mirror of
				https://git.proxmox.com/git/pve-manager
				synced 2025-11-04 00:08:46 +00:00 
			
		
		
		
	since letsencrypt updates their implementation to the ACMEv2 spec [1], we should correctly parse the order status 1: https://community.letsencrypt.org/t/acmev2-order-ready-status/62866 note that we (for now) try to be compatbile to both versions, with and without ready state, this can be changed when all letsencrypt apis have changed Signed-off-by: Dominik Csapak <d.csapak@proxmox.com>
		
			
				
	
	
		
			354 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Perl
		
	
	
	
	
	
			
		
		
	
	
			354 lines
		
	
	
		
			9.9 KiB
		
	
	
	
		
			Perl
		
	
	
	
	
	
package PVE::API2::ACME;
 | 
						|
 | 
						|
use strict;
 | 
						|
use warnings;
 | 
						|
 | 
						|
use PVE::ACME;
 | 
						|
use PVE::ACME::StandAlone;
 | 
						|
use PVE::CertHelpers;
 | 
						|
use PVE::Certificate;
 | 
						|
use PVE::Exception qw(raise raise_param_exc);
 | 
						|
use PVE::JSONSchema qw(get_standard_option);
 | 
						|
use PVE::NodeConfig;
 | 
						|
use PVE::Tools qw(extract_param);
 | 
						|
 | 
						|
use IO::Handle;
 | 
						|
 | 
						|
use base qw(PVE::RESTHandler);
 | 
						|
 | 
						|
my $acme_account_dir = PVE::CertHelpers::acme_account_dir();
 | 
						|
 | 
						|
__PACKAGE__->register_method ({
 | 
						|
    name => 'index',
 | 
						|
    path => '',
 | 
						|
    method => 'GET',
 | 
						|
    permissions => { user => 'all' },
 | 
						|
    description => "ACME index.",
 | 
						|
    parameters => {
 | 
						|
	additionalProperties => 0,
 | 
						|
	properties => {
 | 
						|
	    node => get_standard_option('pve-node'),
 | 
						|
	},
 | 
						|
    },
 | 
						|
    returns => {
 | 
						|
	type => 'array',
 | 
						|
	items => {
 | 
						|
	    type => "object",
 | 
						|
	    properties => {},
 | 
						|
	},
 | 
						|
	links => [ { rel => 'child', href => "{name}" } ],
 | 
						|
    },
 | 
						|
    code => sub {
 | 
						|
	my ($param) = @_;
 | 
						|
 | 
						|
	return [
 | 
						|
	    { name => 'certificate' },
 | 
						|
	];
 | 
						|
    }});
 | 
						|
 | 
						|
my $order_certificate = sub {
 | 
						|
    my ($acme, $domains) = @_;
 | 
						|
    print "Placing ACME order\n";
 | 
						|
    my ($order_url, $order) = $acme->new_order($domains);
 | 
						|
    print "Order URL: $order_url\n";
 | 
						|
    for my $auth_url (@{$order->{authorizations}}) {
 | 
						|
	print "\nGetting authorization details from '$auth_url'\n";
 | 
						|
	my $auth = $acme->get_authorization($auth_url);
 | 
						|
	if ($auth->{status} eq 'valid') {
 | 
						|
	    print "... already validated!\n";
 | 
						|
	} else {
 | 
						|
	    print "... pending!\n";
 | 
						|
	    print "Setting up webserver\n";
 | 
						|
	    my $validation = eval { PVE::ACME::StandAlone->setup($acme, $auth) };
 | 
						|
	    die "failed setting up webserver - $@\n" if $@;
 | 
						|
 | 
						|
	    print "Triggering validation\n";
 | 
						|
	    eval {
 | 
						|
		$acme->request_challenge_validation($validation->{url}, $validation->{key_auth});
 | 
						|
		print "Sleeping for 5 seconds\n";
 | 
						|
		sleep 5;
 | 
						|
		while (1) {
 | 
						|
		    $auth = $acme->get_authorization($auth_url);
 | 
						|
		    if ($auth->{status} eq 'pending') {
 | 
						|
			print "Status is still 'pending', trying again in 30 seconds\n";
 | 
						|
			sleep 30;
 | 
						|
			next;
 | 
						|
		    } elsif ($auth->{status} eq 'valid') {
 | 
						|
			print "Status is 'valid'!\n";
 | 
						|
			last;
 | 
						|
		    }
 | 
						|
		    die "validating challenge '$auth_url' failed\n";
 | 
						|
		}
 | 
						|
	    };
 | 
						|
	    my $err = $@;
 | 
						|
	    eval { $validation->teardown() };
 | 
						|
	    warn "$@\n" if $@;
 | 
						|
	    die $err if $err;
 | 
						|
	}
 | 
						|
    }
 | 
						|
    print "\nAll domains validated!\n";
 | 
						|
    print "\nCreating CSR\n";
 | 
						|
    my ($csr, $key) = PVE::Certificate::generate_csr(identifiers => $order->{identifiers});
 | 
						|
 | 
						|
    my $finalize_error_cnt = 0;
 | 
						|
    print "Checking order status\n";
 | 
						|
    while (1) {
 | 
						|
	$order = $acme->get_order($order_url);
 | 
						|
	if ($order->{status} eq 'pending') {
 | 
						|
	    print "still pending, trying to finalize order\n";
 | 
						|
	    # FIXME
 | 
						|
	    # to be compatible with and without the order ready state
 | 
						|
	    # we try to finalize even at the 'pending' state
 | 
						|
	    # and give up after 5 unsuccessful tries
 | 
						|
	    # this can be removed when the letsencrypt api
 | 
						|
	    # definitely has implemented the 'ready' state
 | 
						|
	    eval {
 | 
						|
		$acme->finalize_order($order, PVE::Certificate::pem_to_der($csr));
 | 
						|
	    };
 | 
						|
	    if (my $err = $@) {
 | 
						|
		die $err if $finalize_error_cnt >= 5;
 | 
						|
 | 
						|
		$finalize_error_cnt++;
 | 
						|
		warn $err;
 | 
						|
	    }
 | 
						|
	    sleep 5;
 | 
						|
	    next;
 | 
						|
	} elsif ($order->{status} eq 'ready') {
 | 
						|
	    print "Order is ready, finalizing order\n";
 | 
						|
	    $acme->finalize_order($order, PVE::Certificate::pem_to_der($csr));
 | 
						|
	    sleep 5;
 | 
						|
	    next;
 | 
						|
	} elsif ($order->{status} eq 'processing') {
 | 
						|
	    print "still processing, trying again in 30 seconds\n";
 | 
						|
	    sleep 30;
 | 
						|
	    next;
 | 
						|
	} elsif ($order->{status} eq 'valid') {
 | 
						|
	    print "valid!\n";
 | 
						|
	    last;
 | 
						|
	}
 | 
						|
	die "order status: $order->{status}\n";
 | 
						|
    }
 | 
						|
 | 
						|
    print "\nDownloading certificate\n";
 | 
						|
    my $cert = $acme->get_certificate($order);
 | 
						|
 | 
						|
    return ($cert, $key);
 | 
						|
};
 | 
						|
 | 
						|
__PACKAGE__->register_method ({
 | 
						|
    name => 'new_certificate',
 | 
						|
    path => 'certificate',
 | 
						|
    method => 'POST',
 | 
						|
    description => "Order a new certificate from ACME-compatible CA.",
 | 
						|
    protected => 1,
 | 
						|
    proxyto => 'node',
 | 
						|
    parameters => {
 | 
						|
	additionalProperties => 0,
 | 
						|
	properties => {
 | 
						|
	    node => get_standard_option('pve-node'),
 | 
						|
	    force => {
 | 
						|
		type => 'boolean',
 | 
						|
		description => 'Overwrite existing custom certificate.',
 | 
						|
		optional => 1,
 | 
						|
		default => 0,
 | 
						|
	    },
 | 
						|
	},
 | 
						|
    },
 | 
						|
    returns => {
 | 
						|
	type => 'string',
 | 
						|
    },
 | 
						|
    code => sub {
 | 
						|
	my ($param) = @_;
 | 
						|
 | 
						|
	my $node = extract_param($param, 'node');
 | 
						|
	my $cert_prefix = PVE::CertHelpers::cert_path_prefix($node);
 | 
						|
 | 
						|
	raise_param_exc({'force' => "Custom certificate exists but 'force' is not set."})
 | 
						|
	    if !$param->{force} && -e "${cert_prefix}.pem";
 | 
						|
 | 
						|
	my $node_config = PVE::NodeConfig::load_config($node);
 | 
						|
	raise("ACME settings in node configuration are missing!", 400)
 | 
						|
	    if !$node_config || !$node_config->{acme};
 | 
						|
	my $acme_node_config = PVE::NodeConfig::parse_acme($node_config->{acme});
 | 
						|
	raise("ACME domain list in node configuration is missing!", 400)
 | 
						|
	    if !$acme_node_config;
 | 
						|
 | 
						|
	my $rpcenv = PVE::RPCEnvironment::get();
 | 
						|
 | 
						|
	my $authuser = $rpcenv->get_user();
 | 
						|
 | 
						|
	my $realcmd = sub {
 | 
						|
	    STDOUT->autoflush(1);
 | 
						|
	    my $account = $acme_node_config->{account} // 'default';
 | 
						|
	    my $account_file = "${acme_account_dir}/${account}";
 | 
						|
	    die "ACME account config file '$account' does not exist.\n"
 | 
						|
		if ! -e $account_file;
 | 
						|
 | 
						|
	    my $acme = PVE::ACME->new($account_file);
 | 
						|
 | 
						|
	    print "Loading ACME account details\n";
 | 
						|
	    $acme->load();
 | 
						|
 | 
						|
	    my ($cert, $key) = $order_certificate->($acme, $acme_node_config->{domains});
 | 
						|
 | 
						|
	    my $code = sub {
 | 
						|
		print "Setting pveproxy certificate and key\n";
 | 
						|
		PVE::CertHelpers::set_cert_files($cert, $key, $cert_prefix, $param->{force});
 | 
						|
 | 
						|
		print "Restarting pveproxy\n";
 | 
						|
		PVE::Tools::run_command(['systemctl', 'reload-or-restart', 'pveproxy']);
 | 
						|
	    };
 | 
						|
	    PVE::CertHelpers::cert_lock(10, $code);
 | 
						|
	    die "$@\n" if $@;
 | 
						|
	};
 | 
						|
 | 
						|
	return $rpcenv->fork_worker("acmenewcert", undef, $authuser, $realcmd);
 | 
						|
    }});
 | 
						|
 | 
						|
__PACKAGE__->register_method ({
 | 
						|
    name => 'renew_certificate',
 | 
						|
    path => 'certificate',
 | 
						|
    method => 'PUT',
 | 
						|
    description => "Renew existing certificate from CA.",
 | 
						|
    protected => 1,
 | 
						|
    proxyto => 'node',
 | 
						|
    parameters => {
 | 
						|
	additionalProperties => 0,
 | 
						|
	properties => {
 | 
						|
	    node => get_standard_option('pve-node'),
 | 
						|
	    force => {
 | 
						|
		type => 'boolean',
 | 
						|
		description => 'Force renewal even if expiry is more than 30 days away.',
 | 
						|
		optional => 1,
 | 
						|
		default => 0,
 | 
						|
	    },
 | 
						|
	},
 | 
						|
    },
 | 
						|
    returns => {
 | 
						|
	type => 'string',
 | 
						|
    },
 | 
						|
    code => sub {
 | 
						|
	my ($param) = @_;
 | 
						|
 | 
						|
	my $node = extract_param($param, 'node');
 | 
						|
	my $cert_prefix = PVE::CertHelpers::cert_path_prefix($node);
 | 
						|
 | 
						|
	raise("No current (custom) certificate found, please order a new certificate!\n")
 | 
						|
	    if ! -e "${cert_prefix}.pem";
 | 
						|
 | 
						|
	my $expires_soon = PVE::Certificate::check_expiry("${cert_prefix}.pem", time() + 30*24*60*60);
 | 
						|
	raise_param_exc({'force' => "Certificate does not expire within the next 30 days, and 'force' is not set."})
 | 
						|
	    if !$expires_soon && !$param->{force};
 | 
						|
 | 
						|
	my $node_config = PVE::NodeConfig::load_config($node);
 | 
						|
	raise("ACME settings in node configuration are missing!", 400)
 | 
						|
	    if !$node_config || !$node_config->{acme};
 | 
						|
	my $acme_node_config = PVE::NodeConfig::parse_acme($node_config->{acme});
 | 
						|
	raise("ACME domain list in node configuration is missing!", 400)
 | 
						|
	    if !$acme_node_config;
 | 
						|
 | 
						|
	my $rpcenv = PVE::RPCEnvironment::get();
 | 
						|
 | 
						|
	my $authuser = $rpcenv->get_user();
 | 
						|
 | 
						|
	my $old_cert = PVE::Tools::file_get_contents("${cert_prefix}.pem");
 | 
						|
 | 
						|
	my $realcmd = sub {
 | 
						|
	    STDOUT->autoflush(1);
 | 
						|
	    my $account = $acme_node_config->{account} // 'default';
 | 
						|
	    my $account_file = "${acme_account_dir}/${account}";
 | 
						|
	    die "ACME account config file '$account' does not exist.\n"
 | 
						|
		if ! -e $account_file;
 | 
						|
 | 
						|
	    my $acme = PVE::ACME->new($account_file);
 | 
						|
 | 
						|
	    print "Loading ACME account details\n";
 | 
						|
	    $acme->load();
 | 
						|
 | 
						|
	    my ($cert, $key) = $order_certificate->($acme, $acme_node_config->{domains});
 | 
						|
 | 
						|
	    my $code = sub {
 | 
						|
		print "Setting pveproxy certificate and key\n";
 | 
						|
		PVE::CertHelpers::set_cert_files($cert, $key, $cert_prefix, 1);
 | 
						|
 | 
						|
		print "Restarting pveproxy\n";
 | 
						|
		PVE::Tools::run_command(['systemctl', 'reload-or-restart', 'pveproxy']);
 | 
						|
	    };
 | 
						|
	    PVE::CertHelpers::cert_lock(10, $code);
 | 
						|
	    die "$@\n" if $@;
 | 
						|
 | 
						|
	    print "Revoking old certificate\n";
 | 
						|
            $acme->revoke_certificate($old_cert);
 | 
						|
	};
 | 
						|
 | 
						|
	return $rpcenv->fork_worker("acmerenew", undef, $authuser, $realcmd);
 | 
						|
    }});
 | 
						|
 | 
						|
__PACKAGE__->register_method ({
 | 
						|
    name => 'revoke_certificate',
 | 
						|
    path => 'certificate',
 | 
						|
    method => 'DELETE',
 | 
						|
    description => "Revoke existing certificate from CA.",
 | 
						|
    protected => 1,
 | 
						|
    proxyto => 'node',
 | 
						|
    parameters => {
 | 
						|
	additionalProperties => 0,
 | 
						|
	properties => {
 | 
						|
	    node => get_standard_option('pve-node'),
 | 
						|
	},
 | 
						|
    },
 | 
						|
    returns => {
 | 
						|
	type => 'string',
 | 
						|
    },
 | 
						|
    code => sub {
 | 
						|
	my ($param) = @_;
 | 
						|
 | 
						|
	my $node = extract_param($param, 'node');
 | 
						|
	my $cert_prefix = PVE::CertHelpers::cert_path_prefix($node);
 | 
						|
 | 
						|
	my $node_config = PVE::NodeConfig::load_config($node);
 | 
						|
	raise("ACME settings in node configuration are missing!", 400)
 | 
						|
	    if !$node_config || !$node_config->{acme};
 | 
						|
	my $acme_node_config = PVE::NodeConfig::parse_acme($node_config->{acme});
 | 
						|
	raise("ACME domain list in node configuration is missing!", 400)
 | 
						|
	    if !$acme_node_config;
 | 
						|
 | 
						|
	my $rpcenv = PVE::RPCEnvironment::get();
 | 
						|
 | 
						|
	my $authuser = $rpcenv->get_user();
 | 
						|
 | 
						|
	my $cert = PVE::Tools::file_get_contents("${cert_prefix}.pem");
 | 
						|
 | 
						|
	my $realcmd = sub {
 | 
						|
	    STDOUT->autoflush(1);
 | 
						|
	    my $account = $acme_node_config->{account} // 'default';
 | 
						|
	    my $account_file = "${acme_account_dir}/${account}";
 | 
						|
	    die "ACME account config file '$account' does not exist.\n"
 | 
						|
		if ! -e $account_file;
 | 
						|
 | 
						|
	    my $acme = PVE::ACME->new($account_file);
 | 
						|
 | 
						|
	    print "Loading ACME account details\n";
 | 
						|
	    $acme->load();
 | 
						|
 | 
						|
	    print "Revoking old certificate\n";
 | 
						|
	    $acme->revoke_certificate($cert);
 | 
						|
 | 
						|
	    my $code = sub {
 | 
						|
		print "Deleting certificate files\n";
 | 
						|
		unlink "${cert_prefix}.pem";
 | 
						|
		unlink "${cert_prefix}.key";
 | 
						|
 | 
						|
		print "Restarting pveproxy to revert to self-signed certificates\n";
 | 
						|
		PVE::Tools::run_command(['systemctl', 'reload-or-restart', 'pveproxy']);
 | 
						|
	    };
 | 
						|
 | 
						|
	    PVE::CertHelpers::cert_lock(10, $code);
 | 
						|
	    die "$@\n" if $@;
 | 
						|
	};
 | 
						|
 | 
						|
	return $rpcenv->fork_worker("acmerevoke", undef, $authuser, $realcmd);
 | 
						|
    }});
 | 
						|
 | 
						|
1;
 |