mirror of
https://github.com/woodchen-ink/certimate.git
synced 2025-07-18 01:11:55 +08:00
132 lines
3.9 KiB
Go
132 lines
3.9 KiB
Go
package goedge
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"encoding/base64"
|
|
"errors"
|
|
"fmt"
|
|
"log/slog"
|
|
"time"
|
|
|
|
"github.com/certimate-go/certimate/pkg/core"
|
|
goedgesdk "github.com/certimate-go/certimate/pkg/sdk3rd/goedge"
|
|
xcert "github.com/certimate-go/certimate/pkg/utils/cert"
|
|
)
|
|
|
|
type SSLDeployerProviderConfig struct {
|
|
// GoEdge 服务地址。
|
|
ServerUrl string `json:"serverUrl"`
|
|
// GoEdge 用户角色。
|
|
// 可取值 "user"、"admin"。
|
|
ApiRole string `json:"apiRole"`
|
|
// GoEdge AccessKeyId。
|
|
AccessKeyId string `json:"accessKeyId"`
|
|
// GoEdge AccessKey。
|
|
AccessKey string `json:"accessKey"`
|
|
// 是否允许不安全的连接。
|
|
AllowInsecureConnections bool `json:"allowInsecureConnections,omitempty"`
|
|
// 部署资源类型。
|
|
ResourceType ResourceType `json:"resourceType"`
|
|
// 证书 ID。
|
|
// 部署资源类型为 [RESOURCE_TYPE_CERTIFICATE] 时必填。
|
|
CertificateId int64 `json:"certificateId,omitempty"`
|
|
}
|
|
|
|
type SSLDeployerProvider struct {
|
|
config *SSLDeployerProviderConfig
|
|
logger *slog.Logger
|
|
sdkClient *goedgesdk.Client
|
|
}
|
|
|
|
var _ core.SSLDeployer = (*SSLDeployerProvider)(nil)
|
|
|
|
func NewSSLDeployerProvider(config *SSLDeployerProviderConfig) (*SSLDeployerProvider, error) {
|
|
if config == nil {
|
|
return nil, errors.New("the configuration of the ssl deployer provider is nil")
|
|
}
|
|
|
|
client, err := createSDKClient(config.ServerUrl, config.ApiRole, config.AccessKeyId, config.AccessKey, config.AllowInsecureConnections)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("could not create sdk client: %w", err)
|
|
}
|
|
|
|
return &SSLDeployerProvider{
|
|
config: config,
|
|
logger: slog.Default(),
|
|
sdkClient: client,
|
|
}, nil
|
|
}
|
|
|
|
func (d *SSLDeployerProvider) SetLogger(logger *slog.Logger) {
|
|
if logger == nil {
|
|
d.logger = slog.New(slog.DiscardHandler)
|
|
} else {
|
|
d.logger = logger
|
|
}
|
|
}
|
|
|
|
func (d *SSLDeployerProvider) Deploy(ctx context.Context, certPEM string, privkeyPEM string) (*core.SSLDeployResult, error) {
|
|
// 根据部署资源类型决定部署方式
|
|
switch d.config.ResourceType {
|
|
case RESOURCE_TYPE_CERTIFICATE:
|
|
if err := d.deployToCertificate(ctx, certPEM, privkeyPEM); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
default:
|
|
return nil, fmt.Errorf("unsupported resource type '%s'", d.config.ResourceType)
|
|
}
|
|
|
|
return &core.SSLDeployResult{}, nil
|
|
}
|
|
|
|
func (d *SSLDeployerProvider) deployToCertificate(ctx context.Context, certPEM string, privkeyPEM string) error {
|
|
if d.config.CertificateId == 0 {
|
|
return errors.New("config `certificateId` is required")
|
|
}
|
|
|
|
// 解析证书内容
|
|
certX509, err := xcert.ParseCertificateFromPEM(certPEM)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// 修改证书
|
|
// REF: https://goedge.cloud/dev/api/service/SSLCertService?role=user#updateSSLCert
|
|
updateSSLCertReq := &goedgesdk.UpdateSSLCertRequest{
|
|
SSLCertId: d.config.CertificateId,
|
|
IsOn: true,
|
|
Name: fmt.Sprintf("certimate-%d", time.Now().UnixMilli()),
|
|
Description: "upload from certimate",
|
|
ServerName: certX509.Subject.CommonName,
|
|
IsCA: false,
|
|
CertData: base64.StdEncoding.EncodeToString([]byte(certPEM)),
|
|
KeyData: base64.StdEncoding.EncodeToString([]byte(privkeyPEM)),
|
|
TimeBeginAt: certX509.NotBefore.Unix(),
|
|
TimeEndAt: certX509.NotAfter.Unix(),
|
|
DNSNames: certX509.DNSNames,
|
|
CommonNames: []string{certX509.Subject.CommonName},
|
|
}
|
|
updateSSLCertResp, err := d.sdkClient.UpdateSSLCert(updateSSLCertReq)
|
|
d.logger.Debug("sdk request 'goedge.UpdateSSLCert'", slog.Any("request", updateSSLCertReq), slog.Any("response", updateSSLCertResp))
|
|
if err != nil {
|
|
return fmt.Errorf("failed to execute sdk request 'goedge.UpdateSSLCert': %w", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func createSDKClient(serverUrl, apiRole, accessKeyId, accessKey string, skipTlsVerify bool) (*goedgesdk.Client, error) {
|
|
client, err := goedgesdk.NewClient(serverUrl, apiRole, accessKeyId, accessKey)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if skipTlsVerify {
|
|
client.SetTLSConfig(&tls.Config{InsecureSkipVerify: true})
|
|
}
|
|
|
|
return client, nil
|
|
}
|