2019-10-20 08:51:19 +00:00
|
|
|
'use strict';
|
|
|
|
|
|
|
|
var pkg = require('./package.json');
|
|
|
|
|
|
|
|
var ACME = require('@root/acme');
|
|
|
|
var Greenlock = module.exports;
|
2019-10-31 11:49:37 +00:00
|
|
|
var request = require('@root/request');
|
2019-10-20 08:51:19 +00:00
|
|
|
|
|
|
|
var G = Greenlock;
|
|
|
|
var U = require('./utils.js');
|
|
|
|
var E = require('./errors.js');
|
|
|
|
var P = require('./plugins.js');
|
|
|
|
var A = require('./accounts.js');
|
|
|
|
var C = require('./certificates.js');
|
|
|
|
var UserEvents = require('./user-events.js');
|
2019-11-05 09:50:27 +00:00
|
|
|
var GreenlockRc = require('./greenlockrc.js');
|
2019-10-20 08:51:19 +00:00
|
|
|
|
|
|
|
var caches = {};
|
|
|
|
|
|
|
|
// { maintainerEmail, directoryUrl, subscriberEmail, store, challenges }
|
|
|
|
G.create = function(gconf) {
|
2019-10-31 22:26:18 +00:00
|
|
|
var greenlock = {};
|
|
|
|
var gdefaults = {};
|
|
|
|
if (!gconf) {
|
|
|
|
gconf = {};
|
|
|
|
}
|
|
|
|
|
2019-11-01 19:43:56 +00:00
|
|
|
greenlock._create = function() {
|
2019-11-02 05:33:11 +00:00
|
|
|
if (!gconf._bin_mode) {
|
|
|
|
if (!gconf.maintainerEmail) {
|
|
|
|
throw E.NO_MAINTAINER('create');
|
|
|
|
}
|
2019-10-31 22:26:18 +00:00
|
|
|
|
2019-11-02 05:33:11 +00:00
|
|
|
// TODO send welcome message with benefit info
|
|
|
|
U._validMx(gconf.maintainerEmail).catch(function() {
|
|
|
|
console.error(
|
|
|
|
'invalid maintainer contact info:',
|
|
|
|
gconf.maintainerEmail
|
|
|
|
);
|
2019-10-31 22:26:18 +00:00
|
|
|
|
2019-11-02 05:33:11 +00:00
|
|
|
// maybe move this to init and don't exit the process, just in case
|
|
|
|
process.exit(1);
|
|
|
|
});
|
|
|
|
}
|
2019-10-31 22:26:18 +00:00
|
|
|
|
2019-11-05 09:50:27 +00:00
|
|
|
if (!gconf.packageRoot) {
|
|
|
|
gconf.packageRoot = process.cwd();
|
|
|
|
console.warn(
|
|
|
|
'`packageRoot` not defined, trying ' + gconf.packageRoot
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2019-11-01 19:43:56 +00:00
|
|
|
if ('function' === typeof gconf.notify) {
|
|
|
|
gdefaults.notify = gconf.notify;
|
|
|
|
} else {
|
|
|
|
gdefaults.notify = _notify;
|
|
|
|
}
|
2019-10-31 22:26:18 +00:00
|
|
|
|
2019-11-05 09:50:27 +00:00
|
|
|
var rc = GreenlockRc.resolve(gconf);
|
|
|
|
gconf = Object.assign(rc, gconf);
|
2019-11-01 19:43:56 +00:00
|
|
|
|
|
|
|
// Wraps each of the following with appropriate error checking
|
|
|
|
// greenlock.manager.defaults
|
2019-11-05 07:01:31 +00:00
|
|
|
// greenlock.sites.add
|
|
|
|
// greenlock.sites.update
|
|
|
|
// greenlock.sites.remove
|
|
|
|
// greenlock.sites.find
|
|
|
|
// greenlock.sites.get
|
|
|
|
require('./manager-underlay.js').wrap(greenlock, gconf);
|
2019-11-01 20:17:15 +00:00
|
|
|
// The goal here is to reduce boilerplate, such as error checking
|
|
|
|
// and duration parsing, that a manager must implement
|
|
|
|
greenlock.sites.add = greenlock.add = greenlock.manager.add;
|
2019-11-03 07:58:01 +00:00
|
|
|
greenlock.sites.update = greenlock.update = greenlock.manager.update;
|
|
|
|
greenlock.sites.remove = greenlock.remove = greenlock.manager.remove;
|
2019-11-01 19:43:56 +00:00
|
|
|
|
|
|
|
// Exports challenges.get for Greenlock Express HTTP-01,
|
|
|
|
// and whatever odd use case pops up, I suppose
|
|
|
|
// greenlock.challenges.get
|
2019-11-05 07:01:31 +00:00
|
|
|
require('./challenges-underlay.js').wrap(greenlock);
|
2019-11-01 19:43:56 +00:00
|
|
|
|
2019-11-05 09:50:27 +00:00
|
|
|
if (gconf.directoryUrl) {
|
|
|
|
gdefaults.directoryUrl = gconf.directoryUrl;
|
|
|
|
if (gconf.staging) {
|
|
|
|
throw new Error(
|
|
|
|
'supply `directoryUrl` or `staging`, but not both'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
} else if (
|
|
|
|
gconf.staging ||
|
|
|
|
process.argv.includes('--staging') ||
|
|
|
|
/DEV|STAG/i.test(process.env.ENV)
|
|
|
|
) {
|
|
|
|
greenlock.staging = true;
|
|
|
|
gdefaults.directoryUrl =
|
|
|
|
'https://acme-staging-v02.api.letsencrypt.org/directory';
|
|
|
|
} else {
|
|
|
|
greenlock.live = true;
|
|
|
|
gdefaults.directoryUrl =
|
|
|
|
'https://acme-v02.api.letsencrypt.org/directory';
|
|
|
|
}
|
|
|
|
|
2019-11-01 19:43:56 +00:00
|
|
|
greenlock._defaults = gdefaults;
|
|
|
|
greenlock._defaults.debug = gconf.debug;
|
|
|
|
|
2019-11-05 09:50:27 +00:00
|
|
|
if (!gconf._bin_mode && false !== gconf.renew) {
|
2019-11-02 05:33:11 +00:00
|
|
|
// renew every 90-ish minutes (random for staggering)
|
|
|
|
// the weak setTimeout (unref) means that when run as a CLI process this
|
|
|
|
// will still finish as expected, and not wait on the timeout
|
|
|
|
(function renew() {
|
|
|
|
setTimeout(function() {
|
|
|
|
greenlock.renew({});
|
|
|
|
renew();
|
|
|
|
}, Math.PI * 30 * 60 * 1000).unref();
|
|
|
|
})();
|
|
|
|
}
|
2019-11-01 19:43:56 +00:00
|
|
|
};
|
2019-10-31 22:26:18 +00:00
|
|
|
|
2019-11-01 19:43:56 +00:00
|
|
|
// The purpose of init is to make MCONF the source of truth
|
|
|
|
greenlock._init = function() {
|
|
|
|
var p;
|
|
|
|
greenlock._init = function() {
|
|
|
|
return p;
|
|
|
|
};
|
|
|
|
|
2019-11-05 07:01:31 +00:00
|
|
|
p = greenlock.manager
|
|
|
|
.init({
|
2019-11-01 19:43:56 +00:00
|
|
|
request: request
|
|
|
|
//punycode: require('punycode')
|
2019-11-05 07:01:31 +00:00
|
|
|
})
|
2019-11-01 19:43:56 +00:00
|
|
|
.then(function() {
|
2019-11-05 07:01:31 +00:00
|
|
|
return greenlock.manager._defaults().then(function(MCONF) {
|
2019-11-01 19:43:56 +00:00
|
|
|
mergeDefaults(MCONF, gconf);
|
|
|
|
if (true === MCONF.agreeToTerms) {
|
|
|
|
gdefaults.agreeToTerms = function(tos) {
|
|
|
|
return Promise.resolve(tos);
|
|
|
|
};
|
|
|
|
}
|
2019-11-05 07:01:31 +00:00
|
|
|
return greenlock.manager._defaults(MCONF);
|
2019-11-01 19:43:56 +00:00
|
|
|
});
|
|
|
|
})
|
|
|
|
.catch(function(err) {
|
2019-11-03 01:33:12 +00:00
|
|
|
if ('load_plugin' !== err.context) {
|
|
|
|
console.error('Fatal error during greenlock init:');
|
|
|
|
console.error(err.message);
|
|
|
|
}
|
|
|
|
if (!gconf._bin_mode) {
|
|
|
|
process.exit(1);
|
|
|
|
}
|
2019-11-01 19:43:56 +00:00
|
|
|
});
|
|
|
|
return p;
|
|
|
|
};
|
|
|
|
|
2019-10-31 22:26:18 +00:00
|
|
|
greenlock.notify = greenlock._notify = function(ev, params) {
|
|
|
|
var mng = greenlock.manager;
|
|
|
|
|
|
|
|
if ('_' === String(ev)[0]) {
|
|
|
|
if ('_cert_issue' === ev) {
|
|
|
|
try {
|
|
|
|
mng.update({
|
|
|
|
subject: params.subject,
|
|
|
|
renewAt: params.renewAt
|
|
|
|
}).catch(function(e) {
|
|
|
|
e.context = '_cert_issue';
|
|
|
|
greenlock._notify('error', e);
|
|
|
|
});
|
|
|
|
} catch (e) {
|
|
|
|
e.context = '_cert_issue';
|
|
|
|
greenlock._notify('error', e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// trap internal events internally
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
try {
|
|
|
|
var p = greenlock._defaults.notify(ev, params);
|
|
|
|
if (p && p.catch) {
|
|
|
|
p.catch(function(e) {
|
|
|
|
console.error("Promise Rejection on event '" + ev + "':");
|
|
|
|
console.error(e);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
} catch (e) {
|
|
|
|
console.error("Thrown Exception on event '" + ev + "':");
|
|
|
|
console.error(e);
|
|
|
|
console.error(params);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (-1 !== ['cert_issue', 'cert_renewal'].indexOf(ev)) {
|
|
|
|
// We will notify all greenlock users of mandatory and security updates
|
|
|
|
// We'll keep track of versions and os so we can make sure things work well
|
|
|
|
// { name, version, email, domains, action, communityMember, telemetry }
|
|
|
|
// TODO look at the other one
|
|
|
|
UserEvents.notify({
|
|
|
|
/*
|
2019-10-31 11:49:37 +00:00
|
|
|
// maintainer should be only on pre-publish, or maybe install, I think
|
|
|
|
maintainerEmail: greenlock._defaults._maintainerEmail,
|
|
|
|
name: greenlock._defaults._packageAgent,
|
|
|
|
version: greenlock._defaults._maintainerPackageVersion,
|
|
|
|
//action: params.pems._type,
|
|
|
|
domains: params.altnames,
|
|
|
|
subscriberEmail: greenlock._defaults._subscriberEmail,
|
|
|
|
// TODO enable for Greenlock Pro
|
|
|
|
//customerEmail: args.customerEmail
|
|
|
|
telemetry: greenlock._defaults.telemetry
|
|
|
|
*/
|
2019-10-31 22:26:18 +00:00
|
|
|
});
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
// certs.get
|
|
|
|
greenlock.get = function(args) {
|
|
|
|
return greenlock
|
|
|
|
._single(args)
|
|
|
|
.then(function() {
|
|
|
|
args._includePems = true;
|
|
|
|
return greenlock.renew(args);
|
|
|
|
})
|
|
|
|
.then(function(results) {
|
|
|
|
if (!results || !results.length) {
|
|
|
|
// TODO throw an error here?
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
|
|
|
|
// just get the first one
|
|
|
|
var result = results[0];
|
|
|
|
|
|
|
|
// (there should be only one, ideally)
|
|
|
|
if (results.length > 1) {
|
|
|
|
var err = new Error(
|
|
|
|
"a search for '" +
|
|
|
|
args.servername +
|
|
|
|
"' returned multiple certificates"
|
|
|
|
);
|
|
|
|
err.context = 'duplicate_certs';
|
|
|
|
err.servername = args.servername;
|
|
|
|
err.subjects = results.map(function(r) {
|
|
|
|
return (r.site || {}).subject || 'N/A';
|
|
|
|
});
|
|
|
|
|
|
|
|
greenlock._notify('warning', err);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (result.error) {
|
|
|
|
return Promise.reject(result.error);
|
|
|
|
}
|
|
|
|
|
|
|
|
// site for plugin options, such as http-01 challenge
|
|
|
|
// pems for the obvious reasons
|
|
|
|
return result;
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
|
|
|
greenlock._single = function(args) {
|
|
|
|
if ('string' !== typeof args.servername) {
|
|
|
|
return Promise.reject(new Error('no `servername` given'));
|
|
|
|
}
|
|
|
|
// www.example.com => *.example.com
|
|
|
|
args.wildname =
|
|
|
|
'*.' +
|
|
|
|
args.servername
|
|
|
|
.split('.')
|
|
|
|
.slice(1)
|
|
|
|
.join('.');
|
2019-11-03 01:33:12 +00:00
|
|
|
if (args.wildname.split('.').length < 3) {
|
|
|
|
// No '*.com'
|
|
|
|
args.wildname = '';
|
|
|
|
}
|
2019-10-31 22:26:18 +00:00
|
|
|
if (
|
|
|
|
args.servernames ||
|
2019-11-03 01:33:12 +00:00
|
|
|
//TODO I think we need to block altnames as well, but I don't want to break anything
|
|
|
|
//args.altnames ||
|
2019-10-31 22:26:18 +00:00
|
|
|
args.subject ||
|
|
|
|
args.renewBefore ||
|
|
|
|
args.issueBefore ||
|
|
|
|
args.expiresBefore
|
|
|
|
) {
|
|
|
|
return Promise.reject(
|
|
|
|
new Error(
|
|
|
|
'bad arguments, did you mean to call greenlock.renew()?'
|
|
|
|
)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
// duplicate, force, and others still allowed
|
|
|
|
return Promise.resolve(args);
|
|
|
|
};
|
|
|
|
|
|
|
|
greenlock._config = function(args) {
|
2019-11-03 17:01:32 +00:00
|
|
|
return greenlock._single(args).then(function() {
|
2019-11-05 07:01:31 +00:00
|
|
|
return greenlock._configAll(args).then(function(sites) {
|
2019-11-03 17:10:27 +00:00
|
|
|
return sites[0];
|
|
|
|
});
|
2019-11-03 17:01:32 +00:00
|
|
|
});
|
|
|
|
};
|
|
|
|
greenlock._configAll = function(args) {
|
|
|
|
return greenlock._find(args).then(function(sites) {
|
|
|
|
if (!sites || !sites.length) {
|
2019-11-05 10:54:51 +00:00
|
|
|
return [];
|
2019-11-03 17:01:32 +00:00
|
|
|
}
|
2019-11-03 17:10:27 +00:00
|
|
|
sites = JSON.parse(JSON.stringify(sites));
|
2019-11-05 07:01:31 +00:00
|
|
|
return greenlock.manager._defaults().then(function(mconf) {
|
2019-11-03 17:10:27 +00:00
|
|
|
return sites.map(function(site) {
|
|
|
|
if (site.store && site.challenges) {
|
|
|
|
return site;
|
|
|
|
}
|
|
|
|
var dconf = site;
|
|
|
|
// TODO make cli and api mode the same
|
|
|
|
if (gconf._bin_mode) {
|
|
|
|
dconf = site.defaults = {};
|
|
|
|
}
|
|
|
|
if (!site.store) {
|
|
|
|
dconf.store = mconf.store;
|
|
|
|
}
|
|
|
|
if (!site.challenges) {
|
|
|
|
dconf.challenges = mconf.challenges;
|
|
|
|
}
|
|
|
|
return site;
|
|
|
|
});
|
2019-10-31 22:26:18 +00:00
|
|
|
});
|
2019-11-03 17:01:32 +00:00
|
|
|
});
|
2019-10-31 22:26:18 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
// needs to get info about the renewal, such as which store and challenge(s) to use
|
|
|
|
greenlock.renew = function(args) {
|
|
|
|
return greenlock._init().then(function() {
|
2019-11-05 07:01:31 +00:00
|
|
|
return greenlock.manager._defaults().then(function(mconf) {
|
2019-10-31 22:26:18 +00:00
|
|
|
return greenlock._renew(mconf, args);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
};
|
|
|
|
greenlock._renew = function(mconf, args) {
|
|
|
|
if (!args) {
|
|
|
|
args = {};
|
|
|
|
}
|
|
|
|
|
|
|
|
var renewedOrFailed = [];
|
|
|
|
//console.log('greenlock._renew find', args);
|
|
|
|
return greenlock._find(args).then(function(sites) {
|
|
|
|
// Note: the manager must guaranteed that these are mutable copies
|
|
|
|
//console.log('greenlock._renew found', sites);;
|
|
|
|
|
2019-11-01 23:12:30 +00:00
|
|
|
if (!Array.isArray(sites)) {
|
|
|
|
throw new Error(
|
|
|
|
'Developer Error: not an array of sites returned from find: ' +
|
|
|
|
JSON.stringify(sites)
|
|
|
|
);
|
|
|
|
}
|
2019-10-31 22:26:18 +00:00
|
|
|
function next() {
|
|
|
|
var site = sites.shift();
|
|
|
|
if (!site) {
|
|
|
|
return Promise.resolve(null);
|
|
|
|
}
|
|
|
|
|
|
|
|
var order = { site: site };
|
|
|
|
renewedOrFailed.push(order);
|
|
|
|
// TODO merge args + result?
|
|
|
|
return greenlock
|
|
|
|
._order(mconf, site)
|
|
|
|
.then(function(pems) {
|
|
|
|
if (args._includePems) {
|
|
|
|
order.pems = pems;
|
|
|
|
}
|
|
|
|
})
|
|
|
|
.catch(function(err) {
|
|
|
|
order.error = err;
|
|
|
|
|
|
|
|
// For greenlock express serialization
|
|
|
|
err.toJSON = errorToJSON;
|
|
|
|
err.context = err.context || 'cert_order';
|
|
|
|
err.subject = site.subject;
|
|
|
|
if (args.servername) {
|
|
|
|
err.servername = args.servername;
|
|
|
|
}
|
|
|
|
// for debugging, but not to be relied on
|
|
|
|
err._site = site;
|
|
|
|
// TODO err.context = err.context || 'renew_certificate'
|
|
|
|
greenlock._notify('error', err);
|
|
|
|
})
|
|
|
|
.then(function() {
|
|
|
|
return next();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
return next().then(function() {
|
|
|
|
return renewedOrFailed;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2019-11-05 09:50:27 +00:00
|
|
|
greenlock._acme = function(mconf, args) {
|
2019-10-31 22:26:18 +00:00
|
|
|
var packageAgent = gconf.packageAgent || '';
|
|
|
|
// because Greenlock_Express/v3.x Greenlock/v3 is redundant
|
|
|
|
if (!/greenlock/i.test(packageAgent)) {
|
|
|
|
packageAgent = (packageAgent + ' Greenlock/' + pkg.version).trim();
|
|
|
|
}
|
|
|
|
var acme = ACME.create({
|
|
|
|
maintainerEmail: gconf.maintainerEmail,
|
|
|
|
packageAgent: packageAgent,
|
|
|
|
notify: greenlock._notify,
|
|
|
|
debug: greenlock._defaults.debug || args.debug
|
|
|
|
});
|
2019-11-05 09:50:27 +00:00
|
|
|
var dirUrl = args.directoryUrl || mconf.directoryUrl;
|
|
|
|
var showDir = false;
|
|
|
|
if (!dirUrl) {
|
|
|
|
showDir = true;
|
|
|
|
dirUrl = greenlock._defaults.directoryUrl;
|
|
|
|
}
|
2019-11-05 22:38:08 +00:00
|
|
|
if (showDir || (/staging/.test(dirUrl) && !gdefaults.shownDirectory)) {
|
|
|
|
gdefaults.shownDirectory = true;
|
2019-11-05 09:50:27 +00:00
|
|
|
console.info('ACME Directory URL:', gdefaults.directoryUrl);
|
|
|
|
}
|
2019-10-31 22:26:18 +00:00
|
|
|
|
|
|
|
var dir = caches[dirUrl];
|
|
|
|
|
|
|
|
// don't cache more than an hour
|
|
|
|
if (dir && Date.now() - dir.ts < 1 * 60 * 60 * 1000) {
|
|
|
|
return dir.promise;
|
|
|
|
}
|
|
|
|
|
|
|
|
return acme
|
|
|
|
.init(dirUrl)
|
|
|
|
.then(function(/*meta*/) {
|
|
|
|
caches[dirUrl] = {
|
|
|
|
promise: Promise.resolve(acme),
|
|
|
|
ts: Date.now()
|
|
|
|
};
|
|
|
|
return acme;
|
|
|
|
})
|
|
|
|
.catch(function(err) {
|
|
|
|
// TODO
|
|
|
|
// let's encrypt is possibly down for maintenaince...
|
|
|
|
// this is a special kind of failure mode
|
|
|
|
throw err;
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2019-11-05 09:50:27 +00:00
|
|
|
greenlock.order = function(siteConf) {
|
2019-10-31 22:26:18 +00:00
|
|
|
return greenlock._init().then(function() {
|
2019-11-05 07:01:31 +00:00
|
|
|
return greenlock.manager._defaults().then(function(mconf) {
|
2019-11-05 09:50:27 +00:00
|
|
|
return greenlock._order(mconf, siteConf);
|
2019-10-31 22:26:18 +00:00
|
|
|
});
|
|
|
|
});
|
|
|
|
};
|
2019-11-05 09:50:27 +00:00
|
|
|
greenlock._order = function(mconf, siteConf) {
|
2019-10-31 22:26:18 +00:00
|
|
|
// packageAgent, maintainerEmail
|
2019-11-05 09:50:27 +00:00
|
|
|
return greenlock._acme(mconf, siteConf).then(function(acme) {
|
|
|
|
var storeConf = siteConf.store || mconf.store;
|
2019-11-05 07:27:03 +00:00
|
|
|
storeConf = JSON.parse(JSON.stringify(storeConf));
|
|
|
|
storeConf.packageRoot = gconf.packageRoot;
|
2019-11-05 22:38:08 +00:00
|
|
|
|
|
|
|
var path = require('path');
|
|
|
|
if (!storeConf.basePath) {
|
|
|
|
storeConf.basePath = 'greenlock';
|
2019-11-05 07:27:03 +00:00
|
|
|
}
|
2019-11-05 22:38:08 +00:00
|
|
|
storeConf.basePath = path.resolve(
|
|
|
|
gconf.packageRoot || process.cwd(),
|
|
|
|
storeConf.basePath
|
|
|
|
);
|
2019-10-31 22:26:18 +00:00
|
|
|
return P._loadStore(storeConf).then(function(store) {
|
|
|
|
return A._getOrCreate(
|
|
|
|
greenlock,
|
|
|
|
mconf,
|
|
|
|
store.accounts,
|
|
|
|
acme,
|
2019-11-05 09:50:27 +00:00
|
|
|
siteConf
|
2019-10-31 22:26:18 +00:00
|
|
|
).then(function(account) {
|
2019-11-05 09:50:27 +00:00
|
|
|
var challengeConfs =
|
|
|
|
siteConf.challenges || mconf.challenges;
|
2019-10-31 22:26:18 +00:00
|
|
|
return Promise.all(
|
|
|
|
Object.keys(challengeConfs).map(function(typ01) {
|
|
|
|
return P._loadChallenge(challengeConfs, typ01);
|
|
|
|
})
|
|
|
|
).then(function(arr) {
|
|
|
|
var challenges = {};
|
|
|
|
arr.forEach(function(el) {
|
|
|
|
challenges[el._type] = el;
|
|
|
|
});
|
|
|
|
return C._getOrOrder(
|
|
|
|
greenlock,
|
|
|
|
mconf,
|
|
|
|
store.certificates,
|
|
|
|
acme,
|
|
|
|
challenges,
|
|
|
|
account,
|
2019-11-05 09:50:27 +00:00
|
|
|
siteConf
|
2019-10-31 22:26:18 +00:00
|
|
|
).then(function(pems) {
|
|
|
|
if (!pems) {
|
|
|
|
throw new Error('no order result');
|
|
|
|
}
|
|
|
|
if (!pems.privkey) {
|
|
|
|
throw new Error(
|
|
|
|
'missing private key, which is kinda important'
|
|
|
|
);
|
|
|
|
}
|
|
|
|
return pems;
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
});
|
|
|
|
};
|
|
|
|
|
2019-11-01 19:43:56 +00:00
|
|
|
greenlock._create();
|
2019-10-31 22:26:18 +00:00
|
|
|
|
|
|
|
return greenlock;
|
2019-10-20 08:51:19 +00:00
|
|
|
};
|
|
|
|
|
2019-10-29 05:18:13 +00:00
|
|
|
G._loadChallenge = P._loadChallenge;
|
|
|
|
|
2019-10-31 11:49:37 +00:00
|
|
|
function errorToJSON(e) {
|
2019-10-31 22:26:18 +00:00
|
|
|
var error = {};
|
|
|
|
Object.getOwnPropertyNames(e).forEach(function(k) {
|
|
|
|
error[k] = e[k];
|
|
|
|
});
|
|
|
|
return error;
|
2019-10-31 11:49:37 +00:00
|
|
|
}
|
2019-10-20 08:51:19 +00:00
|
|
|
|
2019-10-31 11:49:37 +00:00
|
|
|
function mergeDefaults(MCONF, gconf) {
|
2019-10-31 22:26:18 +00:00
|
|
|
if (
|
|
|
|
gconf.agreeToTerms === true ||
|
|
|
|
MCONF.agreeToTerms === true ||
|
|
|
|
// TODO deprecate
|
|
|
|
gconf.agreeTos === true ||
|
|
|
|
MCONF.agreeTos === true
|
|
|
|
) {
|
|
|
|
MCONF.agreeToTerms = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!MCONF.subscriberEmail && gconf.subscriberEmail) {
|
|
|
|
MCONF.subscriberEmail = gconf.subscriberEmail;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the default store module
|
|
|
|
if (!MCONF.store) {
|
|
|
|
if (gconf.store) {
|
|
|
|
MCONF.store = gconf.store;
|
|
|
|
} else {
|
|
|
|
MCONF.store = {
|
2019-11-05 07:27:03 +00:00
|
|
|
module: 'greenlock-store-fs'
|
2019-10-31 22:26:18 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
}
|
2019-11-03 01:33:12 +00:00
|
|
|
|
2019-11-05 07:27:03 +00:00
|
|
|
if ('greenlock-store-fs' === MCONF.store.module && !MCONF.store.basePath) {
|
|
|
|
//homedir = require('os').homedir();
|
|
|
|
if (gconf.configFile) {
|
|
|
|
MCONF.store.basePath = gconf.configFile.replace(/\.json$/i, '.d');
|
|
|
|
} else {
|
|
|
|
MCONF.store.basePath = './greenlock.d';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-31 22:26:18 +00:00
|
|
|
// just to test that it loads
|
|
|
|
P._loadSync(MCONF.store.module);
|
|
|
|
|
|
|
|
// Load the default challenge modules
|
|
|
|
var challenges = MCONF.challenges || gconf.challenges;
|
|
|
|
if (!challenges) {
|
|
|
|
challenges = {};
|
|
|
|
}
|
|
|
|
if (!challenges['http-01'] && !challenges['dns-01']) {
|
|
|
|
challenges['http-01'] = { module: 'acme-http-01-standalone' };
|
|
|
|
}
|
|
|
|
if (challenges['http-01']) {
|
|
|
|
if ('string' !== typeof challenges['http-01'].module) {
|
|
|
|
throw new Error(
|
|
|
|
'bad challenge http-01 module config:' +
|
|
|
|
JSON.stringify(challenges['http-01'])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
P._loadSync(challenges['http-01'].module);
|
|
|
|
}
|
|
|
|
if (challenges['dns-01']) {
|
|
|
|
if ('string' !== typeof challenges['dns-01'].module) {
|
|
|
|
throw new Error(
|
|
|
|
'bad challenge dns-01 module config' +
|
|
|
|
JSON.stringify(challenges['dns-01'])
|
|
|
|
);
|
|
|
|
}
|
|
|
|
P._loadSync(challenges['dns-01'].module);
|
|
|
|
}
|
|
|
|
MCONF.challenges = challenges;
|
|
|
|
|
|
|
|
if (!MCONF.renewOffset) {
|
|
|
|
MCONF.renewOffset = gconf.renewOffset || '-45d';
|
|
|
|
}
|
|
|
|
if (!MCONF.renewStagger) {
|
|
|
|
MCONF.renewStagger = gconf.renewStagger || '3d';
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!MCONF.accountKeyType) {
|
|
|
|
MCONF.accountKeyType = gconf.accountKeyType || 'EC-P256';
|
|
|
|
}
|
|
|
|
if (!MCONF.serverKeyType) {
|
|
|
|
MCONF.serverKeyType = gconf.serverKeyType || 'RSA-2048';
|
|
|
|
}
|
2019-10-31 11:49:37 +00:00
|
|
|
}
|
2019-10-20 09:17:19 +00:00
|
|
|
|
2019-10-31 11:49:37 +00:00
|
|
|
function _notify(ev, args) {
|
2019-10-31 22:26:18 +00:00
|
|
|
if (!args) {
|
|
|
|
args = ev;
|
|
|
|
ev = args.event;
|
|
|
|
delete args.event;
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO define message types
|
|
|
|
if (!_notify._notice) {
|
|
|
|
console.info(
|
|
|
|
'set greenlockOptions.notify to override the default logger'
|
|
|
|
);
|
|
|
|
_notify._notice = true;
|
|
|
|
}
|
|
|
|
var prefix = 'Warning';
|
|
|
|
switch (ev) {
|
|
|
|
case 'error':
|
|
|
|
prefix = 'Error';
|
|
|
|
/* falls through */
|
|
|
|
case 'warning':
|
|
|
|
console.error(
|
|
|
|
prefix + '%s:',
|
|
|
|
(' ' + (args.context || '')).trimRight()
|
|
|
|
);
|
|
|
|
console.error(args.message);
|
|
|
|
if (args.description) {
|
|
|
|
console.error(args.description);
|
|
|
|
}
|
|
|
|
if (args.code) {
|
|
|
|
console.error('code:', args.code);
|
|
|
|
}
|
|
|
|
if (args.stack) {
|
|
|
|
console.error(args.stack);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
if (/status/.test(ev)) {
|
|
|
|
console.info(
|
|
|
|
ev,
|
|
|
|
args.altname || args.subject || '',
|
|
|
|
args.status || ''
|
|
|
|
);
|
|
|
|
if (!args.status) {
|
|
|
|
console.info(args);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
console.info(
|
|
|
|
ev,
|
|
|
|
'(more info available: ' + Object.keys(args).join(' ') + ')'
|
|
|
|
);
|
|
|
|
}
|
2019-10-28 08:25:32 +00:00
|
|
|
}
|