blob: f3e043e87c05b1ff69cef4c0d4b32c301f1e0457 [file] [log] [blame]
/* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <assert.h>
#include <stdio.h>
#include <apr_lib.h>
#include <apr_file_info.h>
#include <apr_file_io.h>
#include <apr_fnmatch.h>
#include <apr_hash.h>
#include <apr_strings.h>
#include <apr_tables.h>
#include "md.h"
#include "md_crypt.h"
#include "md_json.h"
#include "md_jws.h"
#include "md_log.h"
#include "md_result.h"
#include "md_store.h"
#include "md_util.h"
#include "md_version.h"
#include "md_acme.h"
#include "md_acme_acct.h"
static apr_status_t acct_make(md_acme_acct_t **pacct, apr_pool_t *p,
const char *ca_url, apr_array_header_t *contacts)
{
md_acme_acct_t *acct;
acct = apr_pcalloc(p, sizeof(*acct));
acct->ca_url = ca_url;
if (!contacts || apr_is_empty_array(contacts)) {
acct->contacts = apr_array_make(p, 5, sizeof(const char *));
}
else {
acct->contacts = apr_array_copy(p, contacts);
}
*pacct = acct;
return APR_SUCCESS;
}
static const char *mk_acct_id(apr_pool_t *p, md_acme_t *acme, int i)
{
return apr_psprintf(p, "ACME-%s-%04d", acme->sname, i);
}
static const char *mk_acct_pattern(apr_pool_t *p, md_acme_t *acme)
{
return apr_psprintf(p, "ACME-%s-*", acme->sname);
}
/**************************************************************************************************/
/* json load/save */
static md_acme_acct_st acct_st_from_str(const char *s)
{
if (s) {
if (!strcmp("valid", s)) {
return MD_ACME_ACCT_ST_VALID;
}
else if (!strcmp("deactivated", s)) {
return MD_ACME_ACCT_ST_DEACTIVATED;
}
else if (!strcmp("revoked", s)) {
return MD_ACME_ACCT_ST_REVOKED;
}
}
return MD_ACME_ACCT_ST_UNKNOWN;
}
md_json_t *md_acme_acct_to_json(md_acme_acct_t *acct, apr_pool_t *p)
{
md_json_t *jacct;
const char *s;
assert(acct);
jacct = md_json_create(p);
switch (acct->status) {
case MD_ACME_ACCT_ST_VALID:
s = "valid";
break;
case MD_ACME_ACCT_ST_DEACTIVATED:
s = "deactivated";
break;
case MD_ACME_ACCT_ST_REVOKED:
s = "revoked";
break;
default:
s = NULL;
break;
}
if (s) md_json_sets(s, jacct, MD_KEY_STATUS, NULL);
if (acct->url) md_json_sets(acct->url, jacct, MD_KEY_URL, NULL);
if (acct->ca_url) md_json_sets(acct->ca_url, jacct, MD_KEY_CA_URL, NULL);
if (acct->contacts) md_json_setsa(acct->contacts, jacct, MD_KEY_CONTACT, NULL);
if (acct->registration) md_json_setj(acct->registration, jacct, MD_KEY_REGISTRATION, NULL);
if (acct->agreement) md_json_sets(acct->agreement, jacct, MD_KEY_AGREEMENT, NULL);
if (acct->orders) md_json_sets(acct->orders, jacct, MD_KEY_ORDERS, NULL);
if (acct->eab_kid) md_json_sets(acct->eab_kid, jacct, MD_KEY_EAB, MD_KEY_KID, NULL);
if (acct->eab_hmac) md_json_sets(acct->eab_hmac, jacct, MD_KEY_EAB, MD_KEY_HMAC, NULL);
return jacct;
}
apr_status_t md_acme_acct_from_json(md_acme_acct_t **pacct, md_json_t *json, apr_pool_t *p)
{
apr_status_t rv = APR_EINVAL;
md_acme_acct_t *acct;
md_acme_acct_st status = MD_ACME_ACCT_ST_UNKNOWN;
const char *ca_url, *url;
apr_array_header_t *contacts;
if (md_json_has_key(json, MD_KEY_STATUS, NULL)) {
status = acct_st_from_str(md_json_gets(json, MD_KEY_STATUS, NULL));
}
url = md_json_gets(json, MD_KEY_URL, NULL);
if (!url) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, p, "account has no url");
goto leave;
}
ca_url = md_json_gets(json, MD_KEY_CA_URL, NULL);
if (!ca_url) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, p, "account has no CA url: %s", url);
goto leave;
}
contacts = apr_array_make(p, 5, sizeof(const char *));
if (md_json_has_key(json, MD_KEY_CONTACT, NULL)) {
md_json_getsa(contacts, json, MD_KEY_CONTACT, NULL);
}
else {
md_json_getsa(contacts, json, MD_KEY_REGISTRATION, MD_KEY_CONTACT, NULL);
}
rv = acct_make(&acct, p, ca_url, contacts);
if (APR_SUCCESS != rv) goto leave;
acct->status = status;
acct->url = url;
acct->agreement = md_json_gets(json, MD_KEY_AGREEMENT, NULL);
if (!acct->agreement) {
/* backward compatible check */
acct->agreement = md_json_gets(json, "terms-of-service", NULL);
}
acct->orders = md_json_gets(json, MD_KEY_ORDERS, NULL);
if (md_json_has_key(json, MD_KEY_EAB, MD_KEY_KID, NULL)
&& md_json_has_key(json, MD_KEY_EAB, MD_KEY_HMAC, NULL)) {
acct->eab_kid = md_json_gets(json, MD_KEY_EAB, MD_KEY_KID, NULL);
acct->eab_hmac = md_json_gets(json, MD_KEY_EAB, MD_KEY_HMAC, NULL);
}
leave:
*pacct = (APR_SUCCESS == rv)? acct : NULL;
return rv;
}
apr_status_t md_acme_acct_save(md_store_t *store, apr_pool_t *p, md_acme_t *acme,
const char **pid, md_acme_acct_t *acct, md_pkey_t *acct_key)
{
md_json_t *jacct;
apr_status_t rv;
int i;
const char *id = pid? *pid : NULL;
jacct = md_acme_acct_to_json(acct, p);
if (id) {
rv = md_store_save(store, p, MD_SG_ACCOUNTS, id, MD_FN_ACCOUNT, MD_SV_JSON, jacct, 0);
}
else {
rv = APR_EAGAIN;
for (i = 0; i < 1000 && APR_SUCCESS != rv; ++i) {
id = mk_acct_id(p, acme, i);
rv = md_store_save(store, p, MD_SG_ACCOUNTS, id, MD_FN_ACCOUNT, MD_SV_JSON, jacct, 1);
}
}
if (APR_SUCCESS == rv) {
if (pid) *pid = id;
rv = md_store_save(store, p, MD_SG_ACCOUNTS, id, MD_FN_ACCT_KEY, MD_SV_PKEY, acct_key, 0);
}
return rv;
}
apr_status_t md_acme_acct_load(md_acme_acct_t **pacct, md_pkey_t **ppkey,
md_store_t *store, md_store_group_t group,
const char *name, apr_pool_t *p)
{
md_json_t *json;
apr_status_t rv;
rv = md_store_load_json(store, group, name, MD_FN_ACCOUNT, &json, p);
if (APR_STATUS_IS_ENOENT(rv)) {
goto out;
}
if (APR_SUCCESS != rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p, "error reading account: %s", name);
goto out;
}
rv = md_acme_acct_from_json(pacct, json, p);
if (APR_SUCCESS == rv) {
rv = md_store_load(store, group, name, MD_FN_ACCT_KEY, MD_SV_PKEY, (void**)ppkey, p);
if (APR_SUCCESS != rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p, "loading key: %s", name);
goto out;
}
}
out:
if (APR_SUCCESS != rv) {
*pacct = NULL;
*ppkey = NULL;
}
return rv;
}
/**************************************************************************************************/
/* Lookup */
int md_acme_acct_matches_url(md_acme_acct_t *acct, const char *url)
{
/* The ACME url must match exactly */
if (!url || !acct->ca_url || strcmp(acct->ca_url, url)) return 0;
return 1;
}
int md_acme_acct_matches_md(md_acme_acct_t *acct, const md_t *md)
{
if (!md_acme_acct_matches_url(acct, md->ca_effective)) return 0;
/* if eab values are not mentioned, we match an account regardless
* if it was registered with eab or not */
if (!md->ca_eab_kid || !md->ca_eab_hmac) {
/* No eab only acceptable when no eab is asked for.
* This prevents someone that has no external account binding
* to re-use an account from another MDomain that was created
* with a binding. */
return !acct->eab_kid || !acct->eab_hmac;
}
/* But of eab is asked for, we need an acct that matches exactly.
* When someone configures a new EAB and we need
* to created a new account for it. */
if (!acct->eab_kid || !acct->eab_hmac) return 0;
return !strcmp(acct->eab_kid, md->ca_eab_kid)
&& !strcmp(acct->eab_hmac, md->ca_eab_hmac);
}
typedef struct {
apr_pool_t *p;
const md_t *md;
const char *id;
} find_ctx;
static int find_acct(void *baton, const char *name, const char *aspect,
md_store_vtype_t vtype, void *value, apr_pool_t *ptemp)
{
find_ctx *ctx = baton;
md_acme_acct_t *acct;
apr_status_t rv;
(void)aspect;
(void)ptemp;
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, ctx->p, "account candidate %s/%s", name, aspect);
if (MD_SV_JSON == vtype) {
rv = md_acme_acct_from_json(&acct, (md_json_t*)value, ptemp);
if (APR_SUCCESS != rv) goto cleanup;
if (MD_ACME_ACCT_ST_VALID == acct->status
&& (!ctx->md || md_acme_acct_matches_md(acct, ctx->md))) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, ctx->p,
"found account %s for %s: %s, status=%d",
acct->id, ctx->md->ca_effective, aspect, acct->status);
ctx->id = apr_pstrdup(ctx->p, name);
return 0;
}
}
cleanup:
return 1;
}
static apr_status_t acct_find(const char **pid, md_acme_acct_t **pacct, md_pkey_t **ppkey,
md_store_t *store, md_store_group_t group,
const char *name_pattern,
const md_t *md, apr_pool_t *p)
{
apr_status_t rv;
find_ctx ctx;
memset(&ctx, 0, sizeof(ctx));
ctx.p = p;
ctx.md = md;
rv = md_store_iter(find_acct, &ctx, store, p, group, name_pattern, MD_FN_ACCOUNT, MD_SV_JSON);
if (ctx.id) {
*pid = ctx.id;
rv = md_acme_acct_load(pacct, ppkey, store, group, ctx.id, p);
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p, "acct_find: got account %s", ctx.id);
}
else {
*pacct = NULL;
rv = APR_ENOENT;
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, 0, p, "acct_find: none found");
}
return rv;
}
static apr_status_t acct_find_and_verify(md_store_t *store, md_store_group_t group,
const char *name_pattern,
md_acme_t *acme, const md_t *md,
apr_pool_t *p)
{
md_acme_acct_t *acct;
md_pkey_t *pkey;
const char *id;
apr_status_t rv;
rv = acct_find(&id, &acct, &pkey, store, group, name_pattern, md, p);
if (APR_SUCCESS == rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, 0, p, "acct_find_and_verify: found %s",
id);
acme->acct_id = (MD_SG_STAGING == group)? NULL : id;
acme->acct = acct;
acme->acct_key = pkey;
rv = md_acme_acct_validate(acme, (MD_SG_STAGING == group)? NULL : store, p);
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, rv, p, "acct_find_and_verify: verified %s",
id);
if (APR_SUCCESS != rv) {
acme->acct_id = NULL;
acme->acct = NULL;
acme->acct_key = NULL;
if (APR_STATUS_IS_ENOENT(rv)) {
/* verification failed and account has been disabled.
Indicate to caller that he may try again. */
rv = APR_EAGAIN;
}
}
}
return rv;
}
apr_status_t md_acme_find_acct_for_md(md_acme_t *acme, md_store_t *store, const md_t *md)
{
apr_status_t rv;
while (APR_EAGAIN == (rv = acct_find_and_verify(store, MD_SG_ACCOUNTS,
mk_acct_pattern(acme->p, acme),
acme, md, acme->p))) {
/* nop */
}
if (APR_STATUS_IS_ENOENT(rv)) {
/* No suitable account found in MD_SG_ACCOUNTS. Maybe a new account
* can already be found in MD_SG_STAGING? */
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, acme->p,
"no account found, looking in STAGING");
rv = acct_find_and_verify(store, MD_SG_STAGING, "*", acme, md, acme->p);
if (APR_EAGAIN == rv) {
rv = APR_ENOENT;
}
}
return rv;
}
apr_status_t md_acme_acct_id_for_md(const char **pid, md_store_t *store,
md_store_group_t group, const md_t *md,
apr_pool_t *p)
{
apr_status_t rv;
find_ctx ctx;
memset(&ctx, 0, sizeof(ctx));
ctx.p = p;
ctx.md = md;
rv = md_store_iter(find_acct, &ctx, store, p, group, "*", MD_FN_ACCOUNT, MD_SV_JSON);
if (ctx.id) {
*pid = ctx.id;
rv = APR_SUCCESS;
}
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p, "acct_id_for_md %s -> %s", md->name, *pid);
return rv;
}
/**************************************************************************************************/
/* acct operation context */
typedef struct {
md_acme_t *acme;
apr_pool_t *p;
const char *agreement;
const char *eab_kid;
const char *eab_hmac;
} acct_ctx_t;
/**************************************************************************************************/
/* acct update */
static apr_status_t on_init_acct_upd(md_acme_req_t *req, void *baton)
{
(void)baton;
return md_acme_req_body_init(req, NULL);
}
static apr_status_t acct_upd(md_acme_t *acme, apr_pool_t *p,
const apr_table_t *hdrs, md_json_t *body, void *baton)
{
acct_ctx_t *ctx = baton;
apr_status_t rv = APR_SUCCESS;
md_acme_acct_t *acct = acme->acct;
if (md_log_is_level(p, MD_LOG_TRACE2)) {
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE2, 0, acme->p, "acct update response: %s",
md_json_writep(body, p, MD_JSON_FMT_COMPACT));
}
if (!acct->url) {
const char *location = apr_table_get(hdrs, "location");
if (!location) {
md_log_perror(MD_LOG_MARK, MD_LOG_WARNING, APR_EINVAL, p, "new acct without location");
return APR_EINVAL;
}
acct->url = apr_pstrdup(ctx->p, location);
}
apr_array_clear(acct->contacts);
md_json_dupsa(acct->contacts, acme->p, body, MD_KEY_CONTACT, NULL);
if (md_json_has_key(body, MD_KEY_STATUS, NULL)) {
acct->status = acct_st_from_str(md_json_gets(body, MD_KEY_STATUS, NULL));
}
if (md_json_has_key(body, MD_KEY_AGREEMENT, NULL)) {
acct->agreement = md_json_dups(acme->p, body, MD_KEY_AGREEMENT, NULL);
}
if (md_json_has_key(body, MD_KEY_ORDERS, NULL)) {
acct->orders = md_json_dups(acme->p, body, MD_KEY_ORDERS, NULL);
}
if (ctx->eab_kid && ctx->eab_hmac) {
acct->eab_kid = ctx->eab_kid;
acct->eab_hmac = ctx->eab_hmac;
}
acct->registration = md_json_clone(ctx->p, body);
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p, "updated acct %s", acct->url);
return rv;
}
apr_status_t md_acme_acct_update(md_acme_t *acme)
{
acct_ctx_t ctx;
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, acme->p, "acct update");
if (!acme->acct) {
return APR_EINVAL;
}
memset(&ctx, 0, sizeof(ctx));
ctx.acme = acme;
ctx.p = acme->p;
return md_acme_POST(acme, acme->acct->url, on_init_acct_upd, acct_upd, NULL, NULL, &ctx);
}
apr_status_t md_acme_acct_validate(md_acme_t *acme, md_store_t *store, apr_pool_t *p)
{
apr_status_t rv;
if (APR_SUCCESS != (rv = md_acme_acct_update(acme))) {
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, rv, acme->p,
"acct update failed for %s", acme->acct->url);
if (APR_EINVAL == rv && (acme->acct->agreement || !acme->ca_agreement)) {
/* Sadly, some proprietary ACME servers choke on empty POSTs
* on accounts. Try a faked ToS agreement. */
md_log_perror(MD_LOG_MARK, MD_LOG_TRACE1, rv, acme->p,
"trying acct update via ToS agreement");
rv = md_acme_agree(acme, p, "accepted");
}
if (acme->acct && (APR_ENOENT == rv || APR_EACCES == rv || APR_EINVAL == rv)) {
if (MD_ACME_ACCT_ST_VALID == acme->acct->status) {
acme->acct->status = MD_ACME_ACCT_ST_UNKNOWN;
if (store) {
md_acme_acct_save(store, p, acme, &acme->acct_id, acme->acct, acme->acct_key);
}
}
acme->acct = NULL;
acme->acct_key = NULL;
rv = APR_ENOENT;
}
}
return rv;
}
/**************************************************************************************************/
/* Register a new account */
static apr_status_t get_eab(md_json_t **peab, md_acme_req_t *req, const char *kid,
const char *hmac64, md_pkey_t *account_key,
const char *url)
{
md_json_t *eab, *prot_fields, *jwk;
md_data_t payload, hmac_key;
apr_status_t rv;
prot_fields = md_json_create(req->p);
md_json_sets(url, prot_fields, "url", NULL);
md_json_sets(kid, prot_fields, "kid", NULL);
rv = md_jws_get_jwk(&jwk, req->p, account_key);
if (APR_SUCCESS != rv) goto cleanup;
md_data_null(&payload);
payload.data = md_json_writep(jwk, req->p, MD_JSON_FMT_COMPACT);
if (!payload.data) {
rv = APR_EINVAL;
goto cleanup;
}
payload.len = strlen(payload.data);
md_util_base64url_decode(&hmac_key, hmac64, req->p);
if (!hmac_key.len) {
rv = APR_EINVAL;
md_result_problem_set(req->result, rv, "apache:eab-hmac-invalid",
"external account binding HMAC value is not valid base64", NULL);
goto cleanup;
}
rv = md_jws_hmac(&eab, req->p, &payload, prot_fields, &hmac_key);
if (APR_SUCCESS != rv) {
md_result_problem_set(req->result, rv, "apache:eab-hmac-fail",
"external account binding MAC could not be computed", NULL);
}
cleanup:
*peab = (APR_SUCCESS == rv)? eab : NULL;
return rv;
}
static apr_status_t on_init_acct_new(md_acme_req_t *req, void *baton)
{
acct_ctx_t *ctx = baton;
md_json_t *jpayload, *jeab;
apr_status_t rv;
jpayload = md_json_create(req->p);
md_json_setsa(ctx->acme->acct->contacts, jpayload, MD_KEY_CONTACT, NULL);
if (ctx->agreement) {
md_json_setb(1, jpayload, "termsOfServiceAgreed", NULL);
}
if (ctx->eab_kid && ctx->eab_hmac) {
rv = get_eab(&jeab, req, ctx->eab_kid, ctx->eab_hmac,
req->acme->acct_key, req->url);
if (APR_SUCCESS != rv) goto cleanup;
md_json_setj(jeab, jpayload, "externalAccountBinding", NULL);
}
rv = md_acme_req_body_init(req, jpayload);
cleanup:
return rv;
}
apr_status_t md_acme_acct_register(md_acme_t *acme, md_store_t *store,
const md_t *md, apr_pool_t *p)
{
apr_status_t rv;
md_pkey_t *pkey;
const char *err = NULL, *uri;
md_pkey_spec_t spec;
int i;
acct_ctx_t ctx;
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, p, "create new account");
memset(&ctx, 0, sizeof(ctx));
ctx.acme = acme;
ctx.p = p;
/* The agreement URL is submitted when the ACME server announces Terms-of-Service
* in its directory meta data. The magic value "accepted" will always use the
* advertised URL. */
ctx.agreement = NULL;
if (acme->ca_agreement && md->ca_agreement) {
ctx.agreement = !strcmp("accepted", md->ca_agreement)?
acme->ca_agreement : md->ca_agreement;
}
if (ctx.agreement) {
if (APR_SUCCESS != (rv = md_util_abs_uri_check(acme->p, ctx.agreement, &err))) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, 0, p,
"invalid agreement uri (%s): %s", err, ctx.agreement);
goto out;
}
}
ctx.eab_kid = md->ca_eab_kid;
ctx.eab_hmac = md->ca_eab_hmac;
for (i = 0; i < md->contacts->nelts; ++i) {
uri = APR_ARRAY_IDX(md->contacts, i, const char *);
if (APR_SUCCESS != (rv = md_util_abs_uri_check(acme->p, uri, &err))) {
md_log_perror(MD_LOG_MARK, MD_LOG_ERR, 0, p,
"invalid contact uri (%s): %s", err, uri);
goto out;
}
}
/* If there is no key selected yet, try to find an existing one for the same host.
* Let's Encrypt identifies accounts by their key for their ACMEv1 and v2 services.
* Although the account appears on both services with different urls, it is
* internally the same one.
* I think this is beneficial if someone migrates from ACMEv1 to v2 and not a leak
* of identifying information.
*/
if (!acme->acct_key) {
find_ctx fctx;
memset(&fctx, 0, sizeof(fctx));
fctx.p = p;
fctx.md = md;
md_store_iter(find_acct, &fctx, store, p, MD_SG_ACCOUNTS,
mk_acct_pattern(p, acme), MD_FN_ACCOUNT, MD_SV_JSON);
if (fctx.id) {
rv = md_store_load(store, MD_SG_ACCOUNTS, fctx.id, MD_FN_ACCT_KEY, MD_SV_PKEY,
(void**)&acme->acct_key, p);
if (APR_SUCCESS == rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p,
"reusing key from account %s", fctx.id);
}
else {
acme->acct_key = NULL;
}
}
}
/* If we still have no key, generate a new one */
if (!acme->acct_key) {
spec.type = MD_PKEY_TYPE_RSA;
spec.params.rsa.bits = MD_ACME_ACCT_PKEY_BITS;
if (APR_SUCCESS != (rv = md_pkey_gen(&pkey, acme->p, &spec))) goto out;
acme->acct_key = pkey;
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, rv, p, "created new account key");
}
if (APR_SUCCESS != (rv = acct_make(&acme->acct, p, acme->url, md->contacts))) goto out;
rv = md_acme_POST_new_account(acme, on_init_acct_new, acct_upd, NULL, NULL, &ctx);
if (APR_SUCCESS == rv) {
md_log_perror(MD_LOG_MARK, MD_LOG_INFO, 0, p,
"registered new account %s", acme->acct->url);
}
out:
if (APR_SUCCESS != rv && acme->acct) {
acme->acct = NULL;
}
return rv;
}
/**************************************************************************************************/
/* Deactivate the account */
static apr_status_t on_init_acct_del(md_acme_req_t *req, void *baton)
{
md_json_t *jpayload;
(void)baton;
jpayload = md_json_create(req->p);
md_json_sets("deactivated", jpayload, MD_KEY_STATUS, NULL);
return md_acme_req_body_init(req, jpayload);
}
apr_status_t md_acme_acct_deactivate(md_acme_t *acme, apr_pool_t *p)
{
md_acme_acct_t *acct = acme->acct;
acct_ctx_t ctx;
(void)p;
if (!acct) {
return APR_EINVAL;
}
md_log_perror(MD_LOG_MARK, MD_LOG_DEBUG, 0, acme->p, "delete account %s from %s",
acct->url, acct->ca_url);
memset(&ctx, 0, sizeof(ctx));
ctx.acme = acme;
ctx.p = p;
return md_acme_POST(acme, acct->url, on_init_acct_del, acct_upd, NULL, NULL, &ctx);
}
/**************************************************************************************************/
/* terms-of-service */
static apr_status_t on_init_agree_tos(md_acme_req_t *req, void *baton)
{
acct_ctx_t *ctx = baton;
md_json_t *jpayload;
jpayload = md_json_create(req->p);
if (ctx->acme->acct->agreement) {
md_json_setb(1, jpayload, "termsOfServiceAgreed", NULL);
}
return md_acme_req_body_init(req, jpayload);
}
apr_status_t md_acme_agree(md_acme_t *acme, apr_pool_t *p, const char *agreement)
{
acct_ctx_t ctx;
acme->acct->agreement = agreement;
if (!strcmp("accepted", agreement) && acme->ca_agreement) {
acme->acct->agreement = acme->ca_agreement;
}
memset(&ctx, 0, sizeof(ctx));
ctx.acme = acme;
ctx.p = p;
return md_acme_POST(acme, acme->acct->url, on_init_agree_tos, acct_upd, NULL, NULL, &ctx);
}
apr_status_t md_acme_check_agreement(md_acme_t *acme, apr_pool_t *p,
const char *agreement, const char **prequired)
{
apr_status_t rv = APR_SUCCESS;
/* We used to really check if the account agreement and the one indicated in meta
* are the very same. However, LE is happy if the account has agreed to a ToS in
* the past and does not require a renewed acceptance.
*/
*prequired = NULL;
if (!acme->acct->agreement && acme->ca_agreement) {
if (agreement) {
rv = md_acme_agree(acme, p, acme->ca_agreement);
}
else {
*prequired = acme->ca_agreement;
rv = APR_INCOMPLETE;
}
}
return rv;
}