blob: 4366bf695c2286aa51fdaa16d9c9569ad9da43b5 [file] [log] [blame]
/* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <assert.h>
#include <stdlib.h>
#include <apr_lib.h>
#include <apr_strings.h>
#include <apr_buckets.h>
#include <apr_hash.h>
#include <apr_uri.h>
#include "md.h"
#include "md_crypt.h"
#include "md_json.h"
#include "md_jws.h"
#include "md_http.h"
#include "md_log.h"
#include "md_store.h"
#include "md_result.h"
#include "md_util.h"
#include "md_version.h"
#include "md_acme.h"
#include "md_acme_acct.h"
static const char *base_product= "-";
typedef struct acme_problem_status_t acme_problem_status_t;
struct acme_problem_status_t {
const char *type; /* the ACME error string */
apr_status_t rv; /* what Apache status code we give it */
int input_related; /* if error indicates wrong input value */
};
static acme_problem_status_t Problems[] = {
{ "acme:error:badCSR", APR_EINVAL, 1 },
{ "acme:error:badNonce", APR_EAGAIN, 0 },
{ "acme:error:badSignatureAlgorithm", APR_EINVAL, 1 },
{ "acme:error:externalAccountRequired", APR_EINVAL, 1 },
{ "acme:error:invalidContact", APR_BADARG, 1 },
{ "acme:error:unsupportedContact", APR_EGENERAL, 1 },
{ "acme:error:malformed", APR_EINVAL, 1 },
{ "acme:error:rateLimited", APR_BADARG, 0 },
{ "acme:error:rejectedIdentifier", APR_BADARG, 1 },
{ "acme:error:serverInternal", APR_EGENERAL, 0 },
{ "acme:error:unauthorized", APR_EACCES, 0 },
{ "acme:error:unsupportedIdentifier", APR_BADARG, 1 },
{ "acme:error:userActionRequired", APR_EAGAIN, 0 },
{ "acme:error:badRevocationReason", APR_EINVAL, 1 },
{ "acme:error:caa", APR_EGENERAL, 0 },
{ "acme:error:dns", APR_EGENERAL, 0 },
{ "acme:error:connection", APR_EGENERAL, 0 },
{ "acme:error:tls", APR_EGENERAL, 0 },
{ "acme:error:incorrectResponse", APR_EGENERAL, 0 },
};
static apr_status_t problem_status_get(const char *type) {
size_t i;
if (strstr(type, "urn:ietf:params:") == type) {
type += strlen("urn:ietf:params:");
}
else if (strstr(type, "urn:") == type) {
type += strlen("urn:");
}
for(i = 0; i < (sizeof(Problems)/sizeof(Problems[0])); ++i) {
if (!apr_strnatcasecmp(type, Problems[i].type)) {
return Problems[i].rv;
}
}
return APR_EGENERAL;
}
int md_acme_problem_is_input_related(const char *problem) {
size_t i;
if (!problem) return 0;
if (strstr(problem, "urn:ietf:params:") == problem) {
problem += strlen("urn:ietf:params:");
}
else if (strstr(problem, "urn:") == problem) {
problem += strlen("urn:");
}
for(i = 0; i < (sizeof(Problems)/sizeof(Problems[0])); ++i) {
if (!apr_strnatcasecmp(problem, Problems[i].type)) {
return Problems[i].input_related;
}
}
return 0;
}
/**************************************************************************************************/
/* acme requests */
static void req_update_nonce(md_acme_t *acme, apr_table_t *hdrs)
{
if (hdrs) {
const char *nonce = apr_table_get(hdrs, "Replay-Nonce");
if (nonce) {
acme->nonce = apr_pstrdup(acme->p, nonce);
}
}
}
static apr_status_t http_update_nonce(const md_http_response_t *res, void *data)
{
req_update_nonce(data, res->headers);
return APR_SUCCESS;
}
static md_acme_req_t *md_acme_req_create(md_acme_t *acme, const char *method, const char *url)
{
apr_pool_t *pool;
md_acme_req_t *req;
apr_status_t rv;
rv = apr_pool_create(&pool, acme->p);
if (rv != APR_SUCCESS) {
return NULL;
}
apr_pool_tag(pool, "md_acme_req");
req = apr_pcalloc(pool, sizeof(*req));
if (!req) {
apr_pool_destroy(pool);
return NULL;
}
req->acme = acme;
req->p = pool;
req->method = method;
req->url = url;
req->prot_fields = md_json_create(pool);
req->max_retries = acme->max_retries;
req->result = md_result_make(req->p, APR_SUCCESS);
return req;
}
static apr_status_t acmev2_new_nonce(md_acme_t *acme)
{
return md_http_HEAD_perform(acme->http, acme->api.v2.new_nonce, NULL, http_update_nonce, acme);
}
apr_status_t md_acme_init(apr_pool_t *p, const char *base, int init_ssl)
{
base_product = base;
return init_ssl? md_crypt_init(p) : APR_SUCCESS;
}
static apr_status_t inspect_problem(md_acme_req_t *req, const md_http_response_t *res)
{
const char *ctype;
md_json_t *problem = NULL;
apr_status_t rv;
ctype = apr_table_get(req->resp_hdrs, "content-type");
ctype = md_util_parse_ct(res->req->pool, ctype);
if (ctype && !strcmp(ctype, "application/problem+json")) {
/* RFC 7807 */
rv = md_json_read_http(&problem, req->p, res);
if (rv == APR_SUCCESS && problem) {
const char *ptype, *pdetail;
req->resp_json = problem;
ptype = md_json_gets(problem, MD_KEY_TYPE, NULL);
pdetail = md_json_gets(problem, MD_KEY_DETAIL, NULL);
req->rv = problem_status_get(ptype);
md_result_problem_set(req->result, req->rv, ptype, pdetail,
md_json_getj(problem, MD_KEY_SUBPROBLEMS, NULL));
if (APR_STATUS_IS_EAGAIN(req->rv)) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, req->rv, req->p,
"acme reports %s: %s", ptype, pdetail);
}
else {
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, req->rv, req->p,
"acme problem %s: %s", ptype, pdetail);
}
return req->rv;
}
}
switch (res->status) {
case 400:
return APR_EINVAL;
case 401: /* sectigo returns this instead of 403 */
case 403:
return APR_EACCES;
case 404:
return APR_ENOENT;
default:
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, 0, req->p,
"acme problem unknown: http status %d", res->status);
md_result_printf(req->result, APR_EGENERAL, "unexpected http status: %d",
res->status);
return req->result->status;
}
return APR_SUCCESS;
}
/**************************************************************************************************/
/* ACME requests with nonce handling */
static apr_status_t acmev2_req_init(md_acme_req_t *req, md_json_t *jpayload)
{
md_data_t payload;
md_data_null(&payload);
if (!req->acme->acct) {
return APR_EINVAL;
}
if (jpayload) {
payload.data = md_json_writep(jpayload, req->p, MD_JSON_FMT_COMPACT);
if (!payload.data) {
return APR_EINVAL;
}
}
else {
payload.data = "";
}
payload.len = strlen(payload.data);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, 0, req->p,
"acme payload(len=%" APR_SIZE_T_FMT "): %s", payload.len, payload.data);
return md_jws_sign(&req->req_json, req->p, &payload,
req->prot_fields, req->acme->acct_key, req->acme->acct->url);
}
apr_status_t md_acme_req_body_init(md_acme_req_t *req, md_json_t *payload)
{
return req->acme->req_init_fn(req, payload);
}
static apr_status_t md_acme_req_done(md_acme_req_t *req, apr_status_t rv)
{
if (req->result->status != APR_SUCCESS) {
if (req->on_err) {
req->on_err(req, req->result, req->baton);
}
}
/* An error in rv superceeds the result->status */
if (APR_SUCCESS != rv) req->result->status = rv;
rv = req->result->status;
/* transfer results into the acme's central result for longer life and later inspection */
md_result_dup(req->acme->last, req->result);
if (req->p) {
apr_pool_destroy(req->p);
}
return rv;
}
static apr_status_t on_response(const md_http_response_t *res, void *data)
{
md_acme_req_t *req = data;
apr_status_t rv = APR_SUCCESS;
req->resp_hdrs = apr_table_clone(req->p, res->headers);
req_update_nonce(req->acme, res->headers);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, rv, req->p, "response: %d", res->status);
if (res->status >= 200 && res->status < 300) {
int processed = 0;
if (req->on_json) {
processed = 1;
rv = md_json_read_http(&req->resp_json, req->p, res);
if (APR_SUCCESS == rv) {
if (md_log_is_level(req->p, MD_LOG_TRACE2)) {
const char *s;
s = md_json_writep(req->resp_json, req->p, MD_JSON_FMT_INDENT);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE2, rv, req->p,
"response: %s",
s ? s : "<failed to serialize!>");
}
rv = req->on_json(req->acme, req->p, req->resp_hdrs, req->resp_json, req->baton);
}
else if (APR_STATUS_IS_ENOENT(rv)) {
/* not JSON content, fall through */
processed = 0;
}
else {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, rv, req->p, "parsing JSON body");
}
}
if (!processed && req->on_res) {
processed = 1;
rv = req->on_res(req->acme, res, req->baton);
}
if (!processed) {
rv = APR_EINVAL;
md_result_printf(req->result, rv, "unable to process the response: "
"http-status=%d, content-type=%s",
res->status, apr_table_get(res->headers, "Content-Type"));
md_result_log(req->result, MD_LOG_ERR);
}
}
else if (APR_EAGAIN == (rv = inspect_problem(req, res))) {
/* leave req alive */
return rv;
}
md_acme_req_done(req, rv);
return rv;
}
static apr_status_t acmev2_GET_as_POST_init(md_acme_req_t *req, void *baton)
{
(void)baton;
return md_acme_req_body_init(req, NULL);
}
static apr_status_t md_acme_req_send(md_acme_req_t *req)
{
apr_status_t rv;
md_acme_t *acme = req->acme;
md_data_t *body = NULL;
md_result_t *result;
assert(acme->url);
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, req->p,
"sending req: %s %s", req->method, req->url);
md_result_reset(req->acme->last);
result = md_result_make(req->p, APR_SUCCESS);
/* Whom are we talking to? */
if (acme->version == MD_ACME_VERSION_UNKNOWN) {
rv = md_acme_setup(acme, result);
if (APR_SUCCESS != rv) goto leave;
}
if (!strcmp("GET", req->method) && !req->on_init && !req->req_json) {
/* See <https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.6.3>
* and <https://mailarchive.ietf.org/arch/msg/acme/sotffSQ0OWV-qQJodLwWYWcEVKI>
* and <https://community.letsencrypt.org/t/acme-v2-scheduled-deprecation-of-unauthenticated-resource-gets/74380>
* We implement this change in ACMEv2 and higher as keeping the md_acme_GET() methods,
* but switching them to POSTs with a empty, JWS signed, body when we call
* our HTTP client. */
req->method = "POST";
req->on_init = acmev2_GET_as_POST_init;
/*req->max_retries = 0; don't do retries on these "GET"s */
}
/* Besides GET/HEAD, we always need a fresh nonce */
if (strcmp("GET", req->method) && strcmp("HEAD", req->method)) {
if (acme->version == MD_ACME_VERSION_UNKNOWN) {
rv = md_acme_setup(acme, result);
if (APR_SUCCESS != rv) goto leave;
}
if (!acme->nonce && (APR_SUCCESS != (rv = acme->new_nonce_fn(acme)))) {
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, rv, req->p,
"error retrieving new nonce from ACME server");
goto leave;
}
md_json_sets(acme->nonce, req->prot_fields, "nonce", NULL);
md_json_sets(req->url, req->prot_fields, "url", NULL);
acme->nonce = NULL;
}
rv = req->on_init? req->on_init(req, req->baton) : APR_SUCCESS;
if (APR_SUCCESS != rv) goto leave;
if (req->req_json) {
body = apr_pcalloc(req->p, sizeof(*body));
body->data = md_json_writep(req->req_json, req->p, MD_JSON_FMT_INDENT);
body->len = strlen(body->data);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE3, 0, req->p,
"sending JSON body: %s", body->data);
}
if (body && md_log_is_level(req->p, MD_LOG_TRACE4)) {
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE4, 0, req->p,
"req: %s %s, body:\n%s", req->method, req->url, body->data);
}
else {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, req->p,
"req: %s %s", req->method, req->url);
}
if (!strcmp("GET", req->method)) {
rv = md_http_GET_perform(req->acme->http, req->url, NULL, on_response, req);
}
else if (!strcmp("POST", req->method)) {
rv = md_http_POSTd_perform(req->acme->http, req->url, NULL, "application/jose+json",
body, on_response, req);
}
else if (!strcmp("HEAD", req->method)) {
rv = md_http_HEAD_perform(req->acme->http, req->url, NULL, on_response, req);
}
else {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, 0, req->p,
"HTTP method %s against: %s", req->method, req->url);
rv = APR_ENOTIMPL;
}
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, req->p, "req sent");
if (APR_EAGAIN == rv && req->max_retries > 0) {
--req->max_retries;
rv = md_acme_req_send(req);
}
req = NULL;
leave:
if (req) md_acme_req_done(req, rv);
return rv;
}
apr_status_t md_acme_POST(md_acme_t *acme, const char *url,
md_acme_req_init_cb *on_init,
md_acme_req_json_cb *on_json,
md_acme_req_res_cb *on_res,
md_acme_req_err_cb *on_err,
void *baton)
{
md_acme_req_t *req;
assert(url);
assert(on_json || on_res);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, 0, acme->p, "add acme POST: %s", url);
req = md_acme_req_create(acme, "POST", url);
req->on_init = on_init;
req->on_json = on_json;
req->on_res = on_res;
req->on_err = on_err;
req->baton = baton;
return md_acme_req_send(req);
}
apr_status_t md_acme_GET(md_acme_t *acme, const char *url,
md_acme_req_init_cb *on_init,
md_acme_req_json_cb *on_json,
md_acme_req_res_cb *on_res,
md_acme_req_err_cb *on_err,
void *baton)
{
md_acme_req_t *req;
assert(url);
assert(on_json || on_res);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, 0, acme->p, "add acme GET: %s", url);
req = md_acme_req_create(acme, "GET", url);
req->on_init = on_init;
req->on_json = on_json;
req->on_res = on_res;
req->on_err = on_err;
req->baton = baton;
return md_acme_req_send(req);
}
void md_acme_report_result(md_acme_t *acme, apr_status_t rv, struct md_result_t *result)
{
if (acme->last->status == APR_SUCCESS) {
md_result_set(result, rv, NULL);
}
else {
md_result_problem_set(result, acme->last->status, acme->last->problem,
acme->last->detail, acme->last->subproblems);
}
}
/**************************************************************************************************/
/* GET JSON */
typedef struct {
apr_pool_t *pool;
md_json_t *json;
} json_ctx;
static apr_status_t on_got_json(md_acme_t *acme, apr_pool_t *p, const apr_table_t *headers,
md_json_t *jbody, void *baton)
{
json_ctx *ctx = baton;
(void)acme;
(void)p;
(void)headers;
ctx->json = md_json_clone(ctx->pool, jbody);
return APR_SUCCESS;
}
apr_status_t md_acme_get_json(struct md_json_t **pjson, md_acme_t *acme,
const char *url, apr_pool_t *p)
{
apr_status_t rv;
json_ctx ctx;
ctx.pool = p;
ctx.json = NULL;
rv = md_acme_GET(acme, url, NULL, on_got_json, NULL, NULL, &ctx);
*pjson = (APR_SUCCESS == rv)? ctx.json : NULL;
return rv;
}
/**************************************************************************************************/
/* Generic ACME operations */
void md_acme_clear_acct(md_acme_t *acme)
{
acme->acct_id = NULL;
acme->acct = NULL;
acme->acct_key = NULL;
}
const char *md_acme_acct_id_get(md_acme_t *acme)
{
return acme->acct_id;
}
const char *md_acme_acct_url_get(md_acme_t *acme)
{
return acme->acct? acme->acct->url : NULL;
}
apr_status_t md_acme_use_acct(md_acme_t *acme, md_store_t *store,
apr_pool_t *p, const char *acct_id)
{
md_acme_acct_t *acct;
md_pkey_t *pkey;
apr_status_t rv;
if (APR_SUCCESS == (rv = md_acme_acct_load(&acct, &pkey,
store, MD_SG_ACCOUNTS, acct_id, acme->p))) {
if (md_acme_acct_matches_url(acct, acme->url)) {
acme->acct_id = apr_pstrdup(p, acct_id);
acme->acct = acct;
acme->acct_key = pkey;
rv = md_acme_acct_validate(acme, store, p);
}
else {
/* account is from another server or, more likely, from another
* protocol endpoint on the same server */
rv = APR_ENOENT;
}
}
return rv;
}
apr_status_t md_acme_use_acct_for_md(md_acme_t *acme, struct md_store_t *store,
apr_pool_t *p, const char *acct_id,
const md_t *md)
{
md_acme_acct_t *acct;
md_pkey_t *pkey;
apr_status_t rv;
if (APR_SUCCESS == (rv = md_acme_acct_load(&acct, &pkey,
store, MD_SG_ACCOUNTS, acct_id, acme->p))) {
if (md_acme_acct_matches_md(acct, md)) {
acme->acct_id = apr_pstrdup(p, acct_id);
acme->acct = acct;
acme->acct_key = pkey;
rv = md_acme_acct_validate(acme, store, p);
}
else {
/* account is from another server or, more likely, from another
* protocol endpoint on the same server */
rv = APR_ENOENT;
}
}
return rv;
}
apr_status_t md_acme_save_acct(md_acme_t *acme, apr_pool_t *p, md_store_t *store)
{
return md_acme_acct_save(store, p, acme, &acme->acct_id, acme->acct, acme->acct_key);
}
static apr_status_t acmev2_POST_new_account(md_acme_t *acme,
md_acme_req_init_cb *on_init,
md_acme_req_json_cb *on_json,
md_acme_req_res_cb *on_res,
md_acme_req_err_cb *on_err,
void *baton)
{
return md_acme_POST(acme, acme->api.v2.new_account, on_init, on_json, on_res, on_err, baton);
}
apr_status_t md_acme_POST_new_account(md_acme_t *acme,
md_acme_req_init_cb *on_init,
md_acme_req_json_cb *on_json,
md_acme_req_res_cb *on_res,
md_acme_req_err_cb *on_err,
void *baton)
{
return acme->post_new_account_fn(acme, on_init, on_json, on_res, on_err, baton);
}
/**************************************************************************************************/
/* ACME setup */
apr_status_t md_acme_create(md_acme_t **pacme, apr_pool_t *p, const char *url,
const char *proxy_url, const char *ca_file)
{
md_acme_t *acme;
const char *err = NULL;
apr_status_t rv;
apr_uri_t uri_parsed;
size_t len;
if (!url) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, APR_EINVAL, p, "create ACME without url");
return APR_EINVAL;
}
if (APR_SUCCESS != (rv = md_util_abs_uri_check(p, url, &err))) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, rv, p, "invalid ACME uri (%s): %s", err, url);
return rv;
}
acme = apr_pcalloc(p, sizeof(*acme));
acme->url = url;
acme->p = p;
acme->user_agent = apr_psprintf(p, "%s mod_md/%s",
base_product, MOD_MD_VERSION);
acme->proxy_url = proxy_url? apr_pstrdup(p, proxy_url) : NULL;
acme->max_retries = 99;
acme->ca_file = ca_file;
if (APR_SUCCESS != (rv = apr_uri_parse(p, url, &uri_parsed))) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, rv, p, "parsing ACME uri: %s", url);
return APR_EINVAL;
}
len = strlen(uri_parsed.hostname);
acme->sname = (len <= 16)? uri_parsed.hostname : apr_pstrdup(p, uri_parsed.hostname + len - 16);
acme->version = MD_ACME_VERSION_UNKNOWN;
acme->last = md_result_make(acme->p, APR_SUCCESS);
*pacme = acme;
return rv;
}
typedef struct {
md_acme_t *acme;
md_result_t *result;
} update_dir_ctx;
static apr_status_t update_directory(const md_http_response_t *res, void *data)
{
md_http_request_t *req = res->req;
md_acme_t *acme = ((update_dir_ctx *)data)->acme;
md_result_t *result = ((update_dir_ctx *)data)->result;
apr_status_t rv;
md_json_t *json;
const char *s;
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, 0, req->pool, "directory lookup response: %d", res->status);
if (res->status == 503) {
md_result_printf(result, APR_EAGAIN,
"The ACME server at <%s> reports that Service is Unavailable (503). This "
"may happen during maintenance for short periods of time.", acme->url);
md_result_log(result, MD_LOG_INFO);
rv = result->status;
goto leave;
}
else if (res->status < 200 || res->status >= 300) {
md_result_printf(result, APR_EAGAIN,
"The ACME server at <%s> responded with HTTP status %d. This "
"is unusual. Please verify that the URL is correct and that you can indeed "
"make request from the server to it by other means, e.g. invoking curl/wget.",
acme->url, res->status);
rv = result->status;
goto leave;
}
rv = md_json_read_http(&json, req->pool, res);
if (APR_SUCCESS != rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, rv, req->pool, "reading JSON body");
goto leave;
}
if (md_log_is_level(acme->p, MD_LOG_TRACE2)) {
s = md_json_writep(json, req->pool, MD_JSON_FMT_INDENT);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE2, rv, req->pool,
"response: %s", s ? s : "<failed to serialize!>");
}
/* What have we got? */
if ((s = md_json_dups(acme->p, json, "newAccount", NULL))) {
acme->api.v2.new_account = s;
acme->api.v2.new_order = md_json_dups(acme->p, json, "newOrder", NULL);
acme->api.v2.revoke_cert = md_json_dups(acme->p, json, "revokeCert", NULL);
acme->api.v2.key_change = md_json_dups(acme->p, json, "keyChange", NULL);
acme->api.v2.new_nonce = md_json_dups(acme->p, json, "newNonce", NULL);
/* RFC 8555 only requires "directory" and "newNonce" resources.
* mod_md uses "newAccount" and "newOrder" so check for them.
* But mod_md does not use the "revokeCert" or "keyChange"
* resources, so tolerate the absence of those keys. In the
* future if mod_md implements revocation or key rollover then
* the use of those features should be predicated on the
* server's advertised capabilities. */
if (acme->api.v2.new_account
&& acme->api.v2.new_order
&& acme->api.v2.new_nonce) {
acme->version = MD_ACME_VERSION_2;
}
acme->ca_agreement = md_json_dups(acme->p, json, "meta", MD_KEY_TOS, NULL);
acme->eab_required = md_json_getb(json, "meta", MD_KEY_EAB_REQUIRED, NULL);
acme->new_nonce_fn = acmev2_new_nonce;
acme->req_init_fn = acmev2_req_init;
acme->post_new_account_fn = acmev2_POST_new_account;
}
else if ((s = md_json_dups(acme->p, json, "new-authz", NULL))) {
acme->api.v1.new_authz = s;
acme->api.v1.new_cert = md_json_dups(acme->p, json, "new-cert", NULL);
acme->api.v1.new_reg = md_json_dups(acme->p, json, "new-reg", NULL);
acme->api.v1.revoke_cert = md_json_dups(acme->p, json, "revoke-cert", NULL);
if (acme->api.v1.new_authz && acme->api.v1.new_cert
&& acme->api.v1.new_reg && acme->api.v1.revoke_cert) {
acme->version = MD_ACME_VERSION_1;
}
acme->ca_agreement = md_json_dups(acme->p, json, "meta", "terms-of-service", NULL);
/* we init that far, but will not use the v1 api */
}
if (MD_ACME_VERSION_UNKNOWN == acme->version) {
md_result_printf(result, APR_EINVAL,
"Unable to understand ACME server response from <%s>. "
"Wrong ACME protocol version or link?", acme->url);
md_result_log(result, MD_LOG_WARNING);
rv = result->status;
}
leave:
return rv;
}
apr_status_t md_acme_setup(md_acme_t *acme, md_result_t *result)
{
apr_status_t rv;
update_dir_ctx ctx;
assert(acme->url);
acme->version = MD_ACME_VERSION_UNKNOWN;
if (!acme->http && APR_SUCCESS != (rv = md_http_create(&acme->http, acme->p,
acme->user_agent, acme->proxy_url))) {
return rv;
}
/* TODO: maybe this should be configurable. Let's take some reasonable
* defaults for now that protect our client */
md_http_set_response_limit(acme->http, 1024*1024);
md_http_set_timeout_default(acme->http, apr_time_from_sec(10 * 60));
md_http_set_connect_timeout_default(acme->http, apr_time_from_sec(30));
md_http_set_stalling_default(acme->http, 10, apr_time_from_sec(30));
md_http_set_ca_file(acme->http, acme->ca_file);
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, acme->p, "get directory from %s", acme->url);
ctx.acme = acme;
ctx.result = result;
rv = md_http_GET_perform(acme->http, acme->url, NULL, update_directory, &ctx);
if (APR_SUCCESS != rv && APR_SUCCESS == result->status) {
/* If the result reports no error, we never got a response from the server */
md_result_printf(result, rv,
"Unsuccessful in contacting ACME server at <%s>. If this problem persists, "
"please check your network connectivity from your Apache server to the "
"ACME server. Also, older servers might have trouble verifying the certificates "
"of the ACME server. You can check if you are able to contact it manually via the "
"curl command. Sometimes, the ACME server might be down for maintenance, "
"so failing to contact it is not an immediate problem. Apache will "
"continue retrying this.", acme->url);
md_result_log(result, MD_LOG_WARNING);
}
return rv;
}