mirror of
https://github.com/0xJacky/nginx-ui.git
synced 2025-05-11 02:15:48 +02:00
fix: renewed certificate and private key not save #391
This commit is contained in:
parent
c1c1094544
commit
538be53e9c
5 changed files with 81 additions and 57 deletions
|
@ -95,6 +95,8 @@ func IssueCert(c *gin.Context) {
|
||||||
log := &cert.Logger{}
|
log := &cert.Logger{}
|
||||||
log.SetCertModel(&certModel)
|
log.SetCertModel(&certModel)
|
||||||
|
|
||||||
|
payload.CertID = certModel.ID
|
||||||
|
|
||||||
go cert.IssueCert(payload, logChan, errChan)
|
go cert.IssueCert(payload, logChan, errChan)
|
||||||
|
|
||||||
go handleIssueCertLogChan(ws, log, logChan)
|
go handleIssueCertLogChan(ws, log, logChan)
|
||||||
|
|
|
@ -71,6 +71,7 @@ func autoCert(certModel *model.Cert) {
|
||||||
|
|
||||||
// support SAN certification
|
// support SAN certification
|
||||||
payload := &ConfigPayload{
|
payload := &ConfigPayload{
|
||||||
|
CertID: certModel.ID,
|
||||||
ServerName: certModel.Domains,
|
ServerName: certModel.Domains,
|
||||||
ChallengeMethod: certModel.ChallengeMethod,
|
ChallengeMethod: certModel.ChallengeMethod,
|
||||||
DNSCredentialID: certModel.DnsCredentialID,
|
DNSCredentialID: certModel.DnsCredentialID,
|
||||||
|
|
|
@ -1,15 +1,11 @@
|
||||||
package cert
|
package cert
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/0xJacky/Nginx-UI/internal/nginx"
|
|
||||||
"github.com/0xJacky/Nginx-UI/model"
|
"github.com/0xJacky/Nginx-UI/model"
|
||||||
"github.com/go-acme/lego/v4/certificate"
|
"github.com/go-acme/lego/v4/certificate"
|
||||||
"github.com/go-acme/lego/v4/lego"
|
"github.com/go-acme/lego/v4/lego"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"log"
|
"log"
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func obtain(payload *ConfigPayload, client *lego.Client, l *log.Logger, errChan chan error) {
|
func obtain(payload *ConfigPayload, client *lego.Client, l *log.Logger, errChan chan error) {
|
||||||
|
@ -31,33 +27,6 @@ func obtain(payload *ConfigPayload, client *lego.Client, l *log.Logger, errChan
|
||||||
IssuerCertificate: certificates.IssuerCertificate,
|
IssuerCertificate: certificates.IssuerCertificate,
|
||||||
CSR: certificates.CSR,
|
CSR: certificates.CSR,
|
||||||
}
|
}
|
||||||
name := strings.Join(payload.ServerName, "_")
|
|
||||||
saveDir := nginx.GetConfPath("ssl/" + name + "_" + string(payload.KeyType))
|
|
||||||
if _, err = os.Stat(saveDir); os.IsNotExist(err) {
|
|
||||||
err = os.MkdirAll(saveDir, 0755)
|
|
||||||
if err != nil {
|
|
||||||
errChan <- errors.Wrap(err, "mkdir error")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Each certificate comes back with the cert bytes, the bytes of the client's
|
payload.WriteFile(l, errChan)
|
||||||
// private key, and a certificate URL. SAVE THESE TO DISK.
|
|
||||||
l.Println("[INFO] [Nginx UI] Writing certificate to disk")
|
|
||||||
err = os.WriteFile(filepath.Join(saveDir, "fullchain.cer"),
|
|
||||||
certificates.Certificate, 0644)
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
errChan <- errors.Wrap(err, "write fullchain.cer error")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
l.Println("[INFO] [Nginx UI] Writing certificate private key to disk")
|
|
||||||
err = os.WriteFile(filepath.Join(saveDir, "private.key"),
|
|
||||||
certificates.PrivateKey, 0644)
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
errChan <- errors.Wrap(err, "write private.key error")
|
|
||||||
return
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,13 +3,20 @@ package cert
|
||||||
import (
|
import (
|
||||||
"github.com/0xJacky/Nginx-UI/internal/helper"
|
"github.com/0xJacky/Nginx-UI/internal/helper"
|
||||||
"github.com/0xJacky/Nginx-UI/internal/logger"
|
"github.com/0xJacky/Nginx-UI/internal/logger"
|
||||||
|
"github.com/0xJacky/Nginx-UI/internal/nginx"
|
||||||
"github.com/0xJacky/Nginx-UI/model"
|
"github.com/0xJacky/Nginx-UI/model"
|
||||||
"github.com/0xJacky/Nginx-UI/query"
|
"github.com/0xJacky/Nginx-UI/query"
|
||||||
"github.com/go-acme/lego/v4/certcrypto"
|
"github.com/go-acme/lego/v4/certcrypto"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
type ConfigPayload struct {
|
type ConfigPayload struct {
|
||||||
|
CertID int `json:"cert_id"`
|
||||||
ServerName []string `json:"server_name"`
|
ServerName []string `json:"server_name"`
|
||||||
ChallengeMethod string `json:"challenge_method"`
|
ChallengeMethod string `json:"challenge_method"`
|
||||||
DNSCredentialID int `json:"dns_credential_id"`
|
DNSCredentialID int `json:"dns_credential_id"`
|
||||||
|
@ -38,3 +45,46 @@ func (c *ConfigPayload) GetACMEUser() (user *model.AcmeUser, err error) {
|
||||||
func (c *ConfigPayload) GetKeyType() certcrypto.KeyType {
|
func (c *ConfigPayload) GetKeyType() certcrypto.KeyType {
|
||||||
return helper.GetKeyType(c.KeyType)
|
return helper.GetKeyType(c.KeyType)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (c *ConfigPayload) WriteFile(l *log.Logger, errChan chan error) {
|
||||||
|
name := strings.Join(c.ServerName, "_")
|
||||||
|
saveDir := nginx.GetConfPath("ssl/" + name + "_" + string(c.KeyType))
|
||||||
|
if _, err := os.Stat(saveDir); os.IsNotExist(err) {
|
||||||
|
err = os.MkdirAll(saveDir, 0755)
|
||||||
|
if err != nil {
|
||||||
|
errChan <- errors.Wrap(err, "mkdir error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Each certificate comes back with the cert bytes, the bytes of the client's
|
||||||
|
// private key, and a certificate URL. SAVE THESE TO DISK.
|
||||||
|
l.Println("[INFO] [Nginx UI] Writing certificate to disk")
|
||||||
|
err := os.WriteFile(filepath.Join(saveDir, "fullchain.cer"),
|
||||||
|
c.Resource.Certificate, 0644)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
errChan <- errors.Wrap(err, "write fullchain.cer error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
l.Println("[INFO] [Nginx UI] Writing certificate private key to disk")
|
||||||
|
err = os.WriteFile(filepath.Join(saveDir, "private.key"),
|
||||||
|
c.Resource.PrivateKey, 0644)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
errChan <- errors.Wrap(err, "write private.key error")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// update database
|
||||||
|
if c.CertID <= 0 {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
db := model.UseDB()
|
||||||
|
db.Where("id = ?", c.CertID).Updates(&model.Cert{
|
||||||
|
SSLCertificatePath: filepath.Join(saveDir, "fullchain.cer"),
|
||||||
|
SSLCertificateKeyPath: filepath.Join(saveDir, "private.key"),
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
|
@ -1,36 +1,38 @@
|
||||||
package cert
|
package cert
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/0xJacky/Nginx-UI/model"
|
"github.com/0xJacky/Nginx-UI/model"
|
||||||
"github.com/go-acme/lego/v4/certificate"
|
"github.com/go-acme/lego/v4/certificate"
|
||||||
"github.com/go-acme/lego/v4/lego"
|
"github.com/go-acme/lego/v4/lego"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
"log"
|
"log"
|
||||||
)
|
)
|
||||||
|
|
||||||
func renew(payload *ConfigPayload, client *lego.Client, l *log.Logger, errChan chan error) {
|
func renew(payload *ConfigPayload, client *lego.Client, l *log.Logger, errChan chan error) {
|
||||||
if payload.Resource == nil {
|
if payload.Resource == nil {
|
||||||
errChan <- errors.New("resource is nil")
|
errChan <- errors.New("resource is nil")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
options := &certificate.RenewOptions{
|
options := &certificate.RenewOptions{
|
||||||
Bundle: true,
|
Bundle: true,
|
||||||
}
|
}
|
||||||
|
|
||||||
cert, err := client.Certificate.RenewWithOptions(payload.Resource.GetResource(), options)
|
cert, err := client.Certificate.RenewWithOptions(payload.Resource.GetResource(), options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
errChan <- errors.Wrap(err, "renew cert error")
|
errChan <- errors.Wrap(err, "renew cert error")
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
payload.Resource = &model.CertificateResource{
|
payload.Resource = &model.CertificateResource{
|
||||||
Resource: cert,
|
Resource: cert,
|
||||||
PrivateKey: cert.PrivateKey,
|
PrivateKey: cert.PrivateKey,
|
||||||
Certificate: cert.Certificate,
|
Certificate: cert.Certificate,
|
||||||
IssuerCertificate: cert.IssuerCertificate,
|
IssuerCertificate: cert.IssuerCertificate,
|
||||||
CSR: cert.CSR,
|
CSR: cert.CSR,
|
||||||
}
|
}
|
||||||
|
|
||||||
l.Println("[INFO] [Nginx UI] Certificate renewed successfully")
|
payload.WriteFile(l, errChan)
|
||||||
|
|
||||||
|
l.Println("[INFO] [Nginx UI] Certificate renewed successfully")
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue