commit
d71595fc75
@ -76,6 +76,7 @@ https://github.com/Neilpang/acmetest
|
|||||||
- Apache mode
|
- Apache mode
|
||||||
- Nginx mode
|
- Nginx mode
|
||||||
- DNS mode
|
- DNS mode
|
||||||
|
- [DNS alias mode](https://github.com/Neilpang/acme.sh/wiki/DNS-alias-mode)
|
||||||
- [Stateless mode](https://github.com/Neilpang/acme.sh/wiki/Stateless-Mode)
|
- [Stateless mode](https://github.com/Neilpang/acme.sh/wiki/Stateless-Mode)
|
||||||
|
|
||||||
|
|
||||||
@ -204,7 +205,7 @@ Install/copy the cert/key to the production Apache or Nginx path.
|
|||||||
The cert will be renewed every **60** days by default (which is configurable). Once the cert is renewed, the Apache/Nginx service will be reloaded automatically by the command: `service apache2 force-reload` or `service nginx force-reload`.
|
The cert will be renewed every **60** days by default (which is configurable). Once the cert is renewed, the Apache/Nginx service will be reloaded automatically by the command: `service apache2 force-reload` or `service nginx force-reload`.
|
||||||
|
|
||||||
|
|
||||||
**Please take care: The reloadcmd is very important. The cert can be automatically renewed, but, without a correct 'reloadcmd' the cert may not be flushed to your server(like nginx or apache), then your website will not be able to show renewwed cert in 60 days.**
|
**Please take care: The reloadcmd is very important. The cert can be automatically renewed, but, without a correct 'reloadcmd' the cert may not be flushed to your server(like nginx or apache), then your website will not be able to show renewed cert in 60 days.**
|
||||||
|
|
||||||
# 4. Use Standalone server to issue cert
|
# 4. Use Standalone server to issue cert
|
||||||
|
|
||||||
|
75
acme.sh
75
acme.sh
@ -47,6 +47,7 @@ DEFAULT_DNS_SLEEP=120
|
|||||||
NO_VALUE="no"
|
NO_VALUE="no"
|
||||||
|
|
||||||
W_TLS="tls"
|
W_TLS="tls"
|
||||||
|
DNS_ALIAS_PREFIX="="
|
||||||
|
|
||||||
MODE_STATELESS="stateless"
|
MODE_STATELESS="stateless"
|
||||||
|
|
||||||
@ -105,6 +106,8 @@ _PREPARE_LINK="https://github.com/Neilpang/acme.sh/wiki/Install-preparations"
|
|||||||
|
|
||||||
_STATELESS_WIKI="https://github.com/Neilpang/acme.sh/wiki/Stateless-Mode"
|
_STATELESS_WIKI="https://github.com/Neilpang/acme.sh/wiki/Stateless-Mode"
|
||||||
|
|
||||||
|
_DNS_ALIAS_WIKI="https://github.com/Neilpang/acme.sh/wiki/DNS-alias-mode"
|
||||||
|
|
||||||
_DNS_MANUAL_ERR="The dns manual mode can not renew automatically, you must issue it again manually. You'd better use the other modes instead."
|
_DNS_MANUAL_ERR="The dns manual mode can not renew automatically, you must issue it again manually. You'd better use the other modes instead."
|
||||||
|
|
||||||
_DNS_MANUAL_WARN="It seems that you are using dns manual mode. please take care: $_DNS_MANUAL_ERR"
|
_DNS_MANUAL_WARN="It seems that you are using dns manual mode. please take care: $_DNS_MANUAL_ERR"
|
||||||
@ -2859,8 +2862,9 @@ _clearupdns() {
|
|||||||
_debug "skip dns."
|
_debug "skip dns."
|
||||||
return
|
return
|
||||||
fi
|
fi
|
||||||
|
_info "Removing DNS records."
|
||||||
ventries=$(echo "$vlist" | tr ',' ' ')
|
ventries=$(echo "$vlist" | tr ',' ' ')
|
||||||
|
_alias_index=1
|
||||||
for ventry in $ventries; do
|
for ventry in $ventries; do
|
||||||
d=$(echo "$ventry" | cut -d "$sep" -f 1)
|
d=$(echo "$ventry" | cut -d "$sep" -f 1)
|
||||||
keyauthorization=$(echo "$ventry" | cut -d "$sep" -f 2)
|
keyauthorization=$(echo "$ventry" | cut -d "$sep" -f 2)
|
||||||
@ -2874,7 +2878,7 @@ _clearupdns() {
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
if [ "$vtype" != "$VTYPE_DNS" ]; then
|
if [ "$vtype" != "$VTYPE_DNS" ]; then
|
||||||
_info "Skip $d for $vtype"
|
_debug "Skip $d for $vtype"
|
||||||
continue
|
continue
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@ -2902,7 +2906,19 @@ _clearupdns() {
|
|||||||
if _startswith "$_dns_root_d" "*."; then
|
if _startswith "$_dns_root_d" "*."; then
|
||||||
_dns_root_d="$(echo "$_dns_root_d" | sed 's/*.//')"
|
_dns_root_d="$(echo "$_dns_root_d" | sed 's/*.//')"
|
||||||
fi
|
fi
|
||||||
txtdomain="_acme-challenge.$_dns_root_d"
|
|
||||||
|
_d_alias="$(_getfield "$_challenge_alias" "$_alias_index")"
|
||||||
|
_alias_index="$(_math "$_alias_index" + 1)"
|
||||||
|
_debug "_d_alias" "$_d_alias"
|
||||||
|
if [ "$_d_alias" ]; then
|
||||||
|
if _startswith "$_d_alias" "$DNS_ALIAS_PREFIX"; then
|
||||||
|
txtdomain="$(echo "$_d_alias" | sed "s/$DNS_ALIAS_PREFIX//")"
|
||||||
|
else
|
||||||
|
txtdomain="_acme-challenge.$_d_alias"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
txtdomain="_acme-challenge.$_dns_root_d"
|
||||||
|
fi
|
||||||
|
|
||||||
if ! $rmcommand "$txtdomain" "$txt"; then
|
if ! $rmcommand "$txtdomain" "$txt"; then
|
||||||
_err "Error removing txt for domain:$txtdomain"
|
_err "Error removing txt for domain:$txtdomain"
|
||||||
@ -3384,7 +3400,7 @@ issue() {
|
|||||||
_post_hook="${11}"
|
_post_hook="${11}"
|
||||||
_renew_hook="${12}"
|
_renew_hook="${12}"
|
||||||
_local_addr="${13}"
|
_local_addr="${13}"
|
||||||
|
_challenge_alias="${14}"
|
||||||
#remove these later.
|
#remove these later.
|
||||||
if [ "$_web_roots" = "dns-cf" ]; then
|
if [ "$_web_roots" = "dns-cf" ]; then
|
||||||
_web_roots="dns_cf"
|
_web_roots="dns_cf"
|
||||||
@ -3437,6 +3453,11 @@ issue() {
|
|||||||
else
|
else
|
||||||
_cleardomainconf "Le_LocalAddress"
|
_cleardomainconf "Le_LocalAddress"
|
||||||
fi
|
fi
|
||||||
|
if [ "$_challenge_alias" ]; then
|
||||||
|
_savedomainconf "Le_ChallengeAlias" "$_challenge_alias"
|
||||||
|
else
|
||||||
|
_cleardomainconf "Le_ChallengeAlias"
|
||||||
|
fi
|
||||||
|
|
||||||
Le_API="$ACME_DIRECTORY"
|
Le_API="$ACME_DIRECTORY"
|
||||||
_savedomainconf "Le_API" "$Le_API"
|
_savedomainconf "Le_API" "$Le_API"
|
||||||
@ -3658,6 +3679,7 @@ $_authorizations_map"
|
|||||||
#add entry
|
#add entry
|
||||||
dnsadded=""
|
dnsadded=""
|
||||||
ventries=$(echo "$vlist" | tr "$dvsep" ' ')
|
ventries=$(echo "$vlist" | tr "$dvsep" ' ')
|
||||||
|
_alias_index=1
|
||||||
for ventry in $ventries; do
|
for ventry in $ventries; do
|
||||||
d=$(echo "$ventry" | cut -d "$sep" -f 1)
|
d=$(echo "$ventry" | cut -d "$sep" -f 1)
|
||||||
keyauthorization=$(echo "$ventry" | cut -d "$sep" -f 2)
|
keyauthorization=$(echo "$ventry" | cut -d "$sep" -f 2)
|
||||||
@ -3675,7 +3697,18 @@ $_authorizations_map"
|
|||||||
if _startswith "$_dns_root_d" "*."; then
|
if _startswith "$_dns_root_d" "*."; then
|
||||||
_dns_root_d="$(echo "$_dns_root_d" | sed 's/*.//')"
|
_dns_root_d="$(echo "$_dns_root_d" | sed 's/*.//')"
|
||||||
fi
|
fi
|
||||||
txtdomain="_acme-challenge.$_dns_root_d"
|
_d_alias="$(_getfield "$_challenge_alias" "$_alias_index")"
|
||||||
|
_alias_index="$(_math "$_alias_index" + 1)"
|
||||||
|
_debug "_d_alias" "$_d_alias"
|
||||||
|
if [ "$_d_alias" ]; then
|
||||||
|
if _startswith "$_d_alias" "$DNS_ALIAS_PREFIX"; then
|
||||||
|
txtdomain="$(echo "$_d_alias" | sed "s/$DNS_ALIAS_PREFIX//")"
|
||||||
|
else
|
||||||
|
txtdomain="_acme-challenge.$_d_alias"
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
txtdomain="_acme-challenge.$_dns_root_d"
|
||||||
|
fi
|
||||||
_debug txtdomain "$txtdomain"
|
_debug txtdomain "$txtdomain"
|
||||||
txt="$(printf "%s" "$keyauthorization" | _digest "sha256" | _url_replace)"
|
txt="$(printf "%s" "$keyauthorization" | _digest "sha256" | _url_replace)"
|
||||||
_debug txt "$txt"
|
_debug txt "$txt"
|
||||||
@ -4228,7 +4261,7 @@ renew() {
|
|||||||
fi
|
fi
|
||||||
|
|
||||||
IS_RENEW="1"
|
IS_RENEW="1"
|
||||||
issue "$Le_Webroot" "$Le_Domain" "$Le_Alt" "$Le_Keylength" "$Le_RealCertPath" "$Le_RealKeyPath" "$Le_RealCACertPath" "$Le_ReloadCmd" "$Le_RealFullChainPath" "$Le_PreHook" "$Le_PostHook" "$Le_RenewHook" "$Le_LocalAddress"
|
issue "$Le_Webroot" "$Le_Domain" "$Le_Alt" "$Le_Keylength" "$Le_RealCertPath" "$Le_RealKeyPath" "$Le_RealCACertPath" "$Le_ReloadCmd" "$Le_RealFullChainPath" "$Le_PreHook" "$Le_PostHook" "$Le_RenewHook" "$Le_LocalAddress" "$Le_ChallengeAlias"
|
||||||
res="$?"
|
res="$?"
|
||||||
if [ "$res" != "0" ]; then
|
if [ "$res" != "0" ]; then
|
||||||
return "$res"
|
return "$res"
|
||||||
@ -4292,6 +4325,17 @@ signcsr() {
|
|||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
_real_cert="$3"
|
||||||
|
_real_key="$4"
|
||||||
|
_real_ca="$5"
|
||||||
|
_reload_cmd="$6"
|
||||||
|
_real_fullchain="$7"
|
||||||
|
_pre_hook="${8}"
|
||||||
|
_post_hook="${9}"
|
||||||
|
_renew_hook="${10}"
|
||||||
|
_local_addr="${11}"
|
||||||
|
_challenge_alias="${12}"
|
||||||
|
|
||||||
_csrsubj=$(_readSubjectFromCSR "$_csrfile")
|
_csrsubj=$(_readSubjectFromCSR "$_csrfile")
|
||||||
if [ "$?" != "0" ]; then
|
if [ "$?" != "0" ]; then
|
||||||
_err "Can not read subject from csr: $_csrfile"
|
_err "Can not read subject from csr: $_csrfile"
|
||||||
@ -4337,7 +4381,7 @@ signcsr() {
|
|||||||
_info "Copy csr to: $CSR_PATH"
|
_info "Copy csr to: $CSR_PATH"
|
||||||
cp "$_csrfile" "$CSR_PATH"
|
cp "$_csrfile" "$CSR_PATH"
|
||||||
|
|
||||||
issue "$_csrW" "$_csrsubj" "$_csrdomainlist" "$_csrkeylength"
|
issue "$_csrW" "$_csrsubj" "$_csrdomainlist" "$_csrkeylength" "$_real_cert" "$_real_key" "$_real_ca" "$_reload_cmd" "$_real_fullchain" "$_pre_hook" "$_post_hook" "$_renew_hook" "$_local_addr" "$_challenge_alias"
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -5312,6 +5356,8 @@ Commands:
|
|||||||
|
|
||||||
Parameters:
|
Parameters:
|
||||||
--domain, -d domain.tld Specifies a domain, used to issue, renew or revoke etc.
|
--domain, -d domain.tld Specifies a domain, used to issue, renew or revoke etc.
|
||||||
|
--challenge-alias domain.tld The challenge domain alias for DNS alias mode: $_DNS_ALIAS_WIKI
|
||||||
|
--domain-alias domain.tld The domain alias for DNS alias mode: $_DNS_ALIAS_WIKI
|
||||||
--force, -f Used to force to install or force to renew a cert immediately.
|
--force, -f Used to force to install or force to renew a cert immediately.
|
||||||
--staging, --test Use staging server, just for test.
|
--staging, --test Use staging server, just for test.
|
||||||
--debug Output debug info.
|
--debug Output debug info.
|
||||||
@ -5463,6 +5509,7 @@ _process() {
|
|||||||
_domain=""
|
_domain=""
|
||||||
_altdomains="$NO_VALUE"
|
_altdomains="$NO_VALUE"
|
||||||
_webroot=""
|
_webroot=""
|
||||||
|
_challenge_alias=""
|
||||||
_keylength=""
|
_keylength=""
|
||||||
_accountkeylength=""
|
_accountkeylength=""
|
||||||
_cert_file=""
|
_cert_file=""
|
||||||
@ -5652,6 +5699,16 @@ _process() {
|
|||||||
fi
|
fi
|
||||||
shift
|
shift
|
||||||
;;
|
;;
|
||||||
|
--challenge-alias)
|
||||||
|
cvalue="$2"
|
||||||
|
_challenge_alias="$_challenge_alias$cvalue,"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
|
--domain-alias)
|
||||||
|
cvalue="$DNS_ALIAS_PREFIX$2"
|
||||||
|
_challenge_alias="$_challenge_alias$cvalue,"
|
||||||
|
shift
|
||||||
|
;;
|
||||||
--standalone)
|
--standalone)
|
||||||
wvalue="$NO_VALUE"
|
wvalue="$NO_VALUE"
|
||||||
if [ -z "$_webroot" ]; then
|
if [ -z "$_webroot" ]; then
|
||||||
@ -5973,13 +6030,13 @@ _process() {
|
|||||||
uninstall) uninstall "$_nocron" ;;
|
uninstall) uninstall "$_nocron" ;;
|
||||||
upgrade) upgrade ;;
|
upgrade) upgrade ;;
|
||||||
issue)
|
issue)
|
||||||
issue "$_webroot" "$_domain" "$_altdomains" "$_keylength" "$_cert_file" "$_key_file" "$_ca_file" "$_reloadcmd" "$_fullchain_file" "$_pre_hook" "$_post_hook" "$_renew_hook" "$_local_address"
|
issue "$_webroot" "$_domain" "$_altdomains" "$_keylength" "$_cert_file" "$_key_file" "$_ca_file" "$_reloadcmd" "$_fullchain_file" "$_pre_hook" "$_post_hook" "$_renew_hook" "$_local_address" "$_challenge_alias"
|
||||||
;;
|
;;
|
||||||
deploy)
|
deploy)
|
||||||
deploy "$_domain" "$_deploy_hook" "$_ecc"
|
deploy "$_domain" "$_deploy_hook" "$_ecc"
|
||||||
;;
|
;;
|
||||||
signcsr)
|
signcsr)
|
||||||
signcsr "$_csr" "$_webroot"
|
signcsr "$_csr" "$_webroot" "$_cert_file" "$_key_file" "$_ca_file" "$_reloadcmd" "$_fullchain_file" "$_pre_hook" "$_post_hook" "$_renew_hook" "$_local_address" "$_challenge_alias"
|
||||||
;;
|
;;
|
||||||
showcsr)
|
showcsr)
|
||||||
showcsr "$_csr" "$_domain"
|
showcsr "$_csr" "$_domain"
|
||||||
|
141
deploy/README.md
141
deploy/README.md
@ -31,7 +31,146 @@ acme.sh --deploy -d ftp.example.com --deploy-hook kong
|
|||||||
|
|
||||||
## 3. Deploy the cert to remote server through SSH access
|
## 3. Deploy the cert to remote server through SSH access
|
||||||
|
|
||||||
(TODO)
|
The ssh deploy plugin allows you to deploy certificates to a remote host
|
||||||
|
using SSH command to connect to the remote server. The ssh plugin is invoked
|
||||||
|
with the following command...
|
||||||
|
|
||||||
|
```sh
|
||||||
|
acme.sh --deploy -d example.com --deploy-hook ssh
|
||||||
|
```
|
||||||
|
Prior to running this for the first time you must tell the plugin where
|
||||||
|
and how to deploy the certificates. This is done by exporting the following
|
||||||
|
environment variables. This is not required for subsequent runs as the
|
||||||
|
values are stored by acme.sh in the domain configuration files.
|
||||||
|
|
||||||
|
Required...
|
||||||
|
```
|
||||||
|
export DEPLOY_SSH_USER=username
|
||||||
|
```
|
||||||
|
Optional...
|
||||||
|
```
|
||||||
|
export DEPLOY_SSH_CMD=custom ssh command
|
||||||
|
export DEPLOY_SSH_SERVER=url or ip address of remote host
|
||||||
|
export DEPLOY_SSH_KEYFILE=filename for private key
|
||||||
|
export DEPLOY_SSH_CERTFILE=filename for certificate file
|
||||||
|
export DEPLOY_SSH_CAFILE=filename for intermediate CA file
|
||||||
|
export DEPLOY_SSH_FULLCHAIN=filename for fullchain file
|
||||||
|
export DEPLOY_SSH_REMOTE_CMD=command to execute on remote host
|
||||||
|
export DEPLOY_SSH_BACKUP=yes or no
|
||||||
|
```
|
||||||
|
|
||||||
|
**DEPLOY_SSH_USER**
|
||||||
|
Username at the remote host that SSH will login with. Note that
|
||||||
|
SSH must be able to login to remote host without a password... SSH Keys
|
||||||
|
must have been exchanged with the remote host. Validate and test that you
|
||||||
|
can login to USER@URL from the host running acme.sh before using this script.
|
||||||
|
|
||||||
|
The USER@URL at the remote server must also have has permissions to write to
|
||||||
|
the target location of the certificate files and to execute any commands
|
||||||
|
(e.g. to stop/start services).
|
||||||
|
|
||||||
|
**DEPLOY_SSH_CMD**
|
||||||
|
You can customize the ssh command used to connect to the remote host. For example
|
||||||
|
if you need to connect to a specific port at the remote server you can set this
|
||||||
|
to, for example, "ssh -p 22" or to use `sshpass` to provide password inline
|
||||||
|
instead of exchanging ssh keys (this is not recommended, using keys is
|
||||||
|
more secure).
|
||||||
|
|
||||||
|
**DEPLOY_SSH_SERVER**
|
||||||
|
URL or IP Address of the remote server. If not provided then the domain
|
||||||
|
name provided on the acme.sh --deploy command line is used.
|
||||||
|
|
||||||
|
**DEPLOY_SSH_KEYFILE**
|
||||||
|
Target filename for the private key issued by LetsEncrypt.
|
||||||
|
|
||||||
|
**DEPLOY_SSH_CERTFILE**
|
||||||
|
Target filename for the certificate issued by LetsEncrypt.
|
||||||
|
If this is the same as the previous filename (for keyfile) then it is
|
||||||
|
appended to the same file.
|
||||||
|
|
||||||
|
**DEPLOY_SSH_CAFILE**
|
||||||
|
Target filename for the CA intermediate certificate issued by LetsEncrypt.
|
||||||
|
If this is the same as a previous filename (for keyfile or certfile) then
|
||||||
|
it is appended to the same file.
|
||||||
|
|
||||||
|
**DEPLOY_SSH_FULLCHAIN**
|
||||||
|
Target filename for the fullchain certificate issued by LetsEncrypt.
|
||||||
|
If this is the same as a previous filename (for keyfile, certfile or
|
||||||
|
cafile) then it is appended to the same file.
|
||||||
|
|
||||||
|
**DEPLOY_SSH_REMOTE_CMD**
|
||||||
|
Command to execute on the remote server after copying any certificates. This
|
||||||
|
could be any additional command required for example to stop and restart
|
||||||
|
the service.
|
||||||
|
|
||||||
|
**DEPLOY_SSH_BACKUP**
|
||||||
|
Before writing a certificate file to the remote server the existing
|
||||||
|
certificate will be copied to a backup directory on the remote server.
|
||||||
|
These are placed in a hidden directory in the home directory of the SSH
|
||||||
|
user
|
||||||
|
```sh
|
||||||
|
~/.acme_ssh_deploy/[domain name]-backup-[timestamp]
|
||||||
|
```
|
||||||
|
Any backups older than 180 days will be deleted when new certificates
|
||||||
|
are deployed. This defaults to "yes" set to "no" to disable backup.
|
||||||
|
|
||||||
|
###Eamples using SSH deploy
|
||||||
|
The following example illustrates deploying certifcates to a QNAP NAS
|
||||||
|
(tested with QTS version 4.2.3)
|
||||||
|
|
||||||
|
```sh
|
||||||
|
export DEPLOY_SSH_USER="admin"
|
||||||
|
export DEPLOY_SSH_KEYFILE="/etc/stunnel/stunnel.pem"
|
||||||
|
export DEPLOY_SSH_CERTFILE="/etc/stunnel/stunnel.pem"
|
||||||
|
export DEPLOY_SSH_CAFILE="/etc/stunnel/uca.pem"
|
||||||
|
export DEPLOY_SSH_REMOTE_CMD="/etc/init.d/stunnel.sh restart"
|
||||||
|
|
||||||
|
acme.sh --deploy -d qnap.example.com --deploy-hook ssh
|
||||||
|
```
|
||||||
|
Note how in this example both the private key and certificate point to
|
||||||
|
the same file. This will result in the certificate being appended
|
||||||
|
to the same file as the private key... a common requirement of several
|
||||||
|
services.
|
||||||
|
|
||||||
|
The next example illustates deploying certificates to a Unifi
|
||||||
|
Contolller (tested with version 5.4.11).
|
||||||
|
|
||||||
|
```sh
|
||||||
|
export DEPLOY_SSH_USER="root"
|
||||||
|
export DEPLOY_SSH_KEYFILE="/var/lib/unifi/unifi.example.com.key"
|
||||||
|
export DEPLOY_SSH_FULLCHAIN="/var/lib/unifi/unifi.example.com.cer"
|
||||||
|
export DEPLOY_SSH_REMOTE_CMD="openssl pkcs12 -export \
|
||||||
|
-inkey /var/lib/unifi/unifi.example.com.key \
|
||||||
|
-in /var/lib/unifi/unifi.example.com.cer \
|
||||||
|
-out /var/lib/unifi/unifi.example.com.p12 \
|
||||||
|
-name ubnt -password pass:temppass \
|
||||||
|
&& keytool -importkeystore -deststorepass aircontrolenterprise \
|
||||||
|
-destkeypass aircontrolenterprise \
|
||||||
|
-destkeystore /var/lib/unifi/keystore \
|
||||||
|
-srckeystore /var/lib/unifi/unifi.example.com.p12 \
|
||||||
|
-srcstoretype PKCS12 -srcstorepass temppass -alias ubnt -noprompt \
|
||||||
|
&& service unifi restart"
|
||||||
|
|
||||||
|
acme.sh --deploy -d unifi.example.com --deploy-hook ssh
|
||||||
|
```
|
||||||
|
In this exmple we execute several commands on the remote host
|
||||||
|
after the certificate files have been copied... to generate a pkcs12 file
|
||||||
|
compatible with Unifi, to import it into the Unifi keystore and then finaly
|
||||||
|
to restart the service.
|
||||||
|
|
||||||
|
Note also that once the certificate is imported
|
||||||
|
into the keystore the individual certificate files are no longer
|
||||||
|
required. We could if we desired delete those files immediately. If we
|
||||||
|
do that then we should disable backup at the remote host (as there are
|
||||||
|
no files to backup -- they were erased during deployment). For example...
|
||||||
|
```sh
|
||||||
|
export DEPLOY_SSH_BACKUP=no
|
||||||
|
# modify the end of the remote command...
|
||||||
|
&& rm /var/lib/unifi/unifi.example.com.key \
|
||||||
|
/var/lib/unifi/unifi.example.com.cer \
|
||||||
|
/var/lib/unifi/unifi.example.com.p12 \
|
||||||
|
&& service unifi restart
|
||||||
|
```
|
||||||
|
|
||||||
## 4. Deploy the cert to local vsftpd server
|
## 4. Deploy the cert to local vsftpd server
|
||||||
|
|
||||||
|
205
deploy/ssh.sh
Normal file
205
deploy/ssh.sh
Normal file
@ -0,0 +1,205 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
|
||||||
|
# Script to deploy certificates to remote server by SSH
|
||||||
|
# Note that SSH must be able to login to remote host without a password...
|
||||||
|
# SSH Keys must have been exchanged with the remote host. Validate and
|
||||||
|
# test that you can login to USER@SERVER from the host running acme.sh before
|
||||||
|
# using this script.
|
||||||
|
#
|
||||||
|
# The following variables exported from environment will be used.
|
||||||
|
# If not set then values previously saved in domain.conf file are used.
|
||||||
|
#
|
||||||
|
# Only a username is required. All others are optional.
|
||||||
|
#
|
||||||
|
# The following examples are for QNAP NAS running QTS 4.2
|
||||||
|
# export DEPLOY_SSH_CMD="" # defaults to ssh
|
||||||
|
# export DEPLOY_SSH_USER="admin" # required
|
||||||
|
# export DEPLOY_SSH_SERVER="qnap" # defaults to domain name
|
||||||
|
# export DEPLOY_SSH_KEYFILE="/etc/stunnel/stunnel.pem"
|
||||||
|
# export DEPLOY_SSH_CERTFILE="/etc/stunnel/stunnel.pem"
|
||||||
|
# export DEPLOY_SSH_CAFILE="/etc/stunnel/uca.pem"
|
||||||
|
# export DEPLOY_SSH_FULLCHAIN=""
|
||||||
|
# export DEPLOY_SSH_REMOTE_CMD="/etc/init.d/stunnel.sh restart"
|
||||||
|
# export DEPLOY_SSH_BACKUP="" # yes or no, default to yes
|
||||||
|
#
|
||||||
|
######## Public functions #####################
|
||||||
|
|
||||||
|
#domain keyfile certfile cafile fullchain
|
||||||
|
ssh_deploy() {
|
||||||
|
_cdomain="$1"
|
||||||
|
_ckey="$2"
|
||||||
|
_ccert="$3"
|
||||||
|
_cca="$4"
|
||||||
|
_cfullchain="$5"
|
||||||
|
_cmdstr=""
|
||||||
|
_homedir='~'
|
||||||
|
_backupprefix="$_homedir/.acme_ssh_deploy/$_cdomain-backup"
|
||||||
|
_backupdir="$_backupprefix-$(_utc_date | tr ' ' '-')"
|
||||||
|
|
||||||
|
if [ -f "$DOMAIN_CONF" ]; then
|
||||||
|
# shellcheck disable=SC1090
|
||||||
|
. "$DOMAIN_CONF"
|
||||||
|
fi
|
||||||
|
|
||||||
|
_debug _cdomain "$_cdomain"
|
||||||
|
_debug _ckey "$_ckey"
|
||||||
|
_debug _ccert "$_ccert"
|
||||||
|
_debug _cca "$_cca"
|
||||||
|
_debug _cfullchain "$_cfullchain"
|
||||||
|
|
||||||
|
# USER is required to login by SSH to remote host.
|
||||||
|
if [ -z "$DEPLOY_SSH_USER" ]; then
|
||||||
|
if [ -z "$Le_Deploy_ssh_user" ]; then
|
||||||
|
_err "DEPLOY_SSH_USER not defined."
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
Le_Deploy_ssh_user="$DEPLOY_SSH_USER"
|
||||||
|
_savedomainconf Le_Deploy_ssh_user "$Le_Deploy_ssh_user"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# SERVER is optional. If not provided then use _cdomain
|
||||||
|
if [ -n "$DEPLOY_SSH_SERVER" ]; then
|
||||||
|
Le_Deploy_ssh_server="$DEPLOY_SSH_SERVER"
|
||||||
|
_savedomainconf Le_Deploy_ssh_server "$Le_Deploy_ssh_server"
|
||||||
|
elif [ -z "$Le_Deploy_ssh_server" ]; then
|
||||||
|
Le_Deploy_ssh_server="$_cdomain"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# CMD is optional. If not provided then use ssh
|
||||||
|
if [ -n "$DEPLOY_SSH_CMD" ]; then
|
||||||
|
Le_Deploy_ssh_cmd="$DEPLOY_SSH_CMD"
|
||||||
|
_savedomainconf Le_Deploy_ssh_cmd "$Le_Deploy_ssh_cmd"
|
||||||
|
elif [ -z "$Le_Deploy_ssh_cmd" ]; then
|
||||||
|
Le_Deploy_ssh_cmd="ssh"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# BACKUP is optional. If not provided then default to yes
|
||||||
|
if [ "$DEPLOY_SSH_BACKUP" = "no" ]; then
|
||||||
|
Le_Deploy_ssh_backup="no"
|
||||||
|
elif [ -z "$Le_Deploy_ssh_backup" ]; then
|
||||||
|
Le_Deploy_ssh_backup="yes"
|
||||||
|
fi
|
||||||
|
_savedomainconf Le_Deploy_ssh_backup "$Le_Deploy_ssh_backup"
|
||||||
|
|
||||||
|
_info "Deploy certificates to remote server $Le_Deploy_ssh_user@$Le_Deploy_ssh_server"
|
||||||
|
|
||||||
|
# KEYFILE is optional.
|
||||||
|
# If provided then private key will be copied to provided filename.
|
||||||
|
if [ -n "$DEPLOY_SSH_KEYFILE" ]; then
|
||||||
|
Le_Deploy_ssh_keyfile="$DEPLOY_SSH_KEYFILE"
|
||||||
|
_savedomainconf Le_Deploy_ssh_keyfile "$Le_Deploy_ssh_keyfile"
|
||||||
|
fi
|
||||||
|
if [ -n "$Le_Deploy_ssh_keyfile" ]; then
|
||||||
|
if [ "$Le_Deploy_ssh_backup" = "yes" ]; then
|
||||||
|
# backup file we are about to overwrite.
|
||||||
|
_cmdstr="$_cmdstr cp $Le_Deploy_ssh_keyfile $_backupdir >/dev/null;"
|
||||||
|
fi
|
||||||
|
# copy new certificate into file.
|
||||||
|
_cmdstr="$_cmdstr echo \"$(cat "$_ckey")\" > $Le_Deploy_ssh_keyfile;"
|
||||||
|
_info "will copy private key to remote file $Le_Deploy_ssh_keyfile"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# CERTFILE is optional.
|
||||||
|
# If provided then private key will be copied or appended to provided filename.
|
||||||
|
if [ -n "$DEPLOY_SSH_CERTFILE" ]; then
|
||||||
|
Le_Deploy_ssh_certfile="$DEPLOY_SSH_CERTFILE"
|
||||||
|
_savedomainconf Le_Deploy_ssh_certfile "$Le_Deploy_ssh_certfile"
|
||||||
|
fi
|
||||||
|
if [ -n "$Le_Deploy_ssh_certfile" ]; then
|
||||||
|
_pipe=">"
|
||||||
|
if [ "$Le_Deploy_ssh_certfile" = "$Le_Deploy_ssh_keyfile" ]; then
|
||||||
|
# if filename is same as previous file then append.
|
||||||
|
_pipe=">>"
|
||||||
|
elif [ "$Le_Deploy_ssh_backup" = "yes" ]; then
|
||||||
|
# backup file we are about to overwrite.
|
||||||
|
_cmdstr="$_cmdstr cp $Le_Deploy_ssh_certfile $_backupdir >/dev/null;"
|
||||||
|
fi
|
||||||
|
# copy new certificate into file.
|
||||||
|
_cmdstr="$_cmdstr echo \"$(cat "$_ccert")\" $_pipe $Le_Deploy_ssh_certfile;"
|
||||||
|
_info "will copy certificate to remote file $Le_Deploy_ssh_certfile"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# CAFILE is optional.
|
||||||
|
# If provided then CA intermediate certificate will be copied or appended to provided filename.
|
||||||
|
if [ -n "$DEPLOY_SSH_CAFILE" ]; then
|
||||||
|
Le_Deploy_ssh_cafile="$DEPLOY_SSH_CAFILE"
|
||||||
|
_savedomainconf Le_Deploy_ssh_cafile "$Le_Deploy_ssh_cafile"
|
||||||
|
fi
|
||||||
|
if [ -n "$Le_Deploy_ssh_cafile" ]; then
|
||||||
|
_pipe=">"
|
||||||
|
if [ "$Le_Deploy_ssh_cafile" = "$Le_Deploy_ssh_keyfile" ] \
|
||||||
|
|| [ "$Le_Deploy_ssh_cafile" = "$Le_Deploy_ssh_certfile" ]; then
|
||||||
|
# if filename is same as previous file then append.
|
||||||
|
_pipe=">>"
|
||||||
|
elif [ "$Le_Deploy_ssh_backup" = "yes" ]; then
|
||||||
|
# backup file we are about to overwrite.
|
||||||
|
_cmdstr="$_cmdstr cp $Le_Deploy_ssh_cafile $_backupdir >/dev/null;"
|
||||||
|
fi
|
||||||
|
# copy new certificate into file.
|
||||||
|
_cmdstr="$_cmdstr echo \"$(cat "$_cca")\" $_pipe $Le_Deploy_ssh_cafile;"
|
||||||
|
_info "will copy CA file to remote file $Le_Deploy_ssh_cafile"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# FULLCHAIN is optional.
|
||||||
|
# If provided then fullchain certificate will be copied or appended to provided filename.
|
||||||
|
if [ -n "$DEPLOY_SSH_FULLCHAIN" ]; then
|
||||||
|
Le_Deploy_ssh_fullchain="$DEPLOY_SSH_FULLCHAIN"
|
||||||
|
_savedomainconf Le_Deploy_ssh_fullchain "$Le_Deploy_ssh_fullchain"
|
||||||
|
fi
|
||||||
|
if [ -n "$Le_Deploy_ssh_fullchain" ]; then
|
||||||
|
_pipe=">"
|
||||||
|
if [ "$Le_Deploy_ssh_fullchain" = "$Le_Deploy_ssh_keyfile" ] \
|
||||||
|
|| [ "$Le_Deploy_ssh_fullchain" = "$Le_Deploy_ssh_certfile" ] \
|
||||||
|
|| [ "$Le_Deploy_ssh_fullchain" = "$Le_Deploy_ssh_cafile" ]; then
|
||||||
|
# if filename is same as previous file then append.
|
||||||
|
_pipe=">>"
|
||||||
|
elif [ "$Le_Deploy_ssh_backup" = "yes" ]; then
|
||||||
|
# backup file we are about to overwrite.
|
||||||
|
_cmdstr="$_cmdstr cp $Le_Deploy_ssh_fullchain $_backupdir >/dev/null;"
|
||||||
|
fi
|
||||||
|
# copy new certificate into file.
|
||||||
|
_cmdstr="$_cmdstr echo \"$(cat "$_cfullchain")\" $_pipe $Le_Deploy_ssh_fullchain;"
|
||||||
|
_info "will copy fullchain to remote file $Le_Deploy_ssh_fullchain"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# REMOTE_CMD is optional.
|
||||||
|
# If provided then this command will be executed on remote host.
|
||||||
|
if [ -n "$DEPLOY_SSH_REMOTE_CMD" ]; then
|
||||||
|
Le_Deploy_ssh_remote_cmd="$DEPLOY_SSH_REMOTE_CMD"
|
||||||
|
_savedomainconf Le_Deploy_ssh_remote_cmd "$Le_Deploy_ssh_remote_cmd"
|
||||||
|
fi
|
||||||
|
if [ -n "$Le_Deploy_ssh_remote_cmd" ]; then
|
||||||
|
_cmdstr="$_cmdstr $Le_Deploy_ssh_remote_cmd;"
|
||||||
|
_info "Will execute remote command $Le_Deploy_ssh_remote_cmd"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$_cmdstr" ]; then
|
||||||
|
_err "No remote commands to excute. Failed to deploy certificates to remote server"
|
||||||
|
return 1
|
||||||
|
elif [ "$Le_Deploy_ssh_backup" = "yes" ]; then
|
||||||
|
# run cleanup on the backup directory, erase all older
|
||||||
|
# than 180 days (15552000 seconds).
|
||||||
|
_cmdstr="{ now=\"\$(date -u +%s)\"; for fn in $_backupprefix*; \
|
||||||
|
do if [ -d \"\$fn\" ] && [ \"\$(expr \$now - \$(date -ur \$fn +%s) )\" -ge \"15552000\" ]; \
|
||||||
|
then rm -rf \"\$fn\"; echo \"Backup \$fn deleted as older than 180 days\"; fi; done; }; $_cmdstr"
|
||||||
|
# Alternate version of above... _cmdstr="find $_backupprefix* -type d -mtime +180 2>/dev/null | xargs rm -rf; $_cmdstr"
|
||||||
|
# Create our backup directory for overwritten cert files.
|
||||||
|
_cmdstr="mkdir -p $_backupdir; $_cmdstr"
|
||||||
|
_info "Backup of old certificate files will be placed in remote directory $_backupdir"
|
||||||
|
_info "Backup directories erased after 180 days."
|
||||||
|
fi
|
||||||
|
|
||||||
|
_debug "Remote commands to execute: $_cmdstr"
|
||||||
|
_info "Submitting sequence of commands to remote server by ssh"
|
||||||
|
# quotations in bash cmd below intended. Squash travis spellcheck error
|
||||||
|
# shellcheck disable=SC2029
|
||||||
|
$Le_Deploy_ssh_cmd -T "$Le_Deploy_ssh_user@$Le_Deploy_ssh_server" sh -c "'$_cmdstr'"
|
||||||
|
_ret="$?"
|
||||||
|
|
||||||
|
if [ "$_ret" != "0" ]; then
|
||||||
|
_err "Error code $_ret returned from $Le_Deploy_ssh_cmd"
|
||||||
|
fi
|
||||||
|
|
||||||
|
return $_ret
|
||||||
|
}
|
56
deploy/vault_cli.sh
Normal file
56
deploy/vault_cli.sh
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
#!/usr/bin/env sh
|
||||||
|
|
||||||
|
# Here is a script to deploy cert to hashicorp vault
|
||||||
|
# (https://www.vaultproject.io/)
|
||||||
|
#
|
||||||
|
# it requires the vault binary to be available in PATH, and the following
|
||||||
|
# environment variables:
|
||||||
|
#
|
||||||
|
# VAULT_PREFIX - this contains the prefix path in vault
|
||||||
|
# VAULT_ADDR - vault requires this to find your vault server
|
||||||
|
#
|
||||||
|
# additionally, you need to ensure that VAULT_TOKEN is avialable or
|
||||||
|
# `vault auth` has applied the appropriate authorization for the vault binary
|
||||||
|
# to access the vault server
|
||||||
|
|
||||||
|
#returns 0 means success, otherwise error.
|
||||||
|
|
||||||
|
######## Public functions #####################
|
||||||
|
|
||||||
|
#domain keyfile certfile cafile fullchain
|
||||||
|
vault_cli_deploy() {
|
||||||
|
|
||||||
|
_cdomain="$1"
|
||||||
|
_ckey="$2"
|
||||||
|
_ccert="$3"
|
||||||
|
_cca="$4"
|
||||||
|
_cfullchain="$5"
|
||||||
|
|
||||||
|
_debug _cdomain "$_cdomain"
|
||||||
|
_debug _ckey "$_ckey"
|
||||||
|
_debug _ccert "$_ccert"
|
||||||
|
_debug _cca "$_cca"
|
||||||
|
_debug _cfullchain "$_cfullchain"
|
||||||
|
|
||||||
|
# validate required env vars
|
||||||
|
if [ -z "$VAULT_PREFIX" ]; then
|
||||||
|
_err "VAULT_PREFIX needs to be defined (contains prefix path in vault)"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -z "$VAULT_ADDR" ]; then
|
||||||
|
_err "VAULT_ADDR needs to be defined (contains vault connection address)"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
VAULT_CMD=$(which vault)
|
||||||
|
if [ ! $? ]; then
|
||||||
|
_err "cannot find vault binary!"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
$VAULT_CMD write "${VAULT_PREFIX}/${_cdomain}/cert.pem" value=@"$_ccert" || return 1
|
||||||
|
$VAULT_CMD write "${VAULT_PREFIX}/${_cdomain}/cert.key" value=@"$_ckey" || return 1
|
||||||
|
$VAULT_CMD write "${VAULT_PREFIX}/${_cdomain}/fullchain.pem" value=@"$_cfullchain" || return 1
|
||||||
|
|
||||||
|
}
|
@ -21,6 +21,11 @@ dns_aws_add() {
|
|||||||
|
|
||||||
AWS_ACCESS_KEY_ID="${AWS_ACCESS_KEY_ID:-$(_readaccountconf_mutable AWS_ACCESS_KEY_ID)}"
|
AWS_ACCESS_KEY_ID="${AWS_ACCESS_KEY_ID:-$(_readaccountconf_mutable AWS_ACCESS_KEY_ID)}"
|
||||||
AWS_SECRET_ACCESS_KEY="${AWS_SECRET_ACCESS_KEY:-$(_readaccountconf_mutable AWS_SECRET_ACCESS_KEY)}"
|
AWS_SECRET_ACCESS_KEY="${AWS_SECRET_ACCESS_KEY:-$(_readaccountconf_mutable AWS_SECRET_ACCESS_KEY)}"
|
||||||
|
|
||||||
|
if [ -z "$AWS_ACCESS_KEY_ID" ] || [ -z "$AWS_SECRET_ACCESS_KEY" ]; then
|
||||||
|
_use_container_role || _use_instance_role
|
||||||
|
fi
|
||||||
|
|
||||||
if [ -z "$AWS_ACCESS_KEY_ID" ] || [ -z "$AWS_SECRET_ACCESS_KEY" ]; then
|
if [ -z "$AWS_ACCESS_KEY_ID" ] || [ -z "$AWS_SECRET_ACCESS_KEY" ]; then
|
||||||
AWS_ACCESS_KEY_ID=""
|
AWS_ACCESS_KEY_ID=""
|
||||||
AWS_SECRET_ACCESS_KEY=""
|
AWS_SECRET_ACCESS_KEY=""
|
||||||
@ -29,9 +34,11 @@ dns_aws_add() {
|
|||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
#save for future use
|
#save for future use, unless using a role which will be fetched as needed
|
||||||
_saveaccountconf_mutable AWS_ACCESS_KEY_ID "$AWS_ACCESS_KEY_ID"
|
if [ -z "$_using_role" ]; then
|
||||||
_saveaccountconf_mutable AWS_SECRET_ACCESS_KEY "$AWS_SECRET_ACCESS_KEY"
|
_saveaccountconf_mutable AWS_ACCESS_KEY_ID "$AWS_ACCESS_KEY_ID"
|
||||||
|
_saveaccountconf_mutable AWS_SECRET_ACCESS_KEY "$AWS_SECRET_ACCESS_KEY"
|
||||||
|
fi
|
||||||
|
|
||||||
_debug "First detect the root zone"
|
_debug "First detect the root zone"
|
||||||
if ! _get_root "$fulldomain"; then
|
if ! _get_root "$fulldomain"; then
|
||||||
@ -78,6 +85,11 @@ dns_aws_rm() {
|
|||||||
|
|
||||||
AWS_ACCESS_KEY_ID="${AWS_ACCESS_KEY_ID:-$(_readaccountconf_mutable AWS_ACCESS_KEY_ID)}"
|
AWS_ACCESS_KEY_ID="${AWS_ACCESS_KEY_ID:-$(_readaccountconf_mutable AWS_ACCESS_KEY_ID)}"
|
||||||
AWS_SECRET_ACCESS_KEY="${AWS_SECRET_ACCESS_KEY:-$(_readaccountconf_mutable AWS_SECRET_ACCESS_KEY)}"
|
AWS_SECRET_ACCESS_KEY="${AWS_SECRET_ACCESS_KEY:-$(_readaccountconf_mutable AWS_SECRET_ACCESS_KEY)}"
|
||||||
|
|
||||||
|
if [ -z "$AWS_ACCESS_KEY_ID" ] || [ -z "$AWS_SECRET_ACCESS_KEY" ]; then
|
||||||
|
_use_container_role || _use_instance_role
|
||||||
|
fi
|
||||||
|
|
||||||
_debug "First detect the root zone"
|
_debug "First detect the root zone"
|
||||||
if ! _get_root "$fulldomain"; then
|
if ! _get_root "$fulldomain"; then
|
||||||
_err "invalid domain"
|
_err "invalid domain"
|
||||||
@ -162,6 +174,55 @@ _get_root() {
|
|||||||
return 1
|
return 1
|
||||||
}
|
}
|
||||||
|
|
||||||
|
_use_container_role() {
|
||||||
|
# automatically set if running inside ECS
|
||||||
|
if [ -z "$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" ]; then
|
||||||
|
_debug "No ECS environment variable detected"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_use_metadata "169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
|
||||||
|
}
|
||||||
|
|
||||||
|
_use_instance_role() {
|
||||||
|
_url="http://169.254.169.254/latest/meta-data/iam/security-credentials/"
|
||||||
|
_debug "_url" "$_url"
|
||||||
|
if ! _get "$_url" true 1 | _head_n 1 | grep -Fq 200; then
|
||||||
|
_debug "Unable to fetch IAM role from instance metadata"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_aws_role=$(_get "$_url" "" 1)
|
||||||
|
_debug "_aws_role" "$_aws_role"
|
||||||
|
_use_metadata "$_url$_aws_role"
|
||||||
|
}
|
||||||
|
|
||||||
|
_use_metadata() {
|
||||||
|
_aws_creds="$(
|
||||||
|
_get "$1" "" 1 \
|
||||||
|
| _normalizeJson \
|
||||||
|
| tr '{,}' '\n' \
|
||||||
|
| while read -r _line; do
|
||||||
|
_key="$(echo "${_line%%:*}" | tr -d '"')"
|
||||||
|
_value="${_line#*:}"
|
||||||
|
_debug3 "_key" "$_key"
|
||||||
|
_secure_debug3 "_value" "$_value"
|
||||||
|
case "$_key" in
|
||||||
|
AccessKeyId) echo "AWS_ACCESS_KEY_ID=$_value" ;;
|
||||||
|
SecretAccessKey) echo "AWS_SECRET_ACCESS_KEY=$_value" ;;
|
||||||
|
Token) echo "AWS_SESSION_TOKEN=$_value" ;;
|
||||||
|
esac
|
||||||
|
done \
|
||||||
|
| paste -sd' ' -
|
||||||
|
)"
|
||||||
|
_secure_debug "_aws_creds" "$_aws_creds"
|
||||||
|
|
||||||
|
if [ -z "$_aws_creds" ]; then
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
eval "$_aws_creds"
|
||||||
|
_using_role=true
|
||||||
|
}
|
||||||
|
|
||||||
#method uri qstr data
|
#method uri qstr data
|
||||||
aws_rest() {
|
aws_rest() {
|
||||||
mtd="$1"
|
mtd="$1"
|
||||||
|
@ -1,5 +1,7 @@
|
|||||||
#!/usr/bin/env sh
|
#!/usr/bin/env sh
|
||||||
|
|
||||||
|
WIKI="https://github.com/Neilpang/acme.sh/wiki/How-to-use-Azure-DNS"
|
||||||
|
|
||||||
######## Public functions #####################
|
######## Public functions #####################
|
||||||
|
|
||||||
# Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
|
# Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
|
||||||
@ -69,12 +71,36 @@ dns_azure_add() {
|
|||||||
|
|
||||||
acmeRecordURI="https://management.azure.com$(printf '%s' "$_domain_id" | sed 's/\\//g')/TXT/$_sub_domain?api-version=2017-09-01"
|
acmeRecordURI="https://management.azure.com$(printf '%s' "$_domain_id" | sed 's/\\//g')/TXT/$_sub_domain?api-version=2017-09-01"
|
||||||
_debug "$acmeRecordURI"
|
_debug "$acmeRecordURI"
|
||||||
body="{\"properties\": {\"TTL\": 3600, \"TXTRecords\": [{\"value\": [\"$txtvalue\"]}]}}"
|
# Get existing TXT record
|
||||||
|
_azure_rest GET "$acmeRecordURI" "" "$accesstoken"
|
||||||
|
values="{\"value\":[\"$txtvalue\"]}"
|
||||||
|
timestamp="$(_time)"
|
||||||
|
if [ "$_code" = "200" ]; then
|
||||||
|
vlist="$(echo "$response" | _egrep_o "\"value\"\s*:\s*\[\s*\"[^\"]*\"\s*]" | cut -d : -f 2 | tr -d "[]\"")"
|
||||||
|
_debug "existing TXT found"
|
||||||
|
_debug "$vlist"
|
||||||
|
existingts="$(echo "$response" | _egrep_o "\"acmetscheck\"\s*:\s*\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d "\"")"
|
||||||
|
if [ -z "$existingts" ]; then
|
||||||
|
# the record was not created by acme.sh. Copy the exisiting entires
|
||||||
|
existingts=$timestamp
|
||||||
|
fi
|
||||||
|
_diff="$(_math "$timestamp - $existingts")"
|
||||||
|
_debug "existing txt age: $_diff"
|
||||||
|
# only use recently added records and discard if older than 2 hours because they are probably orphaned
|
||||||
|
if [ "$_diff" -lt 7200 ]; then
|
||||||
|
_debug "existing txt value: $vlist"
|
||||||
|
for v in $vlist; do
|
||||||
|
values="$values ,{\"value\":[\"$v\"]}"
|
||||||
|
done
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
# Add the txtvalue TXT Record
|
||||||
|
body="{\"properties\":{\"metadata\":{\"acmetscheck\":\"$timestamp\"},\"TTL\":10, \"TXTRecords\":[$values]}}"
|
||||||
_azure_rest PUT "$acmeRecordURI" "$body" "$accesstoken"
|
_azure_rest PUT "$acmeRecordURI" "$body" "$accesstoken"
|
||||||
if [ "$_code" = "200" ] || [ "$_code" = '201' ]; then
|
if [ "$_code" = "200" ] || [ "$_code" = '201' ]; then
|
||||||
_info "validation record added"
|
_info "validation value added"
|
||||||
else
|
else
|
||||||
_err "error adding validation record ($_code)"
|
_err "error adding validation value ($_code)"
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
@ -141,13 +167,38 @@ dns_azure_rm() {
|
|||||||
|
|
||||||
acmeRecordURI="https://management.azure.com$(printf '%s' "$_domain_id" | sed 's/\\//g')/TXT/$_sub_domain?api-version=2017-09-01"
|
acmeRecordURI="https://management.azure.com$(printf '%s' "$_domain_id" | sed 's/\\//g')/TXT/$_sub_domain?api-version=2017-09-01"
|
||||||
_debug "$acmeRecordURI"
|
_debug "$acmeRecordURI"
|
||||||
body="{\"properties\": {\"TTL\": 3600, \"TXTRecords\": [{\"value\": [\"$txtvalue\"]}]}}"
|
# Get existing TXT record
|
||||||
_azure_rest DELETE "$acmeRecordURI" "" "$accesstoken"
|
_azure_rest GET "$acmeRecordURI" "" "$accesstoken"
|
||||||
if [ "$_code" = "200" ] || [ "$_code" = '204' ]; then
|
timestamp="$(_time)"
|
||||||
_info "validation record removed"
|
if [ "$_code" = "200" ]; then
|
||||||
else
|
vlist="$(echo "$response" | _egrep_o "\"value\"\s*:\s*\[\s*\"[^\"]*\"\s*]" | cut -d : -f 2 | tr -d "[]\"" | grep -v "$txtvalue")"
|
||||||
_err "error removing validation record ($_code)"
|
values=""
|
||||||
return 1
|
comma=""
|
||||||
|
for v in $vlist; do
|
||||||
|
values="$values$comma{\"value\":[\"$v\"]}"
|
||||||
|
comma=","
|
||||||
|
done
|
||||||
|
if [ -z "$values" ]; then
|
||||||
|
# No values left remove record
|
||||||
|
_debug "removing validation record completely $acmeRecordURI"
|
||||||
|
_azure_rest DELETE "$acmeRecordURI" "" "$accesstoken"
|
||||||
|
if [ "$_code" = "200" ] || [ "$_code" = '204' ]; then
|
||||||
|
_info "validation record removed"
|
||||||
|
else
|
||||||
|
_err "error removing validation record ($_code)"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
else
|
||||||
|
# Remove only txtvalue from the TXT Record
|
||||||
|
body="{\"properties\":{\"metadata\":{\"acmetscheck\":\"$timestamp\"},\"TTL\":10, \"TXTRecords\":[$values]}}"
|
||||||
|
_azure_rest PUT "$acmeRecordURI" "$body" "$accesstoken"
|
||||||
|
if [ "$_code" = "200" ] || [ "$_code" = '201' ]; then
|
||||||
|
_info "validation value removed"
|
||||||
|
else
|
||||||
|
_err "error removing validation value ($_code)"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -159,52 +210,92 @@ _azure_rest() {
|
|||||||
data="$3"
|
data="$3"
|
||||||
accesstoken="$4"
|
accesstoken="$4"
|
||||||
|
|
||||||
export _H1="authorization: Bearer $accesstoken"
|
MAX_REQUEST_RETRY_TIMES=5
|
||||||
export _H2="accept: application/json"
|
_request_retry_times=0
|
||||||
export _H3="Content-Type: application/json"
|
while [ "${_request_retry_times}" -lt "$MAX_REQUEST_RETRY_TIMES" ]; do
|
||||||
|
_debug3 _request_retry_times "$_request_retry_times"
|
||||||
_debug "$ep"
|
export _H1="authorization: Bearer $accesstoken"
|
||||||
if [ "$m" != "GET" ]; then
|
export _H2="accept: application/json"
|
||||||
_debug data "$data"
|
export _H3="Content-Type: application/json"
|
||||||
response="$(_post "$data" "$ep" "" "$m")"
|
# clear headers from previous request to avoid getting wrong http code on timeouts
|
||||||
else
|
:>"$HTTP_HEADER"
|
||||||
response="$(_get "$ep")"
|
_debug "$ep"
|
||||||
fi
|
if [ "$m" != "GET" ]; then
|
||||||
_debug2 response "$response"
|
_secure_debug2 "data $data"
|
||||||
|
response="$(_post "$data" "$ep" "" "$m")"
|
||||||
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n")"
|
else
|
||||||
_debug2 "http response code $_code"
|
response="$(_get "$ep")"
|
||||||
|
fi
|
||||||
if [ "$?" != "0" ]; then
|
_secure_debug2 "response $response"
|
||||||
_err "error $ep"
|
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n")"
|
||||||
|
_debug "http response code $_code"
|
||||||
|
if [ "$_code" = "401" ]; then
|
||||||
|
# we have an invalid access token set to expired
|
||||||
|
_saveaccountconf_mutable AZUREDNS_TOKENVALIDTO "0"
|
||||||
|
_err "access denied make sure your Azure settings are correct. See $WIKI"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
# See https://docs.microsoft.com/en-us/azure/architecture/best-practices/retry-service-specific#general-rest-and-retry-guidelines for retryable HTTP codes
|
||||||
|
if [ "$?" != "0" ] || [ -z "$_code" ] || [ "$_code" = "408" ] || [ "$_code" = "500" ] || [ "$_code" = "503" ] || [ "$_code" = "504" ]; then
|
||||||
|
_request_retry_times="$(_math "$_request_retry_times" + 1)"
|
||||||
|
_info "REST call error $_code retrying $ep in $_request_retry_times s"
|
||||||
|
_sleep "$_request_retry_times"
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
break
|
||||||
|
done
|
||||||
|
if [ "$_request_retry_times" = "$MAX_REQUEST_RETRY_TIMES" ]; then
|
||||||
|
_err "Error Azure REST called was retried $MAX_REQUEST_RETRY_TIMES times."
|
||||||
|
_err "Calling $ep failed."
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
response="$(echo "$response" | _normalizeJson)"
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
## Ref: https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-protocols-oauth-service-to-service#request-an-access-token
|
## Ref: https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-protocols-oauth-service-to-service#request-an-access-token
|
||||||
_azure_getaccess_token() {
|
_azure_getaccess_token() {
|
||||||
TENANTID=$1
|
tenantID=$1
|
||||||
clientID=$2
|
clientID=$2
|
||||||
clientSecret=$3
|
clientSecret=$3
|
||||||
|
|
||||||
|
accesstoken="${AZUREDNS_BEARERTOKEN:-$(_readaccountconf_mutable AZUREDNS_BEARERTOKEN)}"
|
||||||
|
expires_on="${AZUREDNS_TOKENVALIDTO:-$(_readaccountconf_mutable AZUREDNS_TOKENVALIDTO)}"
|
||||||
|
|
||||||
|
# can we reuse the bearer token?
|
||||||
|
if [ -n "$accesstoken" ] && [ -n "$expires_on" ]; then
|
||||||
|
if [ "$(_time)" -lt "$expires_on" ]; then
|
||||||
|
# brearer token is still valid - reuse it
|
||||||
|
_debug "reusing bearer token"
|
||||||
|
printf "%s" "$accesstoken"
|
||||||
|
return 0
|
||||||
|
else
|
||||||
|
_debug "bearer token expired"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
_debug "getting new bearer token"
|
||||||
|
|
||||||
export _H1="accept: application/json"
|
export _H1="accept: application/json"
|
||||||
export _H2="Content-Type: application/x-www-form-urlencoded"
|
export _H2="Content-Type: application/x-www-form-urlencoded"
|
||||||
|
|
||||||
body="resource=$(printf "%s" 'https://management.core.windows.net/' | _url_encode)&client_id=$(printf "%s" "$clientID" | _url_encode)&client_secret=$(printf "%s" "$clientSecret" | _url_encode)&grant_type=client_credentials"
|
body="resource=$(printf "%s" 'https://management.core.windows.net/' | _url_encode)&client_id=$(printf "%s" "$clientID" | _url_encode)&client_secret=$(printf "%s" "$clientSecret" | _url_encode)&grant_type=client_credentials"
|
||||||
_debug data "$body"
|
_secure_debug2 "data $body"
|
||||||
response="$(_post "$body" "https://login.windows.net/$TENANTID/oauth2/token" "" "POST")"
|
response="$(_post "$body" "https://login.microsoftonline.com/$tenantID/oauth2/token" "" "POST")"
|
||||||
|
_secure_debug2 "response $response"
|
||||||
|
response="$(echo "$response" | _normalizeJson)"
|
||||||
accesstoken=$(echo "$response" | _egrep_o "\"access_token\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
|
accesstoken=$(echo "$response" | _egrep_o "\"access_token\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
|
||||||
_debug2 "response $response"
|
expires_on=$(echo "$response" | _egrep_o "\"expires_on\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
|
||||||
|
|
||||||
if [ -z "$accesstoken" ]; then
|
if [ -z "$accesstoken" ]; then
|
||||||
_err "no acccess token received"
|
_err "no acccess token received. Check your Azure settings see $WIKI"
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
if [ "$?" != "0" ]; then
|
if [ "$?" != "0" ]; then
|
||||||
_err "error $response"
|
_err "error $response"
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
_saveaccountconf_mutable AZUREDNS_BEARERTOKEN "$accesstoken"
|
||||||
|
_saveaccountconf_mutable AZUREDNS_TOKENVALIDTO "$expires_on"
|
||||||
printf "%s" "$accesstoken"
|
printf "%s" "$accesstoken"
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
@ -222,7 +313,6 @@ _get_root() {
|
|||||||
## Per https://docs.microsoft.com/en-us/azure/azure-subscription-service-limits#dns-limits you are limited to 100 Zone/subscriptions anyways
|
## Per https://docs.microsoft.com/en-us/azure/azure-subscription-service-limits#dns-limits you are limited to 100 Zone/subscriptions anyways
|
||||||
##
|
##
|
||||||
_azure_rest GET "https://management.azure.com/subscriptions/$subscriptionId/providers/Microsoft.Network/dnszones?api-version=2017-09-01" "" "$accesstoken"
|
_azure_rest GET "https://management.azure.com/subscriptions/$subscriptionId/providers/Microsoft.Network/dnszones?api-version=2017-09-01" "" "$accesstoken"
|
||||||
|
|
||||||
# Find matching domain name is Json response
|
# Find matching domain name is Json response
|
||||||
while true; do
|
while true; do
|
||||||
h=$(printf "%s" "$domain" | cut -d . -f $i-100)
|
h=$(printf "%s" "$domain" | cut -d . -f $i-100)
|
||||||
|
@ -26,30 +26,18 @@ dns_cloudns_add() {
|
|||||||
|
|
||||||
host="$(echo "$1" | sed "s/\.$zone\$//")"
|
host="$(echo "$1" | sed "s/\.$zone\$//")"
|
||||||
record=$2
|
record=$2
|
||||||
record_id=$(_dns_cloudns_get_record_id "$zone" "$host")
|
|
||||||
|
|
||||||
_debug zone "$zone"
|
_debug zone "$zone"
|
||||||
_debug host "$host"
|
_debug host "$host"
|
||||||
_debug record "$record"
|
_debug record "$record"
|
||||||
_debug record_id "$record_id"
|
|
||||||
|
|
||||||
if [ -z "$record_id" ]; then
|
_info "Adding the TXT record for $1"
|
||||||
_info "Adding the TXT record for $1"
|
_dns_cloudns_http_api_call "dns/add-record.json" "domain-name=$zone&record-type=TXT&host=$host&record=$record&ttl=60"
|
||||||
_dns_cloudns_http_api_call "dns/add-record.json" "domain-name=$zone&record-type=TXT&host=$host&record=$record&ttl=60"
|
if ! _contains "$response" "\"status\":\"Success\""; then
|
||||||
if ! _contains "$response" "\"status\":\"Success\""; then
|
_err "Record cannot be added."
|
||||||
_err "Record cannot be added."
|
return 1
|
||||||
return 1
|
|
||||||
fi
|
|
||||||
_info "Added."
|
|
||||||
else
|
|
||||||
_info "Updating the TXT record for $1"
|
|
||||||
_dns_cloudns_http_api_call "dns/mod-record.json" "domain-name=$zone&record-id=$record_id&record-type=TXT&host=$host&record=$record&ttl=60"
|
|
||||||
if ! _contains "$response" "\"status\":\"Success\""; then
|
|
||||||
_err "The TXT record for $1 cannot be updated."
|
|
||||||
return 1
|
|
||||||
fi
|
|
||||||
_info "Updated."
|
|
||||||
fi
|
fi
|
||||||
|
_info "Added."
|
||||||
|
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
@ -72,22 +60,32 @@ dns_cloudns_rm() {
|
|||||||
|
|
||||||
host="$(echo "$1" | sed "s/\.$zone\$//")"
|
host="$(echo "$1" | sed "s/\.$zone\$//")"
|
||||||
record=$2
|
record=$2
|
||||||
record_id=$(_dns_cloudns_get_record_id "$zone" "$host")
|
|
||||||
|
|
||||||
_debug zone "$zone"
|
_dns_cloudns_http_api_call "dns/records.json" "domain-name=$zone&host=$host&type=TXT"
|
||||||
_debug host "$host"
|
if ! _contains "$response" "\"id\":"; then
|
||||||
_debug record "$record"
|
return 1
|
||||||
_debug record_id "$record_id"
|
|
||||||
|
|
||||||
if [ ! -z "$record_id" ]; then
|
|
||||||
_info "Deleting the TXT record for $1"
|
|
||||||
_dns_cloudns_http_api_call "dns/delete-record.json" "domain-name=$zone&record-id=$record_id"
|
|
||||||
if ! _contains "$response" "\"status\":\"Success\""; then
|
|
||||||
_err "The TXT record for $1 cannot be deleted."
|
|
||||||
return 1
|
|
||||||
fi
|
|
||||||
_info "Deleted."
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
for i in $(echo "$response" | tr '{' "\n" | grep "$record"); do
|
||||||
|
record_id=$(echo "$i" | tr ',' "\n" | grep -E '^"id"' | sed -re 's/^\"id\"\:\"([0-9]+)\"$/\1/g')
|
||||||
|
|
||||||
|
if [ ! -z "$record_id" ]; then
|
||||||
|
_debug zone "$zone"
|
||||||
|
_debug host "$host"
|
||||||
|
_debug record "$record"
|
||||||
|
_debug record_id "$record_id"
|
||||||
|
|
||||||
|
_info "Deleting the TXT record for $1"
|
||||||
|
_dns_cloudns_http_api_call "dns/delete-record.json" "domain-name=$zone&record-id=$record_id"
|
||||||
|
|
||||||
|
if ! _contains "$response" "\"status\":\"Success\""; then
|
||||||
|
_err "The TXT record for $1 cannot be deleted."
|
||||||
|
else
|
||||||
|
_info "Deleted."
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -126,7 +124,7 @@ _dns_cloudns_init_check() {
|
|||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
#save the api id and password to the account conf file.
|
# save the api id and password to the account conf file.
|
||||||
_saveaccountconf_mutable CLOUDNS_AUTH_ID "$CLOUDNS_AUTH_ID"
|
_saveaccountconf_mutable CLOUDNS_AUTH_ID "$CLOUDNS_AUTH_ID"
|
||||||
_saveaccountconf_mutable CLOUDNS_SUB_AUTH_ID "$CLOUDNS_SUB_AUTH_ID"
|
_saveaccountconf_mutable CLOUDNS_SUB_AUTH_ID "$CLOUDNS_SUB_AUTH_ID"
|
||||||
_saveaccountconf_mutable CLOUDNS_AUTH_PASSWORD "$CLOUDNS_AUTH_PASSWORD"
|
_saveaccountconf_mutable CLOUDNS_AUTH_PASSWORD "$CLOUDNS_AUTH_PASSWORD"
|
||||||
@ -159,15 +157,6 @@ _dns_cloudns_get_zone_name() {
|
|||||||
return 1
|
return 1
|
||||||
}
|
}
|
||||||
|
|
||||||
_dns_cloudns_get_record_id() {
|
|
||||||
_dns_cloudns_http_api_call "dns/records.json" "domain-name=$1&host=$2&type=TXT"
|
|
||||||
if _contains "$response" "\"id\":"; then
|
|
||||||
echo "$response" | cut -d '"' -f 2
|
|
||||||
return 0
|
|
||||||
fi
|
|
||||||
return 1
|
|
||||||
}
|
|
||||||
|
|
||||||
_dns_cloudns_http_api_call() {
|
_dns_cloudns_http_api_call() {
|
||||||
method=$1
|
method=$1
|
||||||
|
|
||||||
@ -189,7 +178,7 @@ _dns_cloudns_http_api_call() {
|
|||||||
|
|
||||||
response="$(_get "$CLOUDNS_API/$method?$data")"
|
response="$(_get "$CLOUDNS_API/$method?$data")"
|
||||||
|
|
||||||
_debug2 response "$response"
|
_debug response "$response"
|
||||||
|
|
||||||
return 0
|
return 0
|
||||||
}
|
}
|
||||||
|
@ -117,7 +117,7 @@ _find_zone() {
|
|||||||
_debug2 response "$response"
|
_debug2 response "$response"
|
||||||
_table="$(echo "$response" | tr -d "#" | sed "s/<table/#<table/g" | tr -d "\n" | tr "#" "\n" | grep 'id="domains_table"')"
|
_table="$(echo "$response" | tr -d "#" | sed "s/<table/#<table/g" | tr -d "\n" | tr "#" "\n" | grep 'id="domains_table"')"
|
||||||
_debug2 _table "$_table"
|
_debug2 _table "$_table"
|
||||||
_matches="$(echo "$_table" | sed "s/<tr/#<tr/g" | tr "#" "\n" | grep 'alt="edit"' | tr -d " " | sed "s/<td/#<td/g" | tr "#" "\n" | sed -n 3p)"
|
_matches="$(echo "$_table" | sed "s/<tr/#<tr/g" | tr "#" "\n" | grep 'alt="edit"' | tr -d " " | sed "s/<td/#<td/g" | tr "#" "\n" | grep 'hosted_dns_zoneid')"
|
||||||
_debug2 _matches "$_matches"
|
_debug2 _matches "$_matches"
|
||||||
# Zone names and zone IDs are in same order
|
# Zone names and zone IDs are in same order
|
||||||
_zone_ids=$(echo "$_matches" | _egrep_o "hosted_dns_zoneid=[0-9]*&" | cut -d = -f 2 | tr -d '&')
|
_zone_ids=$(echo "$_matches" | _egrep_o "hosted_dns_zoneid=[0-9]*&" | cut -d = -f 2 | tr -d '&')
|
||||||
|
@ -43,34 +43,16 @@ dns_me_add() {
|
|||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
count=$(printf "%s\n" "$response" | _egrep_o "\"totalRecords\":[^,]*" | cut -d : -f 2)
|
_info "Adding record"
|
||||||
_debug count "$count"
|
if _me_rest POST "$_domain_id/records/" "{\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"value\":\"$txtvalue\",\"gtdLocation\":\"DEFAULT\",\"ttl\":120}"; then
|
||||||
if [ "$count" = "0" ]; then
|
if printf -- "%s" "$response" | grep \"id\": >/dev/null; then
|
||||||
_info "Adding record"
|
_info "Added"
|
||||||
if _me_rest POST "$_domain_id/records/" "{\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"value\":\"$txtvalue\",\"gtdLocation\":\"DEFAULT\",\"ttl\":120}"; then
|
|
||||||
if printf -- "%s" "$response" | grep \"id\": >/dev/null; then
|
|
||||||
_info "Added"
|
|
||||||
#todo: check if the record takes effect
|
|
||||||
return 0
|
|
||||||
else
|
|
||||||
_err "Add txt record error."
|
|
||||||
return 1
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
_err "Add txt record error."
|
|
||||||
else
|
|
||||||
_info "Updating record"
|
|
||||||
record_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":[^,]*" | cut -d : -f 2 | head -n 1)
|
|
||||||
_debug "record_id" "$record_id"
|
|
||||||
|
|
||||||
_me_rest PUT "$_domain_id/records/$record_id/" "{\"id\":\"$record_id\",\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"value\":\"$txtvalue\",\"gtdLocation\":\"DEFAULT\",\"ttl\":120}"
|
|
||||||
if [ "$?" = "0" ]; then
|
|
||||||
_info "Updated"
|
|
||||||
#todo: check if the record takes effect
|
#todo: check if the record takes effect
|
||||||
return 0
|
return 0
|
||||||
|
else
|
||||||
|
_err "Add txt record error."
|
||||||
|
return 1
|
||||||
fi
|
fi
|
||||||
_err "Update error"
|
|
||||||
return 1
|
|
||||||
fi
|
fi
|
||||||
|
|
||||||
}
|
}
|
||||||
@ -96,7 +78,7 @@ dns_me_rm() {
|
|||||||
if [ "$count" = "0" ]; then
|
if [ "$count" = "0" ]; then
|
||||||
_info "Don't need to remove."
|
_info "Don't need to remove."
|
||||||
else
|
else
|
||||||
record_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":[^,]*" | cut -d : -f 2 | head -n 1)
|
record_id=$(printf "%s\n" "$response" | _egrep_o ",\"value\":\"..$txtvalue..\",\"id\":[^,]*" | cut -d : -f 3 | head -n 1)
|
||||||
_debug "record_id" "$record_id"
|
_debug "record_id" "$record_id"
|
||||||
if [ -z "$record_id" ]; then
|
if [ -z "$record_id" ]; then
|
||||||
_err "Can not get record id to remove."
|
_err "Can not get record id to remove."
|
||||||
@ -152,7 +134,7 @@ _me_rest() {
|
|||||||
data="$3"
|
data="$3"
|
||||||
_debug "$ep"
|
_debug "$ep"
|
||||||
|
|
||||||
cdate=$(date -u +"%a, %d %b %Y %T %Z")
|
cdate=$(LANG=C date -u +"%a, %d %b %Y %T %Z")
|
||||||
hmac=$(printf "%s" "$cdate" | _hmac sha1 "$(printf "%s" "$ME_Secret" | _hex_dump | tr -d " ")" hex)
|
hmac=$(printf "%s" "$cdate" | _hmac sha1 "$(printf "%s" "$ME_Secret" | _hex_dump | tr -d " ")" hex)
|
||||||
|
|
||||||
export _H1="x-dnsme-apiKey: $ME_Key"
|
export _H1="x-dnsme-apiKey: $ME_Key"
|
||||||
|
Loading…
Reference in New Issue
Block a user