urbit/app/acme.hoon

1199 lines
34 KiB
Plaintext
Raw Normal View History

/- asn1
2018-08-30 01:07:21 +03:00
/+ base64, der, primitive-rsa, *pkcs, *jose
=, eyre
=* rsa primitive-rsa
::
|%
:: +en-base64url: url-safe base64 encoding, without padding
::
++ en-base64url
~(en base64 | &)
:: +de-base64url: url-safe base64 decoding, without padding
::
++ de-base64url
~(de base64 | &)
:: |octn: encode/decode unsigned atoms as big-endian octet stream
::
++ octn
|%
++ en |=(a=@u `octs`[(met 3 a) (swp 3 a)])
++ de |=(a=octs `@u`(rev 3 p.a q.a))
--
:: |body: acme api response body types
::
++ body
|%
+$ acct [id=@t wen=@t sas=@t]
::
+$ order
$: exp=@t
sas=@t
aut=(list purl)
fin=(unit purl)
cer=(unit purl)
==
::
+$ auth
$: dom=turf
sas=@t
exp=@t
cal=challenge
==
::
+$ challenge [typ=@t sas=@t url=purl tok=@t err=(unit error)]
::
+$ error [type=@t detail=@t]
--
::
2018-11-01 09:54:30 +03:00
:: |grab: acme api response json reparsers
2018-05-18 01:10:24 +03:00
::
++ grab
=, dejs:format
|%
2018-11-01 09:54:30 +03:00
:: +json-purl: parse url
::
++ json-purl (su auri:de-purl:html)
:: +json-date: parse iso-8601
::
:: XX actually parse
::
++ json-date so
2018-11-01 09:54:30 +03:00
:: +directory: parse ACME service directory
::
++ directory
%- ot
:~ 'newAccount'^json-purl
'newNonce'^json-purl
'newOrder'^json-purl
'revokeCert'^json-purl
'keyChange'^json-purl
==
2018-11-01 09:54:30 +03:00
:: +acct: parse ACME service account
::
++ acct
^- $-(json acct:body)
:: ignoring key, contact, initialIp
::
(ot 'id'^no 'createdAt'^json-date 'status'^so ~)
2018-11-01 09:54:30 +03:00
:: +order: parse certificate order
::
++ order
^- $-(json order:body)
%- ou
:~ 'expires'^(un json-date)
'status'^(un so)
'authorizations'^(uf ~ (ar json-purl))
'finalize'^(uf ~ (mu json-purl))
'certificate'^(uf ~ (mu json-purl))
==
2018-11-01 09:54:30 +03:00
:: +auth: parse authorization
::
++ auth
=> |%
:: +iden: extract +turf from service identifier
::
++ iden
|= [typ=@t hot=host]
^- turf
?>(&(?=(%dns typ) ?=([%& *] hot)) p.hot)
:: +http-trial: extract %http-01 challenge
::
++ trial
|= a=(list challenge:body)
^- challenge:body
=/ b (skim a |=([typ=@t *] ?=(%http-01 typ)))
?>(?=(^ b) i.b)
--
^- $-(json auth:body)
%- ot
:~ 'identifier'^(cu iden (ot type+so value+(su thos:de-purl:html) ~))
'status'^so
'expires'^json-date
'challenges'^(cu trial (ar challenge))
==
2018-11-01 09:54:30 +03:00
:: +challenge: parse domain validation challenge
::
++ challenge
^- $-(json challenge:body)
%- ou
:~ 'type'^(un so)
'status'^(un so)
'url'^(un json-purl)
'token'^(un so)
'error'^(uf ~ (mu error))
==
2018-11-01 09:54:30 +03:00
:: +error: parse ACME service error response
::
++ error
^- $-(json error:body)
(ot type+so detail+so ~)
--
--
::
:::: acme state
::
|%
2018-11-01 09:54:30 +03:00
:: +move: output effect
::
+= move [bone card]
2018-11-01 09:54:30 +03:00
:: +card: output effect payload
::
+= card
$% [%hiss wire [~ ~] %httr %hiss hiss:eyre]
2018-06-29 03:03:16 +03:00
[%wait wire @da]
[%well wire path (unit mime)]
[%rule wire %cert (unit [wain wain])]
==
2018-11-01 09:54:30 +03:00
:: +nonce-next: next effect to emit upon receiving nonce
::
+= nonce-next
$? %register
%new-order
%finalize-order
%finalize-trial
==
2018-11-01 09:54:30 +03:00
:: +acct: an ACME service account
::
+= acct
2018-11-01 09:54:30 +03:00
$: :: key: account keypair
::
key=key:rsa
2018-11-01 09:54:30 +03:00
:: reg: account registration
::
2018-11-01 09:54:30 +03:00
:: XX wen=@da once parser is fixed
::
reg=(unit [wen=@t kid=@t])
==
2018-11-01 09:54:30 +03:00
:: +config: finalized configuration
::
+= config
2018-11-01 09:54:30 +03:00
$: :: dom: domains
::
dom=(set turf)
2018-11-01 09:54:30 +03:00
:: key: certificate keypair
::
key=key:rsa
2018-11-01 09:54:30 +03:00
:: cer: signed certificate
::
cer=wain
2018-11-01 09:54:30 +03:00
:: exp: expiration date
::
exp=@da
2018-11-01 09:54:30 +03:00
:: dor: source ACME service order URL
::
dor=purl
==
2018-11-01 09:54:30 +03:00
:: +trial: domain validation challenge
::
+= trial
2018-11-01 09:54:30 +03:00
$% :: %http only for now
::
$: %http
2018-11-01 09:54:30 +03:00
:: ego: ACME service challenge url
::
ego=purl
2018-11-01 09:54:30 +03:00
:: tok: challenge token
::
tok=@t
2018-11-01 09:54:30 +03:00
:: sas: challenge status
::
sas=?(%recv %pend %auth)
== ==
2018-11-01 09:54:30 +03:00
:: +auth: domain authorization
::
+= auth
2018-11-01 09:54:30 +03:00
$: :: ego: ACME service authorization url
::
ego=purl
2018-11-01 09:54:30 +03:00
:: dom: domain under authorization
::
dom=turf
2018-11-01 09:54:30 +03:00
:: cal: domain validation challenge
::
cal=trial
==
2018-11-01 09:54:30 +03:00
:: +order-auth: domain authorization state for order processing
::
+= order-auth
2018-11-01 09:54:30 +03:00
$: :: pending: remote authorization urls
::
pending=(list purl)
2018-11-01 09:54:30 +03:00
:: active: authorization in progress
::
active=(unit [idx=@ auth])
2018-11-01 09:54:30 +03:00
:: done: finalized authorizations (XX or failed?)
::
done=(list auth)
==
2018-11-01 09:54:30 +03:00
:: +order: ACME certificate order
::
+= order
2018-11-01 09:54:30 +03:00
$: :: dom: domains
::
dom=(set turf)
2018-11-01 09:54:30 +03:00
:: sas: order state
::
sas=$@(%wake [%rest wen=@da])
2018-11-01 09:54:30 +03:00
:: exp: expiration date
::
2018-11-01 09:54:30 +03:00
:: XX @da once ISO-8601 parser
::
exp=@t
2018-11-01 09:54:30 +03:00
:: ego: ACME service order url
::
ego=purl
2018-11-01 09:54:30 +03:00
:: fin: ACME service order finalization url
::
fin=purl
2018-11-01 09:54:30 +03:00
:: key: certificate keypair
::
key=key:rsa
2018-11-01 09:54:30 +03:00
:: csr: DER-encoded PKCS10 certificate signing request
::
csr=@ux
2018-11-01 09:54:30 +03:00
:: aut: authorizations required by this order
::
aut=order-auth
==
2018-11-01 09:54:30 +03:00
:: +history: archive of past ACME service interactions
::
+= history
2018-11-01 09:54:30 +03:00
$: :: act: list of revoked account keypairs
::
act=(list acct)
2018-11-01 09:54:30 +03:00
:: fig: list of expired configurations
::
fig=(list config)
2018-11-01 09:54:30 +03:00
:: fal: list of failed order attempts
::
fal=(list order)
==
2018-11-01 09:54:30 +03:00
:: +directory: ACME v2 service directory
::
+= directory
2018-11-01 09:54:30 +03:00
$: :: reg: registration url (newAccount)
::
reg=purl
2018-11-01 09:54:30 +03:00
:: non: nonce creation url (newNonce)
::
non=purl
2018-11-01 09:54:30 +03:00
:: der: order creation url (newOrder)
::
der=purl
2018-11-01 09:54:30 +03:00
:: rev: certificate revocation url (revokeCert)
::
rev=purl
2018-11-01 09:54:30 +03:00
:: rek: account key revocation url (keyChange)
::
rek=purl
==
2018-11-01 09:54:30 +03:00
:: +acme: complete app state
::
+= acme
2018-11-01 09:54:30 +03:00
$: :: bas: ACME service root url
::
bas=purl
2018-11-01 09:54:30 +03:00
:: dir: ACME service directory
::
dir=directory
2018-11-01 09:54:30 +03:00
:: act: ACME service account
::
act=acct
2018-11-01 09:54:30 +03:00
:: liv: active, live configuration
::
liv=(unit config)
2018-11-01 09:54:30 +03:00
:: hit: ACME account history
::
hit=history
2018-11-01 09:54:30 +03:00
:: nonces: list of unused nonces
::
nonces=(list @t)
2018-11-01 09:54:30 +03:00
:: rod: active, in-progress order
::
rod=(unit order)
2018-11-01 09:54:30 +03:00
:: pen: pending domains for next order
::
pen=(unit (set turf))
2018-11-01 09:54:30 +03:00
:: cey: certificate key XX move?
::
cey=key:rsa
==
--
::
:::: acme app
::
2018-11-01 09:54:30 +03:00
:: mov: list of outgoing moves for the current transaction
::
=| mov=(list move)
::
|_ [bow=bowl:gall acme]
2018-11-01 09:54:30 +03:00
:: +this: self
::
2018-11-01 09:54:30 +03:00
:: XX Should be a +* core alias, see urbit/arvo#712
::
++ this .
2018-11-01 09:54:30 +03:00
:: +emit: emit a move
::
++ emit
|= car=card
2018-04-24 08:49:21 +03:00
~& [%emit car]
this(mov [[ost.bow car] mov])
2018-11-01 09:54:30 +03:00
:: +abet: finalize transaction
::
++ abet
^- (quip move _this)
[(flop mov) this(mov ~)]
2018-11-01 09:54:30 +03:00
:: +request: generic http request
::
++ request
|= [wir=wire req=hiss]
^- card
[%hiss wir [~ ~] %httr %hiss req]
2018-11-01 09:54:30 +03:00
:: +signed-request: JWS JSON POST
::
++ signed-request
|= [url=purl non=@t bod=json]
^- hiss
:^ url %post
(my content-type+['application/jose+json' ~] ~)
:- ~
^- octs
=; pro=json
(as-octt:mimes:html (en-json:html (sign:jws key.act pro bod)))
:- %o %- my :~
nonce+s+non
url+s+(crip (en-purl:html url))
?^ reg.act
kid+s+kid.u.reg.act
jwk+(pass:en:jwk key.act)
==
2018-11-01 09:54:30 +03:00
:: +bad-nonce: check if an http response is a badNonce error
::
++ bad-nonce
|= rep=httr
^- ?
2018-11-01 09:54:30 +03:00
:: XX always 400?
::
?. =(400 p.rep) |
?~ r.rep |
=/ jon=(unit json) (de-json:html q.u.r.rep)
?~ jon |
=('urn:ietf:params:acme:error:badNonce' type:(error:grab u.jon))
2018-11-01 09:54:30 +03:00
:: |effect: send moves to advance
::
++ effect
|%
2018-11-01 09:54:30 +03:00
:: +directory: get ACME service directory
::
++ directory
^+ this
2018-11-01 09:54:30 +03:00
:: XX now?
::
(emit (request /acme/directory/(scot %p our.bow) bas %get ~ ~))
:: +nonce: get a new nonce for the next request
::
++ nonce
|= nex=@tas
~| [%bad-nonce-next nex]
?> ?=(nonce-next nex)
^+ this
2018-11-01 09:54:30 +03:00
:: XX now?
::
(emit (request /acme/nonce/next/[nex] non.dir %get ~ ~))
2018-11-01 09:54:30 +03:00
:: +register: create ACME service account
::
2018-11-01 09:54:30 +03:00
:: Note: accepts services ToS.
::
++ register
^+ this
?~ nonces
(nonce %register)
%- emit(nonces t.nonces, reg.act ~)
%+ request
2018-11-01 09:54:30 +03:00
:: XX now?
::
/acme/register/(scot %p our.bow)
%^ signed-request reg.dir i.nonces
[%o (my [['termsOfServiceAgreed' b+&] ~])]
2018-11-01 09:54:30 +03:00
:: XX rekey
::
2018-11-01 09:54:30 +03:00
:: +new-order: create a new certificate order
::
++ new-order
^+ this
~| %new-order-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=([~ ^] pen) ~|(%no-domains !!)
?~ nonces
(nonce %new-order)
%- emit(nonces t.nonces)
%+ request
/acme/new-order/(scot %da now.bow)
%^ signed-request der.dir i.nonces
:- %o %- my :~
:- %identifiers
:- %a
%+ turn
~(tap in `(set turf)`u.pen)
|=(a=turf [%o (my type+s+'dns' value+s+(join '.' a) ~)])
==
2018-11-01 09:54:30 +03:00
:: +finalize-order: finalize completed order
::
++ finalize-order
^+ this
~| %finalize-order-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
?. ?=(~ pending.aut.u.rod) ~|(%pending-authz !!)
?. ?=(~ active.aut.u.rod) ~|(%active-authz !!)
2018-11-01 09:54:30 +03:00
:: XX revisit wrt rate limits
::
?> ?=(%wake sas.u.rod)
?~ nonces
(nonce %finalize-order)
%- emit(nonces t.nonces)
%+ request
/acme/finalize-order/(scot %da now.bow)
%^ signed-request fin.u.rod i.nonces
[%o (my csr+s+(en-base64url (met 3 csr.u.rod) `@`csr.u.rod) ~)]
2018-11-01 09:54:30 +03:00
:: +check-order: check completed order for certificate availability
::
++ check-order
^+ this
~| %check-order-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
?. ?=(~ pending.aut.u.rod) ~|(%pending-authz !!)
?. ?=(~ active.aut.u.rod) ~|(%active-authz !!)
2018-11-01 09:54:30 +03:00
:: XX revisit wrt rate limits
::
?> ?=(%wake sas.u.rod)
(emit (request /acme/check-order/(scot %da now.bow) ego.u.rod %get ~ ~))
2018-11-01 09:54:30 +03:00
:: +certificate: download PEM-encoded certificate
::
++ certificate
|= url=purl
^+ this
~| %certificate-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
=/ hed (my accept+['applicate/x-pem-file' ~] ~)
(emit (request /acme/certificate/(scot %da now.bow) url %get hed ~))
2018-11-01 09:54:30 +03:00
:: +install: tell %eyre about our certificate
::
++ install
^+ this
~| %install-effect-fail
?> ?=(^ liv)
=/ key=wain (ring:en:pem:pkcs8 key.u.liv)
(emit %rule /install %cert `[key `wain`cer.u.liv])
2018-11-01 09:54:30 +03:00
:: +get-authz: get next ACME service domain authorization object
::
++ get-authz
^+ this
~| %get-authz-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
?. ?=(^ pending.aut.u.rod) ~|(%no-pending-authz !!)
2018-11-01 09:54:30 +03:00
:: XX revisit wrt rate limits
::
?> ?=(%wake sas.u.rod)
%- emit
(request /acme/get-authz/(scot %da now.bow) i.pending.aut.u.rod %get ~ ~)
2018-11-01 09:54:30 +03:00
:: XX check/finalize-authz ??
::
2018-11-01 09:54:30 +03:00
:: +save-trial: save ACME domain validation challenge to /.well-known/
::
++ save-trial
^+ this
~| %save-trial-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
?. ?=(^ active.aut.u.rod) ~|(%no-active-authz !!)
2018-11-01 09:54:30 +03:00
:: XX revisit wrt rate limits
::
?> ?=(%wake sas.u.rod)
=* aut u.active.aut.u.rod
%- emit
:^ %well
2018-11-01 09:54:30 +03:00
:: XX idx in wire?
::
/acme/save-trial/(scot %da now.bow)
/acme-challenge/[tok.cal.aut]
:+ ~
/text/plain
%- as-octs:mimes:html
(rap 3 [tok.cal.aut '.' (pass:thumb:jwk key.act) ~])
2018-11-01 09:54:30 +03:00
:: +test-trial: confirm that ACME domain validation challenge is available
::
++ test-trial
^+ this
~| %test-trial-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
?. ?=(^ active.aut.u.rod) ~|(%no-active-authz !!)
2018-11-01 09:54:30 +03:00
:: XX revisit wrt rate limits
::
?> ?=(%wake sas.u.rod)
=* aut u.active.aut.u.rod
=/ pat=path /'.well-known'/acme-challenge/[tok.cal.aut]
2018-11-01 09:54:30 +03:00
:: note: requires port 80, just as the ACME service will
::
=/ url=purl [[sec=| por=~ hos=[%& dom.aut]] [ext=~ pat] hed=~]
2018-11-01 09:54:30 +03:00
:: =/ url=purl [[sec=| por=`8.081 hos=[%& /localhost]] [ext=~ pat] hed=~]
:: XX idx in wire?
::
(emit (request /acme/test-trial/(scot %da now.bow) url %get ~ ~))
2018-11-01 09:54:30 +03:00
:: +finalize-trial: notify ACME service that challenge is ready
::
++ finalize-trial
^+ this
2018-07-17 02:15:15 +03:00
~| %finalize-trial-effect-fail
?. ?=(^ reg.act) ~|(%no-account !!)
?. ?=(^ rod) ~|(%no-active-order !!)
?. ?=(^ active.aut.u.rod) ~|(%no-active-authz !!)
2018-11-01 09:54:30 +03:00
:: XX revisit wrt rate limits
::
?> ?=(%wake sas.u.rod)
=* aut u.active.aut.u.rod
?~ nonces
(nonce %finalize-trial)
%- emit(nonces t.nonces)
%+ request
2018-11-01 09:54:30 +03:00
:: XX idx in wire?
::
/acme/finalize-trial/(scot %da now.bow)
2018-11-01 09:54:30 +03:00
:: empty object included for signature
::
(signed-request ego.cal.aut i.nonces [%o ~])
:: XX delete-trial?
::
2018-11-01 09:54:30 +03:00
:: +retry: retry effect after timeout
::
2018-06-29 03:03:16 +03:00
++ retry
|= [wir=wire wen=@da]
2018-11-01 09:54:30 +03:00
:: XX validate wire and date
::
2018-06-29 03:03:16 +03:00
(emit %wait [%acme wir] wen)
--
2018-11-01 09:54:30 +03:00
:: |event: accept event, emit next effect(s)
::
2018-11-01 09:54:30 +03:00
:: XX should these next effects be triggered at call sites instead?
::
++ event
|%
2018-11-01 09:54:30 +03:00
:: +directory: accept ACME service directory, trigger registration
::
++ directory
2018-06-23 07:11:22 +03:00
|= [wir=wire rep=httr]
^+ this
?. =(200 p.rep)
~& [%directory-fail rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
(retry:effect /directory (add now.bow ~s10))
:: XX never happened yet, wat do?
::
this
=. dir (directory:grab (need (de-json:html q:(need r.rep))))
?~(reg.act register:effect this)
2018-11-01 09:54:30 +03:00
:: +nonce: accept new nonce and trigger next effect
::
2018-11-01 09:54:30 +03:00
:: Nonce has already been saved in +sigh-httr. The next effect
:: is specified in the wire.
::
++ nonce
|= [wir=wire rep=httr]
^+ this
~| [%unrecognized-nonce-wire wir]
?> &(?=(^ wir) ?=([%next ^] t.wir))
=* nex i.t.t.wir
~| [%unknown-nonce-next nex]
?> ?=(nonce-next nex)
?. =(204 p.rep)
2018-10-31 21:24:19 +03:00
~& [%nonce-fail wir rep]
:: cttp i/o timeout, always retry
:: XX set timer? count retries? backoff?
::
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
(nonce:effect nex)
:: XX never happened yet, retry nonce anyway?
::
this
?- nex
%register register:effect
%new-order new-order:effect
%finalize-order finalize-order:effect
%finalize-trial finalize-trial:effect
==
2018-11-01 09:54:30 +03:00
:: +register: accept ACME service registration
::
++ register
|= [wir=wire rep=httr]
^+ this
?. =(201 p.rep)
2018-10-31 21:24:19 +03:00
:: XX possible 204?
::
?: (bad-nonce rep)
(nonce:effect %register)
~& [%register-fail wir rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
(retry:effect /register (add now.bow ~s10))
:: XX retry service failures?
::
this
=/ loc=@t
q:(head (skim q.rep |=((pair @t @t) ?=(%location p))))
2018-11-01 09:54:30 +03:00
:: XX @da once parser is fixed
::
=/ wen=@t
?~ r.rep
(scot %da now.bow)
=/ bod=acct:body
(acct:grab (need (de-json:html q.u.r.rep)))
?> ?=(%valid sas.bod)
wen.bod
=. reg.act `[wen loc]
?~(pen this new-order:effect)
2018-11-01 09:54:30 +03:00
:: XX rekey
::
:: +new-order: order created, begin processing authorizations
::
++ new-order
|= [wir=wire rep=httr]
^+ this
?. =(201 p.rep)
2018-10-31 21:24:19 +03:00
:: XX possible 204?
::
?: (bad-nonce rep)
(nonce:effect %new-order)
~& [%new-order-fail wir rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
(retry:effect /new-order (add now.bow ~s10))
:: XX retry service failures?
::
this
2018-11-01 09:54:30 +03:00
:: XX delete order if not?
::
?> ?=(^ pen)
=/ loc=@t
q:(head (skim q.rep |=((pair @t @t) ?=(%location p))))
=/ ego=purl (need (de-purl:html loc))
2018-11-01 09:54:30 +03:00
:: XX parse identifiers, confirm equal to pending domains
:: XX check status
::
=/ bod=order:body
(order:grab (need (de-json:html q:(need r.rep))))
2018-11-01 09:54:30 +03:00
:: XX maybe generate key here?
::
=/ csr=@ux +:(en:der:pkcs10 cey ~(tap in u.pen))
=/ dor=order
[dom=u.pen sas=%wake exp.bod ego (need fin.bod) cey csr [aut.bod ~ ~]]
get-authz:effect(rod `dor, pen ~)
2018-11-01 09:54:30 +03:00
:: +finalize-order: order finalized, poll for certificate
::
++ finalize-order
|= [wir=wire rep=httr]
^+ this
?: (bad-nonce rep)
(nonce:effect %finalize-order)
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
2018-10-31 21:24:19 +03:00
::
~& [%finalize-order-fail wir rep]
~& %retrying
(retry:effect /finalize-order (add now.bow ~s10))
:: check-order regardless of status code
2018-11-01 09:54:30 +03:00
::
check-order:effect
:: +check-order: check order status, dispatch appropriately
::
++ check-order
|= [wir=wire rep=httr]
^+ this
?. =(200 p.rep)
~& [%check-order-fail wir rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
(retry:effect /check-order (add now.bow ~s10))
:: XX retry service failures?
::
this
?> ?=(^ rod)
=/ bod=order:body
(order:grab (need (de-json:html q:(need r.rep))))
?+ sas.bod
~& [%check-order-status-unknown sas.bod]
this
:: order failed (at any stage)
::
%invalid
~& [%check-order-fail %invalid wir rep]
:: XX check authz, get the failure reason
:: XX possible to retry any reasons?
2018-11-01 09:54:30 +03:00
:: XX send notification somehow?
::
?> ?=(^ rod)
:: save failed order for future autopsy
::
=. fal.hit [u.rod fal.hit]
:: copy order domain(s), clear order, try again soon
::
:: XX backoff, count retries, how long, etc.
::
(retry:effect(rod ~, pen `dom.u.rod) /new-order (add now.bow ~m10))
:: initial order state
::
%pending
check-order:effect
:: validations completed
::
%ready
finalize-order:effect
:: finalization requested
::
%processing
check-order:effect
:: certificate issued
::
%valid
2018-11-01 09:54:30 +03:00
:: XX update order state
:: XX =< delete-trial
::
~| impossible-order+[wir rep bod]
(certificate:effect (need cer.bod))
==
::
2018-11-01 09:54:30 +03:00
:: +certificate: accept PEM-encoded certificate
::
++ certificate
|= [wir=wire rep=httr]
^+ this
?. =(200 p.rep)
~& [%certificate-fail wir rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
:: will re-attempt certificate download per order status
::
(retry:effect /check-order (add now.bow ~s10))
:: XX retry service failures?
::
this
?> ?=(^ rod)
=/ cer=wain (to-wain:format q:(need r.rep))
=/ fig=config
2018-11-01 09:54:30 +03:00
:: XX expiration date
::
[dom.u.rod key.u.rod cer (add now.bow ~d90) ego.u.rod]
=? fig.hit ?=(^ liv) [u.liv fig.hit]
2018-11-01 09:54:30 +03:00
:: XX set renewal timer
::
install:effect(liv `fig, rod ~)
2018-11-01 09:54:30 +03:00
:: +get-authz: accept ACME service authorization object
::
++ get-authz
|= [wir=wire rep=httr]
^+ this
?. =(200 p.rep)
~& [%get-authz-fail wir rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
(retry:effect /get-authz (add now.bow ~s10))
:: XX retry service failures?
::
this
?> ?=(^ rod)
?> ?=(^ pending.aut.u.rod)
=/ bod=auth:body
(auth:grab (need (de-json:html q:(need r.rep))))
=/ cal=trial
2018-11-01 09:54:30 +03:00
:: XX parse token to verify url-safe base64?
::
[%http url.cal.bod tok.cal.bod %recv]
2018-11-01 09:54:30 +03:00
:: XX check that URLs are the same
::
=/ tau=auth [i.pending.aut.u.rod dom.bod cal]
2018-11-01 09:54:30 +03:00
:: XX get idx from wire instead?
::
=/ idx=@ud +((lent done.aut.u.rod))
=/ rod-aut=order-auth
%= aut.u.rod
pending t.pending.aut.u.rod
active `[idx tau]
==
=< test-trial:effect
save-trial:effect(aut.u.rod rod-aut)
2018-11-01 09:54:30 +03:00
:: XX check/finalize-authz ??
::
2018-11-01 09:54:30 +03:00
:: +test-trial: accept response from challenge test
::
2018-11-01 09:54:30 +03:00
:: Note that +save-trail:effect has no corresponding event.
::
++ test-trial
|= [wir=wire rep=httr]
^+ this
?. =(200 p.rep)
~& [%test-trial-fail wir rep]
2018-11-01 05:54:29 +03:00
:: XX this condition will need to change if vere/cttp timeouts change
::
?: &(=(504 p.rep) ?=(~ r.rep))
:: retry timeouts
:: XX count retries, backoff
::
(retry:effect /test-trial (add now.bow ~s10))
this
?> ?=(^ rod)
?> ?=(^ active.aut.u.rod)
=* aut u.active.aut.u.rod
=/ bod
%- as-octs:mimes:html
(rap 3 [tok.cal.aut '.' (pass:thumb:jwk key.act) ~])
?. ?& ?=(^ r.rep)
=(bod u.r.rep)
==
:: XX save-trail again?
:: XX probably a DNS misconfiguration
::
~& [%test-trial-mismatch expected=bod got=[wir rep]]
this
finalize-trial:effect
2018-11-01 09:54:30 +03:00
:: +finalize-trial:
::
++ finalize-trial
|= [wir=wire rep=httr]
^+ this
?. =(200 p.rep)
2018-10-31 21:24:19 +03:00
:: XX possible 204? assume pending?
:: XX handle "challenge is not pending"
::
?: (bad-nonce rep)
(nonce:effect %finalize-trial)
~& [%finalize-trial-fail wir rep]
2018-10-31 21:24:19 +03:00
?: =(504 p.rep)
:: retry timeouts
:: XX count retries? backoff?
::
~& %retrying
(retry:effect /finalize-trial (add now.bow ~s10))
:: cancel order?
::
this
?> ?=(^ rod)
?> ?=(^ active.aut.u.rod)
=* aut u.active.aut.u.rod
=/ bod=challenge:body
(challenge:grab (need (de-json:html q:(need r.rep))))
2018-11-01 09:54:30 +03:00
:: XX check for other possible values in 200 response
:: note: may have already been validated
::
?> ?=(?(%pending %valid) sas.bod)
=/ rod-aut=order-auth
aut.u.rod(active ~, done [+.aut(sas.cal %pend) done.aut.u.rod])
?~ pending.aut.u.rod
check-order:effect(aut.u.rod rod-aut)
get-authz:effect(aut.u.rod rod-aut)
:: XX delete-trial?
::
2018-11-01 09:54:30 +03:00
:: +retry: retry effect after timeout
::
++ retry
2018-06-29 03:03:16 +03:00
|= wir=wire
^+ this
2018-10-31 21:24:19 +03:00
?> ?=(^ wir)
?+ i.wir
2018-06-29 03:03:16 +03:00
~&(unknown-retry+wir this)
2018-10-31 21:24:19 +03:00
%directory directory:effect
%register register:effect
%new-order new-order:effect
%finalize-order finalize-order:effect
%check-order check-order:effect
%get-authz get-authz:effect
%test-trial test-trial:effect
%finalize-trial finalize-trial:effect
2018-06-29 03:03:16 +03:00
==
--
2018-11-01 09:54:30 +03:00
:: +sigh-tang: handle http request failure
::
++ sigh-tang
|= [wir=wire saw=tang]
^- (quip move _this)
~& [%sigh-tang wir]
2018-11-01 09:54:30 +03:00
:: XX take evasive action
::
[((slog saw) ~) this]
2018-11-01 09:54:30 +03:00
:: +sigh-recoverable-error: handle http rate-limit response
::
++ sigh-recoverable-error
|= [wir=wire %429 %rate-limit lim=(unit @da)]
^- (quip move _this)
~& [%sigh-recoverable wir lim]
2018-11-01 09:54:30 +03:00
:: XX retry
::
[~ this]
2018-11-01 09:54:30 +03:00
:: +sigh-httr: accept http response
::
++ sigh-httr
|= [wir=wire rep=httr]
^- (quip move _this)
~& [wir rep]
?> ?=([%acme ^] wir)
2018-11-01 09:54:30 +03:00
:: add nonce to pool, if present
::
=/ nonhed (skim q.rep |=((pair @t @t) ?=(%replay-nonce p)))
=? nonces ?=(^ nonhed) [q.i.nonhed nonces]
=< abet
~| [%sigh-fail wir rep]
2018-06-23 07:11:22 +03:00
%. [t.wir rep]
?+ i.t.wir
~&([%unknown-wire i.t.wir] !!)
2018-06-23 07:11:22 +03:00
%directory directory:event
%nonce nonce:event
%register register:event
2018-11-01 09:54:30 +03:00
:: XX rekey
::
2018-06-23 07:11:22 +03:00
%new-order new-order:event
%finalize-order finalize-order:event
%check-order check-order:event
%certificate certificate:event
%get-authz get-authz:event
2018-11-01 09:54:30 +03:00
:: XX check/finalize-authz ??
::
2018-06-23 07:11:22 +03:00
%test-trial test-trial:event
%finalize-trial finalize-trial:event
:: XX delete-trial?
2018-11-01 09:54:30 +03:00
::
==
2018-11-01 09:54:30 +03:00
:: +wake: timer wakeup event
2018-06-29 03:03:16 +03:00
::
++ wake
|= [wir=wire ~]
^- (quip move _this)
~& [%wake wir]
?> ?=([%acme *] wir)
abet:(retry:event t.wir)
2018-11-01 09:54:30 +03:00
:: +poke-acme-order: create new order for a set of domains
::
++ poke-acme-order
|= a=(set turf)
~& [%poke-acme a]
abet:(add-order a)
2018-11-01 09:54:30 +03:00
:: +poke-noun: for debugging
::
++ poke-noun
|= a=*
^- (quip move _this)
=< abet
?+ a
~&(+<+.this this)
2018-06-24 06:56:27 +03:00
%dbug ~& [%private (ring:en:pem:pkcs1 key.act)]
~& [%public (pass:en:pem:pkcs1 key.act)]
this
%init init
%reg register:effect
%order new-order:effect
%auth get-authz:effect
%trial test-trial:effect
%final finalize-order:effect
%poll check-order:effect
%our (add-order (sy /org/urbit/(crip +:(scow %p our.bow)) ~))
%rule install:effect
%fake fake
%none none
==
2018-11-01 09:54:30 +03:00
:: +none: uninstall cert for testing
::
:: XX remove
::
++ none
^+ this
(emit %rule /uninstall %cert ~)
2018-11-01 09:54:30 +03:00
:: +fake: install fake cert for testing
::
:: XX remove
::
++ fake
^+ this
=/ key=wain
:~ '-----BEGIN RSA PRIVATE KEY-----'
'MIIEpAIBAAKCAQEAisQPzzmGWNZSNNAwY59XrqK/bU0NKNZS2ETOiJeSpzPAHYl+'
'c39V96/QUR0tra2zQI4QD6kpMYX/7R5nwuvsA4o7ypfYupNrlzLPThCKEHpZomDD'
'0Bb3T8u7YGrMjEX5cOmZIU2T/iy4GK/wWuBIy2TEp/0J+RoSCIr8Df/A7GIM8bwn'
'v23Vq0kE2xBqqaT5LjvuQoXfiLJ42F33DDno9lVikKEyt55D/08rH41KpXvn3tWZ'
'46tZK6Ds7Zr1hEV1LbDx1CXDzQ6gKObBe54DWDV3h7TJhr0BSW68dFJhro7Y60Ns'
'zTcFqY1RC9F0ePtsnKGFzMOe/U+fPvsGe2oWvwIDAQABAoIBACCf19ewfpWETe98'
'wuOpIsQ8HyVjaCShvvh5tNUITcJhuFk5ajFdTqjc/O0VHxgmLm6O99e2vaiXCISH'
'EX4SWXq7lTMcYCf9YN47Y+HGoa8eFNTIS0ExJRPtojAY695O1UZmpUnfI1wux1mG'
'g8vZz0OCfXnBVAbsyjCX/IqOBp2MVzfMyMuaF/oQ2xiX4AZ1hDIMDpUTGw7OKX15'
'JAUlTZUhzifmijPg1gViD8Lf5w42nlwYPC5j6wWKpJSx76CNUxLdJAaaZb3QYE96'
'zu/jOCdy25sPHIux3XTdV6fqZ2iTvt31+bcnSAvmbDpmcujsZPVRXRu5OO/0xBh6'
'GGlTLAECgYEAwSyNkbNk0mBRxet68IW02wXYaxIEVUWqhSeE2MGaXg4h9VSgh83q'
'7wly0ujy9Sj79aF2frkpMbIoeeGIOTIYI4RCYuBKx+/NNWFoggu4UK5xOMr0dfQK'
'2Ggr2agUH3KExvOpAW3rvWzepLl8ppySLNipLcFQHOJ0kxwPd2ig3Z8CgYEAt+WM'
'JoW9dLxUu/zTih5Dacubl+fnnm8BsypKmv88mzcqEVwXOo6Z6bmlw0NeWxmlwHu7'
'vs+XQ8MDUDvQvIul8sFagZk7RvWcXTlaHtPQ1D8/ztrg5d58TwxpwXshBytfR6NA'
'tIZa+tNvzQF5AKVlB+lZEWF6E6FoI5NmGDAZ8uECgYB4FV4cCMzQCphK1Muj4TpA'
'PS3/wT94Usph4+Mta4yuk1KA047HXTaCSflbKvx9cnDOjQTAWhJFll6bBZxNEdr3'
'mSw7kvppt6R1Xow861Q0s3wmteOpv39Ob9Nyho2bzvDDTIzvGonFQ3xUIgpe+E3W'
'GwlwLA/FJPEa0gK7VAtMOQKBgQCgcPtX2LM0l+Ntp+V/yWuTb/quC7w+tCbNhAZX'
'OHxOB1ECmFAD3MpX6oq+05YM8VF1n/5rOX6Ftiy74ZP6C/Sa2Sr3ixL2k+76PsFr'
'x+2YYB5xgPFaXEQkS3YxQhXMxYB5ZetcFSRnVfVi7Pf/Ik4FGweEbIEvg1DySPV4'
'AO+CwQKBgQCFnjHsFeNZVvtiL2wONT6osjRCpMvaUiVecMW9oUBtjpLHI2gQr7+4'
'dvCm2Sj7uq9OWO0rBz1px/kI+ONjhwsFPLK5v8hyVDoIE791Qg3qAY1a6JOXRl9P'
'6TBc3dQ2qUVqt8gi9RLCDFJU18Td6La4mkJSP5YrioGtwUJow0F07Q=='
'-----END RSA PRIVATE KEY-----'
==
=/ cert=wain
:~ '-----BEGIN CERTIFICATE-----'
'MIIF8jCCBNqgAwIBAgITAPrPc8Udwmv5dJ+hx2Uh+gZF1TANBgkqhkiG9w0BAQsF'
'ADAiMSAwHgYDVQQDDBdGYWtlIExFIEludGVybWVkaWF0ZSBYMTAeFw0xODA3MDMx'
'ODAyMTZaFw0xODEwMDExODAyMTZaMB8xHTAbBgNVBAMTFHpvZC5keW5kbnMudXJi'
'aXQub3JnMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAisQPzzmGWNZS'
'NNAwY59XrqK/bU0NKNZS2ETOiJeSpzPAHYl+c39V96/QUR0tra2zQI4QD6kpMYX/'
'7R5nwuvsA4o7ypfYupNrlzLPThCKEHpZomDD0Bb3T8u7YGrMjEX5cOmZIU2T/iy4'
'GK/wWuBIy2TEp/0J+RoSCIr8Df/A7GIM8bwnv23Vq0kE2xBqqaT5LjvuQoXfiLJ4'
'2F33DDno9lVikKEyt55D/08rH41KpXvn3tWZ46tZK6Ds7Zr1hEV1LbDx1CXDzQ6g'
'KObBe54DWDV3h7TJhr0BSW68dFJhro7Y60NszTcFqY1RC9F0ePtsnKGFzMOe/U+f'
'PvsGe2oWvwIDAQABo4IDIjCCAx4wDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQG'
'CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTokXAU'
'vPwcrbkLxcVBCNNQ588pfjAfBgNVHSMEGDAWgBTAzANGuVggzFxycPPhLssgpvVo'
'OjB3BggrBgEFBQcBAQRrMGkwMgYIKwYBBQUHMAGGJmh0dHA6Ly9vY3NwLnN0Zy1p'
'bnQteDEubGV0c2VuY3J5cHQub3JnMDMGCCsGAQUFBzAChidodHRwOi8vY2VydC5z'
'dGctaW50LXgxLmxldHNlbmNyeXB0Lm9yZy8wHwYDVR0RBBgwFoIUem9kLmR5bmRu'
'cy51cmJpdC5vcmcwgf4GA1UdIASB9jCB8zAIBgZngQwBAgEwgeYGCysGAQQBgt8T'
'AQEBMIHWMCYGCCsGAQUFBwIBFhpodHRwOi8vY3BzLmxldHNlbmNyeXB0Lm9yZzCB'
'qwYIKwYBBQUHAgIwgZ4MgZtUaGlzIENlcnRpZmljYXRlIG1heSBvbmx5IGJlIHJl'
'bGllZCB1cG9uIGJ5IFJlbHlpbmcgUGFydGllcyBhbmQgb25seSBpbiBhY2NvcmRh'
'bmNlIHdpdGggdGhlIENlcnRpZmljYXRlIFBvbGljeSBmb3VuZCBhdCBodHRwczov'
'L2xldHNlbmNyeXB0Lm9yZy9yZXBvc2l0b3J5LzCCAQIGCisGAQQB1nkCBAIEgfME'
'gfAA7gB1ALDMg+Wl+X1rr3wJzChJBIcqx+iLEyxjULfG/SbhbGx3AAABZGGGG6QA'
'AAQDAEYwRAIgJHrIawVea5/++wteocdbt1QUBxysW7uJqYgvnOWOQMgCIGRlioyE'
'vzunUm/HZre3fF2jBsJr45C1tz5FTe/cYQwmAHUA3Zk0/KXnJIDJVmh9gTSZCEmy'
'Sfe1adjHvKs/XMHzbmQAAAFkYYYjLQAABAMARjBEAiAWovIKERYeNbJlAKvNorwn'
'RnSFP0lJ9sguwcpbcsYJ1gIgRJxTolkMOr0Fwq62q4UYnpREY8zu4hiL90Mhntky'
'EwYwDQYJKoZIhvcNAQELBQADggEBAMYxvA+p4Qj0U23AHAe61W3+M6T1M0BfrGE2'
'jJCaq4c3d7b9NEN1qFJHl8t/+Z/7RHUIzbm4CIOZynSM8mBxg2NgXymvXQkRrrBo'
'fhO9u8Yxizx4+KOtiigt9JBVlpyCm6I9uifM+7rZYh45s2IkfDBPKd+M1tfIUOne'
'YgUt1YguEkM2xqRG16JyHA0Xwn6mn+4pWiTdfNzlqol6vyGT7WfIvmV7cdGoYKjB'
'wOt/g1wWMTwhSWBCVqCyn+f2rl8u3wbXrIUeRng2ryNVXO03nukTp7OLN3HUO6PR'
'hC4NdS4o2geBNZr8RJiORtCelDaJprY7lhh2MFzVpsodc2eB5sQ='
'-----END CERTIFICATE-----'
''
'-----BEGIN CERTIFICATE-----'
'MIIEqzCCApOgAwIBAgIRAIvhKg5ZRO08VGQx8JdhT+UwDQYJKoZIhvcNAQELBQAw'
'GjEYMBYGA1UEAwwPRmFrZSBMRSBSb290IFgxMB4XDTE2MDUyMzIyMDc1OVoXDTM2'
'MDUyMzIyMDc1OVowIjEgMB4GA1UEAwwXRmFrZSBMRSBJbnRlcm1lZGlhdGUgWDEw'
'ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDtWKySDn7rWZc5ggjz3ZB0'
'8jO4xti3uzINfD5sQ7Lj7hzetUT+wQob+iXSZkhnvx+IvdbXF5/yt8aWPpUKnPym'
'oLxsYiI5gQBLxNDzIec0OIaflWqAr29m7J8+NNtApEN8nZFnf3bhehZW7AxmS1m0'
'ZnSsdHw0Fw+bgixPg2MQ9k9oefFeqa+7Kqdlz5bbrUYV2volxhDFtnI4Mh8BiWCN'
'xDH1Hizq+GKCcHsinDZWurCqder/afJBnQs+SBSL6MVApHt+d35zjBD92fO2Je56'
'dhMfzCgOKXeJ340WhW3TjD1zqLZXeaCyUNRnfOmWZV8nEhtHOFbUCU7r/KkjMZO9'
'AgMBAAGjgeMwgeAwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQAw'
'HQYDVR0OBBYEFMDMA0a5WCDMXHJw8+EuyyCm9Wg6MHoGCCsGAQUFBwEBBG4wbDA0'
'BggrBgEFBQcwAYYoaHR0cDovL29jc3Auc3RnLXJvb3QteDEubGV0c2VuY3J5cHQu'
'b3JnLzA0BggrBgEFBQcwAoYoaHR0cDovL2NlcnQuc3RnLXJvb3QteDEubGV0c2Vu'
'Y3J5cHQub3JnLzAfBgNVHSMEGDAWgBTBJnSkikSg5vogKNhcI5pFiBh54DANBgkq'
'hkiG9w0BAQsFAAOCAgEABYSu4Il+fI0MYU42OTmEj+1HqQ5DvyAeyCA6sGuZdwjF'
'UGeVOv3NnLyfofuUOjEbY5irFCDtnv+0ckukUZN9lz4Q2YjWGUpW4TTu3ieTsaC9'
'AFvCSgNHJyWSVtWvB5XDxsqawl1KzHzzwr132bF2rtGtazSqVqK9E07sGHMCf+zp'
'DQVDVVGtqZPHwX3KqUtefE621b8RI6VCl4oD30Olf8pjuzG4JKBFRFclzLRjo/h7'
'IkkfjZ8wDa7faOjVXx6n+eUQ29cIMCzr8/rNWHS9pYGGQKJiY2xmVC9h12H99Xyf'
'zWE9vb5zKP3MVG6neX1hSdo7PEAb9fqRhHkqVsqUvJlIRmvXvVKTwNCP3eCjRCCI'
'PTAvjV+4ni786iXwwFYNz8l3PmPLCyQXWGohnJ8iBm+5nk7O2ynaPVW0U2W+pt2w'
'SVuvdDM5zGv2f9ltNWUiYZHJ1mmO97jSY/6YfdOUH66iRtQtDkHBRdkNBsMbD+Em'
'2TgBldtHNSJBfB3pm9FblgOcJ0FSWcUDWJ7vO0+NTXlgrRofRT6pVywzxVo6dND0'
'WzYlTWeUVsO40xJqhgUQRER9YLOLxJ0O6C8i0xFxAMKOtSdodMB3RIwt7RFQ0uyt'
'n5Z5MqkYhlMI3J1tPRTp1nEt9fyGspBOO05gi148Qasp+3N+svqKomoQglNoAxU='
'-----END CERTIFICATE-----'
==
=/ k=key:rsa (need (ring:de:pem:pkcs1 key))
=/ k8=wain (ring:en:pem:pkcs8 k)
(emit %rule /install %cert `[k8 cert])
2018-11-01 09:54:30 +03:00
:: +poke-path: for debugging
::
++ poke-path
|=(a=path abet:(add-order (sy a ~)))
2018-11-01 09:54:30 +03:00
:: +prep: initialize and adapt state
::
2018-11-01 09:54:30 +03:00
:: ++ prep _[~ this]
++ prep
|= old=(unit acme)
^- (quip move _this)
?~ old
[~ this]
[~ this(+<+ u.old)]
2018-11-01 09:54:30 +03:00
:: +rekey: create new 2.048 bit RSA key
::
:: XX do something about this iteration
::
2018-11-01 09:54:30 +03:00
++ rekey
|= eny=@
=| i=@
|- ^- key:rsa
=/ k (new-key:rsa 2.048 eny)
=/ m (met 0 n.pub.k)
2018-11-01 09:54:30 +03:00
:: ?: =(0 (mod m 8)) k
?: =(2.048 m) k
~& [%key iter=i width=m]
$(i +(i), eny +(eny))
2018-11-01 09:54:30 +03:00
:: +init: initialize :acme state
::
++ init
=/ url
'https://acme-staging-v02.api.letsencrypt.org/directory'
2018-06-29 03:03:16 +03:00
=< (retry:effect /directory +(now.bow))
%= this
bas (need (de-purl:html url))
act [(rekey eny.bow) ~]
cey (rekey (mix eny.bow (shaz now.bow)))
==
2018-11-01 09:54:30 +03:00
:: +add-order: add new certificate order
::
++ add-order
|= dom=(set turf)
^+ this
?: ?=(?(%earl %pawn) (clan:title our.bow))
this
2018-11-01 09:54:30 +03:00
:: set pending order
::
=. pen `dom
2018-11-01 09:54:30 +03:00
:: archive active order if exists
::
2018-11-01 09:54:30 +03:00
:: XX we may have pending moves out for this order
:: put dates in wires, check against order creation date?
:: or re-use order-id?
::
=? fal.hit ?=(^ rod) [u.rod fal.hit]
=. rod ~
2018-11-01 09:54:30 +03:00
:: if registered, create order
::
?^ reg.act
new-order:effect
2018-11-01 09:54:30 +03:00
:: if initialized, defer
::
?.(=(act *acct) this init)
--