# -*- coding: utf-8 -*- # Copyright 2019 New Vector Ltd # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import logging import attr from zope.interface import implementer import twisted import twisted.internet.error from twisted.internet import defer from twisted.python.filepath import FilePath from twisted.python.url import URL from twisted.web import server, static from twisted.web.resource import Resource from synapse.app import check_bind_error from synapse.crypto.context_factory import ClientTLSOptionsFactory from synapse.http.federation.matrix_federation_agent import MatrixFederationAgent logger = logging.getLogger(__name__) try: from txacme.interfaces import ICertificateStore @attr.s @implementer(ICertificateStore) class ErsatzStore(object): """ A store that only stores in memory. """ certs = attr.ib(default=attr.Factory(dict)) def store(self, server_name, pem_objects): self.certs[server_name] = [o.as_bytes() for o in pem_objects] return defer.succeed(None) except ImportError: # txacme is missing pass class AcmeHandler(object): def __init__(self, hs): self.hs = hs self.reactor = hs.get_reactor() @defer.inlineCallbacks def start_listening(self): # Configure logging for txacme, if you need to debug # from eliot import add_destinations # from eliot.twisted import TwistedDestination # # add_destinations(TwistedDestination()) from txacme.challenges import HTTP01Responder from txacme.service import AcmeIssuingService from txacme.endpoint import load_or_create_client_key from txacme.client import Client from josepy.jwa import RS256 self._store = ErsatzStore() responder = HTTP01Responder() self._issuer = AcmeIssuingService( cert_store=self._store, client_creator=( lambda: Client.from_url( reactor=self.reactor, url=URL.from_text(self.hs.config.acme_url), key=load_or_create_client_key( FilePath(self.hs.config.config_dir_path) ), alg=RS256, ) ), clock=self.reactor, responders=[responder], ) well_known = Resource() well_known.putChild(b'acme-challenge', responder.resource) responder_resource = Resource() responder_resource.putChild(b'.well-known', well_known) responder_resource.putChild(b'check', static.Data(b'OK', b'text/plain')) srv = server.Site(responder_resource) bind_addresses = self.hs.config.acme_bind_addresses for host in bind_addresses: logger.info( "Listening for ACME requests on %s:%i", host, self.hs.config.acme_port, ) try: self.reactor.listenTCP( self.hs.config.acme_port, srv, interface=host, ) except twisted.internet.error.CannotListenError as e: check_bind_error(e, host, bind_addresses) # Make sure we are registered to the ACME server. There's no public API # for this, it is usually triggered by startService, but since we don't # want it to control where we save the certificates, we have to reach in # and trigger the registration machinery ourselves. self._issuer._registered = False yield self._issuer._ensure_registered() @defer.inlineCallbacks def provision_certificate(self): # Retrieve .well-known if it's in use. We do so through the federation # agent, because that's where the .well-known logic lives. agent = MatrixFederationAgent( tls_client_options_factory=ClientTLSOptionsFactory(None), reactor=self.reactor, ) delegated = yield agent._get_well_known(bytes(self.hs.hostname,"ascii")) # If .well-known is in use, use the delegated hostname instead of the # homeserver's server_name. if delegated: cert_name = delegated.decode("ascii") logger.info(".well-known is in use, provisionning %s instead of %s", cert_name, self.hs.hostname) else: cert_name = self.hs.hostname logger.warning("Reprovisioning %s", cert_name) try: yield self._issuer.issue_cert(cert_name) except Exception: logger.exception("Fail!") raise logger.warning("Reprovisioned %s, saving.", cert_name) cert_chain = self._store.certs[cert_name] try: with open(self.hs.config.tls_private_key_file, "wb") as private_key_file: for x in cert_chain: if x.startswith(b"-----BEGIN RSA PRIVATE KEY-----"): private_key_file.write(x) with open(self.hs.config.tls_certificate_file, "wb") as certificate_file: for x in cert_chain: if x.startswith(b"-----BEGIN CERTIFICATE-----"): certificate_file.write(x) except Exception: logger.exception("Failed saving!") raise defer.returnValue(True)