| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141 | // Copyright 2016 The Go Authors. All rights reserved.// Use of this source code is governed by a BSD-style// license that can be found in the LICENSE file.package autocertimport (	"context"	"crypto"	"sync"	"time")// renewJitter is the maximum deviation from Manager.RenewBefore.const renewJitter = time.Hour// domainRenewal tracks the state used by the periodic timers// renewing a single domain's cert.type domainRenewal struct {	m   *Manager	ck  certKey	key crypto.Signer	timerMu sync.Mutex	timer   *time.Timer}// start starts a cert renewal timer at the time// defined by the certificate expiration time exp.//// If the timer is already started, calling start is a noop.func (dr *domainRenewal) start(exp time.Time) {	dr.timerMu.Lock()	defer dr.timerMu.Unlock()	if dr.timer != nil {		return	}	dr.timer = time.AfterFunc(dr.next(exp), dr.renew)}// stop stops the cert renewal timer.// If the timer is already stopped, calling stop is a noop.func (dr *domainRenewal) stop() {	dr.timerMu.Lock()	defer dr.timerMu.Unlock()	if dr.timer == nil {		return	}	dr.timer.Stop()	dr.timer = nil}// renew is called periodically by a timer.// The first renew call is kicked off by dr.start.func (dr *domainRenewal) renew() {	dr.timerMu.Lock()	defer dr.timerMu.Unlock()	if dr.timer == nil {		return	}	ctx, cancel := context.WithTimeout(context.Background(), 10*time.Minute)	defer cancel()	// TODO: rotate dr.key at some point?	next, err := dr.do(ctx)	if err != nil {		next = renewJitter / 2		next += time.Duration(pseudoRand.int63n(int64(next)))	}	dr.timer = time.AfterFunc(next, dr.renew)	testDidRenewLoop(next, err)}// updateState locks and replaces the relevant Manager.state item with the given// state. It additionally updates dr.key with the given state's key.func (dr *domainRenewal) updateState(state *certState) {	dr.m.stateMu.Lock()	defer dr.m.stateMu.Unlock()	dr.key = state.key	dr.m.state[dr.ck] = state}// do is similar to Manager.createCert but it doesn't lock a Manager.state item.// Instead, it requests a new certificate independently and, upon success,// replaces dr.m.state item with a new one and updates cache for the given domain.//// It may lock and update the Manager.state if the expiration date of the currently// cached cert is far enough in the future.//// The returned value is a time interval after which the renewal should occur again.func (dr *domainRenewal) do(ctx context.Context) (time.Duration, error) {	// a race is likely unavoidable in a distributed environment	// but we try nonetheless	if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {		next := dr.next(tlscert.Leaf.NotAfter)		if next > dr.m.renewBefore()+renewJitter {			signer, ok := tlscert.PrivateKey.(crypto.Signer)			if ok {				state := &certState{					key:  signer,					cert: tlscert.Certificate,					leaf: tlscert.Leaf,				}				dr.updateState(state)				return next, nil			}		}	}	der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)	if err != nil {		return 0, err	}	state := &certState{		key:  dr.key,		cert: der,		leaf: leaf,	}	tlscert, err := state.tlscert()	if err != nil {		return 0, err	}	if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {		return 0, err	}	dr.updateState(state)	return dr.next(leaf.NotAfter), nil}func (dr *domainRenewal) next(expiry time.Time) time.Duration {	d := expiry.Sub(dr.m.now()) - dr.m.renewBefore()	// add a bit of randomness to renew deadline	n := pseudoRand.int63n(int64(renewJitter))	d -= time.Duration(n)	if d < 0 {		return 0	}	return d}var testDidRenewLoop = func(next time.Duration, err error) {}
 |