2019-01-23 09:39:06 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
# Copyright 2019 New Vector Ltd
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
import logging
|
|
|
|
|
|
|
|
import attr
|
|
|
|
from zope.interface import implementer
|
|
|
|
|
2019-01-30 15:17:55 +01:00
|
|
|
import twisted
|
|
|
|
import twisted.internet.error
|
2019-01-23 09:39:06 +01:00
|
|
|
from twisted.internet import defer
|
|
|
|
from twisted.python.filepath import FilePath
|
|
|
|
from twisted.python.url import URL
|
|
|
|
from twisted.web import server, static
|
|
|
|
from twisted.web.resource import Resource
|
|
|
|
|
2019-01-30 15:17:55 +01:00
|
|
|
from synapse.app import check_bind_error
|
|
|
|
|
2019-01-23 09:39:06 +01:00
|
|
|
logger = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
try:
|
|
|
|
from txacme.interfaces import ICertificateStore
|
|
|
|
|
|
|
|
@attr.s
|
|
|
|
@implementer(ICertificateStore)
|
|
|
|
class ErsatzStore(object):
|
|
|
|
"""
|
|
|
|
A store that only stores in memory.
|
|
|
|
"""
|
|
|
|
|
|
|
|
certs = attr.ib(default=attr.Factory(dict))
|
|
|
|
|
|
|
|
def store(self, server_name, pem_objects):
|
|
|
|
self.certs[server_name] = [o.as_bytes() for o in pem_objects]
|
|
|
|
return defer.succeed(None)
|
|
|
|
|
|
|
|
|
|
|
|
except ImportError:
|
|
|
|
# txacme is missing
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
|
|
class AcmeHandler(object):
|
|
|
|
def __init__(self, hs):
|
|
|
|
self.hs = hs
|
|
|
|
self.reactor = hs.get_reactor()
|
2019-02-19 11:54:33 +01:00
|
|
|
self._acme_domain = hs.config.acme_domain
|
2019-01-23 09:39:06 +01:00
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def start_listening(self):
|
|
|
|
|
|
|
|
# Configure logging for txacme, if you need to debug
|
|
|
|
# from eliot import add_destinations
|
|
|
|
# from eliot.twisted import TwistedDestination
|
|
|
|
#
|
|
|
|
# add_destinations(TwistedDestination())
|
|
|
|
|
|
|
|
from txacme.challenges import HTTP01Responder
|
|
|
|
from txacme.service import AcmeIssuingService
|
|
|
|
from txacme.endpoint import load_or_create_client_key
|
|
|
|
from txacme.client import Client
|
|
|
|
from josepy.jwa import RS256
|
|
|
|
|
|
|
|
self._store = ErsatzStore()
|
|
|
|
responder = HTTP01Responder()
|
|
|
|
|
|
|
|
self._issuer = AcmeIssuingService(
|
|
|
|
cert_store=self._store,
|
|
|
|
client_creator=(
|
|
|
|
lambda: Client.from_url(
|
|
|
|
reactor=self.reactor,
|
|
|
|
url=URL.from_text(self.hs.config.acme_url),
|
|
|
|
key=load_or_create_client_key(
|
|
|
|
FilePath(self.hs.config.config_dir_path)
|
|
|
|
),
|
|
|
|
alg=RS256,
|
|
|
|
)
|
|
|
|
),
|
|
|
|
clock=self.reactor,
|
|
|
|
responders=[responder],
|
|
|
|
)
|
|
|
|
|
|
|
|
well_known = Resource()
|
|
|
|
well_known.putChild(b'acme-challenge', responder.resource)
|
|
|
|
responder_resource = Resource()
|
|
|
|
responder_resource.putChild(b'.well-known', well_known)
|
|
|
|
responder_resource.putChild(b'check', static.Data(b'OK', b'text/plain'))
|
|
|
|
|
|
|
|
srv = server.Site(responder_resource)
|
|
|
|
|
2019-01-30 15:17:55 +01:00
|
|
|
bind_addresses = self.hs.config.acme_bind_addresses
|
|
|
|
for host in bind_addresses:
|
2019-01-23 09:39:06 +01:00
|
|
|
logger.info(
|
2019-01-30 15:17:55 +01:00
|
|
|
"Listening for ACME requests on %s:%i", host, self.hs.config.acme_port,
|
2019-01-23 09:39:06 +01:00
|
|
|
)
|
2019-01-30 15:17:55 +01:00
|
|
|
try:
|
|
|
|
self.reactor.listenTCP(
|
|
|
|
self.hs.config.acme_port,
|
|
|
|
srv,
|
|
|
|
interface=host,
|
|
|
|
)
|
|
|
|
except twisted.internet.error.CannotListenError as e:
|
|
|
|
check_bind_error(e, host, bind_addresses)
|
2019-01-23 09:39:06 +01:00
|
|
|
|
|
|
|
# Make sure we are registered to the ACME server. There's no public API
|
|
|
|
# for this, it is usually triggered by startService, but since we don't
|
|
|
|
# want it to control where we save the certificates, we have to reach in
|
|
|
|
# and trigger the registration machinery ourselves.
|
|
|
|
self._issuer._registered = False
|
|
|
|
yield self._issuer._ensure_registered()
|
|
|
|
|
|
|
|
@defer.inlineCallbacks
|
|
|
|
def provision_certificate(self):
|
|
|
|
|
2019-02-19 11:54:33 +01:00
|
|
|
logger.warning("Reprovisioning %s", self._acme_domain)
|
2019-01-23 09:39:06 +01:00
|
|
|
|
|
|
|
try:
|
2019-02-19 11:54:33 +01:00
|
|
|
yield self._issuer.issue_cert(self._acme_domain)
|
2019-01-23 09:39:06 +01:00
|
|
|
except Exception:
|
|
|
|
logger.exception("Fail!")
|
|
|
|
raise
|
2019-02-19 11:54:33 +01:00
|
|
|
logger.warning("Reprovisioned %s, saving.", self._acme_domain)
|
|
|
|
cert_chain = self._store.certs[self._acme_domain]
|
2019-01-23 09:39:06 +01:00
|
|
|
|
|
|
|
try:
|
|
|
|
with open(self.hs.config.tls_private_key_file, "wb") as private_key_file:
|
|
|
|
for x in cert_chain:
|
|
|
|
if x.startswith(b"-----BEGIN RSA PRIVATE KEY-----"):
|
|
|
|
private_key_file.write(x)
|
|
|
|
|
|
|
|
with open(self.hs.config.tls_certificate_file, "wb") as certificate_file:
|
|
|
|
for x in cert_chain:
|
|
|
|
if x.startswith(b"-----BEGIN CERTIFICATE-----"):
|
|
|
|
certificate_file.write(x)
|
|
|
|
except Exception:
|
|
|
|
logger.exception("Failed saving!")
|
|
|
|
raise
|
|
|
|
|
|
|
|
defer.returnValue(True)
|