mirror of
https://github.com/caddyserver/caddy.git
synced 2024-12-23 22:27:38 -05:00
ac4fa2c3a9
These changes span work from the last ~4 months in an effort to make Caddy more extensible, reduce the coupling between its components, and lay a more robust foundation of code going forward into 1.0. A bunch of new features have been added, too, with even higher future potential. The most significant design change is an overall inversion of dependencies. Instead of the caddy package knowing about the server and the notion of middleware and config, the caddy package exposes an interface that other components plug into. This does introduce more indirection when reading the code, but every piece is very modular and pluggable. Even the HTTP server is pluggable. The caddy package has been moved to the top level, and main has been pushed into a subfolder called caddy. The actual logic of the main file has been pushed even further into caddy/caddymain/run.go so that custom builds of Caddy can be 'go get'able. The HTTPS logic was surgically separated into two parts to divide the TLS-specific code and the HTTPS-specific code. The caddytls package can now be used by any type of server that needs TLS, not just HTTP. I also added the ability to customize nearly every aspect of TLS at the site level rather than all sites sharing the same TLS configuration. Not all of this flexibility is exposed in the Caddyfile yet, but it may be in the future. Caddy can also generate self-signed certificates in memory for the convenience of a developer working on localhost who wants HTTPS. And Caddy now supports the DNS challenge, assuming at least one DNS provider is plugged in. Dozens, if not hundreds, of other minor changes swept through the code base as I literally started from an empty main function, copying over functions or files as needed, then adjusting them to fit in the new design. Most tests have been restored and adapted to the new API, but more work is needed there. A lot of what was "impossible" before is now possible, or can be made possible with minimal disruption of the code. For example, it's fairly easy to make plugins hook into another part of the code via callbacks. Plugins can do more than just be directives; we now have plugins that customize how the Caddyfile is loaded (useful when you need to get your configuration from a remote store). Site addresses no longer need be just a host and port. They can have a path, allowing you to scope a configuration to a specific path. There is no inheretance, however; each site configuration is distinct. Thanks to amazing work by Lucas Clemente, this commit adds experimental QUIC support. Turn it on using the -quic flag; your browser may have to be configured to enable it. Almost everything is here, but you will notice that most of the middle- ware are missing. After those are transferred over, we'll be ready for beta tests. I'm very excited to get this out. Thanks for everyone's help and patience these last few months. I hope you like it!!
200 lines
5.8 KiB
Go
200 lines
5.8 KiB
Go
package caddytls
|
|
|
|
import (
|
|
"bufio"
|
|
"crypto"
|
|
"crypto/ecdsa"
|
|
"crypto/elliptic"
|
|
"crypto/rand"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/xenolf/lego/acme"
|
|
)
|
|
|
|
// User represents a Let's Encrypt user account.
|
|
type User struct {
|
|
Email string
|
|
Registration *acme.RegistrationResource
|
|
key crypto.PrivateKey
|
|
}
|
|
|
|
// GetEmail gets u's email.
|
|
func (u User) GetEmail() string {
|
|
return u.Email
|
|
}
|
|
|
|
// GetRegistration gets u's registration resource.
|
|
func (u User) GetRegistration() *acme.RegistrationResource {
|
|
return u.Registration
|
|
}
|
|
|
|
// GetPrivateKey gets u's private key.
|
|
func (u User) GetPrivateKey() crypto.PrivateKey {
|
|
return u.key
|
|
}
|
|
|
|
// newUser creates a new User for the given email address
|
|
// with a new private key. This function does NOT save the
|
|
// user to disk or register it via ACME. If you want to use
|
|
// a user account that might already exist, call getUser
|
|
// instead. It does NOT prompt the user.
|
|
func newUser(email string) (User, error) {
|
|
user := User{Email: email}
|
|
privateKey, err := ecdsa.GenerateKey(elliptic.P384(), rand.Reader)
|
|
if err != nil {
|
|
return user, errors.New("error generating private key: " + err.Error())
|
|
}
|
|
user.key = privateKey
|
|
return user, nil
|
|
}
|
|
|
|
// getEmail does everything it can to obtain an email
|
|
// address from the user within the scope of storage
|
|
// to use for ACME TLS. If it cannot get an email
|
|
// address, it returns empty string. (It will warn the
|
|
// user of the consequences of an empty email.) This
|
|
// function MAY prompt the user for input. If userPresent
|
|
// is false, the operator will NOT be prompted and an
|
|
// empty email may be returned.
|
|
func getEmail(storage Storage, userPresent bool) string {
|
|
// First try memory (command line flag or typed by user previously)
|
|
leEmail := DefaultEmail
|
|
if leEmail == "" {
|
|
// Then try to get most recent user email
|
|
userDirs, err := ioutil.ReadDir(storage.Users())
|
|
if err == nil {
|
|
var mostRecent os.FileInfo
|
|
for _, dir := range userDirs {
|
|
if !dir.IsDir() {
|
|
continue
|
|
}
|
|
if mostRecent == nil || dir.ModTime().After(mostRecent.ModTime()) {
|
|
leEmail = dir.Name()
|
|
DefaultEmail = leEmail // save for next time
|
|
mostRecent = dir
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if leEmail == "" && userPresent {
|
|
// Alas, we must bother the user and ask for an email address;
|
|
// if they proceed they also agree to the SA.
|
|
reader := bufio.NewReader(stdin)
|
|
fmt.Println("\nYour sites will be served over HTTPS automatically using Let's Encrypt.")
|
|
fmt.Println("By continuing, you agree to the Let's Encrypt Subscriber Agreement at:")
|
|
fmt.Println(" " + saURL) // TODO: Show current SA link
|
|
fmt.Println("Please enter your email address so you can recover your account if needed.")
|
|
fmt.Println("You can leave it blank, but you'll lose the ability to recover your account.")
|
|
fmt.Print("Email address: ")
|
|
var err error
|
|
leEmail, err = reader.ReadString('\n')
|
|
if err != nil {
|
|
return ""
|
|
}
|
|
leEmail = strings.TrimSpace(leEmail)
|
|
DefaultEmail = leEmail
|
|
Agreed = true
|
|
}
|
|
return strings.ToLower(leEmail)
|
|
}
|
|
|
|
// getUser loads the user with the given email from disk
|
|
// using the provided storage. If the user does not exist,
|
|
// it will create a new one, but it does NOT save new
|
|
// users to the disk or register them via ACME. It does
|
|
// NOT prompt the user.
|
|
func getUser(storage Storage, email string) (User, error) {
|
|
var user User
|
|
|
|
// open user file
|
|
regFile, err := os.Open(storage.UserRegFile(email))
|
|
if err != nil {
|
|
if os.IsNotExist(err) {
|
|
// create a new user
|
|
return newUser(email)
|
|
}
|
|
return user, err
|
|
}
|
|
defer regFile.Close()
|
|
|
|
// load user information
|
|
err = json.NewDecoder(regFile).Decode(&user)
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
|
|
// load their private key
|
|
user.key, err = loadPrivateKey(storage.UserKeyFile(email))
|
|
if err != nil {
|
|
return user, err
|
|
}
|
|
|
|
return user, nil
|
|
}
|
|
|
|
// saveUser persists a user's key and account registration
|
|
// to the file system. It does NOT register the user via ACME
|
|
// or prompt the user. You must also pass in the storage
|
|
// wherein the user should be saved. It should be the storage
|
|
// for the CA with which user has an account.
|
|
func saveUser(storage Storage, user User) error {
|
|
// make user account folder
|
|
err := os.MkdirAll(storage.User(user.Email), 0700)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// save private key file
|
|
err = savePrivateKey(user.key, storage.UserKeyFile(user.Email))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// save registration file
|
|
jsonBytes, err := json.MarshalIndent(&user, "", "\t")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return ioutil.WriteFile(storage.UserRegFile(user.Email), jsonBytes, 0600)
|
|
}
|
|
|
|
// promptUserAgreement prompts the user to agree to the agreement
|
|
// at agreementURL via stdin. If the agreement has changed, then pass
|
|
// true as the second argument. If this is the user's first time
|
|
// agreeing, pass false. It returns whether the user agreed or not.
|
|
func promptUserAgreement(agreementURL string, changed bool) bool {
|
|
if changed {
|
|
fmt.Printf("The Let's Encrypt Subscriber Agreement has changed:\n %s\n", agreementURL)
|
|
fmt.Print("Do you agree to the new terms? (y/n): ")
|
|
} else {
|
|
fmt.Printf("To continue, you must agree to the Let's Encrypt Subscriber Agreement:\n %s\n", agreementURL)
|
|
fmt.Print("Do you agree to the terms? (y/n): ")
|
|
}
|
|
|
|
reader := bufio.NewReader(stdin)
|
|
answer, err := reader.ReadString('\n')
|
|
if err != nil {
|
|
return false
|
|
}
|
|
answer = strings.ToLower(strings.TrimSpace(answer))
|
|
|
|
return answer == "y" || answer == "yes"
|
|
}
|
|
|
|
// stdin is used to read the user's input if prompted;
|
|
// this is changed by tests during tests.
|
|
var stdin = io.ReadWriter(os.Stdin)
|
|
|
|
// The name of the folder for accounts where the email
|
|
// address was not provided; default 'username' if you will.
|
|
const emptyEmail = "default"
|
|
|
|
// TODO: Use latest
|
|
const saURL = "https://letsencrypt.org/documents/LE-SA-v1.0.1-July-27-2015.pdf"
|