14:48 +00:00
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2016-03-29 17:11:11 +00:00
|
|
|
"encoding/json"
|
|
|
|
"io/ioutil"
|
|
|
|
"path"
|
|
|
|
"time"
|
2016-03-29 10:14:48 +00:00
|
|
|
|
2016-03-29 17:17:51 +00:00
|
|
|
"github.com/xenolf/lego/cmd/utils"
|
2016-03-29 10:14:48 +00:00
|
|
|
"github.com/spf13/cobra"
|
2016-03-29 17:11:11 +00:00
|
|
|
"github.com/xenolf/lego/acme"
|
2016-03-29 10:14:48 +00:00
|
|
|
)
|
|
|
|
|
2016-03-29 17:11:11 +00:00
|
|
|
func renewHandler(cmd *cobra.Command, args []string) {
|
|
|
|
conf, _, client := utils.Setup(RootCmd)
|
|
|
|
|
|
|
|
domains, err := RootCmd.PersistentFlags().GetStringSlice("domains")
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalln(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(domains) <= 0 {
|
|
|
|
logger().Fatal("Please specify at least one domain.")
|
|
|
|
}
|
|
|
|
|
|
|
|
domain := domains[0]
|
|
|
|
|
|
|
|
// load the cert resource from files.
|
|
|
|
// We store the certificate, private key and metadata in different files
|
|
|
|
// as web servers would not be able to work with a combined file.
|
|
|
|
certPath := path.Join(conf.CertPath(), domain+".crt")
|
|
|
|
privPath := path.Join(conf.CertPath(), domain+".key")
|
|
|
|
metaPath := path.Join(conf.CertPath(), domain+".json")
|
|
|
|
|
|
|
|
certBytes, err := ioutil.ReadFile(certPath)
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Error while loading the certificate for domain %s\n\t%s", domain, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
days, err := cmd.PersistentFlags().GetInt("days")
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalln(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
if days > 0 {
|
|
|
|
expTime, err := acme.GetPEMCertExpiration(certBytes)
|
|
|
|
if err != nil {
|
|
|
|
logger().Printf("Could not get Certification expiration for domain %s", domain)
|
|
|
|
}
|
|
|
|
|
|
|
|
if int(expTime.Sub(time.Now()).Hours()/24.0) > days {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
metaBytes, err := ioutil.ReadFile(metaPath)
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Error while loading the meta data for domain %s\n\t%s", domain, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
var certRes acme.CertificateResource
|
|
|
|
err = json.Unmarshal(metaBytes, &certRes)
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Error while marshalling the meta data for domain %s\n\t%s", domain, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
reusekey, err := cmd.PersistentFlags().GetBool("reuse-key")
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalln(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
if reusekey {
|
|
|
|
keyBytes, err := ioutil.ReadFile(privPath)
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("Error while loading the private key for domain %s\n\t%s", domain, err.Error())
|
|
|
|
}
|
|
|
|
certRes.PrivateKey = keyBytes
|
|
|
|
}
|
|
|
|
|
|
|
|
certRes.Certificate = certBytes
|
|
|
|
|
|
|
|
nobundle, err := cmd.PersistentFlags().GetBool("no-bundle")
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalln(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
newCert, err := client.RenewCertificate(certRes, !nobundle)
|
|
|
|
if err != nil {
|
|
|
|
logger().Fatalf("%s", err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
utils.SaveCertRes(newCert, conf)
|
|
|
|
}
|
|
|
|
|
2016-03-29 10:14:48 +00:00
|
|
|
// renewCmd represents the renew command
|
|
|
|
var renewCmd = &cobra.Command{
|
|
|
|
Use: "renew",
|
|
|
|
Short: "Renew a certificate",
|
2016-03-29 17:11:11 +00:00
|
|
|
Long: ``,
|
|
|
|
Run: renewHandler,
|
2016-03-29 10:14:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func init() {
|
|
|
|
RootCmd.AddCommand(renewCmd)
|
|
|
|
|
|
|
|
renewCmd.PersistentFlags().Int("days", 0, "The number of days left on a certificate to renew it.")
|
2016-03-29 17:11:11 +00:00
|
|
|
renewCmd.PersistentFlags().Bool("resuse-key", false, "Used to indicate you want to reuse your current private key for the new certificate.")
|
|
|
|
renewCmd.PersistentFlags().Bool("no-bundle", false, "Do not create a certificate bundle by adding the issuers certificate to the new certificate.")
|
2016-03-29 10:14:48 +00:00
|
|
|
|
|
|
|
}
|