2018-07-03 10:44:04 +00:00
|
|
|
package acme
|
|
|
|
|
|
|
|
import (
|
2020-10-29 14:40:04 +00:00
|
|
|
"fmt"
|
2024-02-19 14:44:03 +00:00
|
|
|
"slices"
|
2020-10-29 14:40:04 +00:00
|
|
|
"sync"
|
|
|
|
"time"
|
2018-07-03 10:44:04 +00:00
|
|
|
|
2020-09-04 08:52:03 +00:00
|
|
|
"github.com/go-acme/lego/v4/challenge/tlsalpn01"
|
2022-11-21 17:36:05 +00:00
|
|
|
"github.com/rs/zerolog/log"
|
2023-02-03 14:24:05 +00:00
|
|
|
"github.com/traefik/traefik/v3/pkg/config/dynamic"
|
|
|
|
"github.com/traefik/traefik/v3/pkg/logs"
|
|
|
|
"github.com/traefik/traefik/v3/pkg/safe"
|
|
|
|
traefiktls "github.com/traefik/traefik/v3/pkg/tls"
|
|
|
|
"github.com/traefik/traefik/v3/pkg/types"
|
2018-07-03 10:44:04 +00:00
|
|
|
)
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
const providerNameALPN = "tlsalpn.acme"
|
2018-07-03 10:44:04 +00:00
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
// ChallengeTLSALPN TLSALPN challenge provider implements challenge.Provider.
|
|
|
|
type ChallengeTLSALPN struct {
|
|
|
|
chans map[string]chan struct{}
|
|
|
|
muChans sync.Mutex
|
|
|
|
|
|
|
|
certs map[string]*Certificate
|
|
|
|
muCerts sync.Mutex
|
|
|
|
|
|
|
|
configurationChan chan<- dynamic.Message
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewChallengeTLSALPN creates a new ChallengeTLSALPN.
|
2022-02-07 10:58:04 +00:00
|
|
|
func NewChallengeTLSALPN() *ChallengeTLSALPN {
|
2020-10-29 14:40:04 +00:00
|
|
|
return &ChallengeTLSALPN{
|
2022-02-07 10:58:04 +00:00
|
|
|
chans: make(map[string]chan struct{}),
|
|
|
|
certs: make(map[string]*Certificate),
|
2020-10-29 14:40:04 +00:00
|
|
|
}
|
2018-07-03 10:44:04 +00:00
|
|
|
}
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
// Present presents a challenge to obtain new ACME certificate.
|
|
|
|
func (c *ChallengeTLSALPN) Present(domain, _, keyAuth string) error {
|
2022-11-21 17:36:05 +00:00
|
|
|
logger := log.With().Str(logs.ProviderName, providerNameALPN).Logger()
|
|
|
|
logger.Debug().Msgf("TLS Challenge Present temp certificate for %s", domain)
|
2018-07-03 10:44:04 +00:00
|
|
|
|
2019-01-07 17:30:06 +00:00
|
|
|
certPEMBlock, keyPEMBlock, err := tlsalpn01.ChallengeBlocks(domain, keyAuth)
|
2018-07-03 10:44:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cert := &Certificate{Certificate: certPEMBlock, Key: keyPEMBlock, Domain: types.Domain{Main: "TEMP-" + domain}}
|
2020-10-29 14:40:04 +00:00
|
|
|
|
|
|
|
c.muChans.Lock()
|
|
|
|
ch := make(chan struct{})
|
|
|
|
c.chans[string(certPEMBlock)] = ch
|
|
|
|
c.muChans.Unlock()
|
|
|
|
|
|
|
|
c.muCerts.Lock()
|
|
|
|
c.certs[keyAuth] = cert
|
|
|
|
conf := createMessage(c.certs)
|
|
|
|
c.muCerts.Unlock()
|
|
|
|
|
|
|
|
c.configurationChan <- conf
|
|
|
|
|
2022-02-07 10:58:04 +00:00
|
|
|
// Present should return when its dynamic configuration has been received and applied by Traefik.
|
|
|
|
// The timer exists in case the above does not happen, to ensure the challenge cleanup.
|
|
|
|
timer := time.NewTimer(time.Minute)
|
|
|
|
defer timer.Stop()
|
2020-10-29 14:40:04 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case t := <-timer.C:
|
2021-03-08 10:18:04 +00:00
|
|
|
c.muChans.Lock()
|
|
|
|
c.cleanChan(string(certPEMBlock))
|
|
|
|
c.muChans.Unlock()
|
2021-02-11 15:32:03 +00:00
|
|
|
|
|
|
|
err = c.CleanUp(domain, "", keyAuth)
|
|
|
|
if err != nil {
|
2022-11-21 17:36:05 +00:00
|
|
|
logger.Error().Err(err).Msg("Failed to clean up TLS challenge")
|
2021-02-11 15:32:03 +00:00
|
|
|
}
|
|
|
|
|
2021-03-08 10:18:04 +00:00
|
|
|
return fmt.Errorf("timeout %s", t)
|
2020-10-29 14:40:04 +00:00
|
|
|
case <-ch:
|
|
|
|
// noop
|
2021-03-08 10:18:04 +00:00
|
|
|
return nil
|
2020-10-29 14:40:04 +00:00
|
|
|
}
|
2018-07-03 10:44:04 +00:00
|
|
|
}
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
// CleanUp cleans the challenges when certificate is obtained.
|
|
|
|
func (c *ChallengeTLSALPN) CleanUp(domain, _, keyAuth string) error {
|
2022-11-21 17:36:05 +00:00
|
|
|
log.Debug().Str(logs.ProviderName, providerNameALPN).
|
|
|
|
Msgf("TLS Challenge CleanUp temp certificate for %s", domain)
|
2018-07-03 10:44:04 +00:00
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
c.muCerts.Lock()
|
|
|
|
delete(c.certs, keyAuth)
|
|
|
|
conf := createMessage(c.certs)
|
|
|
|
c.muCerts.Unlock()
|
|
|
|
|
|
|
|
c.configurationChan <- conf
|
|
|
|
|
|
|
|
return nil
|
2018-07-03 10:44:04 +00:00
|
|
|
}
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
// Init the provider.
|
|
|
|
func (c *ChallengeTLSALPN) Init() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-02-07 10:58:04 +00:00
|
|
|
// ThrottleDuration returns the throttle duration.
|
|
|
|
func (c *ChallengeTLSALPN) ThrottleDuration() time.Duration {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
// Provide allows the provider to provide configurations to traefik using the given configuration channel.
|
|
|
|
func (c *ChallengeTLSALPN) Provide(configurationChan chan<- dynamic.Message, _ *safe.Pool) error {
|
|
|
|
c.configurationChan = configurationChan
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ListenConfiguration sets a new Configuration into the configurationChan.
|
|
|
|
func (c *ChallengeTLSALPN) ListenConfiguration(conf dynamic.Configuration) {
|
2021-03-08 10:18:04 +00:00
|
|
|
c.muChans.Lock()
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
for _, certificate := range conf.TLS.Certificates {
|
2024-02-19 14:44:03 +00:00
|
|
|
if !slices.Contains(certificate.Stores, tlsalpn01.ACMETLS1Protocol) {
|
2020-10-29 14:40:04 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2021-03-08 10:18:04 +00:00
|
|
|
c.cleanChan(certificate.CertFile.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
c.muChans.Unlock()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *ChallengeTLSALPN) cleanChan(key string) {
|
|
|
|
if _, ok := c.chans[key]; ok {
|
|
|
|
close(c.chans[key])
|
|
|
|
delete(c.chans, key)
|
2018-07-03 10:44:04 +00:00
|
|
|
}
|
2020-10-29 14:40:04 +00:00
|
|
|
}
|
2018-07-03 10:44:04 +00:00
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
func createMessage(certs map[string]*Certificate) dynamic.Message {
|
|
|
|
conf := dynamic.Message{
|
|
|
|
ProviderName: providerNameALPN,
|
|
|
|
Configuration: &dynamic.Configuration{
|
|
|
|
HTTP: &dynamic.HTTPConfiguration{
|
|
|
|
Routers: map[string]*dynamic.Router{},
|
|
|
|
Middlewares: map[string]*dynamic.Middleware{},
|
|
|
|
Services: map[string]*dynamic.Service{},
|
|
|
|
},
|
|
|
|
TLS: &dynamic.TLSConfiguration{},
|
|
|
|
},
|
2018-07-03 10:44:04 +00:00
|
|
|
}
|
|
|
|
|
2020-10-29 14:40:04 +00:00
|
|
|
for _, cert := range certs {
|
|
|
|
certConf := &traefiktls.CertAndStores{
|
|
|
|
Certificate: traefiktls.Certificate{
|
2024-01-11 16:06:06 +00:00
|
|
|
CertFile: types.FileOrContent(cert.Certificate),
|
|
|
|
KeyFile: types.FileOrContent(cert.Key),
|
2020-10-29 14:40:04 +00:00
|
|
|
},
|
|
|
|
Stores: []string{tlsalpn01.ACMETLS1Protocol},
|
|
|
|
}
|
|
|
|
conf.Configuration.TLS.Certificates = append(conf.Configuration.TLS.Certificates, certConf)
|
|
|
|
}
|
|
|
|
|
|
|
|
return conf
|
|
|
|
}
|