fixed multiple bugs
This commit is contained in:
parent
fc3b68316e
commit
8898e975e8
@ -8,9 +8,9 @@ type Entry struct {
|
|||||||
Domains string `xorm:"notnull"`
|
Domains string `xorm:"notnull"`
|
||||||
Certificate string `xorm:"text notnull"`
|
Certificate string `xorm:"text notnull"`
|
||||||
PrivateKey string `xorm:"text notnull"`
|
PrivateKey string `xorm:"text notnull"`
|
||||||
AuthURL string
|
AuthURL string `xorm:"notnull"`
|
||||||
ValidityBegin time.Time
|
ValidityBegin time.Time `xorm:"notnull"`
|
||||||
ValidityEnd time.Time
|
ValidityEnd time.Time `xorm:"notnull"`
|
||||||
Created time.Time `xorm:"created notnull"`
|
Created time.Time `xorm:"created notnull"`
|
||||||
Updated time.Time `xorm:"updated notnull"`
|
Updated time.Time `xorm:"updated notnull"`
|
||||||
}
|
}
|
||||||
|
@ -81,12 +81,12 @@ func (u *User) RequestNewCert(cfg *config.Config, domains []string) (certificate
|
|||||||
|
|
||||||
client, err := lego.NewClient(legoconfig)
|
client, err := lego.NewClient(legoconfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Println(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
err = client.Challenge.SetDNS01Provider(ovhprovider)
|
err = client.Challenge.SetDNS01Provider(ovhprovider)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Println(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// If PKICtx doesn't exists, get existing of fetch registration
|
// If PKICtx doesn't exists, get existing of fetch registration
|
||||||
@ -104,7 +104,7 @@ func (u *User) RequestNewCert(cfg *config.Config, domains []string) (certificate
|
|||||||
|
|
||||||
certificates, err = client.Certificate.Obtain(request)
|
certificates, err = client.Certificate.Obtain(request)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Println(err)
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
@ -39,7 +39,7 @@ func GetCertificate(cfg *config.Config, user *pki.User, domains []string) (resul
|
|||||||
ValidityBegin: NotBefore,
|
ValidityBegin: NotBefore,
|
||||||
ValidityEnd: NotAfter,
|
ValidityEnd: NotAfter,
|
||||||
AuthURL: cfg.ACME.AuthURL}
|
AuthURL: cfg.ACME.AuthURL}
|
||||||
cfg.Db.Insert(entry)
|
cfg.Db.Insert(&entry)
|
||||||
result = convertEntryToResponse(entry)
|
result = convertEntryToResponse(entry)
|
||||||
return result, err
|
return result, err
|
||||||
}
|
}
|
||||||
@ -49,11 +49,16 @@ func GetCertificate(cfg *config.Config, user *pki.User, domains []string) (resul
|
|||||||
|
|
||||||
// CheckDomains check if requested domains are valid
|
// CheckDomains check if requested domains are valid
|
||||||
func CheckDomains(domains []string) (err error) {
|
func CheckDomains(domains []string) (err error) {
|
||||||
|
domainRegex, err := regexp.Compile(`^[a-z0-9\*]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,6}$`)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
for _, d := range domains {
|
for _, d := range domains {
|
||||||
res, err := regexp.Match(`^[a-z0-9\*]+([\-\.]{1}[a-z0-9]+)*\.[a-z]{2,6}$`, []byte(d))
|
res := domainRegex.Match([]byte(d))
|
||||||
if !res {
|
if !res {
|
||||||
fmt.Println(res, err)
|
return fmt.Errorf(fmt.Sprintf("Domain %s has not a valid syntax %s, please verify", d, err))
|
||||||
return fmt.Errorf(fmt.Sprintf("Domain has not a valid syntax %s, please verify", err))
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return
|
return
|
||||||
@ -65,7 +70,7 @@ func GetDates(cert []byte) (NotBefore time.Time, NotAfter time.Time, err error)
|
|||||||
if block.Type == "CERTIFICATE" {
|
if block.Type == "CERTIFICATE" {
|
||||||
ce, err := x509.ParseCertificate(block.Bytes)
|
ce, err := x509.ParseCertificate(block.Bytes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal("Error when parsing certificate")
|
log.Println("Error when parsing certificate")
|
||||||
}
|
}
|
||||||
NotBefore = ce.NotBefore
|
NotBefore = ce.NotBefore
|
||||||
NotAfter = ce.NotAfter
|
NotAfter = ce.NotAfter
|
||||||
|
Loading…
Reference in New Issue
Block a user