2020-11-22 15:34:21 +01:00
|
|
|
#!/usr/bin/env sh
|
2023-11-18 17:57:12 +01:00
|
|
|
# shellcheck disable=SC2034
|
|
|
|
dns_huaweicloud_info='HuaweiCloud.com
|
|
|
|
Site: HuaweiCloud.com
|
|
|
|
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_huaweicloud
|
|
|
|
Options:
|
|
|
|
HUAWEICLOUD_Username Username
|
|
|
|
HUAWEICLOUD_Password Password
|
|
|
|
HUAWEICLOUD_DomainName DomainName
|
|
|
|
Issues: github.com/acmesh-official/acme.sh/issues/3265
|
|
|
|
'
|
2022-07-01 11:12:06 +02:00
|
|
|
|
2020-11-22 15:34:21 +01:00
|
|
|
iam_api="https://iam.myhuaweicloud.com"
|
2021-02-15 08:18:49 +01:00
|
|
|
dns_api="https://dns.ap-southeast-1.myhuaweicloud.com" # Should work
|
2020-11-22 15:34:21 +01:00
|
|
|
|
|
|
|
######## Public functions #####################
|
|
|
|
|
|
|
|
# Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
|
|
|
|
# Used to add txt record
|
|
|
|
#
|
|
|
|
# Ref: https://support.huaweicloud.com/intl/zh-cn/api-dns/zh-cn_topic_0132421999.html
|
|
|
|
#
|
2022-07-01 11:12:06 +02:00
|
|
|
# About "DomainName" parameters see: https://support.huaweicloud.com/api-iam/iam_01_0006.html
|
|
|
|
#
|
2020-11-22 15:34:21 +01:00
|
|
|
|
|
|
|
dns_huaweicloud_add() {
|
|
|
|
fulldomain=$1
|
|
|
|
txtvalue=$2
|
|
|
|
|
|
|
|
HUAWEICLOUD_Username="${HUAWEICLOUD_Username:-$(_readaccountconf_mutable HUAWEICLOUD_Username)}"
|
|
|
|
HUAWEICLOUD_Password="${HUAWEICLOUD_Password:-$(_readaccountconf_mutable HUAWEICLOUD_Password)}"
|
2023-03-12 05:41:29 +01:00
|
|
|
HUAWEICLOUD_DomainName="${HUAWEICLOUD_DomainName:-$(_readaccountconf_mutable HUAWEICLOUD_DomainName)}"
|
2020-11-22 15:34:21 +01:00
|
|
|
|
2020-11-24 03:05:34 +01:00
|
|
|
# Check information
|
2022-07-01 11:12:06 +02:00
|
|
|
if [ -z "${HUAWEICLOUD_Username}" ] || [ -z "${HUAWEICLOUD_Password}" ] || [ -z "${HUAWEICLOUD_DomainName}" ]; then
|
2020-11-24 03:05:34 +01:00
|
|
|
_err "Not enough information provided to dns_huaweicloud!"
|
2020-11-23 07:25:48 +01:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2021-02-15 08:18:49 +01:00
|
|
|
unset token # Clear token
|
2022-07-01 11:12:06 +02:00
|
|
|
token="$(_get_token "${HUAWEICLOUD_Username}" "${HUAWEICLOUD_Password}" "${HUAWEICLOUD_DomainName}")"
|
2021-02-15 08:18:49 +01:00
|
|
|
if [ -z "${token}" ]; then # Check token
|
|
|
|
_err "dns_api(dns_huaweicloud): Error getting token."
|
|
|
|
return 1
|
|
|
|
fi
|
2022-01-15 12:23:30 +01:00
|
|
|
_secure_debug "Access token is:" "${token}"
|
2021-02-15 08:18:49 +01:00
|
|
|
|
|
|
|
unset zoneid
|
2020-11-22 15:34:21 +01:00
|
|
|
zoneid="$(_get_zoneid "${token}" "${fulldomain}")"
|
2021-02-15 08:18:49 +01:00
|
|
|
if [ -z "${zoneid}" ]; then
|
|
|
|
_err "dns_api(dns_huaweicloud): Error getting zone id."
|
|
|
|
return 1
|
|
|
|
fi
|
2022-01-15 12:23:30 +01:00
|
|
|
_debug "Zone ID is:" "${zoneid}"
|
2020-11-22 15:34:21 +01:00
|
|
|
|
|
|
|
_debug "Adding Record"
|
|
|
|
_add_record "${token}" "${fulldomain}" "${txtvalue}"
|
|
|
|
ret="$?"
|
|
|
|
if [ "${ret}" != "0" ]; then
|
2021-02-15 08:18:49 +01:00
|
|
|
_err "dns_api(dns_huaweicloud): Error adding record."
|
2020-11-22 15:34:21 +01:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Do saving work if all succeeded
|
|
|
|
_saveaccountconf_mutable HUAWEICLOUD_Username "${HUAWEICLOUD_Username}"
|
|
|
|
_saveaccountconf_mutable HUAWEICLOUD_Password "${HUAWEICLOUD_Password}"
|
2022-07-01 11:12:06 +02:00
|
|
|
_saveaccountconf_mutable HUAWEICLOUD_DomainName "${HUAWEICLOUD_DomainName}"
|
2020-11-22 15:34:21 +01:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
# Usage: fulldomain txtvalue
|
|
|
|
# Used to remove the txt record after validation
|
|
|
|
#
|
|
|
|
# Ref: https://support.huaweicloud.com/intl/zh-cn/api-dns/dns_api_64005.html
|
|
|
|
#
|
|
|
|
|
|
|
|
dns_huaweicloud_rm() {
|
|
|
|
fulldomain=$1
|
|
|
|
txtvalue=$2
|
|
|
|
|
|
|
|
HUAWEICLOUD_Username="${HUAWEICLOUD_Username:-$(_readaccountconf_mutable HUAWEICLOUD_Username)}"
|
|
|
|
HUAWEICLOUD_Password="${HUAWEICLOUD_Password:-$(_readaccountconf_mutable HUAWEICLOUD_Password)}"
|
2023-03-12 05:41:29 +01:00
|
|
|
HUAWEICLOUD_DomainName="${HUAWEICLOUD_DomainName:-$(_readaccountconf_mutable HUAWEICLOUD_DomainName)}"
|
2020-11-22 15:34:21 +01:00
|
|
|
|
2020-11-24 03:05:34 +01:00
|
|
|
# Check information
|
2022-07-01 11:12:06 +02:00
|
|
|
if [ -z "${HUAWEICLOUD_Username}" ] || [ -z "${HUAWEICLOUD_Password}" ] || [ -z "${HUAWEICLOUD_DomainName}" ]; then
|
2020-11-24 03:05:34 +01:00
|
|
|
_err "Not enough information provided to dns_huaweicloud!"
|
2020-11-22 17:32:50 +01:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2021-02-15 08:18:49 +01:00
|
|
|
unset token # Clear token
|
2022-07-01 11:12:06 +02:00
|
|
|
token="$(_get_token "${HUAWEICLOUD_Username}" "${HUAWEICLOUD_Password}" "${HUAWEICLOUD_DomainName}")"
|
2021-02-15 08:18:49 +01:00
|
|
|
if [ -z "${token}" ]; then # Check token
|
|
|
|
_err "dns_api(dns_huaweicloud): Error getting token."
|
|
|
|
return 1
|
|
|
|
fi
|
2022-01-15 12:23:30 +01:00
|
|
|
_secure_debug "Access token is:" "${token}"
|
2021-02-15 08:18:49 +01:00
|
|
|
|
|
|
|
unset zoneid
|
2020-11-22 15:34:21 +01:00
|
|
|
zoneid="$(_get_zoneid "${token}" "${fulldomain}")"
|
2021-02-15 08:18:49 +01:00
|
|
|
if [ -z "${zoneid}" ]; then
|
|
|
|
_err "dns_api(dns_huaweicloud): Error getting zone id."
|
|
|
|
return 1
|
|
|
|
fi
|
2022-01-15 12:23:30 +01:00
|
|
|
_debug "Zone ID is:" "${zoneid}"
|
2020-11-22 15:56:47 +01:00
|
|
|
|
2023-03-07 02:57:39 +01:00
|
|
|
record_id="$(_get_recordset_id "${token}" "${fulldomain}" "${zoneid}")"
|
2023-03-07 02:48:13 +01:00
|
|
|
_recursive_rm_record "${token}" "${fulldomain}" "${zoneid}" "${record_id}"
|
|
|
|
ret="$?"
|
|
|
|
if [ "${ret}" != "0" ]; then
|
|
|
|
_err "dns_api(dns_huaweicloud): Error removing record."
|
|
|
|
return 1
|
|
|
|
fi
|
2023-03-07 03:01:20 +01:00
|
|
|
|
2023-03-07 02:48:13 +01:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
################### Private functions below ##################################
|
|
|
|
|
|
|
|
# _recursive_rm_record
|
|
|
|
# remove all records from the record set
|
2023-03-07 03:01:20 +01:00
|
|
|
#
|
2023-03-07 02:48:13 +01:00
|
|
|
# _token=$1
|
|
|
|
# _domain=$2
|
|
|
|
# _zoneid=$3
|
|
|
|
# _record_id=$4
|
|
|
|
#
|
|
|
|
# Returns 0 on success
|
|
|
|
_recursive_rm_record() {
|
|
|
|
_token=$1
|
|
|
|
_domain=$2
|
|
|
|
_zoneid=$3
|
|
|
|
_record_id=$4
|
|
|
|
|
|
|
|
# Most likely to have problems will huaweicloud side if more than 50 attempts but still cannot fully remove the record set
|
|
|
|
# Maybe can be removed manually in the dashboard
|
|
|
|
_retry_cnt=50
|
|
|
|
|
2020-11-22 15:56:47 +01:00
|
|
|
# Remove all records
|
2020-11-24 03:05:34 +01:00
|
|
|
# Therotically HuaweiCloud does not allow more than one record set
|
|
|
|
# But remove them recurringly to increase robusty
|
2023-03-07 02:48:13 +01:00
|
|
|
|
2023-03-07 02:57:39 +01:00
|
|
|
while [ "${_record_id}" != "0" ] && [ "${_retry_cnt}" != "0" ]; do
|
2020-11-22 17:20:38 +01:00
|
|
|
_debug "Removing Record"
|
2023-03-07 02:57:39 +01:00
|
|
|
_retry_cnt=$((_retry_cnt - 1))
|
2023-03-07 02:48:13 +01:00
|
|
|
_rm_record "${_token}" "${_zoneid}" "${_record_id}"
|
|
|
|
_record_id="$(_get_recordset_id "${_token}" "${_domain}" "${_zoneid}")"
|
|
|
|
_debug2 "Checking record exists: record_id=${_record_id}"
|
2020-11-22 15:34:21 +01:00
|
|
|
done
|
2023-03-07 02:48:13 +01:00
|
|
|
|
|
|
|
# Check if retry count is reached
|
2023-03-07 02:57:39 +01:00
|
|
|
if [ "${_retry_cnt}" = "0" ]; then
|
2023-03-07 02:48:13 +01:00
|
|
|
_debug "Failed to remove record after 50 attempts, please try removing it manually in the dashboard"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2020-11-22 15:34:21 +01:00
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
# _get_zoneid
|
|
|
|
#
|
|
|
|
# _token=$1
|
|
|
|
# _domain_string=$2
|
|
|
|
#
|
|
|
|
# printf "%s" "${_zoneid}"
|
|
|
|
_get_zoneid() {
|
|
|
|
_token=$1
|
|
|
|
_domain_string=$2
|
|
|
|
export _H1="X-Auth-Token: ${_token}"
|
|
|
|
|
|
|
|
i=1
|
|
|
|
while true; do
|
2023-03-07 02:57:39 +01:00
|
|
|
h=$(printf "%s" "${_domain_string}" | cut -d . -f "$i"-100)
|
2020-11-22 15:34:21 +01:00
|
|
|
if [ -z "$h" ]; then
|
|
|
|
#not valid
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
_debug "$h"
|
|
|
|
response=$(_get "${dns_api}/v2/zones?name=${h}")
|
2022-01-15 12:23:30 +01:00
|
|
|
_debug2 "$response"
|
2022-01-14 15:10:26 +01:00
|
|
|
if _contains "${response}" '"id"'; then
|
|
|
|
zoneidlist=$(echo "${response}" | _egrep_o "\"id\": *\"[^\"]*\"" | cut -d : -f 2 | tr -d \" | tr -d " ")
|
|
|
|
zonenamelist=$(echo "${response}" | _egrep_o "\"name\": *\"[^\"]*\"" | cut -d : -f 2 | tr -d \" | tr -d " ")
|
2023-03-07 10:50:44 +01:00
|
|
|
_debug2 "Returned Zone ID(s):" "${zoneidlist}"
|
|
|
|
_debug2 "Returned Zone Name(s):" "${zonenamelist}"
|
2022-01-14 15:10:26 +01:00
|
|
|
zoneidnum=0
|
2022-01-20 07:01:33 +01:00
|
|
|
zoneidcount=$(echo "${zoneidlist}" | grep -c '^')
|
2023-03-07 10:50:44 +01:00
|
|
|
_debug "Returned Zone ID(s) Count:" "${zoneidcount}"
|
2022-01-20 07:01:33 +01:00
|
|
|
while [ "${zoneidnum}" -lt "${zoneidcount}" ]; do
|
2022-01-14 15:10:26 +01:00
|
|
|
zoneidnum=$(_math "$zoneidnum" + 1)
|
2022-01-20 07:01:33 +01:00
|
|
|
_zoneid=$(echo "${zoneidlist}" | sed -n "${zoneidnum}p")
|
|
|
|
zonename=$(echo "${zonenamelist}" | sed -n "${zoneidnum}p")
|
2022-01-15 12:23:30 +01:00
|
|
|
_debug "Check Zone Name" "${zonename}"
|
2022-01-14 15:10:26 +01:00
|
|
|
if [ "${zonename}" = "${h}." ]; then
|
|
|
|
_debug "Get Zone ID Success."
|
2022-01-20 07:01:33 +01:00
|
|
|
_debug "ZoneID:" "${_zoneid}"
|
2022-01-14 15:10:26 +01:00
|
|
|
printf "%s" "${_zoneid}"
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
done
|
2020-11-22 15:34:21 +01:00
|
|
|
fi
|
|
|
|
i=$(_math "$i" + 1)
|
|
|
|
done
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
_get_recordset_id() {
|
|
|
|
_token=$1
|
|
|
|
_domain=$2
|
|
|
|
_zoneid=$3
|
|
|
|
export _H1="X-Auth-Token: ${_token}"
|
|
|
|
|
|
|
|
response=$(_get "${dns_api}/v2/zones/${_zoneid}/recordsets?name=${_domain}")
|
2022-01-14 15:10:26 +01:00
|
|
|
if _contains "${response}" '"id"'; then
|
2020-11-22 15:34:21 +01:00
|
|
|
_id="$(echo "${response}" | _egrep_o "\"id\": *\"[^\"]*\"" | cut -d : -f 2 | tr -d \" | tr -d " ")"
|
|
|
|
printf "%s" "${_id}"
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
printf "%s" "0"
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
_add_record() {
|
|
|
|
_token=$1
|
|
|
|
_domain=$2
|
|
|
|
_txtvalue=$3
|
2020-11-23 07:25:48 +01:00
|
|
|
|
|
|
|
# Get Existing Records
|
|
|
|
export _H1="X-Auth-Token: ${_token}"
|
2020-11-23 07:57:33 +01:00
|
|
|
response=$(_get "${dns_api}/v2/zones/${zoneid}/recordsets?name=${_domain}")
|
|
|
|
|
2020-11-24 03:05:34 +01:00
|
|
|
_debug2 "${response}"
|
2020-11-24 05:58:16 +01:00
|
|
|
_exist_record=$(echo "${response}" | _egrep_o '"records":[^]]*' | sed 's/\"records\"\:\[//g')
|
2020-11-23 07:25:48 +01:00
|
|
|
_debug "${_exist_record}"
|
|
|
|
|
|
|
|
# Check if record exist
|
|
|
|
# Generate body data
|
|
|
|
if [ -z "${_exist_record}" ]; then
|
2020-11-23 07:57:33 +01:00
|
|
|
_post_body="{
|
2020-11-23 07:25:48 +01:00
|
|
|
\"name\": \"${_domain}.\",
|
|
|
|
\"description\": \"ACME Challenge\",
|
|
|
|
\"type\": \"TXT\",
|
|
|
|
\"ttl\": 1,
|
|
|
|
\"records\": [
|
|
|
|
\"\\\"${_txtvalue}\\\"\"
|
|
|
|
]
|
|
|
|
}"
|
2020-11-24 03:05:34 +01:00
|
|
|
else
|
|
|
|
_post_body="{
|
|
|
|
\"name\": \"${_domain}.\",
|
|
|
|
\"description\": \"ACME Challenge\",
|
|
|
|
\"type\": \"TXT\",
|
|
|
|
\"ttl\": 1,
|
|
|
|
\"records\": [
|
2023-03-07 03:56:10 +01:00
|
|
|
${_exist_record},\"\\\"${_txtvalue}\\\"\"
|
2020-11-24 03:05:34 +01:00
|
|
|
]
|
|
|
|
}"
|
2020-11-23 07:25:48 +01:00
|
|
|
fi
|
2020-11-23 07:57:33 +01:00
|
|
|
|
|
|
|
_record_id="$(_get_recordset_id "${_token}" "${_domain}" "${zoneid}")"
|
2022-01-15 12:23:30 +01:00
|
|
|
_debug "Record Set ID is:" "${_record_id}"
|
2020-11-23 07:57:33 +01:00
|
|
|
|
|
|
|
# Add brand new records with all old and new records
|
2020-11-22 15:34:21 +01:00
|
|
|
export _H2="Content-Type: application/json"
|
|
|
|
export _H1="X-Auth-Token: ${_token}"
|
|
|
|
|
2020-11-24 03:05:34 +01:00
|
|
|
_debug2 "${_post_body}"
|
2023-03-07 04:27:08 +01:00
|
|
|
if [ -z "${_exist_record}" ]; then
|
|
|
|
_post "${_post_body}" "${dns_api}/v2/zones/${zoneid}/recordsets" >/dev/null
|
2023-03-07 04:30:32 +01:00
|
|
|
else
|
|
|
|
_post "${_post_body}" "${dns_api}/v2/zones/${zoneid}/recordsets/${_record_id}" false "PUT" >/dev/null
|
|
|
|
fi
|
2020-11-22 15:34:21 +01:00
|
|
|
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\\r\\n")"
|
|
|
|
if [ "$_code" != "202" ]; then
|
|
|
|
_err "dns_huaweicloud: http code ${_code}"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
2020-11-23 07:57:33 +01:00
|
|
|
# _rm_record $token $zoneid $recordid
|
|
|
|
# assume ${dns_api} exist
|
|
|
|
# no output
|
|
|
|
# return 0
|
2020-11-22 15:34:21 +01:00
|
|
|
_rm_record() {
|
|
|
|
_token=$1
|
|
|
|
_zone_id=$2
|
|
|
|
_record_id=$3
|
|
|
|
|
|
|
|
export _H2="Content-Type: application/json"
|
|
|
|
export _H1="X-Auth-Token: ${_token}"
|
|
|
|
|
2020-11-23 07:57:33 +01:00
|
|
|
_post "" "${dns_api}/v2/zones/${_zone_id}/recordsets/${_record_id}" false "DELETE" >/dev/null
|
|
|
|
return $?
|
2020-11-22 15:34:21 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
_get_token() {
|
|
|
|
_username=$1
|
|
|
|
_password=$2
|
2022-07-01 11:12:06 +02:00
|
|
|
_domain_name=$3
|
2020-11-22 15:34:21 +01:00
|
|
|
|
|
|
|
_debug "Getting Token"
|
|
|
|
body="{
|
|
|
|
\"auth\": {
|
|
|
|
\"identity\": {
|
|
|
|
\"methods\": [
|
|
|
|
\"password\"
|
|
|
|
],
|
|
|
|
\"password\": {
|
|
|
|
\"user\": {
|
|
|
|
\"name\": \"${_username}\",
|
|
|
|
\"password\": \"${_password}\",
|
|
|
|
\"domain\": {
|
2022-07-01 11:12:06 +02:00
|
|
|
\"name\": \"${_domain_name}\"
|
2020-11-22 15:34:21 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
},
|
|
|
|
\"scope\": {
|
|
|
|
\"project\": {
|
2022-07-01 11:12:06 +02:00
|
|
|
\"name\": \"ap-southeast-1\"
|
2020-11-22 15:34:21 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}"
|
|
|
|
export _H1="Content-Type: application/json;charset=utf8"
|
|
|
|
_post "${body}" "${iam_api}/v3/auth/tokens" >/dev/null
|
|
|
|
_code=$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\\r\\n")
|
|
|
|
_token=$(grep "^X-Subject-Token" "$HTTP_HEADER" | cut -d " " -f 2-)
|
2022-01-15 12:23:30 +01:00
|
|
|
_secure_debug "${_code}"
|
2020-11-22 15:34:21 +01:00
|
|
|
printf "%s" "${_token}"
|
|
|
|
return 0
|
|
|
|
}
|