2018-12-06 21:50:17 +00:00
|
|
|
package cmd
|
|
|
|
|
|
|
|
import (
|
2019-01-03 15:59:53 +00:00
|
|
|
"net"
|
2018-12-06 21:50:17 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/urfave/cli"
|
|
|
|
"github.com/xenolf/lego/challenge"
|
|
|
|
"github.com/xenolf/lego/challenge/dns01"
|
2019-01-03 15:59:53 +00:00
|
|
|
"github.com/xenolf/lego/challenge/http01"
|
|
|
|
"github.com/xenolf/lego/challenge/tlsalpn01"
|
2018-12-06 21:50:17 +00:00
|
|
|
"github.com/xenolf/lego/lego"
|
|
|
|
"github.com/xenolf/lego/log"
|
|
|
|
"github.com/xenolf/lego/providers/dns"
|
|
|
|
"github.com/xenolf/lego/providers/http/memcached"
|
|
|
|
"github.com/xenolf/lego/providers/http/webroot"
|
|
|
|
)
|
|
|
|
|
|
|
|
func setupChallenges(ctx *cli.Context, client *lego.Client) {
|
2019-01-03 15:59:53 +00:00
|
|
|
if !ctx.GlobalBool("http") && !ctx.GlobalBool("tls") && !ctx.GlobalIsSet("dns") {
|
|
|
|
log.Fatal("No challenge selected. You must specify at least one challenge: `--http`, `--tls`, `--dns`.")
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
|
2019-01-03 15:59:53 +00:00
|
|
|
if ctx.GlobalBool("http") {
|
|
|
|
err := client.Challenge.SetHTTP01Provider(setupHTTPProvider(ctx))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
|
2019-01-03 15:59:53 +00:00
|
|
|
if ctx.GlobalBool("tls") {
|
|
|
|
err := client.Challenge.SetTLSALPN01Provider(setupTLSProvider(ctx))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if ctx.GlobalIsSet("dns") {
|
|
|
|
setupDNS(ctx, client)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-03 15:59:53 +00:00
|
|
|
func setupHTTPProvider(ctx *cli.Context) challenge.Provider {
|
|
|
|
switch {
|
|
|
|
case ctx.GlobalIsSet("http.webroot"):
|
|
|
|
ps, err := webroot.NewHTTPProvider(ctx.GlobalString("http.webroot"))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
return ps
|
|
|
|
case ctx.GlobalIsSet("http.memcached-host"):
|
|
|
|
ps, err := memcached.NewMemcachedProvider(ctx.GlobalStringSlice("http.memcached-host"))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
return ps
|
|
|
|
case ctx.GlobalIsSet("http.port"):
|
|
|
|
iface := ctx.GlobalString("http.port")
|
|
|
|
if !strings.Contains(iface, ":") {
|
|
|
|
log.Fatalf("The --http switch only accepts interface:port or :port for its argument.")
|
|
|
|
}
|
|
|
|
|
|
|
|
host, port, err := net.SplitHostPort(iface)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return http01.NewProviderServer(host, port)
|
|
|
|
case ctx.GlobalBool("http"):
|
|
|
|
return http01.NewProviderServer("", "")
|
|
|
|
default:
|
|
|
|
log.Fatal("Invalid HTTP challenge options.")
|
|
|
|
return nil
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-03 15:59:53 +00:00
|
|
|
func setupTLSProvider(ctx *cli.Context) challenge.Provider {
|
|
|
|
switch {
|
|
|
|
case ctx.GlobalIsSet("tls.port"):
|
|
|
|
iface := ctx.GlobalString("tls.port")
|
|
|
|
if !strings.Contains(iface, ":") {
|
|
|
|
log.Fatalf("The --tls switch only accepts interface:port or :port for its argument.")
|
|
|
|
}
|
|
|
|
|
|
|
|
host, port, err := net.SplitHostPort(iface)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tlsalpn01.NewProviderServer(host, port)
|
|
|
|
case ctx.GlobalBool("tls"):
|
|
|
|
return tlsalpn01.NewProviderServer("", "")
|
|
|
|
default:
|
|
|
|
log.Fatal("Invalid HTTP challenge options.")
|
|
|
|
return nil
|
2018-12-06 21:50:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func setupDNS(ctx *cli.Context, client *lego.Client) {
|
|
|
|
provider, err := dns.NewDNSChallengeProviderByName(ctx.GlobalString("dns"))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2019-01-03 15:59:53 +00:00
|
|
|
servers := ctx.GlobalStringSlice("dns.resolvers")
|
2018-12-06 21:50:17 +00:00
|
|
|
err = client.Challenge.SetDNS01Provider(provider,
|
|
|
|
dns01.CondOption(len(servers) > 0,
|
2019-01-03 15:59:53 +00:00
|
|
|
dns01.AddRecursiveNameservers(dns01.ParseNameservers(ctx.GlobalStringSlice("dns.resolvers")))),
|
|
|
|
dns01.CondOption(ctx.GlobalIsSet("dns.disable-cp"),
|
2018-12-06 21:50:17 +00:00
|
|
|
dns01.DisableCompletePropagationRequirement()),
|
|
|
|
dns01.CondOption(ctx.GlobalIsSet("dns-timeout"),
|
|
|
|
dns01.AddDNSTimeout(time.Duration(ctx.GlobalInt("dns-timeout"))*time.Second)),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|