2016-11-28 18:20:19 +07:00
|
|
|
//+build !test
|
|
|
|
|
2016-11-11 21:48:00 +07:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2017-11-15 04:54:29 +07:00
|
|
|
"crypto/tls"
|
2018-09-21 17:38:23 +07:00
|
|
|
"flag"
|
2017-11-15 04:54:29 +07:00
|
|
|
stdlog "log"
|
|
|
|
"net/http"
|
2016-11-11 21:48:00 +07:00
|
|
|
"os"
|
2018-12-13 17:19:10 +07:00
|
|
|
"strings"
|
2018-08-13 00:06:54 +07:00
|
|
|
"syscall"
|
2017-01-30 17:19:22 +07:00
|
|
|
|
2017-11-15 04:54:29 +07:00
|
|
|
"github.com/julienschmidt/httprouter"
|
2018-10-31 05:54:51 +07:00
|
|
|
"github.com/miekg/dns"
|
2017-11-15 04:54:29 +07:00
|
|
|
"github.com/rs/cors"
|
2017-08-02 23:25:27 +07:00
|
|
|
log "github.com/sirupsen/logrus"
|
2017-11-15 04:54:29 +07:00
|
|
|
"golang.org/x/crypto/acme/autocert"
|
2016-11-11 21:48:00 +07:00
|
|
|
)
|
|
|
|
|
|
|
|
func main() {
|
2018-08-13 00:06:54 +07:00
|
|
|
// Created files are not world writable
|
|
|
|
syscall.Umask(0077)
|
2018-09-21 17:38:23 +07:00
|
|
|
configPtr := flag.String("c", "/etc/acme-dns/config.cfg", "config file location")
|
|
|
|
flag.Parse()
|
2016-11-13 19:50:44 +07:00
|
|
|
// Read global config
|
2018-08-12 22:49:17 +07:00
|
|
|
var err error
|
2018-09-21 17:38:23 +07:00
|
|
|
if fileIsAccessible(*configPtr) {
|
|
|
|
log.WithFields(log.Fields{"file": *configPtr}).Info("Using config file")
|
|
|
|
Config, err = readConfig(*configPtr)
|
2018-08-12 22:49:17 +07:00
|
|
|
} else if fileIsAccessible("./config.cfg") {
|
2017-11-15 04:54:29 +07:00
|
|
|
log.WithFields(log.Fields{"file": "./config.cfg"}).Info("Using config file")
|
2018-08-12 22:49:17 +07:00
|
|
|
Config, err = readConfig("./config.cfg")
|
|
|
|
} else {
|
|
|
|
log.Errorf("Configuration file not found.")
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Encountered an error while trying to read configuration file: %s", err)
|
|
|
|
os.Exit(1)
|
2017-11-14 05:42:30 +07:00
|
|
|
}
|
2016-11-23 22:11:31 +07:00
|
|
|
|
2017-11-14 05:42:30 +07:00
|
|
|
setupLogging(Config.Logconfig.Format, Config.Logconfig.Level)
|
2016-11-13 19:50:44 +07:00
|
|
|
|
|
|
|
// Read the default records in
|
2017-11-14 05:42:30 +07:00
|
|
|
RR.Parse(Config.General)
|
2016-11-11 21:48:00 +07:00
|
|
|
|
|
|
|
// Open database
|
2016-11-28 04:21:46 +07:00
|
|
|
newDB := new(acmedb)
|
2018-08-12 22:49:17 +07:00
|
|
|
err = newDB.Init(Config.Database.Engine, Config.Database.Connection)
|
2016-11-11 21:48:00 +07:00
|
|
|
if err != nil {
|
|
|
|
log.Errorf("Could not open database [%v]", err)
|
|
|
|
os.Exit(1)
|
2018-01-22 14:53:07 +07:00
|
|
|
} else {
|
|
|
|
log.Info("Connected to database")
|
2016-11-11 21:48:00 +07:00
|
|
|
}
|
2016-11-28 04:21:46 +07:00
|
|
|
DB = newDB
|
|
|
|
defer DB.Close()
|
2016-11-11 21:48:00 +07:00
|
|
|
|
2018-10-31 05:54:51 +07:00
|
|
|
// Error channel for servers
|
|
|
|
errChan := make(chan error, 1)
|
|
|
|
|
2016-11-28 02:21:38 +07:00
|
|
|
// DNS server
|
2018-12-13 17:19:10 +07:00
|
|
|
if strings.HasPrefix(Config.General.Proto, "both") {
|
|
|
|
// Handle the case where DNS server should be started for both udp and tcp
|
|
|
|
udpProto := "udp"
|
|
|
|
tcpProto := "tcp"
|
|
|
|
if strings.HasSuffix(Config.General.Proto, "4") {
|
|
|
|
udpProto += "4"
|
|
|
|
tcpProto += "4"
|
|
|
|
} else if strings.HasSuffix(Config.General.Proto, "6") {
|
|
|
|
udpProto += "6"
|
|
|
|
tcpProto += "6"
|
|
|
|
}
|
|
|
|
dnsServerUDP := setupDNSServer(udpProto)
|
|
|
|
dnsServerTCP := setupDNSServer(tcpProto)
|
|
|
|
go startDNS(dnsServerUDP, errChan)
|
|
|
|
go startDNS(dnsServerTCP, errChan)
|
|
|
|
} else {
|
|
|
|
dnsServer := setupDNSServer(Config.General.Proto)
|
|
|
|
go startDNS(dnsServer, errChan)
|
|
|
|
}
|
2016-11-11 21:48:00 +07:00
|
|
|
|
2016-11-28 03:09:13 +07:00
|
|
|
// HTTP API
|
2018-10-31 05:54:51 +07:00
|
|
|
go startHTTPAPI(errChan)
|
2016-11-28 03:09:13 +07:00
|
|
|
|
2018-10-31 05:54:51 +07:00
|
|
|
// block waiting for error
|
|
|
|
select {
|
|
|
|
case err = <-errChan:
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
2016-11-11 21:48:00 +07:00
|
|
|
log.Debugf("Shutting down...")
|
|
|
|
}
|
2016-11-28 18:09:10 +07:00
|
|
|
|
2018-10-31 05:54:51 +07:00
|
|
|
func startDNS(server *dns.Server, errChan chan error) {
|
|
|
|
// DNS server part
|
|
|
|
dns.HandleFunc(".", handleRequest)
|
2018-12-13 17:19:10 +07:00
|
|
|
log.WithFields(log.Fields{"addr": Config.General.Listen, "proto": server.Net}).Info("Listening DNS")
|
2018-10-31 05:54:51 +07:00
|
|
|
err := server.ListenAndServe()
|
|
|
|
if err != nil {
|
|
|
|
errChan <- err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-13 17:19:10 +07:00
|
|
|
func setupDNSServer(proto string) *dns.Server {
|
|
|
|
return &dns.Server{Addr: Config.General.Listen, Net: proto}
|
2018-10-31 05:54:51 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
func startHTTPAPI(errChan chan error) {
|
2017-11-15 04:54:29 +07:00
|
|
|
// Setup http logger
|
|
|
|
logger := log.New()
|
|
|
|
logwriter := logger.Writer()
|
|
|
|
defer logwriter.Close()
|
|
|
|
api := httprouter.New()
|
|
|
|
c := cors.New(cors.Options{
|
2017-11-14 05:42:30 +07:00
|
|
|
AllowedOrigins: Config.API.CorsOrigins,
|
2016-11-28 18:09:10 +07:00
|
|
|
AllowedMethods: []string{"GET", "POST"},
|
|
|
|
OptionsPassthrough: false,
|
2017-11-14 05:42:30 +07:00
|
|
|
Debug: Config.General.Debug,
|
2017-11-15 04:54:29 +07:00
|
|
|
})
|
2017-11-16 02:35:35 +07:00
|
|
|
if Config.General.Debug {
|
|
|
|
// Logwriter for saner log output
|
|
|
|
c.Log = stdlog.New(logwriter, "", 0)
|
|
|
|
}
|
2018-03-15 04:35:39 +07:00
|
|
|
if !Config.API.DisableRegistration {
|
|
|
|
api.POST("/register", webRegisterPost)
|
|
|
|
}
|
2017-11-15 04:54:29 +07:00
|
|
|
api.POST("/update", Auth(webUpdatePost))
|
2019-01-26 00:22:53 +07:00
|
|
|
api.GET("/health", healthCheck)
|
2017-11-15 04:54:29 +07:00
|
|
|
|
|
|
|
host := Config.API.IP + ":" + Config.API.Port
|
|
|
|
|
|
|
|
cfg := &tls.Config{
|
|
|
|
MinVersion: tls.VersionTLS12,
|
|
|
|
}
|
2018-10-31 05:54:51 +07:00
|
|
|
var err error
|
2017-11-14 05:42:30 +07:00
|
|
|
switch Config.API.TLS {
|
2016-11-28 18:09:10 +07:00
|
|
|
case "letsencrypt":
|
2017-11-15 04:54:29 +07:00
|
|
|
m := autocert.Manager{
|
2018-05-14 17:42:39 +07:00
|
|
|
Cache: autocert.DirCache(Config.API.ACMECacheDir),
|
2017-11-15 04:54:29 +07:00
|
|
|
Prompt: autocert.AcceptTOS,
|
|
|
|
HostPolicy: autocert.HostWhitelist(Config.API.Domain),
|
|
|
|
}
|
2018-02-01 15:53:34 +07:00
|
|
|
autocerthost := Config.API.IP + ":" + Config.API.AutocertPort
|
|
|
|
log.WithFields(log.Fields{"autocerthost": autocerthost, "domain": Config.API.Domain}).Debug("Opening HTTP port for autocert")
|
|
|
|
go http.ListenAndServe(autocerthost, m.HTTPHandler(nil))
|
2017-11-15 04:54:29 +07:00
|
|
|
cfg.GetCertificate = m.GetCertificate
|
|
|
|
srv := &http.Server{
|
|
|
|
Addr: host,
|
|
|
|
Handler: c.Handler(api),
|
|
|
|
TLSConfig: cfg,
|
|
|
|
ErrorLog: stdlog.New(logwriter, "", 0),
|
|
|
|
}
|
2018-02-01 15:53:34 +07:00
|
|
|
log.WithFields(log.Fields{"host": host, "domain": Config.API.Domain}).Info("Listening HTTPS, using certificate from autocert")
|
2018-10-31 05:54:51 +07:00
|
|
|
err = srv.ListenAndServeTLS("", "")
|
2016-11-28 18:09:10 +07:00
|
|
|
case "cert":
|
2017-11-15 04:54:29 +07:00
|
|
|
srv := &http.Server{
|
|
|
|
Addr: host,
|
|
|
|
Handler: c.Handler(api),
|
|
|
|
TLSConfig: cfg,
|
|
|
|
ErrorLog: stdlog.New(logwriter, "", 0),
|
|
|
|
}
|
|
|
|
log.WithFields(log.Fields{"host": host}).Info("Listening HTTPS")
|
2018-10-31 05:54:51 +07:00
|
|
|
err = srv.ListenAndServeTLS(Config.API.TLSCertFullchain, Config.API.TLSCertPrivkey)
|
2016-11-28 18:09:10 +07:00
|
|
|
default:
|
2017-11-15 04:54:29 +07:00
|
|
|
log.WithFields(log.Fields{"host": host}).Info("Listening HTTP")
|
2018-10-31 05:54:51 +07:00
|
|
|
err = http.ListenAndServe(host, c.Handler(api))
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
errChan <- err
|
2016-11-28 18:09:10 +07:00
|
|
|
}
|
|
|
|
}
|