If server returns an auth with status valid it seems that client
needs to always skip it, CA can recycle authorizations, without
this change haproxy fails to obtain certificates in that case.
It is also something that is explicitly allowed and stated
in the dns-persist-01 draft RFC.

Note that it would be better to change how haproxy does status polling,
and implements the state machine, but that will take some thought
and time, this patch is a quick fix of the problem.

See:
https://github.com/letsencrypt/boulder/issues/2125
https://github.com/letsencrypt/pebble/issues/133
---
 include/haproxy/acme-t.h |  1 +
 src/acme.c               | 30 ++++++++++++++++++++++++++++++
 2 files changed, 31 insertions(+)

diff --git a/include/haproxy/acme-t.h b/include/haproxy/acme-t.h
index b26682dd0..e93b617c7 100644
--- a/include/haproxy/acme-t.h
+++ b/include/haproxy/acme-t.h
@@ -58,6 +58,7 @@ struct acme_auth {
        struct ist auth;   /* auth URI */
        struct ist chall;  /* challenge URI */
        struct ist token;  /* token */
+       int validated;     /* already validated */
        int ready;         /* is the challenge ready ? */
        void *next;
 };
diff --git a/src/acme.c b/src/acme.c
index b274dd2f8..911d468f8 100644
--- a/src/acme.c
+++ b/src/acme.c
@@ -1654,6 +1654,19 @@ int acme_res_auth(struct task *task, struct acme_ctx 
*ctx, struct acme_auth *aut
 
        auth->dns = istdup(ist2(t2->area, t2->data));
 
+       ret = mjson_get_string(hc->res.buf.area, hc->res.buf.data, "$.status", 
trash.area, trash.size);
+       if (ret == -1) {
+               memprintf(errmsg, "couldn't get a \"status\" from Authorization 
URL \"%s\"", auth->auth.ptr);
+               goto error;
+       }
+       trash.data = ret;
+
+       /* if auth is already valid we need to skip solving challenges */
+       if (strncasecmp("valid", trash.area, trash.data) == 0) {
+               auth->validated = 1;
+               goto out;
+       }
+
        /* get the multiple challenges and select the one from the 
configuration */
        for (i = 0; ; i++) {
                int ret;
@@ -1761,6 +1774,7 @@ int acme_res_auth(struct task *task, struct acme_ctx 
*ctx, struct acme_auth *aut
                break;
        }
 
+out:
        ret = 0;
 
 error:
@@ -2263,6 +2277,14 @@ struct task *acme_process(struct task *task, void 
*context, unsigned int state)
                break;
                case ACME_CHALLENGE:
                        if (http_st == ACME_HTTP_REQ) {
+                               /* if challenge is already validated we skip 
this stage */
+                               if (ctx->next_auth->validated) {
+                                       if ((ctx->next_auth = 
ctx->next_auth->next) == NULL) {
+                                               st = ACME_CHKCHALLENGE;
+                                               ctx->next_auth = ctx->auths;
+                                       }
+                                       goto nextreq;
+                               }
 
                                /* if the challenge is not ready, wait to be 
wakeup */
                                if (!ctx->next_auth->ready)
@@ -2292,6 +2314,14 @@ struct task *acme_process(struct task *task, void 
*context, unsigned int state)
                break;
                case ACME_CHKCHALLENGE:
                        if (http_st == ACME_HTTP_REQ) {
+                               /* if challenge is already validated we skip 
this stage */
+                               if (ctx->next_auth->validated) {
+                                       if ((ctx->next_auth = 
ctx->next_auth->next) == NULL)
+                                               st = ACME_FINALIZE;
+
+                                       goto nextreq;
+                               }
+
                                if (acme_post_as_get(task, ctx, 
ctx->next_auth->chall, &errmsg) != 0)
                                        goto retry;
                        }
-- 
2.52.0


Reply via email to