mirror of
				https://github.com/go-gitea/gitea
				synced 2025-10-26 17:08:25 +00:00 
			
		
		
		
	* Migrate to go modules * make vendor * Update mvdan.cc/xurls * make vendor * Update code.gitea.io/git * make fmt-check * Update github.com/go-sql-driver/mysql * make vendor
		
			
				
	
	
		
			142 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			142 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2016 The Go Authors. All rights reserved.
 | |
| // Use of this source code is governed by a BSD-style
 | |
| // license that can be found in the LICENSE file.
 | |
| 
 | |
| package autocert
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"crypto"
 | |
| 	"sync"
 | |
| 	"time"
 | |
| )
 | |
| 
 | |
| // renewJitter is the maximum deviation from Manager.RenewBefore.
 | |
| const renewJitter = time.Hour
 | |
| 
 | |
| // domainRenewal tracks the state used by the periodic timers
 | |
| // renewing a single domain's cert.
 | |
| type domainRenewal struct {
 | |
| 	m   *Manager
 | |
| 	ck  certKey
 | |
| 	key crypto.Signer
 | |
| 
 | |
| 	timerMu sync.Mutex
 | |
| 	timer   *time.Timer
 | |
| }
 | |
| 
 | |
| // start starts a cert renewal timer at the time
 | |
| // defined by the certificate expiration time exp.
 | |
| //
 | |
| // If the timer is already started, calling start is a noop.
 | |
| func (dr *domainRenewal) start(exp time.Time) {
 | |
| 	dr.timerMu.Lock()
 | |
| 	defer dr.timerMu.Unlock()
 | |
| 	if dr.timer != nil {
 | |
| 		return
 | |
| 	}
 | |
| 	dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
 | |
| }
 | |
| 
 | |
| // stop stops the cert renewal timer.
 | |
| // If the timer is already stopped, calling stop is a noop.
 | |
| func (dr *domainRenewal) stop() {
 | |
| 	dr.timerMu.Lock()
 | |
| 	defer dr.timerMu.Unlock()
 | |
| 	if dr.timer == nil {
 | |
| 		return
 | |
| 	}
 | |
| 	dr.timer.Stop()
 | |
| 	dr.timer = nil
 | |
| }
 | |
| 
 | |
| // renew is called periodically by a timer.
 | |
| // The first renew call is kicked off by dr.start.
 | |
| func (dr *domainRenewal) renew() {
 | |
| 	dr.timerMu.Lock()
 | |
| 	defer dr.timerMu.Unlock()
 | |
| 	if dr.timer == nil {
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	ctx, cancel := context.WithTimeout(context.Background(), 10*time.Minute)
 | |
| 	defer cancel()
 | |
| 	// TODO: rotate dr.key at some point?
 | |
| 	next, err := dr.do(ctx)
 | |
| 	if err != nil {
 | |
| 		next = renewJitter / 2
 | |
| 		next += time.Duration(pseudoRand.int63n(int64(next)))
 | |
| 	}
 | |
| 	dr.timer = time.AfterFunc(next, dr.renew)
 | |
| 	testDidRenewLoop(next, err)
 | |
| }
 | |
| 
 | |
| // updateState locks and replaces the relevant Manager.state item with the given
 | |
| // state. It additionally updates dr.key with the given state's key.
 | |
| func (dr *domainRenewal) updateState(state *certState) {
 | |
| 	dr.m.stateMu.Lock()
 | |
| 	defer dr.m.stateMu.Unlock()
 | |
| 	dr.key = state.key
 | |
| 	dr.m.state[dr.ck] = state
 | |
| }
 | |
| 
 | |
| // do is similar to Manager.createCert but it doesn't lock a Manager.state item.
 | |
| // Instead, it requests a new certificate independently and, upon success,
 | |
| // replaces dr.m.state item with a new one and updates cache for the given domain.
 | |
| //
 | |
| // It may lock and update the Manager.state if the expiration date of the currently
 | |
| // cached cert is far enough in the future.
 | |
| //
 | |
| // The returned value is a time interval after which the renewal should occur again.
 | |
| func (dr *domainRenewal) do(ctx context.Context) (time.Duration, error) {
 | |
| 	// a race is likely unavoidable in a distributed environment
 | |
| 	// but we try nonetheless
 | |
| 	if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
 | |
| 		next := dr.next(tlscert.Leaf.NotAfter)
 | |
| 		if next > dr.m.renewBefore()+renewJitter {
 | |
| 			signer, ok := tlscert.PrivateKey.(crypto.Signer)
 | |
| 			if ok {
 | |
| 				state := &certState{
 | |
| 					key:  signer,
 | |
| 					cert: tlscert.Certificate,
 | |
| 					leaf: tlscert.Leaf,
 | |
| 				}
 | |
| 				dr.updateState(state)
 | |
| 				return next, nil
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
 | |
| 	if err != nil {
 | |
| 		return 0, err
 | |
| 	}
 | |
| 	state := &certState{
 | |
| 		key:  dr.key,
 | |
| 		cert: der,
 | |
| 		leaf: leaf,
 | |
| 	}
 | |
| 	tlscert, err := state.tlscert()
 | |
| 	if err != nil {
 | |
| 		return 0, err
 | |
| 	}
 | |
| 	if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
 | |
| 		return 0, err
 | |
| 	}
 | |
| 	dr.updateState(state)
 | |
| 	return dr.next(leaf.NotAfter), nil
 | |
| }
 | |
| 
 | |
| func (dr *domainRenewal) next(expiry time.Time) time.Duration {
 | |
| 	d := expiry.Sub(dr.m.now()) - dr.m.renewBefore()
 | |
| 	// add a bit of randomness to renew deadline
 | |
| 	n := pseudoRand.int63n(int64(renewJitter))
 | |
| 	d -= time.Duration(n)
 | |
| 	if d < 0 {
 | |
| 		return 0
 | |
| 	}
 | |
| 	return d
 | |
| }
 | |
| 
 | |
| var testDidRenewLoop = func(next time.Duration, err error) {}
 |