summaryrefslogtreecommitdiffstats
path: root/vendor/github.com/xenolf/lego/providers/http
diff options
context:
space:
mode:
Diffstat (limited to 'vendor/github.com/xenolf/lego/providers/http')
-rw-r--r--vendor/github.com/xenolf/lego/providers/http/webroot/webroot.go58
-rw-r--r--vendor/github.com/xenolf/lego/providers/http/webroot/webroot_test.go46
2 files changed, 104 insertions, 0 deletions
diff --git a/vendor/github.com/xenolf/lego/providers/http/webroot/webroot.go b/vendor/github.com/xenolf/lego/providers/http/webroot/webroot.go
new file mode 100644
index 000000000..4bf211f39
--- /dev/null
+++ b/vendor/github.com/xenolf/lego/providers/http/webroot/webroot.go
@@ -0,0 +1,58 @@
+// Package webroot implements a HTTP provider for solving the HTTP-01 challenge using web server's root path.
+package webroot
+
+import (
+ "fmt"
+ "io/ioutil"
+ "os"
+ "path"
+
+ "github.com/xenolf/lego/acme"
+)
+
+// HTTPProvider implements ChallengeProvider for `http-01` challenge
+type HTTPProvider struct {
+ path string
+}
+
+// NewHTTPProvider returns a HTTPProvider instance with a configured webroot path
+func NewHTTPProvider(path string) (*HTTPProvider, error) {
+ if _, err := os.Stat(path); os.IsNotExist(err) {
+ return nil, fmt.Errorf("Webroot path does not exist")
+ }
+
+ c := &HTTPProvider{
+ path: path,
+ }
+
+ return c, nil
+}
+
+// Present makes the token available at `HTTP01ChallengePath(token)` by creating a file in the given webroot path
+func (w *HTTPProvider) Present(domain, token, keyAuth string) error {
+ var err error
+
+ challengeFilePath := path.Join(w.path, acme.HTTP01ChallengePath(token))
+ err = os.MkdirAll(path.Dir(challengeFilePath), 0755)
+ if err != nil {
+ return fmt.Errorf("Could not create required directories in webroot for HTTP challenge -> %v", err)
+ }
+
+ err = ioutil.WriteFile(challengeFilePath, []byte(keyAuth), 0644)
+ if err != nil {
+ return fmt.Errorf("Could not write file in webroot for HTTP challenge -> %v", err)
+ }
+
+ return nil
+}
+
+// CleanUp removes the file created for the challenge
+func (w *HTTPProvider) CleanUp(domain, token, keyAuth string) error {
+ var err error
+ err = os.Remove(path.Join(w.path, acme.HTTP01ChallengePath(token)))
+ if err != nil {
+ return fmt.Errorf("Could not remove file in webroot after HTTP challenge -> %v", err)
+ }
+
+ return nil
+}
diff --git a/vendor/github.com/xenolf/lego/providers/http/webroot/webroot_test.go b/vendor/github.com/xenolf/lego/providers/http/webroot/webroot_test.go
new file mode 100644
index 000000000..99c930ed3
--- /dev/null
+++ b/vendor/github.com/xenolf/lego/providers/http/webroot/webroot_test.go
@@ -0,0 +1,46 @@
+package webroot
+
+import (
+ "io/ioutil"
+ "os"
+ "testing"
+)
+
+func TestHTTPProvider(t *testing.T) {
+ webroot := "webroot"
+ domain := "domain"
+ token := "token"
+ keyAuth := "keyAuth"
+ challengeFilePath := webroot + "/.well-known/acme-challenge/" + token
+
+ os.MkdirAll(webroot+"/.well-known/acme-challenge", 0777)
+ defer os.RemoveAll(webroot)
+
+ provider, err := NewHTTPProvider(webroot)
+ if err != nil {
+ t.Errorf("Webroot provider error: got %v, want nil", err)
+ }
+
+ err = provider.Present(domain, token, keyAuth)
+ if err != nil {
+ t.Errorf("Webroot provider present() error: got %v, want nil", err)
+ }
+
+ if _, err := os.Stat(challengeFilePath); os.IsNotExist(err) {
+ t.Error("Challenge file was not created in webroot")
+ }
+
+ data, err := ioutil.ReadFile(challengeFilePath)
+ if err != nil {
+ t.Errorf("Webroot provider ReadFile() error: got %v, want nil", err)
+ }
+ dataStr := string(data)
+ if dataStr != keyAuth {
+ t.Errorf("Challenge file content: got %q, want %q", dataStr, keyAuth)
+ }
+
+ err = provider.CleanUp(domain, token, keyAuth)
+ if err != nil {
+ t.Errorf("Webroot provider CleanUp() error: got %v, want nil", err)
+ }
+}