mirror of
				https://github.com/acmesh-official/acme.sh
				synced 2025-11-04 13:55:56 +08:00 
			
		
		
		
	Compare commits
	
		
			500 Commits
		
	
	
		
			3.0.8
			...
			b722d1a673
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					b722d1a673 | ||
| 
						 | 
					15197455f2 | ||
| 
						 | 
					2584f09083 | ||
| 
						 | 
					d439933b52 | ||
| 
						 | 
					094d03bf7a | ||
| 
						 | 
					0f5093c0b7 | ||
| 
						 | 
					80748b9fe0 | ||
| 
						 | 
					b244c76dd5 | ||
| 
						 | 
					f2dbf56db1 | ||
| 
						 | 
					e5214ea2e5 | ||
| 
						 | 
					11995b958a | ||
| 
						 | 
					493ec4be52 | ||
| 
						 | 
					604e6873ba | ||
| 
						 | 
					5954f0dde5 | ||
| 
						 | 
					f22b490a10 | ||
| 
						 | 
					471e0c05f9 | ||
| 
						 | 
					c3ec827fdd | ||
| 
						 | 
					ca7bdd9101 | ||
| 
						 | 
					070cd0f4df | ||
| 
						 | 
					1b00ced7ad | ||
| 
						 | 
					44c7473ef9 | ||
| 
						 | 
					b4a5149ba2 | ||
| 
						 | 
					df350e6660 | ||
| 
						 | 
					d76f4b27b0 | ||
| 
						 | 
					a1ea2a5aa6 | ||
| 
						 | 
					8608e9cd3a | ||
| 
						 | 
					5f8f7ee576 | ||
| 
						 | 
					fc3bfda3bd | ||
| 
						 | 
					c4d228ad8d | ||
| 
						 | 
					30faf500eb | ||
| 
						 | 
					26d4bac85f | ||
| 
						 | 
					e0e3cdc316 | ||
| 
						 | 
					1deb52f86d | ||
| 
						 | 
					39cb87dc4b | ||
| 
						 | 
					04e2549239 | ||
| 
						 | 
					e06cdbf0ac | ||
| 
						 | 
					d366b7e4fc | ||
| 
						 | 
					5aae3333bc | ||
| 
						 | 
					6d40ac8644 | ||
| 
						 | 
					d7c428fc8d | ||
| 
						 | 
					28f8f56fa3 | ||
| 
						 | 
					b1f6b5314c | ||
| 
						 | 
					fdb1e8c2e4 | ||
| 
						 | 
					5b02e86334 | ||
| 
						 | 
					10627e4974 | ||
| 
						 | 
					1b89e7c2ec | ||
| 
						 | 
					bcf0afb25e | ||
| 
						 | 
					ab22c8ca1c | ||
| 
						 | 
					49513cb2ee | ||
| 
						 | 
					1b5e66f9c2 | ||
| 
						 | 
					1f486fc9a5 | ||
| 
						 | 
					4cdbdf2125 | ||
| 
						 | 
					ec5ecabdec | ||
| 
						 | 
					e391301348 | ||
| 
						 | 
					49866b6cf4 | ||
| 
						 | 
					09d326de3a | ||
| 
						 | 
					8cac773e34 | ||
| 
						 | 
					365ec1fd5e | ||
| 
						 | 
					40e58ed12d | ||
| 
						 | 
					0c98dc54fe | ||
| 
						 | 
					3b0f624302 | ||
| 
						 | 
					56242423b2 | ||
| 
						 | 
					8113711b7a | ||
| 
						 | 
					85ec6343ff | ||
| 
						 | 
					daf183e2cc | ||
| 
						 | 
					c6819cbd6b | ||
| 
						 | 
					01ed3c3326 | ||
| 
						 | 
					76b68f7ccb | ||
| 
						 | 
					2bea808251 | ||
| 
						 | 
					52e051bb02 | ||
| 
						 | 
					74fdf649d3 | ||
| 
						 | 
					2402f463e1 | ||
| 
						 | 
					424d33faa0 | ||
| 
						 | 
					b64c57fa36 | ||
| 
						 | 
					6966b3810d | ||
| 
						 | 
					02cb4764c2 | ||
| 
						 | 
					89071f7226 | ||
| 
						 | 
					d6eca62e56 | ||
| 
						 | 
					b025e7f0f2 | ||
| 
						 | 
					0f7ecad4e8 | ||
| 
						 | 
					4a16aaacb6 | ||
| 
						 | 
					21c758c3d3 | ||
| 
						 | 
					c338f1a3fa | ||
| 
						 | 
					242085d676 | ||
| 
						 | 
					289d895423 | ||
| 
						 | 
					f2b248243c | ||
| 
						 | 
					fcd358eb71 | ||
| 
						 | 
					06d3739a8d | ||
| 
						 | 
					bff1064dbd | ||
| 
						 | 
					19678db933 | ||
| 
						 | 
					3d8b682380 | ||
| 
						 | 
					7b76502ee6 | ||
| 
						 | 
					28687ad7c7 | ||
| 
						 | 
					d420ff0e56 | ||
| 
						 | 
					ed1adfd878 | ||
| 
						 | 
					58a7b9ffa7 | ||
| 
						 | 
					af5d046698 | ||
| 
						 | 
					9e75b707ce | ||
| 
						 | 
					8241b078ce | ||
| 
						 | 
					c8f1e41197 | ||
| 
						 | 
					cddf098f47 | ||
| 
						 | 
					500cfbc19c | ||
| 
						 | 
					133ae8555a | ||
| 
						 | 
					f132010acb | ||
| 
						 | 
					426305dc33 | ||
| 
						 | 
					55282851c4 | ||
| 
						 | 
					9e7d1b9ce7 | ||
| 
						 | 
					e0da5f1703 | ||
| 
						 | 
					4f5a70b804 | ||
| 
						 | 
					42bbd1b44a | ||
| 
						 | 
					fdeaf861e3 | ||
| 
						 | 
					8e032a27c4 | ||
| 
						 | 
					5bfd43b718 | ||
| 
						 | 
					ce7f4cb9a8 | ||
| 
						 | 
					99a4cf9e07 | ||
| 
						 | 
					b82f6801cd | ||
| 
						 | 
					184cb0b9a8 | ||
| 
						 | 
					bf2e99efa6 | ||
| 
						 | 
					7543d5220c | ||
| 
						 | 
					ca73e1f024 | ||
| 
						 | 
					c2ccc1f980 | ||
| 
						 | 
					f34d4bd6da | ||
| 
						 | 
					8a4b436314 | ||
| 
						 | 
					42aaf7c2a0 | ||
| 
						 | 
					eb00852a71 | ||
| 
						 | 
					b0535d8b40 | ||
| 
						 | 
					8b4d93cc14 | ||
| 
						 | 
					e2d0923122 | ||
| 
						 | 
					2928d84339 | ||
| 
						 | 
					b5e3883891 | ||
| 
						 | 
					d01aefd1eb | ||
| 
						 | 
					e1d447847f | ||
| 
						 | 
					24a1b93842 | ||
| 
						 | 
					bed1c311e3 | ||
| 
						 | 
					1ce8d3ae9b | ||
| 
						 | 
					676d76696b | ||
| 
						 | 
					1d18432f8d | ||
| 
						 | 
					277f13ff9d | ||
| 
						 | 
					2d365efe56 | ||
| 
						 | 
					e81635f23d | ||
| 
						 | 
					827315e059 | ||
| 
						 | 
					e55a54f3d4 | ||
| 
						 | 
					5e8b40faf6 | ||
| 
						 | 
					45b9982172 | ||
| 
						 | 
					9b267bb572 | ||
| 
						 | 
					20c7bfaff2 | ||
| 
						 | 
					dd29f970a2 | ||
| 
						 | 
					b6a9a1a7ee | ||
| 
						 | 
					1d87d9b370 | ||
| 
						 | 
					40b6db6a27 | ||
| 
						 | 
					9ba662a53e | ||
| 
						 | 
					dc228c3dbb | ||
| 
						 | 
					dd5dd422d1 | ||
| 
						 | 
					73fdf4b957 | ||
| 
						 | 
					a1de13657e | ||
| 
						 | 
					93c19356d0 | ||
| 
						 | 
					8a27c902ff | ||
| 
						 | 
					be35b55444 | ||
| 
						 | 
					a16ccf40c2 | ||
| 
						 | 
					5c7b1cd5f2 | ||
| 
						 | 
					fc5e593e2d | ||
| 
						 | 
					f1dc79f0b5 | ||
| 
						 | 
					34ea97dcea | ||
| 
						 | 
					f2931163aa | ||
| 
						 | 
					7e320d2748 | ||
| 
						 | 
					b38d15adb3 | ||
| 
						 | 
					29342e036f | ||
| 
						 | 
					45660902ed | ||
| 
						 | 
					72318cb687 | ||
| 
						 | 
					f277223a65 | ||
| 
						 | 
					262fa74f5e | ||
| 
						 | 
					ebdd221c72 | ||
| 
						 | 
					2b8d162c9e | ||
| 
						 | 
					dc8cf0e02e | ||
| 
						 | 
					a054f6a97b | ||
| 
						 | 
					63d11c3eea | ||
| 
						 | 
					dd2199c472 | ||
| 
						 | 
					661c3bbdb0 | ||
| 
						 | 
					5236e81068 | ||
| 
						 | 
					c459b5eb9d | ||
| 
						 | 
					384f0fb89a | ||
| 
						 | 
					1d628bcf9e | ||
| 
						 | 
					b8644f49ec | ||
| 
						 | 
					091c1f7ef1 | ||
| 
						 | 
					c838c3fa73 | ||
| 
						 | 
					8bb9106b42 | ||
| 
						 | 
					a7e3b0d184 | ||
| 
						 | 
					449c542d5a | ||
| 
						 | 
					7f19f8cf0e | ||
| 
						 | 
					b2eb704394 | ||
| 
						 | 
					899da0c6ea | ||
| 
						 | 
					def41a7878 | ||
| 
						 | 
					6dbe49089e | ||
| 
						 | 
					5883e5159f | ||
| 
						 | 
					26a5d48f63 | ||
| 
						 | 
					aa6feb4b62 | ||
| 
						 | 
					2fef0ebea8 | ||
| 
						 | 
					66dd51a09a | ||
| 
						 | 
					077868604d | ||
| 
						 | 
					6c555cb666 | ||
| 
						 | 
					0ae80272fb | ||
| 
						 | 
					7bef7cf9e2 | ||
| 
						 | 
					6fa24cad18 | ||
| 
						 | 
					6313020ba9 | ||
| 
						 | 
					b2eead386d | ||
| 
						 | 
					b826123d98 | ||
| 
						 | 
					cf537070d8 | ||
| 
						 | 
					7a00a1dced | ||
| 
						 | 
					80c37ebab2 | ||
| 
						 | 
					5fb4136bcd | ||
| 
						 | 
					6a249ca1dd | ||
| 
						 | 
					5610d4782f | ||
| 
						 | 
					fef4574c3c | ||
| 
						 | 
					65239c7c25 | ||
| 
						 | 
					1b123054b3 | ||
| 
						 | 
					b29d17f522 | ||
| 
						 | 
					04aefbf28d | ||
| 
						 | 
					f8fcf02448 | ||
| 
						 | 
					0e4fd5269b | ||
| 
						 | 
					6328496bfb | ||
| 
						 | 
					524b40b75f | ||
| 
						 | 
					0241552c0d | ||
| 
						 | 
					fd3f6687ce | ||
| 
						 | 
					93d63749e6 | ||
| 
						 | 
					41bf5450d9 | ||
| 
						 | 
					d37553e7b8 | ||
| 
						 | 
					101d7138c2 | ||
| 
						 | 
					11de3aed51 | ||
| 
						 | 
					4bb41cf886 | ||
| 
						 | 
					1ae7dd9b11 | ||
| 
						 | 
					a3250fac6d | ||
| 
						 | 
					fabe6317ef | ||
| 
						 | 
					23a4af9a52 | ||
| 
						 | 
					9526dbadad | ||
| 
						 | 
					6ad469c637 | ||
| 
						 | 
					b30cdf0873 | ||
| 
						 | 
					234bc93ddb | ||
| 
						 | 
					42862852b8 | ||
| 
						 | 
					7a6101c417 | ||
| 
						 | 
					588123ed11 | ||
| 
						 | 
					ac9852f9df | ||
| 
						 | 
					d093476da5 | ||
| 
						 | 
					9ad794f2cc | ||
| 
						 | 
					b0f566a80d | ||
| 
						 | 
					d3f3a70350 | ||
| 
						 | 
					3f262fe872 | ||
| 
						 | 
					150c708726 | ||
| 
						 | 
					7512dbffbb | ||
| 
						 | 
					3cfa882fe1 | ||
| 
						 | 
					35f3b7088d | ||
| 
						 | 
					07220a324d | ||
| 
						 | 
					c7cecd5b4f | ||
| 
						 | 
					ab1a2045d9 | ||
| 
						 | 
					5e9a067e87 | ||
| 
						 | 
					4cc460be64 | ||
| 
						 | 
					112bfccfd5 | ||
| 
						 | 
					b29cb08956 | ||
| 
						 | 
					e42ad9be24 | ||
| 
						 | 
					02da1700e0 | ||
| 
						 | 
					a9f97e1fe2 | ||
| 
						 | 
					d75077c6f9 | ||
| 
						 | 
					b81939f02d | ||
| 
						 | 
					0e1d90dd0c | ||
| 
						 | 
					03e9c612b9 | ||
| 
						 | 
					f981c782bb | ||
| 
						 | 
					3fbdb7a007 | ||
| 
						 | 
					2997a15ba8 | ||
| 
						 | 
					b4c02eca16 | ||
| 
						 | 
					223dc87cef | ||
| 
						 | 
					3ccdae0634 | ||
| 
						 | 
					11af6f49c6 | ||
| 
						 | 
					22dfedf6ae | ||
| 
						 | 
					157d3f9dc9 | ||
| 
						 | 
					f3b2ab5e60 | ||
| 
						 | 
					fca53a0c2c | ||
| 
						 | 
					6d302889fa | ||
| 
						 | 
					a94ac63e74 | ||
| 
						 | 
					19e73f8889 | ||
| 
						 | 
					aacc26179e | ||
| 
						 | 
					36f060dcf6 | ||
| 
						 | 
					cb12c8dfd5 | ||
| 
						 | 
					9cd1d1a9dc | ||
| 
						 | 
					ebaf4c9c01 | ||
| 
						 | 
					44240339d9 | ||
| 
						 | 
					9110375173 | ||
| 
						 | 
					c3557bbe3f | ||
| 
						 | 
					cd924099e4 | ||
| 
						 | 
					f2a311bb81 | ||
| 
						 | 
					d7855e8fe5 | ||
| 
						 | 
					1e52efa867 | ||
| 
						 | 
					5d6f1bd2d7 | ||
| 
						 | 
					48ccaa8b91 | ||
| 
						 | 
					54ac0048c4 | ||
| 
						 | 
					276e089419 | ||
| 
						 | 
					3b8608761b | ||
| 
						 | 
					413a91646c | ||
| 
						 | 
					4299c6a802 | ||
| 
						 | 
					4232923641 | ||
| 
						 | 
					75b4bb306b | ||
| 
						 | 
					4e0686f73c | ||
| 
						 | 
					709f1e76d3 | ||
| 
						 | 
					0c2d7b9c06 | ||
| 
						 | 
					412e14a41c | ||
| 
						 | 
					532b425dd9 | ||
| 
						 | 
					2bb5fbdee5 | ||
| 
						 | 
					38c41b72d6 | ||
| 
						 | 
					30e89c3cdc | ||
| 
						 | 
					b665014707 | ||
| 
						 | 
					e98e7a232f | ||
| 
						 | 
					5f7ad72d45 | ||
| 
						 | 
					9c25365b12 | ||
| 
						 | 
					0cc74b7cfe | ||
| 
						 | 
					8a972ea213 | ||
| 
						 | 
					2229bcc98b | ||
| 
						 | 
					1bfd4672e1 | ||
| 
						 | 
					15e9e8575a | ||
| 
						 | 
					d7bafa6dfa | ||
| 
						 | 
					35632f2109 | ||
| 
						 | 
					08807b498e | ||
| 
						 | 
					e8a453c567 | ||
| 
						 | 
					717802611a | ||
| 
						 | 
					b6a77e0231 | ||
| 
						 | 
					21b966c8e6 | ||
| 
						 | 
					64a1e88982 | ||
| 
						 | 
					34c8b882c6 | ||
| 
						 | 
					fa420d70cc | ||
| 
						 | 
					2c67934191 | ||
| 
						 | 
					821adcf178 | ||
| 
						 | 
					8bf9482bc0 | ||
| 
						 | 
					fe8ad3548b | ||
| 
						 | 
					4f17bc0d86 | ||
| 
						 | 
					1a43c81840 | ||
| 
						 | 
					d3cf3f7a5c | ||
| 
						 | 
					4f96a2a667 | ||
| 
						 | 
					7b63ebfcaa | ||
| 
						 | 
					724f3aa301 | ||
| 
						 | 
					1ff326c89c | ||
| 
						 | 
					2663f500cf | ||
| 
						 | 
					43ed998ed6 | ||
| 
						 | 
					a3032ab945 | ||
| 
						 | 
					af9425ed8f | ||
| 
						 | 
					d058ac6174 | ||
| 
						 | 
					a4e7806d21 | ||
| 
						 | 
					03906cc055 | ||
| 
						 | 
					10833dcf39 | ||
| 
						 | 
					a00323412b | ||
| 
						 | 
					838a20ea95 | ||
| 
						 | 
					e8ed8cbfcd | ||
| 
						 | 
					5c78a5e4fe | ||
| 
						 | 
					30ed4af38d | ||
| 
						 | 
					6a9304dd1c | ||
| 
						 | 
					1782eeb785 | ||
| 
						 | 
					1aabb7d6de | ||
| 
						 | 
					d4b8f9700b | ||
| 
						 | 
					2ebecf1aa0 | ||
| 
						 | 
					7031df4948 | ||
| 
						 | 
					e0381dd757 | ||
| 
						 | 
					9b2eae24d2 | ||
| 
						 | 
					7362e8de4d | ||
| 
						 | 
					87beb0a5f2 | ||
| 
						 | 
					fc69cea4f7 | ||
| 
						 | 
					ad4780a1ac | ||
| 
						 | 
					72f487d2e3 | ||
| 
						 | 
					0c10bd7dd7 | ||
| 
						 | 
					b0418cb394 | ||
| 
						 | 
					a30c81dadc | ||
| 
						 | 
					40df6e87db | ||
| 
						 | 
					0dff1dce8f | ||
| 
						 | 
					ffd3b3e6b5 | ||
| 
						 | 
					1305b0d8dd | ||
| 
						 | 
					5fc41a3ea2 | ||
| 
						 | 
					fc87fc7cab | ||
| 
						 | 
					8887a0a6d3 | ||
| 
						 | 
					ba7764aeaf | ||
| 
						 | 
					28afe6f29f | ||
| 
						 | 
					138ab6dbbd | ||
| 
						 | 
					26c2fc21c8 | ||
| 
						 | 
					fef74c3bca | ||
| 
						 | 
					c390f1bfee | ||
| 
						 | 
					f6698d4a84 | ||
| 
						 | 
					4193196c8b | ||
| 
						 | 
					da06dc3728 | ||
| 
						 | 
					a0b8be5941 | ||
| 
						 | 
					fe971680ea | ||
| 
						 | 
					254eb8f304 | ||
| 
						 | 
					c9d15901d1 | ||
| 
						 | 
					59b3f5fb19 | ||
| 
						 | 
					dbe9dd47ce | ||
| 
						 | 
					8e35f8c3aa | ||
| 
						 | 
					80970a0ac6 | ||
| 
						 | 
					432f6ac4d7 | ||
| 
						 | 
					eaf11009d1 | ||
| 
						 | 
					df93fb773f | ||
| 
						 | 
					f6887a4dac | ||
| 
						 | 
					1c58c4c409 | ||
| 
						 | 
					a972901438 | ||
| 
						 | 
					25703296a6 | ||
| 
						 | 
					7ebe97b931 | ||
| 
						 | 
					76719d1bf5 | ||
| 
						 | 
					cb113437f6 | ||
| 
						 | 
					e6b3e42d61 | ||
| 
						 | 
					c20b0169a9 | ||
| 
						 | 
					89342bcb75 | ||
| 
						 | 
					e036eea362 | ||
| 
						 | 
					2044d633e9 | ||
| 
						 | 
					8cb684e6bd | ||
| 
						 | 
					997bd3392f | ||
| 
						 | 
					ad44c87746 | ||
| 
						 | 
					45ea2f82ba | ||
| 
						 | 
					df6aa99ec2 | ||
| 
						 | 
					1029dd3504 | ||
| 
						 | 
					114eb6288d | ||
| 
						 | 
					2ea37e6a0d | ||
| 
						 | 
					ea2330b49f | ||
| 
						 | 
					610bb2b85c | ||
| 
						 | 
					fca6e9b932 | ||
| 
						 | 
					fc7f86104e | ||
| 
						 | 
					d057a9bb6d | ||
| 
						 | 
					167aba6f26 | ||
| 
						 | 
					9ecd84080b | ||
| 
						 | 
					22d260f4e6 | ||
| 
						 | 
					ea94477cd4 | ||
| 
						 | 
					522c953860 | ||
| 
						 | 
					f86ee84457 | ||
| 
						 | 
					2d282597ca | ||
| 
						 | 
					8635d89cc8 | ||
| 
						 | 
					dc341ef9c1 | ||
| 
						 | 
					beb31ab2fa | ||
| 
						 | 
					e0214a2c2a | ||
| 
						 | 
					5275daa66c | ||
| 
						 | 
					8860915fb9 | ||
| 
						 | 
					f0d486d1ff | ||
| 
						 | 
					b27767e8f4 | ||
| 
						 | 
					0b2edd28df | ||
| 
						 | 
					dd634382d7 | ||
| 
						 | 
					c7fb155733 | ||
| 
						 | 
					1eaa2cc619 | ||
| 
						 | 
					92a47aaac5 | ||
| 
						 | 
					fcffe8beb9 | ||
| 
						 | 
					a94653ba77 | ||
| 
						 | 
					d8637b2c0f | ||
| 
						 | 
					f1b6016157 | ||
| 
						 | 
					de99d6d9fc | ||
| 
						 | 
					ca6226359b | ||
| 
						 | 
					adfafe5c54 | ||
| 
						 | 
					a8d8fefceb | ||
| 
						 | 
					3bb5943b20 | ||
| 
						 | 
					57da04b5ec | ||
| 
						 | 
					833632eee3 | ||
| 
						 | 
					abc76299c0 | ||
| 
						 | 
					c96fcf319a | ||
| 
						 | 
					5214a7c3ec | ||
| 
						 | 
					de902166a8 | ||
| 
						 | 
					cb5eae888d | ||
| 
						 | 
					b6f7710621 | ||
| 
						 | 
					3e36f05a8c | ||
| 
						 | 
					dd582c0306 | ||
| 
						 | 
					0a64567822 | ||
| 
						 | 
					2f5ea120cb | ||
| 
						 | 
					ab86e056a2 | ||
| 
						 | 
					a2bc79ddd5 | ||
| 
						 | 
					51151293d7 | ||
| 
						 | 
					5789e80d74 | ||
| 
						 | 
					2beb2f5659 | ||
| 
						 | 
					617f4acfd6 | ||
| 
						 | 
					2f8fb360aa | ||
| 
						 | 
					05ec3922f1 | ||
| 
						 | 
					1c9423ef31 | ||
| 
						 | 
					3f40380c69 | ||
| 
						 | 
					1116b73a08 | ||
| 
						 | 
					b821836dc4 | ||
| 
						 | 
					a42fef0905 | ||
| 
						 | 
					fd461fe015 | ||
| 
						 | 
					b1d019146a | ||
| 
						 | 
					95b51cf9e6 | ||
| 
						 | 
					a375e924b4 | ||
| 
						 | 
					d989617825 | ||
| 
						 | 
					177d9b7cb0 | ||
| 
						 | 
					7a1305c1bb | ||
| 
						 | 
					8bb29f53d1 | ||
| 
						 | 
					2e3c1ef4ac | ||
| 
						 | 
					ada7e12b5a | ||
| 
						 | 
					b8949ba3dd | ||
| 
						 | 
					73fe47ba79 | ||
| 
						 | 
					577920de86 | ||
| 
						 | 
					517baa3235 | ||
| 
						 | 
					bfba44fbad | ||
| 
						 | 
					c466f063c8 | ||
| 
						 | 
					295af01687 | ||
| 
						 | 
					e7284df1df | ||
| 
						 | 
					3b46060caa | ||
| 
						 | 
					696182cfa4 | ||
| 
						 | 
					d1a1d1da8f | ||
| 
						 | 
					c508984f56 | ||
| 
						 | 
					54eba51b35 | ||
| 
						 | 
					bd3a2b1bb5 | ||
| 
						 | 
					b0ca4435fd | ||
| 
						 | 
					ed72b090af | ||
| 
						 | 
					778ee02803 | ||
| 
						 | 
					c327b888c1 | 
							
								
								
									
										2
									
								
								.github/workflows/DNS.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.github/workflows/DNS.yml
									
									
									
									
										vendored
									
									
								
							@@ -281,7 +281,7 @@ jobs:
 | 
			
		||||
    - uses: vmactions/openbsd-vm@v1
 | 
			
		||||
      with:
 | 
			
		||||
        envs: 'TEST_DNS TestingDomain TEST_DNS_NO_WILDCARD TEST_DNS_NO_SUBDOMAIN TEST_DNS_SLEEP CASE TEST_LOCAL DEBUG http_proxy https_proxy TokenName1 TokenName2 TokenName3 TokenName4 TokenName5 ${{ secrets.TokenName1}} ${{ secrets.TokenName2}} ${{ secrets.TokenName3}} ${{ secrets.TokenName4}} ${{ secrets.TokenName5}}'
 | 
			
		||||
        prepare: pkg_add socat curl
 | 
			
		||||
        prepare: pkg_add socat curl libiconv
 | 
			
		||||
        usesh: true
 | 
			
		||||
        copyback: false
 | 
			
		||||
        run: |
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								.github/workflows/Linux.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.github/workflows/Linux.yml
									
									
									
									
										vendored
									
									
								
							@@ -26,7 +26,7 @@ jobs:
 | 
			
		||||
  Linux:
 | 
			
		||||
    strategy:
 | 
			
		||||
      matrix:
 | 
			
		||||
        os: ["ubuntu:latest", "debian:latest", "almalinux:latest", "fedora:latest", "opensuse/leap:latest", "alpine:latest", "oraclelinux:8", "kalilinux/kali", "archlinux:latest", "mageia", "gentoo/stage3"]
 | 
			
		||||
        os: ["ubuntu:latest", "debian:latest", "almalinux:latest", "fedora:latest", "opensuse/leap:latest", "alpine:latest", "oraclelinux:8", "kalilinux/kali", "archlinux:latest", "gentoo/stage3"]
 | 
			
		||||
    runs-on: ubuntu-latest
 | 
			
		||||
    env:
 | 
			
		||||
      TEST_LOCAL: 1
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										17
									
								
								.github/workflows/dockerhub.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										17
									
								
								.github/workflows/dockerhub.yml
									
									
									
									
										vendored
									
									
								
							@@ -15,6 +15,8 @@ concurrency:
 | 
			
		||||
  group: ${{ github.workflow }}-${{ github.ref }}
 | 
			
		||||
  cancel-in-progress: true
 | 
			
		||||
 | 
			
		||||
env:
 | 
			
		||||
  DOCKER_IMAGE: neilpang/acme.sh
 | 
			
		||||
 | 
			
		||||
jobs:
 | 
			
		||||
  CheckToken:
 | 
			
		||||
@@ -42,8 +44,15 @@ jobs:
 | 
			
		||||
    steps:
 | 
			
		||||
      - name: checkout code
 | 
			
		||||
        uses: actions/checkout@v4
 | 
			
		||||
        with:
 | 
			
		||||
          persist-credentials: false
 | 
			
		||||
      - name: Set up QEMU
 | 
			
		||||
        uses: docker/setup-qemu-action@v2
 | 
			
		||||
      - name: Extract Docker metadata
 | 
			
		||||
        id: meta
 | 
			
		||||
        uses: docker/metadata-action@v5.5.1
 | 
			
		||||
        with:
 | 
			
		||||
          images: ${DOCKER_IMAGE}
 | 
			
		||||
      - name: Set up Docker Buildx
 | 
			
		||||
        uses: docker/setup-buildx-action@v2
 | 
			
		||||
      - name: login to docker hub
 | 
			
		||||
@@ -51,8 +60,6 @@ jobs:
 | 
			
		||||
          echo "${{ secrets.DOCKER_PASSWORD }}" | docker login -u "${{ secrets.DOCKER_USERNAME }}" --password-stdin
 | 
			
		||||
      - name: build and push the image
 | 
			
		||||
        run: |
 | 
			
		||||
          DOCKER_IMAGE=neilpang/acme.sh
 | 
			
		||||
 | 
			
		||||
          if [[ $GITHUB_REF == refs/tags/* ]]; then
 | 
			
		||||
            DOCKER_IMAGE_TAG=${GITHUB_REF#refs/tags/}
 | 
			
		||||
          fi
 | 
			
		||||
@@ -66,8 +73,14 @@ jobs:
 | 
			
		||||
            fi
 | 
			
		||||
          fi
 | 
			
		||||
 | 
			
		||||
          DOCKER_LABELS=()
 | 
			
		||||
          while read -r label; do
 | 
			
		||||
            DOCKER_LABELS+=(--label "${label}")
 | 
			
		||||
          done <<<"${DOCKER_METADATA_OUTPUT_LABELS}"
 | 
			
		||||
 | 
			
		||||
          docker buildx build \
 | 
			
		||||
            --tag ${DOCKER_IMAGE}:${DOCKER_IMAGE_TAG} \
 | 
			
		||||
            "${DOCKER_LABELS[@]}" \
 | 
			
		||||
            --output "type=image,push=true" \
 | 
			
		||||
            --build-arg AUTO_UPGRADE=${AUTO_UPGRADE} \
 | 
			
		||||
            --platform linux/arm64/v8,linux/amd64,linux/arm/v6,linux/arm/v7,linux/386,linux/ppc64le,linux/s390x .
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										13
									
								
								.github/workflows/pr_dns.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										13
									
								
								.github/workflows/pr_dns.yml
									
									
									
									
										vendored
									
									
								
							@@ -20,11 +20,14 @@ jobs:
 | 
			
		||||
              owner: context.repo.owner,
 | 
			
		||||
              repo: context.repo.repo,
 | 
			
		||||
              body: `**Welcome**
 | 
			
		||||
                First thing: don't send PR to the master branch, please send to the dev branch instead.
 | 
			
		||||
                Please make sure you've read our [DNS API Dev Guide](../wiki/DNS-API-Dev-Guide) and [DNS-API-Test](../wiki/DNS-API-Test).
 | 
			
		||||
                Then reply on this message, otherwise, your code will not be reviewed or merged.
 | 
			
		||||
                We look forward to reviewing your Pull request shortly ✨
 | 
			
		||||
                注意: 必须通过了 [DNS-API-Test](../wiki/DNS-API-Test) 才会被 review. 无论是修改, 还是新加的 dns api, 都必须确保通过这个测试.
 | 
			
		||||
                    READ ME !!!!!
 | 
			
		||||
                    Read me !!!!!!
 | 
			
		||||
                    First thing: don't send PR to the master branch, please send to the dev branch instead.
 | 
			
		||||
                    Please read the [DNS API Dev Guide](../wiki/DNS-API-Dev-Guide).
 | 
			
		||||
                    You MUST pass the [DNS-API-Test](../wiki/DNS-API-Test).
 | 
			
		||||
                    Then reply on this message, otherwise, your code will not be reviewed or merged.
 | 
			
		||||
                    Please also make sure to add/update the usage here: https://github.com/acmesh-official/acme.sh/wiki/dnsapi2
 | 
			
		||||
                    注意: 必须通过了 [DNS-API-Test](../wiki/DNS-API-Test) 才会被 review. 无论是修改, 还是新加的 dns api, 都必须确保通过这个测试.
 | 
			
		||||
                `
 | 
			
		||||
            })
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										2
									
								
								.github/workflows/pr_notify.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.github/workflows/pr_notify.yml
									
									
									
									
										vendored
									
									
								
							@@ -1,4 +1,4 @@
 | 
			
		||||
name: Check dns api
 | 
			
		||||
name: Check notify api
 | 
			
		||||
 | 
			
		||||
on:
 | 
			
		||||
  pull_request_target:
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										62
									
								
								.github/workflows/wiki-monitor.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										62
									
								
								.github/workflows/wiki-monitor.yml
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,62 @@
 | 
			
		||||
name: Notify via Issue on Wiki Edit
 | 
			
		||||
 | 
			
		||||
on:
 | 
			
		||||
  gollum:
 | 
			
		||||
 | 
			
		||||
jobs:
 | 
			
		||||
  notify:
 | 
			
		||||
    runs-on: ubuntu-latest
 | 
			
		||||
    steps:
 | 
			
		||||
      - name: Checkout wiki repository
 | 
			
		||||
        uses: actions/checkout@v4
 | 
			
		||||
        with:
 | 
			
		||||
          repository: ${{ github.repository }}.wiki
 | 
			
		||||
          path: wiki
 | 
			
		||||
          fetch-depth: 0
 | 
			
		||||
 | 
			
		||||
      - name: Generate wiki change message
 | 
			
		||||
        run: |
 | 
			
		||||
            actor="${{ github.actor }}"
 | 
			
		||||
            sender_url=$(jq -r '.sender.html_url' "$GITHUB_EVENT_PATH")
 | 
			
		||||
            page_name=$(jq -r '.pages[0].page_name' "$GITHUB_EVENT_PATH")
 | 
			
		||||
            page_sha=$(jq -r '.pages[0].sha' "$GITHUB_EVENT_PATH")
 | 
			
		||||
            page_url=$(jq -r '.pages[0].html_url' "$GITHUB_EVENT_PATH")
 | 
			
		||||
            page_action=$(jq -r '.pages[0].action' "$GITHUB_EVENT_PATH")
 | 
			
		||||
            now="$(date '+%Y-%m-%d %H:%M:%S')"
 | 
			
		||||
 | 
			
		||||
            cd wiki
 | 
			
		||||
            prev_sha=$(git rev-list $page_sha^ -- "$page_name.md" | head -n 1)
 | 
			
		||||
            if [ -n "$prev_sha" ]; then
 | 
			
		||||
                git diff $prev_sha $page_sha -- "$page_name.md" > ../wiki.diff || echo "(No diff found)" > ../wiki.diff
 | 
			
		||||
            else
 | 
			
		||||
                echo "(no diff)" > ../wiki.diff
 | 
			
		||||
            fi
 | 
			
		||||
            cd ..
 | 
			
		||||
            {
 | 
			
		||||
            echo "Wiki edited"
 | 
			
		||||
            echo -n "User: "
 | 
			
		||||
            echo "[$actor]($sender_url)"
 | 
			
		||||
            echo "Time: $now"
 | 
			
		||||
            echo "Page: [$page_name]($page_url) (Action: $page_action)"
 | 
			
		||||
            echo ""
 | 
			
		||||
            echo "----"
 | 
			
		||||
            echo "###  diff:"
 | 
			
		||||
            echo '```diff'
 | 
			
		||||
            cat wiki.diff
 | 
			
		||||
            echo '```'
 | 
			
		||||
            } > wiki-change-msg.txt
 | 
			
		||||
 | 
			
		||||
      - name: Create issue to notify Neilpang
 | 
			
		||||
        uses: peter-evans/create-issue-from-file@v5
 | 
			
		||||
        with:
 | 
			
		||||
          title: "Wiki edited"
 | 
			
		||||
          content-filepath: ./wiki-change-msg.txt
 | 
			
		||||
          assignees: Neilpang
 | 
			
		||||
        env:
 | 
			
		||||
          TZ: Asia/Shanghai
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										12
									
								
								Dockerfile
									
									
									
									
									
								
							
							
						
						
									
										12
									
								
								Dockerfile
									
									
									
									
									
								
							@@ -1,4 +1,4 @@
 | 
			
		||||
FROM alpine:3.17
 | 
			
		||||
FROM alpine:3.21
 | 
			
		||||
 | 
			
		||||
RUN apk --no-cache add -f \
 | 
			
		||||
  openssl \
 | 
			
		||||
@@ -15,14 +15,18 @@ RUN apk --no-cache add -f \
 | 
			
		||||
  jq \
 | 
			
		||||
  cronie
 | 
			
		||||
 | 
			
		||||
ENV LE_CONFIG_HOME /acme.sh
 | 
			
		||||
ENV LE_CONFIG_HOME=/acme.sh
 | 
			
		||||
 | 
			
		||||
ARG AUTO_UPGRADE=1
 | 
			
		||||
 | 
			
		||||
ENV AUTO_UPGRADE $AUTO_UPGRADE
 | 
			
		||||
ENV AUTO_UPGRADE=$AUTO_UPGRADE
 | 
			
		||||
 | 
			
		||||
#Install
 | 
			
		||||
COPY ./ /install_acme.sh/
 | 
			
		||||
COPY ./acme.sh /install_acme.sh/acme.sh
 | 
			
		||||
COPY ./deploy /install_acme.sh/deploy
 | 
			
		||||
COPY ./dnsapi /install_acme.sh/dnsapi
 | 
			
		||||
COPY ./notify /install_acme.sh/notify
 | 
			
		||||
 | 
			
		||||
RUN cd /install_acme.sh && ([ -f /install_acme.sh/acme.sh ] && /install_acme.sh/acme.sh --install || curl https://get.acme.sh | sh) && rm -rf /install_acme.sh/
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -98,9 +98,9 @@ https://github.com/acmesh-official/acmetest
 | 
			
		||||
 | 
			
		||||
- [ZeroSSL.com CA](https://github.com/acmesh-official/acme.sh/wiki/ZeroSSL.com-CA)(default)
 | 
			
		||||
- Letsencrypt.org CA
 | 
			
		||||
- [BuyPass.com CA](https://github.com/acmesh-official/acme.sh/wiki/BuyPass.com-CA)
 | 
			
		||||
- [SSL.com CA](https://github.com/acmesh-official/acme.sh/wiki/SSL.com-CA)
 | 
			
		||||
- [Google.com Public CA](https://github.com/acmesh-official/acme.sh/wiki/Google-Public-CA)
 | 
			
		||||
- [Actalis.com CA](https://github.com/acmesh-official/acme.sh/wiki/Actalis.com-CA)
 | 
			
		||||
- [Pebble strict Mode](https://github.com/letsencrypt/pebble)
 | 
			
		||||
- Any other [RFC8555](https://tools.ietf.org/html/rfc8555)-compliant CA
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										205
									
								
								acme.sh
									
									
									
									
									
								
							
							
						
						
									
										205
									
								
								acme.sh
									
									
									
									
									
								
							@@ -1,6 +1,6 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
VER=3.0.8
 | 
			
		||||
VER=3.1.2
 | 
			
		||||
 | 
			
		||||
PROJECT_NAME="acme.sh"
 | 
			
		||||
 | 
			
		||||
@@ -23,9 +23,6 @@ _SUB_FOLDERS="$_SUB_FOLDER_DNSAPI $_SUB_FOLDER_DEPLOY $_SUB_FOLDER_NOTIFY"
 | 
			
		||||
CA_LETSENCRYPT_V2="https://acme-v02.api.letsencrypt.org/directory"
 | 
			
		||||
CA_LETSENCRYPT_V2_TEST="https://acme-staging-v02.api.letsencrypt.org/directory"
 | 
			
		||||
 | 
			
		||||
CA_BUYPASS="https://api.buypass.com/acme/directory"
 | 
			
		||||
CA_BUYPASS_TEST="https://api.test4.buypass.no/acme/directory"
 | 
			
		||||
 | 
			
		||||
CA_ZEROSSL="https://acme.zerossl.com/v2/DV90"
 | 
			
		||||
_ZERO_EAB_ENDPOINT="https://api.zerossl.com/acme/eab-credentials-email"
 | 
			
		||||
 | 
			
		||||
@@ -35,6 +32,8 @@ CA_SSLCOM_ECC="https://acme.ssl.com/sslcom-dv-ecc"
 | 
			
		||||
CA_GOOGLE="https://dv.acme-v02.api.pki.goog/directory"
 | 
			
		||||
CA_GOOGLE_TEST="https://dv.acme-v02.test-api.pki.goog/directory"
 | 
			
		||||
 | 
			
		||||
CA_ACTALIS="https://acme-api.actalis.com/acme/directory"
 | 
			
		||||
 | 
			
		||||
DEFAULT_CA=$CA_ZEROSSL
 | 
			
		||||
DEFAULT_STAGING_CA=$CA_LETSENCRYPT_V2_TEST
 | 
			
		||||
 | 
			
		||||
@@ -42,14 +41,13 @@ CA_NAMES="
 | 
			
		||||
ZeroSSL.com,zerossl
 | 
			
		||||
LetsEncrypt.org,letsencrypt
 | 
			
		||||
LetsEncrypt.org_test,letsencrypt_test,letsencrypttest
 | 
			
		||||
BuyPass.com,buypass
 | 
			
		||||
BuyPass.com_test,buypass_test,buypasstest
 | 
			
		||||
SSL.com,sslcom
 | 
			
		||||
Google.com,google
 | 
			
		||||
Google.com_test,googletest,google_test
 | 
			
		||||
Actalis.com,actalis.com,actalis
 | 
			
		||||
"
 | 
			
		||||
 | 
			
		||||
CA_SERVERS="$CA_ZEROSSL,$CA_LETSENCRYPT_V2,$CA_LETSENCRYPT_V2_TEST,$CA_BUYPASS,$CA_BUYPASS_TEST,$CA_SSLCOM_RSA,$CA_GOOGLE,$CA_GOOGLE_TEST"
 | 
			
		||||
CA_SERVERS="$CA_ZEROSSL,$CA_LETSENCRYPT_V2,$CA_LETSENCRYPT_V2_TEST,$CA_SSLCOM_RSA,$CA_GOOGLE,$CA_GOOGLE_TEST,$CA_ACTALIS"
 | 
			
		||||
 | 
			
		||||
DEFAULT_USER_AGENT="$PROJECT_NAME/$VER ($PROJECT)"
 | 
			
		||||
 | 
			
		||||
@@ -180,6 +178,8 @@ _VALIDITY_WIKI="https://github.com/acmesh-official/acme.sh/wiki/Validity"
 | 
			
		||||
 | 
			
		||||
_DNSCHECK_WIKI="https://github.com/acmesh-official/acme.sh/wiki/dnscheck"
 | 
			
		||||
 | 
			
		||||
_PROFILESELECTION_WIKI="https://github.com/acmesh-official/acme.sh/wiki/Profile-selection"
 | 
			
		||||
 | 
			
		||||
_DNS_MANUAL_ERR="The dns manual mode can not renew automatically, you must issue it again manually. You'd better use the other modes instead."
 | 
			
		||||
 | 
			
		||||
_DNS_MANUAL_WARN="It seems that you are using dns manual mode. please take care: $_DNS_MANUAL_ERR"
 | 
			
		||||
@@ -436,14 +436,28 @@ _secure_debug3() {
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
__USE_TR_TAG=""
 | 
			
		||||
if [ "$(echo "abc" | LANG=C tr a-z A-Z 2>/dev/null)" != "ABC" ]; then
 | 
			
		||||
  __USE_TR_TAG="1"
 | 
			
		||||
fi
 | 
			
		||||
export __USE_TR_TAG
 | 
			
		||||
 | 
			
		||||
_upper_case() {
 | 
			
		||||
  # shellcheck disable=SC2018,SC2019
 | 
			
		||||
  tr '[a-z]' '[A-Z]'
 | 
			
		||||
  if [ "$__USE_TR_TAG" ]; then
 | 
			
		||||
    LANG=C tr '[:lower:]' '[:upper:]'
 | 
			
		||||
  else
 | 
			
		||||
    # shellcheck disable=SC2018,SC2019
 | 
			
		||||
    LANG=C tr '[a-z]' '[A-Z]'
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_lower_case() {
 | 
			
		||||
  # shellcheck disable=SC2018,SC2019
 | 
			
		||||
  tr '[A-Z]' '[a-z]'
 | 
			
		||||
  if [ "$__USE_TR_TAG" ]; then
 | 
			
		||||
    LANG=C tr '[:upper:]' '[:lower:]'
 | 
			
		||||
  else
 | 
			
		||||
    # shellcheck disable=SC2018,SC2019
 | 
			
		||||
    LANG=C tr '[A-Z]' '[a-z]'
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_startswith() {
 | 
			
		||||
@@ -672,8 +686,10 @@ _hex_dump() {
 | 
			
		||||
#0  1  2  3  4  5  6  7  8  9  -  _  .  ~
 | 
			
		||||
#30 31 32 33 34 35 36 37 38 39 2d 5f 2e 7e
 | 
			
		||||
 | 
			
		||||
#_url_encode [upper-hex]  the encoded hex will be upper-case if the argument upper-hex is followed
 | 
			
		||||
#stdin stdout
 | 
			
		||||
_url_encode() {
 | 
			
		||||
  _upper_hex=$1
 | 
			
		||||
  _hex_str=$(_hex_dump)
 | 
			
		||||
  _debug3 "_url_encode"
 | 
			
		||||
  _debug3 "_hex_str" "$_hex_str"
 | 
			
		||||
@@ -883,6 +899,9 @@ _url_encode() {
 | 
			
		||||
      ;;
 | 
			
		||||
    #other hex
 | 
			
		||||
    *)
 | 
			
		||||
      if [ "$_upper_hex" = "upper-hex" ]; then
 | 
			
		||||
        _hex_code=$(printf "%s" "$_hex_code" | _upper_case)
 | 
			
		||||
      fi
 | 
			
		||||
      printf '%%%s' "$_hex_code"
 | 
			
		||||
      ;;
 | 
			
		||||
    esac
 | 
			
		||||
@@ -916,6 +935,9 @@ _sed_i() {
 | 
			
		||||
  if sed -h 2>&1 | grep "\-i\[SUFFIX]" >/dev/null 2>&1; then
 | 
			
		||||
    _debug "Using sed  -i"
 | 
			
		||||
    sed -i "$options" "$filename"
 | 
			
		||||
  elif sed -h 2>&1 | grep "\-i extension" >/dev/null 2>&1; then
 | 
			
		||||
    _debug "Using FreeBSD sed -i"
 | 
			
		||||
    sed -i "" "$options" "$filename"
 | 
			
		||||
  else
 | 
			
		||||
    _debug "No -i support in sed"
 | 
			
		||||
    text="$(cat "$filename")"
 | 
			
		||||
@@ -1393,6 +1415,12 @@ _ss() {
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$(uname)" = "AIX" ]; then
 | 
			
		||||
    _debug "Using: AIX netstat"
 | 
			
		||||
    netstat -an | grep "^tcp" | grep "LISTEN" | grep "\.$_port "
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if _exists "netstat"; then
 | 
			
		||||
    _debug "Using: netstat"
 | 
			
		||||
    if netstat -help 2>&1 | grep "\-p proto" >/dev/null; then
 | 
			
		||||
@@ -1437,7 +1465,7 @@ _toPkcs() {
 | 
			
		||||
  else
 | 
			
		||||
    ${ACME_OPENSSL_BIN:-openssl} pkcs12 -export -out "$_cpfx" -inkey "$_ckey" -in "$_ccert" -certfile "$_cca"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ "$?" == "0" ]; then
 | 
			
		||||
  if [ "$?" = "0" ]; then
 | 
			
		||||
    _savedomainconf "Le_PFXPassword" "$pfxPassword"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
@@ -1623,6 +1651,11 @@ _time2str() {
 | 
			
		||||
    return
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #Omnios
 | 
			
		||||
  if date -u -r "$1" +"%Y-%m-%dT%H:%M:%SZ" 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #Solaris
 | 
			
		||||
  if printf "%(%Y-%m-%dT%H:%M:%SZ)T\n" $1 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
@@ -1792,6 +1825,10 @@ _time() {
 | 
			
		||||
#    2022-04-01 08:10:33   to   1648800633
 | 
			
		||||
#or  2022-04-01T08:10:33Z  to   1648800633
 | 
			
		||||
_date2time() {
 | 
			
		||||
  #Mac/BSD
 | 
			
		||||
  if date -u -j -f "%Y-%m-%d %H:%M:%S" "$(echo "$1" | tr -d "Z" | tr "T" ' ')" +"%s" 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
  fi
 | 
			
		||||
  #Linux
 | 
			
		||||
  if date -u -d "$(echo "$1" | tr -d "Z" | tr "T" ' ')" +"%s" 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
@@ -1801,12 +1838,12 @@ _date2time() {
 | 
			
		||||
  if gdate -u -d "$(echo "$1" | tr -d "Z" | tr "T" ' ')" +"%s" 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
  fi
 | 
			
		||||
  #Mac/BSD
 | 
			
		||||
  if date -u -j -f "%Y-%m-%d %H:%M:%S" "$(echo "$1" | tr -d "Z" | tr "T" ' ')" +"%s" 2>/dev/null; then
 | 
			
		||||
  #Omnios
 | 
			
		||||
  if python3 -c "import datetime; print(int(datetime.datetime.strptime(\"$1\", \"%Y-%m-%d %H:%M:%S\").replace(tzinfo=datetime.timezone.utc).timestamp()))" 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
  fi
 | 
			
		||||
  #Omnios
 | 
			
		||||
  if da="$(echo "$1" | tr -d "Z" | tr "T" ' ')" perl -MTime::Piece -e 'print Time::Piece->strptime($ENV{da}, "%Y-%m-%d %H:%M:%S")->epoch, "\n";' 2>/dev/null; then
 | 
			
		||||
  if python3 -c "import datetime; print(int(datetime.datetime.strptime(\"$1\", \"%Y-%m-%dT%H:%M:%SZ\").replace(tzinfo=datetime.timezone.utc).timestamp()))" 2>/dev/null; then
 | 
			
		||||
    return
 | 
			
		||||
  fi
 | 
			
		||||
  _err "Cannot parse _date2time $1"
 | 
			
		||||
@@ -2188,7 +2225,6 @@ _send_signed_request() {
 | 
			
		||||
        _debug2 _headers "$_headers"
 | 
			
		||||
        _CACHED_NONCE="$(echo "$_headers" | grep -i "Replay-Nonce:" | _head_n 1 | tr -d "\r\n " | cut -d ':' -f 2)"
 | 
			
		||||
      fi
 | 
			
		||||
      _debug2 _CACHED_NONCE "$_CACHED_NONCE"
 | 
			
		||||
      if [ "$?" != "0" ]; then
 | 
			
		||||
        _err "Cannot connect to $nonceurl to get nonce."
 | 
			
		||||
        return 1
 | 
			
		||||
@@ -2361,7 +2397,7 @@ _clear_conf() {
 | 
			
		||||
  _sdkey="$2"
 | 
			
		||||
  if [ "$_c_c_f" ]; then
 | 
			
		||||
    _conf_data="$(cat "$_c_c_f")"
 | 
			
		||||
    echo "$_conf_data" | sed "s/^$_sdkey *=.*$//" >"$_c_c_f"
 | 
			
		||||
    echo "$_conf_data" | sed "/^$_sdkey *=.*$/d" >"$_c_c_f"
 | 
			
		||||
  else
 | 
			
		||||
    _err "Config file is empty, cannot clear"
 | 
			
		||||
  fi
 | 
			
		||||
@@ -2516,15 +2552,19 @@ _startserver() {
 | 
			
		||||
  _NC="socat"
 | 
			
		||||
  if [ "$Le_Listen_V6" ]; then
 | 
			
		||||
    _NC="$_NC -6"
 | 
			
		||||
  else
 | 
			
		||||
    SOCAT_OPTIONS=TCP6-LISTEN
 | 
			
		||||
  elif [ "$Le_Listen_V4" ]; then
 | 
			
		||||
    _NC="$_NC -4"
 | 
			
		||||
    SOCAT_OPTIONS=TCP4-LISTEN
 | 
			
		||||
  else
 | 
			
		||||
    SOCAT_OPTIONS=TCP-LISTEN
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$DEBUG" ] && [ "$DEBUG" -gt "1" ]; then
 | 
			
		||||
    _NC="$_NC -d -d -v"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  SOCAT_OPTIONS=TCP-LISTEN:$Le_HTTPPort,crlf,reuseaddr,fork
 | 
			
		||||
  SOCAT_OPTIONS=$SOCAT_OPTIONS:$Le_HTTPPort,crlf,reuseaddr,fork
 | 
			
		||||
 | 
			
		||||
  #Adding bind to local-address
 | 
			
		||||
  if [ "$ncaddr" ]; then
 | 
			
		||||
@@ -2745,7 +2785,7 @@ _initAPI() {
 | 
			
		||||
  _request_retry_times=0
 | 
			
		||||
  while [ -z "$ACME_NEW_ACCOUNT" ] && [ "${_request_retry_times}" -lt "$MAX_API_RETRY_TIMES" ]; do
 | 
			
		||||
    _request_retry_times=$(_math "$_request_retry_times" + 1)
 | 
			
		||||
    response=$(_get "$_api_server")
 | 
			
		||||
    response=$(_get "$_api_server" "" 10)
 | 
			
		||||
    if [ "$?" != "0" ]; then
 | 
			
		||||
      _debug2 "response" "$response"
 | 
			
		||||
      _info "Cannot init API for: $_api_server."
 | 
			
		||||
@@ -3491,7 +3531,7 @@ _on_before_issue() {
 | 
			
		||||
  _debug _chk_alt_domains "$_chk_alt_domains"
 | 
			
		||||
  #run pre hook
 | 
			
		||||
  if [ "$_chk_pre_hook" ]; then
 | 
			
		||||
    _info "Runing pre hook:'$_chk_pre_hook'"
 | 
			
		||||
    _info "Running pre hook:'$_chk_pre_hook'"
 | 
			
		||||
    if ! (
 | 
			
		||||
      export Le_Domain="$_chk_main_domain"
 | 
			
		||||
      export Le_Alt="$_chk_alt_domains"
 | 
			
		||||
@@ -4394,6 +4434,7 @@ issue() {
 | 
			
		||||
  _preferred_chain="${15}"
 | 
			
		||||
  _valid_from="${16}"
 | 
			
		||||
  _valid_to="${17}"
 | 
			
		||||
  _certificate_profile="${18}"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$_ACME_IS_RENEW" ]; then
 | 
			
		||||
    _initpath "$_main_domain" "$_key_length"
 | 
			
		||||
@@ -4469,6 +4510,11 @@ issue() {
 | 
			
		||||
  else
 | 
			
		||||
    _cleardomainconf "Le_Preferred_Chain"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ "$_certificate_profile" ]; then
 | 
			
		||||
    _savedomainconf "Le_Certificate_Profile" "$_certificate_profile"
 | 
			
		||||
  else
 | 
			
		||||
    _cleardomainconf "Le_Certificate_Profile"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  Le_API="$ACME_DIRECTORY"
 | 
			
		||||
  _savedomainconf "Le_API" "$Le_API"
 | 
			
		||||
@@ -4480,6 +4526,7 @@ issue() {
 | 
			
		||||
 | 
			
		||||
  if ! _on_before_issue "$_web_roots" "$_main_domain" "$_alt_domains" "$_pre_hook" "$_local_addr"; then
 | 
			
		||||
    _err "_on_before_issue."
 | 
			
		||||
    _on_issue_err "$_post_hook"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
@@ -4600,6 +4647,9 @@ issue() {
 | 
			
		||||
    if [ "$_notAfter" ]; then
 | 
			
		||||
      _newOrderObj="$_newOrderObj,\"notAfter\": \"$_notAfter\""
 | 
			
		||||
    fi
 | 
			
		||||
    if [ "$_certificate_profile" ]; then
 | 
			
		||||
      _newOrderObj="$_newOrderObj,\"profile\": \"$_certificate_profile\""
 | 
			
		||||
    fi
 | 
			
		||||
    _debug "STEP 1, Ordering a Certificate"
 | 
			
		||||
    if ! _send_signed_request "$ACME_NEW_ORDER" "$_newOrderObj}"; then
 | 
			
		||||
      _err "Error creating new order."
 | 
			
		||||
@@ -4739,7 +4789,8 @@ $_authorizations_map"
 | 
			
		||||
        _debug keyauthorization "$keyauthorization"
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      entry="$(echo "$response" | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')"
 | 
			
		||||
      # Fix for empty error objects in response which mess up the original code, adapted from fix suggested here: https://github.com/acmesh-official/acme.sh/issues/4933#issuecomment-1870499018
 | 
			
		||||
      entry="$(echo "$response" | sed s/'"error":{}'/'"error":null'/ | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')"
 | 
			
		||||
      _debug entry "$entry"
 | 
			
		||||
 | 
			
		||||
      if [ -z "$keyauthorization" -a -z "$entry" ]; then
 | 
			
		||||
@@ -4989,9 +5040,11 @@ $_authorizations_map"
 | 
			
		||||
 | 
			
		||||
        _debug "Writing token: $token to $wellknown_path/$token"
 | 
			
		||||
 | 
			
		||||
        mkdir -p "$wellknown_path"
 | 
			
		||||
 | 
			
		||||
        if ! printf "%s" "$keyauthorization" >"$wellknown_path/$token"; then
 | 
			
		||||
        # Ensure .well-known is visible to web server user/group
 | 
			
		||||
        # https://github.com/Neilpang/acme.sh/pull/32
 | 
			
		||||
        if ! (umask ugo+rx &&
 | 
			
		||||
          mkdir -p "$wellknown_path" &&
 | 
			
		||||
          printf "%s" "$keyauthorization" >"$wellknown_path/$token"); then
 | 
			
		||||
          _err "$d: Cannot write token to file: $wellknown_path/$token"
 | 
			
		||||
          _clearupwebbroot "$_currentRoot" "$removelevel" "$token"
 | 
			
		||||
          _clearup
 | 
			
		||||
@@ -5111,6 +5164,19 @@ $_authorizations_map"
 | 
			
		||||
        _on_issue_err "$_post_hook" "$vlist"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
      _retryafter=$(echo "$responseHeaders" | grep -i "^Retry-After *: *[0-9]\+ *" | cut -d : -f 2 | tr -d ' ' | tr -d '\r')
 | 
			
		||||
      _sleep_overload_retry_sec=$_retryafter
 | 
			
		||||
      if [ "$_sleep_overload_retry_sec" ]; then
 | 
			
		||||
        if [ $_sleep_overload_retry_sec -le 600 ]; then
 | 
			
		||||
          _sleep $_sleep_overload_retry_sec
 | 
			
		||||
        else
 | 
			
		||||
          _info "The retryafter=$_retryafter value is too large (> 600), will not retry anymore."
 | 
			
		||||
          _clearupwebbroot "$_currentRoot" "$removelevel" "$token"
 | 
			
		||||
          _clearup
 | 
			
		||||
          _on_issue_err "$_post_hook" "$vlist"
 | 
			
		||||
          return 1
 | 
			
		||||
        fi
 | 
			
		||||
      fi
 | 
			
		||||
    done
 | 
			
		||||
 | 
			
		||||
  done
 | 
			
		||||
@@ -5421,10 +5487,6 @@ renew() {
 | 
			
		||||
    _info "Switching back to $CA_LETSENCRYPT_V2"
 | 
			
		||||
    Le_API="$CA_LETSENCRYPT_V2"
 | 
			
		||||
    ;;
 | 
			
		||||
  "$CA_BUYPASS_TEST")
 | 
			
		||||
    _info "Switching back to $CA_BUYPASS"
 | 
			
		||||
    Le_API="$CA_BUYPASS"
 | 
			
		||||
    ;;
 | 
			
		||||
  "$CA_GOOGLE_TEST")
 | 
			
		||||
    _info "Switching back to $CA_GOOGLE"
 | 
			
		||||
    Le_API="$CA_GOOGLE"
 | 
			
		||||
@@ -5466,6 +5528,7 @@ renew() {
 | 
			
		||||
  Le_PostHook="$(_readdomainconf Le_PostHook)"
 | 
			
		||||
  Le_RenewHook="$(_readdomainconf Le_RenewHook)"
 | 
			
		||||
  Le_Preferred_Chain="$(_readdomainconf Le_Preferred_Chain)"
 | 
			
		||||
  Le_Certificate_Profile="$(_readdomainconf Le_Certificate_Profile)"
 | 
			
		||||
  # When renewing from an old version, the empty Le_Keylength means 2048.
 | 
			
		||||
  # Note, do not use DEFAULT_DOMAIN_KEY_LENGTH as that value may change over
 | 
			
		||||
  # time but an empty value implies 2048 specifically.
 | 
			
		||||
@@ -5473,7 +5536,14 @@ renew() {
 | 
			
		||||
  if [ -z "$Le_Keylength" ]; then
 | 
			
		||||
    Le_Keylength=2048
 | 
			
		||||
  fi
 | 
			
		||||
  issue "$Le_Webroot" "$Le_Domain" "$Le_Alt" "$Le_Keylength" "$Le_RealCertPath" "$Le_RealKeyPath" "$Le_RealCACertPath" "$Le_ReloadCmd" "$Le_RealFullChainPath" "$Le_PreHook" "$Le_PostHook" "$Le_RenewHook" "$Le_LocalAddress" "$Le_ChallengeAlias" "$Le_Preferred_Chain" "$Le_Valid_From" "$Le_Valid_To"
 | 
			
		||||
  if [ "$CA_LETSENCRYPT_V2" = "$Le_API" ]; then
 | 
			
		||||
    #letsencrypt doesn't support ocsp anymore
 | 
			
		||||
    if [ "$Le_OCSP_Staple" ]; then
 | 
			
		||||
      export Le_OCSP_Staple=""
 | 
			
		||||
      _cleardomainconf Le_OCSP_Staple
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
  issue "$Le_Webroot" "$Le_Domain" "$Le_Alt" "$Le_Keylength" "$Le_RealCertPath" "$Le_RealKeyPath" "$Le_RealCACertPath" "$Le_ReloadCmd" "$Le_RealFullChainPath" "$Le_PreHook" "$Le_PostHook" "$Le_RenewHook" "$Le_LocalAddress" "$Le_ChallengeAlias" "$Le_Preferred_Chain" "$Le_Valid_From" "$Le_Valid_To" "$Le_Certificate_Profile"
 | 
			
		||||
  res="$?"
 | 
			
		||||
  if [ "$res" != "0" ]; then
 | 
			
		||||
    return "$res"
 | 
			
		||||
@@ -5734,7 +5804,7 @@ list() {
 | 
			
		||||
  _sep="|"
 | 
			
		||||
  if [ "$_raw" ]; then
 | 
			
		||||
    if [ -z "$_domain" ]; then
 | 
			
		||||
      printf "%s\n" "Main_Domain${_sep}KeyLength${_sep}SAN_Domains${_sep}CA${_sep}Created${_sep}Renew"
 | 
			
		||||
      printf "%s\n" "Main_Domain${_sep}KeyLength${_sep}SAN_Domains${_sep}Profile${_sep}CA${_sep}Created${_sep}Renew"
 | 
			
		||||
    fi
 | 
			
		||||
    for di in "${CERT_HOME}"/*.*/; do
 | 
			
		||||
      d=$(basename "$di")
 | 
			
		||||
@@ -5749,7 +5819,7 @@ list() {
 | 
			
		||||
          . "$DOMAIN_CONF"
 | 
			
		||||
          _ca="$(_getCAShortName "$Le_API")"
 | 
			
		||||
          if [ -z "$_domain" ]; then
 | 
			
		||||
            printf "%s\n" "$Le_Domain${_sep}\"$Le_Keylength\"${_sep}$Le_Alt${_sep}$_ca${_sep}$Le_CertCreateTimeStr${_sep}$Le_NextRenewTimeStr"
 | 
			
		||||
            printf "%s\n" "$Le_Domain${_sep}\"$Le_Keylength\"${_sep}$Le_Alt${_sep}$Le_Certificate_Profile${_sep}$_ca${_sep}$Le_CertCreateTimeStr${_sep}$Le_NextRenewTimeStr"
 | 
			
		||||
          else
 | 
			
		||||
            if [ "$_domain" = "$d" ]; then
 | 
			
		||||
              cat "$DOMAIN_CONF"
 | 
			
		||||
@@ -5768,6 +5838,48 @@ list() {
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
list_profiles() {
 | 
			
		||||
  _initpath
 | 
			
		||||
  _initAPI
 | 
			
		||||
 | 
			
		||||
  _l_server_url="$ACME_DIRECTORY"
 | 
			
		||||
  _l_server_name="$(_getCAShortName "$_l_server_url")"
 | 
			
		||||
  _info "Fetching profiles from $_l_server_name ($_l_server_url)..."
 | 
			
		||||
 | 
			
		||||
  response=$(_get "$_l_server_url" "" 10)
 | 
			
		||||
  if [ "$?" != "0" ]; then
 | 
			
		||||
    _err "Failed to connect to CA directory: $_l_server_url"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  normalized_response=$(echo "$response" | _normalizeJson)
 | 
			
		||||
  profiles_json=$(echo "$normalized_response" | _egrep_o '"profiles" *: *\{[^\}]*\}')
 | 
			
		||||
 | 
			
		||||
  if [ -z "$profiles_json" ]; then
 | 
			
		||||
    _info "The CA '$_l_server_name' does not publish certificate profiles via its directory endpoint."
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Strip the outer layer to get the key-value pairs
 | 
			
		||||
  profiles_kv=$(echo "$profiles_json" | sed 's/"profiles" *: *{//' | sed 's/}$//' | tr ',' '\n')
 | 
			
		||||
 | 
			
		||||
  printf "\n%-15s %s\n" "name" "info"
 | 
			
		||||
  printf -- "--------------------------------------------------------------------\n"
 | 
			
		||||
 | 
			
		||||
  _old_IFS="$IFS"
 | 
			
		||||
  IFS='
 | 
			
		||||
'
 | 
			
		||||
  for pair in $profiles_kv; do
 | 
			
		||||
    # Trim quotes and whitespace
 | 
			
		||||
    _name=$(echo "$pair" | cut -d: -f1 | tr -d '" \t')
 | 
			
		||||
    _info_url=$(echo "$pair" | cut -d: -f2- | sed 's/^ *//' | tr -d '"')
 | 
			
		||||
    printf "%-15s %s\n" "$_name" "$_info_url"
 | 
			
		||||
  done
 | 
			
		||||
  IFS="$_old_IFS"
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_deploy() {
 | 
			
		||||
  _d="$1"
 | 
			
		||||
  _hooks="$2"
 | 
			
		||||
@@ -5792,7 +5904,7 @@ _deploy() {
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      if ! $d_command "$_d" "$CERT_KEY_PATH" "$CERT_PATH" "$CA_CERT_PATH" "$CERT_FULLCHAIN_PATH"; then
 | 
			
		||||
      if ! $d_command "$_d" "$CERT_KEY_PATH" "$CERT_PATH" "$CA_CERT_PATH" "$CERT_FULLCHAIN_PATH" "$CERT_PFX_PATH"; then
 | 
			
		||||
        _err "Error deploying for domain: $_d"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
@@ -5955,7 +6067,7 @@ _installcert() {
 | 
			
		||||
    ); then
 | 
			
		||||
      _info "$(__green "Reload successful")"
 | 
			
		||||
    else
 | 
			
		||||
      _err "Reload error for: $Le_Domain"
 | 
			
		||||
      _err "Reload error for: $_main_domain"
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
@@ -6035,7 +6147,7 @@ installcronjob() {
 | 
			
		||||
    _script="$(_readlink "$_SCRIPT_")"
 | 
			
		||||
    _debug _script "$_script"
 | 
			
		||||
    if [ -f "$_script" ]; then
 | 
			
		||||
      _info "Usinging the current script from: $_script"
 | 
			
		||||
      _info "Using the current script from: $_script"
 | 
			
		||||
      lesh="$_script"
 | 
			
		||||
    else
 | 
			
		||||
      _err "Cannot install cronjob, $PROJECT_ENTRY not found."
 | 
			
		||||
@@ -6306,7 +6418,8 @@ _deactivate() {
 | 
			
		||||
    fi
 | 
			
		||||
    _debug "Trigger validation."
 | 
			
		||||
    vtype="$(_getIdType "$_d_domain")"
 | 
			
		||||
    entry="$(echo "$response" | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')"
 | 
			
		||||
    # Fix for empty error objects in response which mess up the original code, adapted from fix suggested here: https://github.com/acmesh-official/acme.sh/issues/4933#issuecomment-1870499018
 | 
			
		||||
    entry="$(echo "$response" | sed s/'"error":{}'/'"error":null'/ | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')"
 | 
			
		||||
    _debug entry "$entry"
 | 
			
		||||
    if [ -z "$entry" ]; then
 | 
			
		||||
      _err "$d: Cannot get domain token"
 | 
			
		||||
@@ -6787,7 +6900,7 @@ _send_notify() {
 | 
			
		||||
 | 
			
		||||
  _nsource="$NOTIFY_SOURCE"
 | 
			
		||||
  if [ -z "$_nsource" ]; then
 | 
			
		||||
    _nsource="$(hostname)"
 | 
			
		||||
    _nsource="$(uname -n)"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _nsubject="$_nsubject by $_nsource"
 | 
			
		||||
@@ -6945,6 +7058,9 @@ Parameters:
 | 
			
		||||
                                      If no match, the default offered chain will be used. (default: empty)
 | 
			
		||||
                                      See: $_PREFERRED_CHAIN_WIKI
 | 
			
		||||
 | 
			
		||||
  --cert-profile, --certificate-profile <profile>  If the CA offers profiles, select the desired profile
 | 
			
		||||
                                      See: $_PROFILESELECTION_WIKI
 | 
			
		||||
 | 
			
		||||
  --valid-to    <date-time>         Request the NotAfter field of the cert.
 | 
			
		||||
                                      See: $_VALIDITY_WIKI
 | 
			
		||||
  --valid-from  <date-time>         Request the NotBefore field of the cert.
 | 
			
		||||
@@ -6989,7 +7105,7 @@ Parameters:
 | 
			
		||||
 | 
			
		||||
  --accountconf <file>              Specifies a customized account config file.
 | 
			
		||||
  --home <directory>                Specifies the home dir for $PROJECT_NAME.
 | 
			
		||||
  --cert-home <directory>           Specifies the home dir to save all the certs, only valid for '--install' command.
 | 
			
		||||
  --cert-home <directory>           Specifies the home dir to save all the certs.
 | 
			
		||||
  --config-home <directory>         Specifies the home dir to save all the configurations.
 | 
			
		||||
  --useragent <string>              Specifies the user agent string. it will be saved for future use too.
 | 
			
		||||
  -m, --email <email>               Specifies the account email, only valid for the '--install' and '--update-account' command.
 | 
			
		||||
@@ -7320,6 +7436,7 @@ _process() {
 | 
			
		||||
  _preferred_chain=""
 | 
			
		||||
  _valid_from=""
 | 
			
		||||
  _valid_to=""
 | 
			
		||||
  _certificate_profile=""
 | 
			
		||||
  while [ ${#} -gt 0 ]; do
 | 
			
		||||
    case "${1}" in
 | 
			
		||||
 | 
			
		||||
@@ -7423,6 +7540,9 @@ _process() {
 | 
			
		||||
    --set-default-chain)
 | 
			
		||||
      _CMD="setdefaultchain"
 | 
			
		||||
      ;;
 | 
			
		||||
    --list-profiles)
 | 
			
		||||
      _CMD="list_profiles"
 | 
			
		||||
      ;;
 | 
			
		||||
    -d | --domain)
 | 
			
		||||
      _dvalue="$2"
 | 
			
		||||
 | 
			
		||||
@@ -7638,6 +7758,10 @@ _process() {
 | 
			
		||||
      _valid_to="$2"
 | 
			
		||||
      shift
 | 
			
		||||
      ;;
 | 
			
		||||
    --certificate-profile | --cert-profile)
 | 
			
		||||
      _certificate_profile="$2"
 | 
			
		||||
      shift
 | 
			
		||||
      ;;
 | 
			
		||||
    --httpport)
 | 
			
		||||
      _httpport="$2"
 | 
			
		||||
      Le_HTTPPort="$_httpport"
 | 
			
		||||
@@ -7913,7 +8037,7 @@ _process() {
 | 
			
		||||
  uninstall) uninstall "$_nocron" ;;
 | 
			
		||||
  upgrade) upgrade ;;
 | 
			
		||||
  issue)
 | 
			
		||||
    issue "$_webroot" "$_domain" "$_altdomains" "$_keylength" "$_cert_file" "$_key_file" "$_ca_file" "$_reloadcmd" "$_fullchain_file" "$_pre_hook" "$_post_hook" "$_renew_hook" "$_local_address" "$_challenge_alias" "$_preferred_chain" "$_valid_from" "$_valid_to"
 | 
			
		||||
    issue "$_webroot" "$_domain" "$_altdomains" "$_keylength" "$_cert_file" "$_key_file" "$_ca_file" "$_reloadcmd" "$_fullchain_file" "$_pre_hook" "$_post_hook" "$_renew_hook" "$_local_address" "$_challenge_alias" "$_preferred_chain" "$_valid_from" "$_valid_to" "$_certificate_profile"
 | 
			
		||||
    ;;
 | 
			
		||||
  deploy)
 | 
			
		||||
    deploy "$_domain" "$_deploy_hook" "$_ecc"
 | 
			
		||||
@@ -7984,6 +8108,9 @@ _process() {
 | 
			
		||||
  setdefaultchain)
 | 
			
		||||
    setdefaultchain "$_preferred_chain"
 | 
			
		||||
    ;;
 | 
			
		||||
  list_profiles)
 | 
			
		||||
    list_profiles
 | 
			
		||||
    ;;
 | 
			
		||||
  *)
 | 
			
		||||
    if [ "$_CMD" ]; then
 | 
			
		||||
      _err "Invalid command: $_CMD"
 | 
			
		||||
 
 | 
			
		||||
@@ -1,17 +1,23 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034,SC2154
 | 
			
		||||
 | 
			
		||||
# Script to create certificate to Alibaba Cloud CDN
 | 
			
		||||
#
 | 
			
		||||
# Docs: https://github.com/acmesh-official/acme.sh/wiki/deployhooks#33-deploy-your-certificate-to-cdn-or-dcdn-of-alibaba-cloud-aliyun
 | 
			
		||||
#
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export Ali_Key="ALIACCESSKEY"
 | 
			
		||||
# export Ali_Secret="ALISECRETKEY"
 | 
			
		||||
# The credentials are shared with all the Alibaba Cloud deploy hooks and dnsapi
 | 
			
		||||
#
 | 
			
		||||
# To specify the CDN domain that is different from the certificate CN, usually used for multi-domain or wildcard certificates
 | 
			
		||||
# export DEPLOY_ALI_CDN_DOMAIN="cdn.example.com"
 | 
			
		||||
# If you have more than one domain, just
 | 
			
		||||
# If you have multiple CDN domains using the same certificate, just
 | 
			
		||||
# export DEPLOY_ALI_CDN_DOMAIN="cdn1.example.com cdn2.example.com"
 | 
			
		||||
#
 | 
			
		||||
# The credentials are shared with all domains, also shared with dns_ali api
 | 
			
		||||
# For DCDN, see ali_dcdn deploy hook
 | 
			
		||||
 | 
			
		||||
Ali_API="https://cdn.aliyuncs.com/"
 | 
			
		||||
Ali_CDN_API="https://cdn.aliyuncs.com/"
 | 
			
		||||
 | 
			
		||||
ali_cdn_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
@@ -26,18 +32,16 @@ ali_cdn_deploy() {
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  Ali_Key="${Ali_Key:-$(_readaccountconf_mutable Ali_Key)}"
 | 
			
		||||
  Ali_Secret="${Ali_Secret:-$(_readaccountconf_mutable Ali_Secret)}"
 | 
			
		||||
  if [ -z "$Ali_Key" ] || [ -z "$Ali_Secret" ]; then
 | 
			
		||||
    Ali_Key=""
 | 
			
		||||
    Ali_Secret=""
 | 
			
		||||
    _err "You don't specify aliyun api key and secret yet."
 | 
			
		||||
  # Load dnsapi/dns_ali.sh to reduce the duplicated codes
 | 
			
		||||
  # https://github.com/acmesh-official/acme.sh/pull/5205#issuecomment-2357867276
 | 
			
		||||
  dnsapi_ali="$(_findHook "$_cdomain" "$_SUB_FOLDER_DNSAPI" dns_ali)"
 | 
			
		||||
  # shellcheck source=/dev/null
 | 
			
		||||
  if ! . "$dnsapi_ali"; then
 | 
			
		||||
    _err "Error loading file $dnsapi_ali. Please check your API file and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the api key and secret to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable Ali_Key "$Ali_Key"
 | 
			
		||||
  _saveaccountconf_mutable Ali_Secret "$Ali_Secret"
 | 
			
		||||
  _prepare_ali_credentials || return 1
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_ALI_CDN_DOMAIN
 | 
			
		||||
  if [ "$DEPLOY_ALI_CDN_DOMAIN" ]; then
 | 
			
		||||
@@ -47,8 +51,8 @@ ali_cdn_deploy() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # read cert and key files and urlencode both
 | 
			
		||||
  _cert=$(_url_encode_upper <"$_cfullchain")
 | 
			
		||||
  _key=$(_url_encode_upper <"$_ckey")
 | 
			
		||||
  _cert=$(_url_encode upper-hex <"$_cfullchain")
 | 
			
		||||
  _key=$(_url_encode upper-hex <"$_ckey")
 | 
			
		||||
 | 
			
		||||
  _debug2 _cert "$_cert"
 | 
			
		||||
  _debug2 _key "$_key"
 | 
			
		||||
@@ -64,82 +68,9 @@ ali_cdn_deploy() {
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below ##################################
 | 
			
		||||
 | 
			
		||||
# act ign mtd
 | 
			
		||||
_ali_rest() {
 | 
			
		||||
  act="$1"
 | 
			
		||||
  ign="$2"
 | 
			
		||||
  mtd="$3"
 | 
			
		||||
 | 
			
		||||
  signature=$(printf "%s" "$mtd&%2F&$(_ali_urlencode "$query")" | _hmac "sha1" "$(printf "%s" "$Ali_Secret&" | _hex_dump | tr -d " ")" | _base64)
 | 
			
		||||
  signature=$(_ali_urlencode "$signature")
 | 
			
		||||
  url="$Ali_API?$query&Signature=$signature"
 | 
			
		||||
 | 
			
		||||
  if [ "$mtd" = "GET" ]; then
 | 
			
		||||
    response="$(_get "$url")"
 | 
			
		||||
  else
 | 
			
		||||
    # post payload is not supported yet because of signature
 | 
			
		||||
    response="$(_post "" "$url")"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _ret="$?"
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  if [ "$_ret" != "0" ]; then
 | 
			
		||||
    _err "Error <$act>"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$ign" ]; then
 | 
			
		||||
    message="$(echo "$response" | _egrep_o "\"Message\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \")"
 | 
			
		||||
    if [ "$message" ]; then
 | 
			
		||||
      _err "$message"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_ali_urlencode() {
 | 
			
		||||
  _str="$1"
 | 
			
		||||
  _str_len=${#_str}
 | 
			
		||||
  _u_i=1
 | 
			
		||||
  while [ "$_u_i" -le "$_str_len" ]; do
 | 
			
		||||
    _str_c="$(printf "%s" "$_str" | cut -c "$_u_i")"
 | 
			
		||||
    case $_str_c in [a-zA-Z0-9.~_-])
 | 
			
		||||
      printf "%s" "$_str_c"
 | 
			
		||||
      ;;
 | 
			
		||||
    *)
 | 
			
		||||
      printf "%%%02X" "'$_str_c"
 | 
			
		||||
      ;;
 | 
			
		||||
    esac
 | 
			
		||||
    _u_i="$(_math "$_u_i" + 1)"
 | 
			
		||||
  done
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_ali_nonce() {
 | 
			
		||||
  #_head_n 1 </dev/urandom | _digest "sha256" hex | cut -c 1-31
 | 
			
		||||
  #Not so good...
 | 
			
		||||
  date +"%s%N" | sed 's/%N//g'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_timestamp() {
 | 
			
		||||
  date -u +"%Y-%m-%dT%H%%3A%M%%3A%SZ"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# stdin stdout
 | 
			
		||||
_url_encode_upper() {
 | 
			
		||||
  encoded=$(_url_encode)
 | 
			
		||||
 | 
			
		||||
  for match in $(echo "$encoded" | _egrep_o '%..' | sort -u); do
 | 
			
		||||
    upper=$(echo "$match" | _upper_case)
 | 
			
		||||
    encoded=$(echo "$encoded" | sed "s/$match/$upper/g")
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  echo "$encoded"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# domain pub pri
 | 
			
		||||
_set_cdn_domain_ssl_certificate_query() {
 | 
			
		||||
  endpoint=$Ali_CDN_API
 | 
			
		||||
  query=''
 | 
			
		||||
  query=$query'AccessKeyId='$Ali_Key
 | 
			
		||||
  query=$query'&Action=SetCdnDomainSSLCertificate'
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										88
									
								
								deploy/ali_dcdn.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										88
									
								
								deploy/ali_dcdn.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,88 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034,SC2154
 | 
			
		||||
 | 
			
		||||
# Script to create certificate to Alibaba Cloud DCDN
 | 
			
		||||
#
 | 
			
		||||
# Docs: https://github.com/acmesh-official/acme.sh/wiki/deployhooks#33-deploy-your-certificate-to-cdn-or-dcdn-of-alibaba-cloud-aliyun
 | 
			
		||||
#
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export Ali_Key="ALIACCESSKEY"
 | 
			
		||||
# export Ali_Secret="ALISECRETKEY"
 | 
			
		||||
# The credentials are shared with all the Alibaba Cloud deploy hooks and dnsapi
 | 
			
		||||
#
 | 
			
		||||
# To specify the DCDN domain that is different from the certificate CN, usually used for multi-domain or wildcard certificates
 | 
			
		||||
# export DEPLOY_ALI_DCDN_DOMAIN="dcdn.example.com"
 | 
			
		||||
# If you have multiple CDN domains using the same certificate, just
 | 
			
		||||
# export DEPLOY_ALI_DCDN_DOMAIN="dcdn1.example.com dcdn2.example.com"
 | 
			
		||||
#
 | 
			
		||||
# For regular CDN, see ali_cdn deploy hook
 | 
			
		||||
 | 
			
		||||
Ali_DCDN_API="https://dcdn.aliyuncs.com/"
 | 
			
		||||
 | 
			
		||||
ali_dcdn_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  # Load dnsapi/dns_ali.sh to reduce the duplicated codes
 | 
			
		||||
  # https://github.com/acmesh-official/acme.sh/pull/5205#issuecomment-2357867276
 | 
			
		||||
  dnsapi_ali="$(_findHook "$_cdomain" "$_SUB_FOLDER_DNSAPI" dns_ali)"
 | 
			
		||||
  # shellcheck source=/dev/null
 | 
			
		||||
  if ! . "$dnsapi_ali"; then
 | 
			
		||||
    _err "Error loading file $dnsapi_ali. Please check your API file and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _prepare_ali_credentials || return 1
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_ALI_DCDN_DOMAIN
 | 
			
		||||
  if [ "$DEPLOY_ALI_DCDN_DOMAIN" ]; then
 | 
			
		||||
    _savedeployconf DEPLOY_ALI_DCDN_DOMAIN "$DEPLOY_ALI_DCDN_DOMAIN"
 | 
			
		||||
  else
 | 
			
		||||
    DEPLOY_ALI_DCDN_DOMAIN="$_cdomain"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # read cert and key files and urlencode both
 | 
			
		||||
  _cert=$(_url_encode upper-hex <"$_cfullchain")
 | 
			
		||||
  _key=$(_url_encode upper-hex <"$_ckey")
 | 
			
		||||
 | 
			
		||||
  _debug2 _cert "$_cert"
 | 
			
		||||
  _debug2 _key "$_key"
 | 
			
		||||
 | 
			
		||||
  ## update domain ssl config
 | 
			
		||||
  for domain in $DEPLOY_ALI_DCDN_DOMAIN; do
 | 
			
		||||
    _set_dcdn_domain_ssl_certificate_query "$domain" "$_cert" "$_key"
 | 
			
		||||
    if _ali_rest "Set DCDN domain SSL certificate for $domain" "" POST; then
 | 
			
		||||
      _info "Domain $domain certificate has been deployed successfully"
 | 
			
		||||
    fi
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# domain pub pri
 | 
			
		||||
_set_dcdn_domain_ssl_certificate_query() {
 | 
			
		||||
  endpoint=$Ali_DCDN_API
 | 
			
		||||
  query=''
 | 
			
		||||
  query=$query'AccessKeyId='$Ali_Key
 | 
			
		||||
  query=$query'&Action=SetDcdnDomainSSLCertificate'
 | 
			
		||||
  query=$query'&CertType=upload'
 | 
			
		||||
  query=$query'&DomainName='$1
 | 
			
		||||
  query=$query'&Format=json'
 | 
			
		||||
  query=$query'&SSLPri='$3
 | 
			
		||||
  query=$query'&SSLProtocol=on'
 | 
			
		||||
  query=$query'&SSLPub='$2
 | 
			
		||||
  query=$query'&SignatureMethod=HMAC-SHA1'
 | 
			
		||||
  query=$query"&SignatureNonce=$(_ali_nonce)"
 | 
			
		||||
  query=$query'&SignatureVersion=1.0'
 | 
			
		||||
  query=$query'&Timestamp='$(_timestamp)
 | 
			
		||||
  query=$query'&Version=2018-01-15'
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										56
									
								
								deploy/cachefly.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								deploy/cachefly.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,56 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to CacheFly
 | 
			
		||||
# https://api.cachefly.com/api/2.5/docs#tag/Certificates/paths/~1certificates/post
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export CACHEFLY_TOKEN="Your CacheFly API Token"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
CACHEFLY_API_BASE="https://api.cachefly.com/api/2.5"
 | 
			
		||||
 | 
			
		||||
cachefly_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$CACHEFLY_TOKEN" ]; then
 | 
			
		||||
    _err "CACHEFLY_TOKEN is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf CACHEFLY_TOKEN "$CACHEFLY_TOKEN"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Deploying certificate to CacheFly..."
 | 
			
		||||
 | 
			
		||||
  ## upload certificate
 | 
			
		||||
  string_fullchain=$(sed 's/$/\\n/' "$_cfullchain" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  _request_body="{\"certificate\":\"$string_fullchain\",\"certificateKey\":\"$string_key\"}"
 | 
			
		||||
  _debug _request_body "$_request_body"
 | 
			
		||||
  _debug CACHEFLY_TOKEN "$CACHEFLY_TOKEN"
 | 
			
		||||
  export _H1="Authorization: Bearer $CACHEFLY_TOKEN"
 | 
			
		||||
  _response=$(_post "$_request_body" "$CACHEFLY_API_BASE/certificates" "" "POST" "application/json")
 | 
			
		||||
 | 
			
		||||
  if _contains "$_response" "message"; then
 | 
			
		||||
    _err "Error in deploying $_cdomain certificate to CacheFly."
 | 
			
		||||
    _err "$_response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _debug response "$_response"
 | 
			
		||||
  _info "Domain $_cdomain certificate successfully deployed to CacheFly."
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										86
									
								
								deploy/directadmin.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										86
									
								
								deploy/directadmin.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,86 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to DirectAdmin
 | 
			
		||||
# https://docs.directadmin.com/directadmin/customizing-workflow/api-all-about.html#creating-a-login-key
 | 
			
		||||
# https://docs.directadmin.com/changelog/version-1.24.4.html#cmd-api-catch-all-pop-passwords-frontpage-protected-dirs-ssl-certs
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export DirectAdmin_SCHEME="https" # Optional, https or http, defaults to https
 | 
			
		||||
# export DirectAdmin_ENDPOINT="example.com:2222"
 | 
			
		||||
# export DirectAdmin_USERNAME="Your DirectAdmin Username"
 | 
			
		||||
# export DirectAdmin_KEY="Your DirectAdmin Login Key or Password"
 | 
			
		||||
# export DirectAdmin_MAIN_DOMAIN="Your DirectAdmin Main Domain, NOT Subdomain"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
directadmin_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DirectAdmin_ENDPOINT" ]; then
 | 
			
		||||
    _err "DirectAdmin_ENDPOINT is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_ENDPOINT "$DirectAdmin_ENDPOINT"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DirectAdmin_USERNAME" ]; then
 | 
			
		||||
    _err "DirectAdmin_USERNAME is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_USERNAME "$DirectAdmin_USERNAME"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DirectAdmin_KEY" ]; then
 | 
			
		||||
    _err "DirectAdmin_KEY is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_KEY "$DirectAdmin_KEY"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DirectAdmin_MAIN_DOMAIN" ]; then
 | 
			
		||||
    _err "DirectAdmin_MAIN_DOMAIN is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_MAIN_DOMAIN "$DirectAdmin_MAIN_DOMAIN"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Optional SCHEME
 | 
			
		||||
  _getdeployconf DirectAdmin_SCHEME
 | 
			
		||||
  # set default values for DirectAdmin_SCHEME
 | 
			
		||||
  [ -n "${DirectAdmin_SCHEME}" ] || DirectAdmin_SCHEME="https"
 | 
			
		||||
 | 
			
		||||
  _info "Deploying certificate to DirectAdmin..."
 | 
			
		||||
 | 
			
		||||
  # upload certificate
 | 
			
		||||
  string_cfullchain=$(sed 's/$/\\n/' "$_cfullchain" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  _request_body="{\"domain\":\"$DirectAdmin_MAIN_DOMAIN\",\"action\":\"save\",\"type\":\"paste\",\"certificate\":\"$string_key\n$string_cfullchain\n\"}"
 | 
			
		||||
  _debug _request_body "$_request_body"
 | 
			
		||||
  _debug DirectAdmin_ENDPOINT "$DirectAdmin_ENDPOINT"
 | 
			
		||||
  _debug DirectAdmin_USERNAME "$DirectAdmin_USERNAME"
 | 
			
		||||
  _debug DirectAdmin_KEY "$DirectAdmin_KEY"
 | 
			
		||||
  _debug DirectAdmin_MAIN_DOMAIN "$DirectAdmin_MAIN_DOMAIN"
 | 
			
		||||
  _response=$(_post "$_request_body" "$DirectAdmin_SCHEME://$DirectAdmin_USERNAME:$DirectAdmin_KEY@$DirectAdmin_ENDPOINT/CMD_API_SSL" "" "POST" "application/json")
 | 
			
		||||
 | 
			
		||||
  if _contains "$_response" "error=1"; then
 | 
			
		||||
    _err "Error in deploying $_cdomain certificate to DirectAdmin Domain $DirectAdmin_MAIN_DOMAIN."
 | 
			
		||||
    _err "$_response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "$_response"
 | 
			
		||||
  _info "Domain $_cdomain certificate successfully deployed to DirectAdmin Domain $DirectAdmin_MAIN_DOMAIN."
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
@@ -18,6 +18,7 @@ docker_deploy() {
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
  _cpfx="$6"
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _getdeployconf DEPLOY_DOCKER_CONTAINER_LABEL
 | 
			
		||||
  _debug2 DEPLOY_DOCKER_CONTAINER_LABEL "$DEPLOY_DOCKER_CONTAINER_LABEL"
 | 
			
		||||
@@ -88,6 +89,12 @@ docker_deploy() {
 | 
			
		||||
    _savedeployconf DEPLOY_DOCKER_CONTAINER_FULLCHAIN_FILE "$DEPLOY_DOCKER_CONTAINER_FULLCHAIN_FILE"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_DOCKER_CONTAINER_PFX_FILE
 | 
			
		||||
  _debug2 DEPLOY_DOCKER_CONTAINER_PFX_FILE "$DEPLOY_DOCKER_CONTAINER_PFX_FILE"
 | 
			
		||||
  if [ "$DEPLOY_DOCKER_CONTAINER_PFX_FILE" ]; then
 | 
			
		||||
    _savedeployconf DEPLOY_DOCKER_CONTAINER_PFX_FILE "$DEPLOY_DOCKER_CONTAINER_PFX_FILE"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_DOCKER_CONTAINER_RELOAD_CMD
 | 
			
		||||
  _debug2 DEPLOY_DOCKER_CONTAINER_RELOAD_CMD "$DEPLOY_DOCKER_CONTAINER_RELOAD_CMD"
 | 
			
		||||
  if [ "$DEPLOY_DOCKER_CONTAINER_RELOAD_CMD" ]; then
 | 
			
		||||
@@ -125,6 +132,12 @@ docker_deploy() {
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$DEPLOY_DOCKER_CONTAINER_PFX_FILE" ]; then
 | 
			
		||||
    if ! _docker_cp "$_cid" "$_cpfx" "$DEPLOY_DOCKER_CONTAINER_PFX_FILE"; then
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$DEPLOY_DOCKER_CONTAINER_RELOAD_CMD" ]; then
 | 
			
		||||
    _info "Reloading: $DEPLOY_DOCKER_CONTAINER_RELOAD_CMD"
 | 
			
		||||
    if ! _docker_exec "$_cid" "$DEPLOY_DOCKER_CONTAINER_RELOAD_CMD"; then
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										86
									
								
								deploy/edgio.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										86
									
								
								deploy/edgio.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,86 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Here is a script to deploy cert to edgio using its API
 | 
			
		||||
# https://docs.edg.io/guides/v7/develop/rest_api/authentication
 | 
			
		||||
# https://docs.edg.io/rest_api/#tag/tls-certs/operation/postConfigV01TlsCerts
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export EDGIO_CLIENT_ID="Your Edgio Client ID"
 | 
			
		||||
# export EDGIO_CLIENT_SECRET="Your Edgio Client Secret"
 | 
			
		||||
# export EDGIO_ENVIRONMENT_ID="Your Edgio Environment ID"
 | 
			
		||||
 | 
			
		||||
# If have more than one Environment ID
 | 
			
		||||
# export EDGIO_ENVIRONMENT_ID="ENVIRONMENT_ID_1 ENVIRONMENT_ID_2"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
edgio_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$EDGIO_CLIENT_ID" ]; then
 | 
			
		||||
    _err "EDGIO_CLIENT_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf EDGIO_CLIENT_ID "$EDGIO_CLIENT_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$EDGIO_CLIENT_SECRET" ]; then
 | 
			
		||||
    _err "EDGIO_CLIENT_SECRET is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf EDGIO_CLIENT_SECRET "$EDGIO_CLIENT_SECRET"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$EDGIO_ENVIRONMENT_ID" ]; then
 | 
			
		||||
    _err "EDGIO_ENVIRONMENT_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf EDGIO_ENVIRONMENT_ID "$EDGIO_ENVIRONMENT_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Getting access token"
 | 
			
		||||
  _data="client_id=$EDGIO_CLIENT_ID&client_secret=$EDGIO_CLIENT_SECRET&grant_type=client_credentials&scope=app.config"
 | 
			
		||||
  _debug Get_access_token_data "$_data"
 | 
			
		||||
  _response=$(_post "$_data" "https://id.edgio.app/connect/token" "" "POST" "application/x-www-form-urlencoded")
 | 
			
		||||
  _debug Get_access_token_response "$_response"
 | 
			
		||||
  _access_token=$(echo "$_response" | _json_decode | _egrep_o '"access_token":"[^"]*' | cut -d : -f 2 | tr -d '"')
 | 
			
		||||
  _debug _access_token "$_access_token"
 | 
			
		||||
  if [ -z "$_access_token" ]; then
 | 
			
		||||
    _err "Error in getting access token"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Uploading certificate"
 | 
			
		||||
  string_ccert=$(sed 's/$/\\n/' "$_ccert" | tr -d '\n')
 | 
			
		||||
  string_cca=$(sed 's/$/\\n/' "$_cca" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  for ENVIRONMENT_ID in $EDGIO_ENVIRONMENT_ID; do
 | 
			
		||||
    _data="{\"environment_id\":\"$ENVIRONMENT_ID\",\"primary_cert\":\"$string_ccert\",\"intermediate_cert\":\"$string_cca\",\"private_key\":\"$string_key\"}"
 | 
			
		||||
    _debug Upload_certificate_data "$_data"
 | 
			
		||||
    _H1="Authorization: Bearer $_access_token"
 | 
			
		||||
    _response=$(_post "$_data" "https://edgioapis.com/config/v0.1/tls-certs" "" "POST" "application/json")
 | 
			
		||||
    if _contains "$_response" "message"; then
 | 
			
		||||
      _err "Error in deploying $_cdomain certificate to Edgio ENVIRONMENT_ID $ENVIRONMENT_ID."
 | 
			
		||||
      _err "$_response"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _debug Upload_certificate_response "$_response"
 | 
			
		||||
    _info "Domain $_cdomain certificate successfully deployed to Edgio ENVIRONMENT_ID $ENVIRONMENT_ID."
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
@@ -109,6 +109,5 @@ exim4_deploy() {
 | 
			
		||||
    fi
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  return 0
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -357,7 +357,7 @@ haproxy_deploy() {
 | 
			
		||||
        _info "Update existing certificate '${_pem}' over HAProxy ${_socketname}."
 | 
			
		||||
      fi
 | 
			
		||||
      _socat_cert_set_cmd="echo -e '${_cmdpfx}set ssl cert ${_pem} <<\n$(cat "${_pem}")\n' | socat '${_statssock}' - | grep -q 'Transaction created'"
 | 
			
		||||
      _debug _socat_cert_set_cmd "${_socat_cert_set_cmd}"
 | 
			
		||||
      _secure_debug _socat_cert_set_cmd "${_socat_cert_set_cmd}"
 | 
			
		||||
      eval "${_socat_cert_set_cmd}"
 | 
			
		||||
      _ret=$?
 | 
			
		||||
      if [ "${_ret}" != "0" ]; then
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										98
									
								
								deploy/kemplm.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										98
									
								
								deploy/kemplm.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,98 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
#Here is a script to deploy cert to a Kemp Loadmaster.
 | 
			
		||||
 | 
			
		||||
#returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
#DEPLOY_KEMP_TOKEN="token"
 | 
			
		||||
#DEPLOY_KEMP_URL="https://kemplm.example.com"
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
kemplm_deploy() {
 | 
			
		||||
  _domain="$1"
 | 
			
		||||
  _key_file="$2"
 | 
			
		||||
  _cert_file="$3"
 | 
			
		||||
  _ca_file="$4"
 | 
			
		||||
  _fullchain_file="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
  _debug _key_file "$_key_file"
 | 
			
		||||
  _debug _cert_file "$_cert_file"
 | 
			
		||||
  _debug _ca_file "$_ca_file"
 | 
			
		||||
  _debug _fullchain_file "$_fullchain_file"
 | 
			
		||||
 | 
			
		||||
  if ! _exists jq; then
 | 
			
		||||
    _err "jq not found"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Rename wildcard certs, kemp accepts only alphanumeric names so we delete '*.' from filename
 | 
			
		||||
  _kemp_domain=$(echo "${_domain}" | sed 's/\*\.//')
 | 
			
		||||
  _debug _kemp_domain "$_kemp_domain"
 | 
			
		||||
 | 
			
		||||
  # Read config from saved values or env
 | 
			
		||||
  _getdeployconf DEPLOY_KEMP_TOKEN
 | 
			
		||||
  _getdeployconf DEPLOY_KEMP_URL
 | 
			
		||||
 | 
			
		||||
  _debug DEPLOY_KEMP_URL "$DEPLOY_KEMP_URL"
 | 
			
		||||
  _secure_debug DEPLOY_KEMP_TOKEN "$DEPLOY_KEMP_TOKEN"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEMP_TOKEN" ]; then
 | 
			
		||||
    _err "Kemp Loadmaster token is not found, please define DEPLOY_KEMP_TOKEN."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DEPLOY_KEMP_URL" ]; then
 | 
			
		||||
    _err "Kemp Loadmaster URL is not found, please define DEPLOY_KEMP_URL."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Save current values
 | 
			
		||||
  _savedeployconf DEPLOY_KEMP_TOKEN "$DEPLOY_KEMP_TOKEN"
 | 
			
		||||
  _savedeployconf DEPLOY_KEMP_URL "$DEPLOY_KEMP_URL"
 | 
			
		||||
 | 
			
		||||
  # Check if certificate is already installed
 | 
			
		||||
  _info "Check if certificate is already present"
 | 
			
		||||
  _list_request="{\"cmd\": \"listcert\", \"apikey\": \"${DEPLOY_KEMP_TOKEN}\"}"
 | 
			
		||||
  _debug3 _list_request "${_list_request}"
 | 
			
		||||
  _kemp_cert_count=$(HTTPS_INSECURE=1 _post "${_list_request}" "${DEPLOY_KEMP_URL}/accessv2" | jq -r '.cert[] | .name' | grep -c "${_kemp_domain}")
 | 
			
		||||
  _debug2 _kemp_cert_count "${_kemp_cert_count}"
 | 
			
		||||
 | 
			
		||||
  _kemp_replace_cert=1
 | 
			
		||||
  if [ "${_kemp_cert_count}" -eq 0 ]; then
 | 
			
		||||
    _kemp_replace_cert=0
 | 
			
		||||
    _info "Certificate does not exist on Kemp Loadmaster"
 | 
			
		||||
  else
 | 
			
		||||
    _info "Certificate already exists on Kemp Loadmaster"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug _kemp_replace_cert "${_kemp_replace_cert}"
 | 
			
		||||
 | 
			
		||||
  # Upload new certificate to Kemp Loadmaster
 | 
			
		||||
  _kemp_upload_cert=$(_mktemp)
 | 
			
		||||
  cat "${_fullchain_file}" "${_key_file}" | base64 | tr -d '\n' >"${_kemp_upload_cert}"
 | 
			
		||||
 | 
			
		||||
  _info "Uploading certificate to Kemp Loadmaster"
 | 
			
		||||
  _add_data=$(cat "${_kemp_upload_cert}")
 | 
			
		||||
  _add_request="{\"cmd\": \"addcert\", \"apikey\": \"${DEPLOY_KEMP_TOKEN}\", \"replace\": ${_kemp_replace_cert}, \"cert\": \"${_kemp_domain}\", \"data\": \"${_add_data}\"}"
 | 
			
		||||
  _debug3 _add_request "${_add_request}"
 | 
			
		||||
  _kemp_post_result=$(HTTPS_INSECURE=1 _post "${_add_request}" "${DEPLOY_KEMP_URL}/accessv2")
 | 
			
		||||
  _retval=$?
 | 
			
		||||
  _debug2 _kemp_post_result "${_kemp_post_result}"
 | 
			
		||||
  if [ "${_retval}" -eq 0 ]; then
 | 
			
		||||
    _kemp_post_status=$(echo "${_kemp_post_result}" | jq -r '.status')
 | 
			
		||||
    _kemp_post_message=$(echo "${_kemp_post_result}" | jq -r '.message')
 | 
			
		||||
    if [ "${_kemp_post_status}" = "ok" ]; then
 | 
			
		||||
      _info "Upload successful"
 | 
			
		||||
    else
 | 
			
		||||
      _err "Upload failed: ${_kemp_post_message}"
 | 
			
		||||
    fi
 | 
			
		||||
  else
 | 
			
		||||
    _err "Upload failed"
 | 
			
		||||
    _retval=1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  rm "${_kemp_upload_cert}"
 | 
			
		||||
 | 
			
		||||
  return $_retval
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										131
									
								
								deploy/keyhelp.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										131
									
								
								deploy/keyhelp.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,131 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to KeyHelp
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export DEPLOY_KEYHELP_BASEURL="https://keyhelp.example.com"
 | 
			
		||||
# export DEPLOY_KEYHELP_USERNAME="Your KeyHelp Username"
 | 
			
		||||
# export DEPLOY_KEYHELP_PASSWORD="Your KeyHelp Password"
 | 
			
		||||
# export DEPLOY_KEYHELP_DOMAIN_ID="Depoly certificate to this Domain ID"
 | 
			
		||||
 | 
			
		||||
# Open the 'Edit domain' page, and you will see id=xxx at the end of the URL. This is the Domain ID.
 | 
			
		||||
# https://DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit&id=xxx
 | 
			
		||||
 | 
			
		||||
# If have more than one domain name
 | 
			
		||||
# export DEPLOY_KEYHELP_DOMAIN_ID="111 222 333"
 | 
			
		||||
 | 
			
		||||
keyhelp_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_BASEURL" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_BASEURL is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_BASEURL "$DEPLOY_KEYHELP_BASEURL"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_USERNAME" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_USERNAME is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_USERNAME "$DEPLOY_KEYHELP_USERNAME"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_PASSWORD" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_PASSWORD is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_PASSWORD "$DEPLOY_KEYHELP_PASSWORD"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_DOMAIN_ID" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_DOMAIN_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_DOMAIN_ID "$DEPLOY_KEYHELP_DOMAIN_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Optional DEPLOY_KEYHELP_ENFORCE_HTTPS
 | 
			
		||||
  _getdeployconf DEPLOY_KEYHELP_ENFORCE_HTTPS
 | 
			
		||||
  # set default values for DEPLOY_KEYHELP_ENFORCE_HTTPS
 | 
			
		||||
  [ -n "${DEPLOY_KEYHELP_ENFORCE_HTTPS}" ] || DEPLOY_KEYHELP_ENFORCE_HTTPS="1"
 | 
			
		||||
 | 
			
		||||
  _info "Logging in to keyhelp panel"
 | 
			
		||||
  username_encoded="$(printf "%s" "${DEPLOY_KEYHELP_USERNAME}" | _url_encode)"
 | 
			
		||||
  password_encoded="$(printf "%s" "${DEPLOY_KEYHELP_PASSWORD}" | _url_encode)"
 | 
			
		||||
  _H1="Content-Type: application/x-www-form-urlencoded"
 | 
			
		||||
  _response=$(_get "$DEPLOY_KEYHELP_BASEURL/index.php?submit=1&username=$username_encoded&password=$password_encoded" "TRUE")
 | 
			
		||||
  _cookie="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _head_n 1 | cut -d " " -f 2)"
 | 
			
		||||
 | 
			
		||||
  # If cookies is not empty then logon successful
 | 
			
		||||
  if [ -z "$_cookie" ]; then
 | 
			
		||||
    _err "Fail to get cookie."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _debug "cookie" "$_cookie"
 | 
			
		||||
 | 
			
		||||
  _info "Uploading certificate"
 | 
			
		||||
  _date=$(date +"%Y%m%d")
 | 
			
		||||
  encoded_key="$(_url_encode <"$_ckey")"
 | 
			
		||||
  encoded_ccert="$(_url_encode <"$_ccert")"
 | 
			
		||||
  encoded_cca="$(_url_encode <"$_cca")"
 | 
			
		||||
  certificate_name="$_cdomain-$_date"
 | 
			
		||||
 | 
			
		||||
  _request_body="submit=1&certificate_name=$certificate_name&add_type=upload&text_private_key=$encoded_key&text_certificate=$encoded_ccert&text_ca_certificate=$encoded_cca"
 | 
			
		||||
  _H1="Cookie: $_cookie"
 | 
			
		||||
  _response=$(_post "$_request_body" "$DEPLOY_KEYHELP_BASEURL/index.php?page=ssl_certificates&action=add" "" "POST")
 | 
			
		||||
  _message=$(echo "$_response" | grep -A 2 'message-body' | sed -n '/<div class="message-body ">/,/<\/div>/{//!p;}' | sed 's/<[^>]*>//g' | sed 's/^ *//;s/ *$//')
 | 
			
		||||
  _info "_message" "$_message"
 | 
			
		||||
  if [ -z "$_message" ]; then
 | 
			
		||||
    _err "Fail to upload certificate."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  for DOMAIN_ID in $DEPLOY_KEYHELP_DOMAIN_ID; do
 | 
			
		||||
    _info "Apply certificate to domain id $DOMAIN_ID"
 | 
			
		||||
    _response=$(_get "$DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit&id=$DOMAIN_ID")
 | 
			
		||||
    cert_value=$(echo "$_response" | grep "$certificate_name" | sed -n 's/.*value="\([^"]*\).*/\1/p')
 | 
			
		||||
    target_type=$(echo "$_response" | grep 'target_type' | grep 'checked' | sed -n 's/.*value="\([^"]*\).*/\1/p')
 | 
			
		||||
    if [ "$target_type" = "directory" ]; then
 | 
			
		||||
      path=$(echo "$_response" | awk '/name="path"/{getline; print}' | sed -n 's/.*value="\([^"]*\).*/\1/p')
 | 
			
		||||
    fi
 | 
			
		||||
    echo "$_response" | grep "is_prefer_https" | grep "checked" >/dev/null
 | 
			
		||||
    if [ $? -eq 0 ]; then
 | 
			
		||||
      is_prefer_https=1
 | 
			
		||||
    else
 | 
			
		||||
      is_prefer_https=0
 | 
			
		||||
    fi
 | 
			
		||||
    echo "$_response" | grep "hsts_enabled" | grep "checked" >/dev/null
 | 
			
		||||
    if [ $? -eq 0 ]; then
 | 
			
		||||
      hsts_enabled=1
 | 
			
		||||
    else
 | 
			
		||||
      hsts_enabled=0
 | 
			
		||||
    fi
 | 
			
		||||
    _debug "cert_value" "$cert_value"
 | 
			
		||||
    if [ -z "$cert_value" ]; then
 | 
			
		||||
      _err "Fail to get certificate id."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _request_body="submit=1&id=$DOMAIN_ID&target_type=$target_type&path=$path&is_prefer_https=$is_prefer_https&hsts_enabled=$hsts_enabled&certificate_type=custom&certificate_id=$cert_value&enforce_https=$DEPLOY_KEYHELP_ENFORCE_HTTPS"
 | 
			
		||||
    _response=$(_post "$_request_body" "$DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit" "" "POST")
 | 
			
		||||
    _message=$(echo "$_response" | grep -A 2 'message-body' | sed -n '/<div class="message-body ">/,/<\/div>/{//!p;}' | sed 's/<[^>]*>//g' | sed 's/^ *//;s/ *$//')
 | 
			
		||||
    _info "_message" "$_message"
 | 
			
		||||
    if [ -z "$_message" ]; then
 | 
			
		||||
      _err "Fail to apply certificate."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  _info "Domain $_cdomain certificate successfully deployed to KeyHelp Domain ID $DEPLOY_KEYHELP_DOMAIN_ID."
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										69
									
								
								deploy/netlify.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										69
									
								
								deploy/netlify.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,69 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to Netlify
 | 
			
		||||
# https://docs.netlify.com/api/get-started/#authentication
 | 
			
		||||
# https://open-api.netlify.com/#tag/sniCertificate
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export Netlify_ACCESS_TOKEN="Your Netlify Access Token"
 | 
			
		||||
# export Netlify_SITE_ID="Your Netlify Site ID"
 | 
			
		||||
 | 
			
		||||
# If have more than one SITE ID
 | 
			
		||||
# export Netlify_SITE_ID="SITE_ID_1 SITE_ID_2"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
netlify_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$Netlify_ACCESS_TOKEN" ]; then
 | 
			
		||||
    _err "Netlify_ACCESS_TOKEN is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf Netlify_ACCESS_TOKEN "$Netlify_ACCESS_TOKEN"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$Netlify_SITE_ID" ]; then
 | 
			
		||||
    _err "Netlify_SITE_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf Netlify_SITE_ID "$Netlify_SITE_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Deploying certificate to Netlify..."
 | 
			
		||||
 | 
			
		||||
  ## upload certificate
 | 
			
		||||
  string_ccert=$(sed 's/$/\\n/' "$_ccert" | tr -d '\n')
 | 
			
		||||
  string_cca=$(sed 's/$/\\n/' "$_cca" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  for SITE_ID in $Netlify_SITE_ID; do
 | 
			
		||||
    _request_body="{\"certificate\":\"$string_ccert\",\"key\":\"$string_key\",\"ca_certificates\":\"$string_cca\"}"
 | 
			
		||||
    _debug _request_body "$_request_body"
 | 
			
		||||
    _debug Netlify_ACCESS_TOKEN "$Netlify_ACCESS_TOKEN"
 | 
			
		||||
    export _H1="Authorization: Bearer $Netlify_ACCESS_TOKEN"
 | 
			
		||||
    _response=$(_post "$_request_body" "https://api.netlify.com/api/v1/sites/$SITE_ID/ssl" "" "POST" "application/json")
 | 
			
		||||
 | 
			
		||||
    if _contains "$_response" "\"error\""; then
 | 
			
		||||
      _err "Error in deploying $_cdomain certificate to Netlify SITE_ID $SITE_ID."
 | 
			
		||||
      _err "$_response"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _debug response "$_response"
 | 
			
		||||
    _info "Domain $_cdomain certificate successfully deployed to Netlify SITE_ID $SITE_ID."
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
@@ -7,20 +7,26 @@
 | 
			
		||||
#
 | 
			
		||||
# Firewall admin with superuser and IP address is required.
 | 
			
		||||
#
 | 
			
		||||
# REQURED:
 | 
			
		||||
# REQUIRED:
 | 
			
		||||
#     export PANOS_HOST=""
 | 
			
		||||
#     export PANOS_USER=""    #User *MUST* have Commit and Import Permissions in XML API for Admin Role
 | 
			
		||||
#     export PANOS_PASS=""
 | 
			
		||||
#
 | 
			
		||||
# OPTIONAL
 | 
			
		||||
#    export PANOS_TEMPLATE="" #Template Name of panorama managed devices
 | 
			
		||||
#    export PANOS_TEMPLATE="" # Template Name of panorama managed devices
 | 
			
		||||
#    export PANOS_TEMPLATE_STACK="" # set a Template Stack if certificate should also be pushed automatically
 | 
			
		||||
#    export PANOS_VSYS="Shared"  # name of the vsys to import the certificate
 | 
			
		||||
#
 | 
			
		||||
# The script will automatically generate a new API key if
 | 
			
		||||
# no key is found, or if a saved key has expired or is invalid.
 | 
			
		||||
 | 
			
		||||
_COMMIT_WAIT_INTERVAL=30   # query commit status every 30 seconds
 | 
			
		||||
_COMMIT_WAIT_ITERATIONS=20 # query commit status 20 times (20*30 = 600 seconds = 10 minutes)
 | 
			
		||||
 | 
			
		||||
# This function is to parse the XML response from the firewall
 | 
			
		||||
parse_response() {
 | 
			
		||||
  type=$2
 | 
			
		||||
  _debug "API Response: $1"
 | 
			
		||||
  if [ "$type" = 'keygen' ]; then
 | 
			
		||||
    status=$(echo "$1" | sed 's/^.*\(['\'']\)\([a-z]*\)'\''.*/\2/g')
 | 
			
		||||
    if [ "$status" = "success" ]; then
 | 
			
		||||
@@ -30,6 +36,13 @@ parse_response() {
 | 
			
		||||
      message="PAN-OS Key could not be set."
 | 
			
		||||
    fi
 | 
			
		||||
  else
 | 
			
		||||
    if [ "$type" = 'commit' ]; then
 | 
			
		||||
      job_id=$(echo "$1" | sed 's/^.*\(<job>\)\(.*\)<\/job>.*/\2/g')
 | 
			
		||||
      _commit_job_id=$job_id
 | 
			
		||||
    elif [ "$type" = 'job_status' ]; then
 | 
			
		||||
      job_status=$(echo "$1" | tr -d '\n' | sed 's/^.*<result>\([^<]*\)<\/result>.*/\1/g')
 | 
			
		||||
      _commit_job_status=$job_status
 | 
			
		||||
    fi
 | 
			
		||||
    status=$(echo "$1" | tr -d '\n' | sed 's/^.*"\([a-z]*\)".*/\1/g')
 | 
			
		||||
    message=$(echo "$1" | tr -d '\n' | sed 's/.*\(<result>\|<msg>\|<line>\)\([^<]*\).*/\2/g')
 | 
			
		||||
    _debug "Firewall message:  $message"
 | 
			
		||||
@@ -44,13 +57,13 @@ parse_response() {
 | 
			
		||||
#This function is used to deploy to the firewall
 | 
			
		||||
deployer() {
 | 
			
		||||
  content=""
 | 
			
		||||
  type=$1 # Types are keytest, keygen, cert, key, commit
 | 
			
		||||
  type=$1 # Types are keytest, keygen, cert, key, commit, job_status, push
 | 
			
		||||
  panos_url="https://$_panos_host/api/"
 | 
			
		||||
  export _H1="Content-Type: application/x-www-form-urlencoded"
 | 
			
		||||
 | 
			
		||||
  #Test API Key by performing a lookup
 | 
			
		||||
  if [ "$type" = 'keytest' ]; then
 | 
			
		||||
    _debug "**** Testing saved API Key ****"
 | 
			
		||||
    _H1="Content-Type: application/x-www-form-urlencoded"
 | 
			
		||||
    # Get Version Info to test key
 | 
			
		||||
    content="type=version&key=$_panos_key"
 | 
			
		||||
    ## Exclude all scopes for the empty commit
 | 
			
		||||
@@ -61,7 +74,6 @@ deployer() {
 | 
			
		||||
  # Generate API Key
 | 
			
		||||
  if [ "$type" = 'keygen' ]; then
 | 
			
		||||
    _debug "**** Generating new API Key ****"
 | 
			
		||||
    _H1="Content-Type: application/x-www-form-urlencoded"
 | 
			
		||||
    content="type=keygen&user=$_panos_user&password=$_panos_pass"
 | 
			
		||||
    # content="$content${nl}--$delim${nl}Content-Disposition: form-data; type=\"keygen\"; user=\"$_panos_user\"; password=\"$_panos_pass\"${nl}Content-Type: application/octet-stream${nl}${nl}"
 | 
			
		||||
  fi
 | 
			
		||||
@@ -84,6 +96,9 @@ deployer() {
 | 
			
		||||
      if [ "$_panos_template" ]; then
 | 
			
		||||
        content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"target-tpl\"\r\n\r\n$_panos_template"
 | 
			
		||||
      fi
 | 
			
		||||
      if [ "$_panos_vsys" ]; then
 | 
			
		||||
        content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"target-tpl-vsys\"\r\n\r\n$_panos_vsys"
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
    if [ "$type" = 'key' ]; then
 | 
			
		||||
      panos_url="${panos_url}?type=import"
 | 
			
		||||
@@ -96,6 +111,9 @@ deployer() {
 | 
			
		||||
      if [ "$_panos_template" ]; then
 | 
			
		||||
        content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"target-tpl\"\r\n\r\n$_panos_template"
 | 
			
		||||
      fi
 | 
			
		||||
      if [ "$_panos_vsys" ]; then
 | 
			
		||||
        content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"target-tpl-vsys\"\r\n\r\n$_panos_vsys"
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
    #Close multipart
 | 
			
		||||
    content="$content${nl}--$delim--${nl}${nl}"
 | 
			
		||||
@@ -106,7 +124,6 @@ deployer() {
 | 
			
		||||
  # Commit changes
 | 
			
		||||
  if [ "$type" = 'commit' ]; then
 | 
			
		||||
    _debug "**** Committing changes ****"
 | 
			
		||||
    export _H1="Content-Type: application/x-www-form-urlencoded"
 | 
			
		||||
    #Check for force commit - will commit ALL uncommited changes to the firewall. Use with caution!
 | 
			
		||||
    if [ "$FORCE" ]; then
 | 
			
		||||
      _debug "Force switch detected.  Committing ALL changes to the firewall."
 | 
			
		||||
@@ -118,6 +135,20 @@ deployer() {
 | 
			
		||||
    content="type=commit&action=partial&key=$_panos_key&cmd=$cmd"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Query job status
 | 
			
		||||
  if [ "$type" = 'job_status' ]; then
 | 
			
		||||
    echo "**** Querying job $_commit_job_id status ****"
 | 
			
		||||
    cmd=$(printf "%s" "<show><jobs><id>$_commit_job_id</id></jobs></show>" | _url_encode)
 | 
			
		||||
    content="type=op&key=$_panos_key&cmd=$cmd"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Push changes
 | 
			
		||||
  if [ "$type" = 'push' ]; then
 | 
			
		||||
    echo "**** Pushing changes ****"
 | 
			
		||||
    cmd=$(printf "%s" "<commit-all><template-stack><name>$_panos_template_stack</name><admin><member>$_panos_user</member></admin></template-stack></commit-all>" | _url_encode)
 | 
			
		||||
    content="type=commit&action=all&key=$_panos_key&cmd=$cmd"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  response=$(_post "$content" "$panos_url" "" "POST")
 | 
			
		||||
  parse_response "$response" "$type"
 | 
			
		||||
  # Saving response to variables
 | 
			
		||||
@@ -126,6 +157,8 @@ deployer() {
 | 
			
		||||
  if [ "$response_status" = "success" ]; then
 | 
			
		||||
    _debug "Successfully deployed $type"
 | 
			
		||||
    return 0
 | 
			
		||||
  elif [ "$_commit_job_status" ]; then
 | 
			
		||||
    _debug "Commit Job Status = $_commit_job_status"
 | 
			
		||||
  else
 | 
			
		||||
    _err "Deploy of type $type failed. Try deploying with --debug to troubleshoot."
 | 
			
		||||
    _debug "$message"
 | 
			
		||||
@@ -191,11 +224,31 @@ panos_deploy() {
 | 
			
		||||
    _getdeployconf PANOS_TEMPLATE
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # PANOS_TEMPLATE_STACK
 | 
			
		||||
  if [ "$PANOS_TEMPLATE_STACK" ]; then
 | 
			
		||||
    _debug "Detected ENV variable PANOS_TEMPLATE_STACK. Saving to file."
 | 
			
		||||
    _savedeployconf PANOS_TEMPLATE_STACK "$PANOS_TEMPLATE_STACK" 1
 | 
			
		||||
  else
 | 
			
		||||
    _debug "Attempting to load variable PANOS_TEMPLATE_STACK from file."
 | 
			
		||||
    _getdeployconf PANOS_TEMPLATE_STACK
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # PANOS_TEMPLATE_STACK
 | 
			
		||||
  if [ "$PANOS_VSYS" ]; then
 | 
			
		||||
    _debug "Detected ENV variable PANOS_VSYS. Saving to file."
 | 
			
		||||
    _savedeployconf PANOS_VSYS "$PANOS_VSYS" 1
 | 
			
		||||
  else
 | 
			
		||||
    _debug "Attempting to load variable PANOS_VSYS from file."
 | 
			
		||||
    _getdeployconf PANOS_VSYS
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #Store variables
 | 
			
		||||
  _panos_host=$PANOS_HOST
 | 
			
		||||
  _panos_user=$PANOS_USER
 | 
			
		||||
  _panos_pass=$PANOS_PASS
 | 
			
		||||
  _panos_template=$PANOS_TEMPLATE
 | 
			
		||||
  _panos_template_stack=$PANOS_TEMPLATE_STACK
 | 
			
		||||
  _panos_vsys=$PANOS_VSYS
 | 
			
		||||
 | 
			
		||||
  #Test API Key if found.  If the key is invalid, the variable _panos_key will be unset.
 | 
			
		||||
  if [ "$_panos_host" ] && [ "$_panos_key" ]; then
 | 
			
		||||
@@ -229,6 +282,20 @@ panos_deploy() {
 | 
			
		||||
      deployer cert
 | 
			
		||||
      deployer key
 | 
			
		||||
      deployer commit
 | 
			
		||||
      if [ "$_panos_template_stack" ]; then
 | 
			
		||||
        # try to get job status for 20 times in 30 sec interval
 | 
			
		||||
        i=0
 | 
			
		||||
        while [ "$i" -lt $_COMMIT_WAIT_ITERATIONS ]; do
 | 
			
		||||
          deployer job_status
 | 
			
		||||
          if [ "$_commit_job_status" = "OK" ]; then
 | 
			
		||||
            echo "Commit finished!"
 | 
			
		||||
            break
 | 
			
		||||
          fi
 | 
			
		||||
          sleep $_COMMIT_WAIT_INTERVAL
 | 
			
		||||
          i=$((i + 1))
 | 
			
		||||
        done
 | 
			
		||||
        deployer push
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										130
									
								
								deploy/proxmoxbs.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										130
									
								
								deploy/proxmoxbs.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,130 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Deploy certificates to a proxmox backup server using the API.
 | 
			
		||||
#
 | 
			
		||||
# Environment variables that can be set are:
 | 
			
		||||
# `DEPLOY_PROXMOXBS_SERVER`: The hostname of the proxmox backup server. Defaults to
 | 
			
		||||
#                            _cdomain.
 | 
			
		||||
# `DEPLOY_PROXMOXBS_SERVER_PORT`: The port number the management interface is on.
 | 
			
		||||
#                                 Defaults to 8007.
 | 
			
		||||
# `DEPLOY_PROXMOXBS_USER`: The user we'll connect as. Defaults to root.
 | 
			
		||||
# `DEPLOY_PROXMOXBS_USER_REALM`: The authentication realm the user authenticates
 | 
			
		||||
#                                with. Defaults to pam.
 | 
			
		||||
# `DEPLOY_PROXMOXBS_API_TOKEN_NAME`: The name of the API token created for the
 | 
			
		||||
#                                    user account. Defaults to acme.
 | 
			
		||||
# `DEPLOY_PROXMOXBS_API_TOKEN_KEY`: The API token. Required.
 | 
			
		||||
 | 
			
		||||
proxmoxbs_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug2 _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  # "Sane" defaults.
 | 
			
		||||
  _getdeployconf DEPLOY_PROXMOXBS_SERVER
 | 
			
		||||
  if [ -z "$DEPLOY_PROXMOXBS_SERVER" ]; then
 | 
			
		||||
    _target_hostname="$_cdomain"
 | 
			
		||||
  else
 | 
			
		||||
    _target_hostname="$DEPLOY_PROXMOXBS_SERVER"
 | 
			
		||||
    _savedeployconf DEPLOY_PROXMOXBS_SERVER "$DEPLOY_PROXMOXBS_SERVER"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug2 DEPLOY_PROXMOXBS_SERVER "$_target_hostname"
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_PROXMOXBS_SERVER_PORT
 | 
			
		||||
  if [ -z "$DEPLOY_PROXMOXBS_SERVER_PORT" ]; then
 | 
			
		||||
    _target_port="8007"
 | 
			
		||||
  else
 | 
			
		||||
    _target_port="$DEPLOY_PROXMOXBS_SERVER_PORT"
 | 
			
		||||
    _savedeployconf DEPLOY_PROXMOXBS_SERVER_PORT "$DEPLOY_PROXMOXBS_SERVER_PORT"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug2 DEPLOY_PROXMOXBS_SERVER_PORT "$_target_port"
 | 
			
		||||
 | 
			
		||||
  # Complete URL.
 | 
			
		||||
  _target_url="https://${_target_hostname}:${_target_port}/api2/json/nodes/localhost/certificates/custom"
 | 
			
		||||
  _debug TARGET_URL "$_target_url"
 | 
			
		||||
 | 
			
		||||
  # More "sane" defaults.
 | 
			
		||||
  _getdeployconf DEPLOY_PROXMOXBS_USER
 | 
			
		||||
  if [ -z "$DEPLOY_PROXMOXBS_USER" ]; then
 | 
			
		||||
    _proxmoxbs_user="root"
 | 
			
		||||
  else
 | 
			
		||||
    _proxmoxbs_user="$DEPLOY_PROXMOXBS_USER"
 | 
			
		||||
    _savedeployconf DEPLOY_PROXMOXBS_USER "$DEPLOY_PROXMOXBS_USER"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug2 DEPLOY_PROXMOXBS_USER "$_proxmoxbs_user"
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_PROXMOXBS_USER_REALM
 | 
			
		||||
  if [ -z "$DEPLOY_PROXMOXBS_USER_REALM" ]; then
 | 
			
		||||
    _proxmoxbs_user_realm="pam"
 | 
			
		||||
  else
 | 
			
		||||
    _proxmoxbs_user_realm="$DEPLOY_PROXMOXBS_USER_REALM"
 | 
			
		||||
    _savedeployconf DEPLOY_PROXMOXBS_USER_REALM "$DEPLOY_PROXMOXBS_USER_REALM"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug2 DEPLOY_PROXMOXBS_USER_REALM "$_proxmoxbs_user_realm"
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_PROXMOXBS_API_TOKEN_NAME
 | 
			
		||||
  if [ -z "$DEPLOY_PROXMOXBS_API_TOKEN_NAME" ]; then
 | 
			
		||||
    _proxmoxbs_api_token_name="acme"
 | 
			
		||||
  else
 | 
			
		||||
    _proxmoxbs_api_token_name="$DEPLOY_PROXMOXBS_API_TOKEN_NAME"
 | 
			
		||||
    _savedeployconf DEPLOY_PROXMOXBS_API_TOKEN_NAME "$DEPLOY_PROXMOXBS_API_TOKEN_NAME"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug2 DEPLOY_PROXMOXBS_API_TOKEN_NAME "$_proxmoxbs_api_token_name"
 | 
			
		||||
 | 
			
		||||
  # This is required.
 | 
			
		||||
  _getdeployconf DEPLOY_PROXMOXBS_API_TOKEN_KEY
 | 
			
		||||
  if [ -z "$DEPLOY_PROXMOXBS_API_TOKEN_KEY" ]; then
 | 
			
		||||
    _err "API key not provided."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _proxmoxbs_api_token_key="$DEPLOY_PROXMOXBS_API_TOKEN_KEY"
 | 
			
		||||
    _savedeployconf DEPLOY_PROXMOXBS_API_TOKEN_KEY "$DEPLOY_PROXMOXBS_API_TOKEN_KEY"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug2 DEPLOY_PROXMOXBS_API_TOKEN_KEY "$_proxmoxbs_api_token_key"
 | 
			
		||||
 | 
			
		||||
  # PBS API Token header value. Used in "Authorization: PBSAPIToken".
 | 
			
		||||
  _proxmoxbs_header_api_token="${_proxmoxbs_user}@${_proxmoxbs_user_realm}!${_proxmoxbs_api_token_name}:${_proxmoxbs_api_token_key}"
 | 
			
		||||
  _debug2 "Auth Header" "$_proxmoxbs_header_api_token"
 | 
			
		||||
 | 
			
		||||
  # Ugly. I hate putting heredocs inside functions because heredocs don't
 | 
			
		||||
  # account for whitespace correctly but it _does_ work and is several times
 | 
			
		||||
  # cleaner than anything else I had here.
 | 
			
		||||
  #
 | 
			
		||||
  # This dumps the json payload to a variable that should be passable to the
 | 
			
		||||
  # _psot function.
 | 
			
		||||
  _json_payload=$(
 | 
			
		||||
    cat <<HEREDOC
 | 
			
		||||
{
 | 
			
		||||
  "certificates": "$(tr '\n' ':' <"$_cfullchain" | sed 's/:/\\n/g')",
 | 
			
		||||
  "key": "$(tr '\n' ':' <"$_ckey" | sed 's/:/\\n/g')",
 | 
			
		||||
  "node":"localhost",
 | 
			
		||||
  "restart":true,
 | 
			
		||||
  "force":true
 | 
			
		||||
}
 | 
			
		||||
HEREDOC
 | 
			
		||||
  )
 | 
			
		||||
  _debug2 Payload "$_json_payload"
 | 
			
		||||
 | 
			
		||||
  _info "Push certificates to server"
 | 
			
		||||
  export HTTPS_INSECURE=1
 | 
			
		||||
  export _H1="Authorization: PBSAPIToken=${_proxmoxbs_header_api_token}"
 | 
			
		||||
  response=$(_post "$_json_payload" "$_target_url" "" POST "application/json")
 | 
			
		||||
  _retval=$?
 | 
			
		||||
  if [ "${_retval}" -eq 0 ]; then
 | 
			
		||||
    _debug3 response "$response"
 | 
			
		||||
    _info "Certificate successfully deployed"
 | 
			
		||||
    return 0
 | 
			
		||||
  else
 | 
			
		||||
    _err "Certificate deployment failed"
 | 
			
		||||
    _debug "Response" "$response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
@@ -127,6 +127,16 @@ HEREDOC
 | 
			
		||||
  _info "Push certificates to server"
 | 
			
		||||
  export HTTPS_INSECURE=1
 | 
			
		||||
  export _H1="Authorization: PVEAPIToken=${_proxmoxve_header_api_token}"
 | 
			
		||||
  _post "$_json_payload" "$_target_url" "" POST "application/json"
 | 
			
		||||
  response=$(_post "$_json_payload" "$_target_url" "" POST "application/json")
 | 
			
		||||
  _retval=$?
 | 
			
		||||
  if [ "${_retval}" -eq 0 ]; then
 | 
			
		||||
    _debug3 response "$response"
 | 
			
		||||
    _info "Certificate successfully deployed"
 | 
			
		||||
    return 0
 | 
			
		||||
  else
 | 
			
		||||
    _err "Certificate deployment failed"
 | 
			
		||||
    _debug "Response" "$response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -144,8 +144,8 @@ source=\"/certificate remove [ find name=$_cdomain.cer_0 ];\
 | 
			
		||||
\n/certificate remove [ find name=$_cdomain.cer_1 ];\
 | 
			
		||||
\n/certificate remove [ find name=$_cdomain.cer_2 ];\
 | 
			
		||||
\ndelay 1;\
 | 
			
		||||
\n/certificate import file-name=$_cdomain.cer passphrase=\\\"\\\";\
 | 
			
		||||
\n/certificate import file-name=$_cdomain.key passphrase=\\\"\\\";\
 | 
			
		||||
\n/certificate import file-name=\\\"$_cdomain.cer\\\" passphrase=\\\"\\\";\
 | 
			
		||||
\n/certificate import file-name=\\\"$_cdomain.key\\\" passphrase=\\\"\\\";\
 | 
			
		||||
\ndelay 1;\
 | 
			
		||||
\n:do {/file remove $_cdomain.cer; } on-error={ }\
 | 
			
		||||
\n:do {/file remove $_cdomain.key; } on-error={ }\
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										200
									
								
								deploy/ruckus.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										200
									
								
								deploy/ruckus.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,200 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Here is a script to deploy cert to Ruckus ZoneDirector / Unleashed.
 | 
			
		||||
#
 | 
			
		||||
# Public domain, 2024, Tony Rielly <https://github.com/ms264556>
 | 
			
		||||
#
 | 
			
		||||
# ```sh
 | 
			
		||||
# acme.sh --deploy -d ruckus.example.com --deploy-hook ruckus
 | 
			
		||||
# ```
 | 
			
		||||
#
 | 
			
		||||
# Then you need to set the environment variables for the
 | 
			
		||||
# deploy script to work.
 | 
			
		||||
#
 | 
			
		||||
# ```sh
 | 
			
		||||
# export RUCKUS_HOST=myruckus.example.com
 | 
			
		||||
# export RUCKUS_USER=myruckususername
 | 
			
		||||
# export RUCKUS_PASS=myruckuspassword
 | 
			
		||||
#
 | 
			
		||||
# acme.sh --deploy -d myruckus.example.com --deploy-hook ruckus
 | 
			
		||||
# ```
 | 
			
		||||
#
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
ruckus_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
  _err_code=0
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  _getdeployconf RUCKUS_HOST
 | 
			
		||||
  _getdeployconf RUCKUS_USER
 | 
			
		||||
  _getdeployconf RUCKUS_PASS
 | 
			
		||||
 | 
			
		||||
  if [ -z "$RUCKUS_HOST" ]; then
 | 
			
		||||
    _debug "Using _cdomain as RUCKUS_HOST, please set if not correct."
 | 
			
		||||
    RUCKUS_HOST="$_cdomain"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$RUCKUS_USER" ]; then
 | 
			
		||||
    _err "Need to set the env variable RUCKUS_USER"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$RUCKUS_PASS" ]; then
 | 
			
		||||
    _err "Need to set the env variable RUCKUS_PASS"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _savedeployconf RUCKUS_HOST "$RUCKUS_HOST"
 | 
			
		||||
  _savedeployconf RUCKUS_USER "$RUCKUS_USER"
 | 
			
		||||
  _savedeployconf RUCKUS_PASS "$RUCKUS_PASS"
 | 
			
		||||
 | 
			
		||||
  _debug RUCKUS_HOST "$RUCKUS_HOST"
 | 
			
		||||
  _debug RUCKUS_USER "$RUCKUS_USER"
 | 
			
		||||
  _secure_debug RUCKUS_PASS "$RUCKUS_PASS"
 | 
			
		||||
 | 
			
		||||
  export ACME_HTTP_NO_REDIRECTS=1
 | 
			
		||||
 | 
			
		||||
  _info "Discovering the login URL"
 | 
			
		||||
  _get "https://$RUCKUS_HOST" >/dev/null
 | 
			
		||||
  _login_url="$(_response_header 'Location')"
 | 
			
		||||
  if [ -n "$_login_url" ]; then
 | 
			
		||||
    _login_path=$(echo "$_login_url" | sed 's|https\?://[^/]\+||')
 | 
			
		||||
    if [ -z "$_login_path" ]; then
 | 
			
		||||
      # redirect was to a different host
 | 
			
		||||
      _err "Connection failed: redirected to a different host. Configure Unleashed with a Preferred Master or Management Interface."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "${_login_url}" ]; then
 | 
			
		||||
    _err "Connection failed: couldn't find login page."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _base_url=$(dirname "$_login_url")
 | 
			
		||||
  _login_page=$(basename "$_login_url")
 | 
			
		||||
 | 
			
		||||
  if [ "$_login_page" = "index.html" ]; then
 | 
			
		||||
    _err "Connection temporarily unavailable: Unleashed Rebuilding."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$_login_page" = "wizard.jsp" ]; then
 | 
			
		||||
    _err "Connection failed: Setup Wizard not complete."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Login"
 | 
			
		||||
  _username_encoded="$(printf "%s" "$RUCKUS_USER" | _url_encode)"
 | 
			
		||||
  _password_encoded="$(printf "%s" "$RUCKUS_PASS" | _url_encode)"
 | 
			
		||||
  _login_query="$(printf "%s" "username=${_username_encoded}&password=${_password_encoded}&ok=Log+In")"
 | 
			
		||||
  _post "$_login_query" "$_login_url" >/dev/null
 | 
			
		||||
 | 
			
		||||
  _login_code="$(_response_code)"
 | 
			
		||||
  if [ "$_login_code" = "200" ]; then
 | 
			
		||||
    _err "Login failed: incorrect credentials."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Collect Session Cookie"
 | 
			
		||||
  _H1="Cookie: $(_response_cookie)"
 | 
			
		||||
  export _H1
 | 
			
		||||
  _info "Collect CSRF Token"
 | 
			
		||||
  _H2="X-CSRF-Token: $(_response_header 'HTTP_X_CSRF_TOKEN')"
 | 
			
		||||
  export _H2
 | 
			
		||||
 | 
			
		||||
  if _isRSA "$_ckey" >/dev/null 2>&1; then
 | 
			
		||||
    _debug "Using RSA certificate."
 | 
			
		||||
  else
 | 
			
		||||
    _info "Verifying ECC certificate support."
 | 
			
		||||
 | 
			
		||||
    _ul_version="$(_get_unleashed_version)"
 | 
			
		||||
    if [ -z "$_ul_version" ]; then
 | 
			
		||||
      _err "Your controller doesn't support ECC certificates. Please deploy an RSA certificate."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _ul_version_major="$(echo "$_ul_version" | cut -d . -f 1)"
 | 
			
		||||
    _ul_version_minor="$(echo "$_ul_version" | cut -d . -f 2)"
 | 
			
		||||
    if [ "$_ul_version_major" -lt "200" ]; then
 | 
			
		||||
      _err "ZoneDirector doesn't support ECC certificates. Please deploy an RSA certificate."
 | 
			
		||||
      return 1
 | 
			
		||||
    elif [ "$_ul_version_minor" -lt "13" ]; then
 | 
			
		||||
      _err "Unleashed $_ul_version_major.$_ul_version_minor doesn't support ECC certificates. Please deploy an RSA certificate or upgrade to Unleashed 200.13+."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _debug "ECC certificates OK for Unleashed $_ul_version_major.$_ul_version_minor."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Uploading certificate"
 | 
			
		||||
  _post_upload "uploadcert" "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  _info "Uploading private key"
 | 
			
		||||
  _post_upload "uploadprivatekey" "$_ckey"
 | 
			
		||||
 | 
			
		||||
  _info "Replacing certificate"
 | 
			
		||||
  _replace_cert_ajax='<ajax-request action="docmd" comp="system" updater="rid.0.5" xcmd="replace-cert" checkAbility="6" timeout="-1"><xcmd cmd="replace-cert" cn="'$RUCKUS_HOST'"/></ajax-request>'
 | 
			
		||||
  _post "$_replace_cert_ajax" "$_base_url/_cmdstat.jsp" >/dev/null
 | 
			
		||||
 | 
			
		||||
  _info "Rebooting"
 | 
			
		||||
  _cert_reboot_ajax='<ajax-request action="docmd" comp="worker" updater="rid.0.5" xcmd="cert-reboot" checkAbility="6"><xcmd cmd="cert-reboot" action="undefined"/></ajax-request>'
 | 
			
		||||
  _post "$_cert_reboot_ajax" "$_base_url/_cmdstat.jsp" >/dev/null
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_response_code() {
 | 
			
		||||
  _egrep_o <"$HTTP_HEADER" "^HTTP[^ ]* .*$" | cut -d " " -f 2-100 | tr -d "\f\n" | _egrep_o "^[0-9]*"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_response_header() {
 | 
			
		||||
  grep <"$HTTP_HEADER" -i "^$1:" | cut -d ':' -f 2- | tr -d "\r\n\t "
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_response_cookie() {
 | 
			
		||||
  _response_header 'Set-Cookie' | sed 's/;.*//'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_get_unleashed_version() {
 | 
			
		||||
  _post '<ajax-request action="getstat" comp="system"><sysinfo/></ajax-request>' "$_base_url/_cmdstat.jsp" | _egrep_o "version-num=\"[^\"]*\"" | cut -d '"' -f 2
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_post_upload() {
 | 
			
		||||
  _post_action="$1"
 | 
			
		||||
  _post_file="$2"
 | 
			
		||||
 | 
			
		||||
  _post_boundary="----FormBoundary$(date "+%s%N")"
 | 
			
		||||
 | 
			
		||||
  _post_data="$({
 | 
			
		||||
    printf -- "--%s\r\n" "$_post_boundary"
 | 
			
		||||
    printf -- "Content-Disposition: form-data; name=\"u\"; filename=\"%s\"\r\n" "$_post_action"
 | 
			
		||||
    printf -- "Content-Type: application/octet-stream\r\n\r\n"
 | 
			
		||||
    printf -- "%s\r\n" "$(cat "$_post_file")"
 | 
			
		||||
 | 
			
		||||
    printf -- "--%s\r\n" "$_post_boundary"
 | 
			
		||||
    printf -- "Content-Disposition: form-data; name=\"action\"\r\n\r\n"
 | 
			
		||||
    printf -- "%s\r\n" "$_post_action"
 | 
			
		||||
 | 
			
		||||
    printf -- "--%s\r\n" "$_post_boundary"
 | 
			
		||||
    printf -- "Content-Disposition: form-data; name=\"callback\"\r\n\r\n"
 | 
			
		||||
    printf -- "%s\r\n" "uploader_$_post_action"
 | 
			
		||||
 | 
			
		||||
    printf -- "--%s--\r\n\r\n" "$_post_boundary"
 | 
			
		||||
  })"
 | 
			
		||||
 | 
			
		||||
  _post "$_post_data" "$_base_url/_upload.jsp?request_type=xhr" "" "" "multipart/form-data; boundary=$_post_boundary" >/dev/null
 | 
			
		||||
}
 | 
			
		||||
@@ -10,46 +10,89 @@
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
strongswan_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _cdomain="${1}"
 | 
			
		||||
  _ckey="${2}"
 | 
			
		||||
  _ccert="${3}"
 | 
			
		||||
  _cca="${4}"
 | 
			
		||||
  _cfullchain="${5}"
 | 
			
		||||
  _info "Using strongswan"
 | 
			
		||||
 | 
			
		||||
  if [ -x /usr/sbin/ipsec ]; then
 | 
			
		||||
    _ipsec=/usr/sbin/ipsec
 | 
			
		||||
  elif [ -x /usr/sbin/strongswan ]; then
 | 
			
		||||
    _ipsec=/usr/sbin/strongswan
 | 
			
		||||
  elif [ -x /usr/local/sbin/ipsec ]; then
 | 
			
		||||
    _ipsec=/usr/local/sbin/ipsec
 | 
			
		||||
  else
 | 
			
		||||
  if _exists ipsec; then
 | 
			
		||||
    _ipsec=ipsec
 | 
			
		||||
  elif _exists strongswan; then
 | 
			
		||||
    _ipsec=strongswan
 | 
			
		||||
  fi
 | 
			
		||||
  if _exists swanctl; then
 | 
			
		||||
    _swanctl=swanctl
 | 
			
		||||
  fi
 | 
			
		||||
  # For legacy stroke mode
 | 
			
		||||
  if [ -n "${_ipsec}" ]; then
 | 
			
		||||
    _info "${_ipsec} command detected"
 | 
			
		||||
    _confdir=$(${_ipsec} --confdir)
 | 
			
		||||
    if [ -z "${_confdir}" ]; then
 | 
			
		||||
      _err "no strongswan --confdir is detected"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _info _confdir "${_confdir}"
 | 
			
		||||
    __deploy_cert "$@" "stroke" "${_confdir}"
 | 
			
		||||
    ${_ipsec} reload
 | 
			
		||||
  fi
 | 
			
		||||
  # For modern vici mode
 | 
			
		||||
  if [ -n "${_swanctl}" ]; then
 | 
			
		||||
    _info "${_swanctl} command detected"
 | 
			
		||||
    for _dir in /usr/local/etc/swanctl /etc/swanctl /etc/strongswan/swanctl; do
 | 
			
		||||
      if [ -d ${_dir} ]; then
 | 
			
		||||
        _confdir=${_dir}
 | 
			
		||||
        _info _confdir "${_confdir}"
 | 
			
		||||
        break
 | 
			
		||||
      fi
 | 
			
		||||
    done
 | 
			
		||||
    if [ -z "${_confdir}" ]; then
 | 
			
		||||
      _err "no swanctl config dir is found"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    __deploy_cert "$@" "vici" "${_confdir}"
 | 
			
		||||
    ${_swanctl} --load-creds
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "${_swanctl}" ] && [ -z "${_ipsec}" ]; then
 | 
			
		||||
    _err "no strongswan or ipsec command is detected"
 | 
			
		||||
    _err "no swanctl is detected"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info _ipsec "$_ipsec"
 | 
			
		||||
 | 
			
		||||
  _confdir=$($_ipsec --confdir)
 | 
			
		||||
  if [ $? -ne 0 ] || [ -z "$_confdir" ]; then
 | 
			
		||||
    _err "no strongswan --confdir is detected"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info _confdir "$_confdir"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  cat "$_ckey" >"${_confdir}/ipsec.d/private/$(basename "$_ckey")"
 | 
			
		||||
  cat "$_ccert" >"${_confdir}/ipsec.d/certs/$(basename "$_ccert")"
 | 
			
		||||
  cat "$_cca" >"${_confdir}/ipsec.d/cacerts/$(basename "$_cca")"
 | 
			
		||||
  cat "$_cfullchain" >"${_confdir}/ipsec.d/cacerts/$(basename "$_cfullchain")"
 | 
			
		||||
 | 
			
		||||
  $_ipsec reload
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below ##################################
 | 
			
		||||
 | 
			
		||||
__deploy_cert() {
 | 
			
		||||
  _cdomain="${1}"
 | 
			
		||||
  _ckey="${2}"
 | 
			
		||||
  _ccert="${3}"
 | 
			
		||||
  _cca="${4}"
 | 
			
		||||
  _cfullchain="${5}"
 | 
			
		||||
  _swan_mode="${6}"
 | 
			
		||||
  _confdir="${7}"
 | 
			
		||||
  _debug _cdomain "${_cdomain}"
 | 
			
		||||
  _debug _ckey "${_ckey}"
 | 
			
		||||
  _debug _ccert "${_ccert}"
 | 
			
		||||
  _debug _cca "${_cca}"
 | 
			
		||||
  _debug _cfullchain "${_cfullchain}"
 | 
			
		||||
  _debug _swan_mode "${_swan_mode}"
 | 
			
		||||
  _debug _confdir "${_confdir}"
 | 
			
		||||
  if [ "${_swan_mode}" = "vici" ]; then
 | 
			
		||||
    _dir_private="private"
 | 
			
		||||
    _dir_cert="x509"
 | 
			
		||||
    _dir_ca="x509ca"
 | 
			
		||||
  elif [ "${_swan_mode}" = "stroke" ]; then
 | 
			
		||||
    _dir_private="ipsec.d/private"
 | 
			
		||||
    _dir_cert="ipsec.d/certs"
 | 
			
		||||
    _dir_ca="ipsec.d/cacerts"
 | 
			
		||||
  else
 | 
			
		||||
    _err "unknown StrongSwan mode ${_swan_mode}"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  cat "${_ckey}" >"${_confdir}/${_dir_private}/$(basename "${_ckey}")"
 | 
			
		||||
  cat "${_ccert}" >"${_confdir}/${_dir_cert}/$(basename "${_ccert}")"
 | 
			
		||||
  cat "${_cca}" >"${_confdir}/${_dir_ca}/$(basename "${_cca}")"
 | 
			
		||||
  if [ "${_swan_mode}" = "stroke" ]; then
 | 
			
		||||
    cat "${_cfullchain}" >"${_confdir}/${_dir_ca}/$(basename "${_cfullchain}")"
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -113,9 +113,9 @@ synology_dsm_deploy() {
 | 
			
		||||
 | 
			
		||||
  # Default values for scheme, hostname and port
 | 
			
		||||
  # Defaulting to localhost and http, because it's localhost…
 | 
			
		||||
  [ -n "$SYNO_SCHEME" ] || SYNO_SCHEME="http"
 | 
			
		||||
  [ -n "$SYNO_HOSTNAME" ] || SYNO_HOSTNAME="localhost"
 | 
			
		||||
  [ -n "$SYNO_PORT" ] || SYNO_PORT="5000"
 | 
			
		||||
  [ -n "$SYNO_SCHEME" ] || SYNO_SCHEME=http
 | 
			
		||||
  [ -n "$SYNO_HOSTNAME" ] || SYNO_HOSTNAME=localhost
 | 
			
		||||
  [ -n "$SYNO_PORT" ] || SYNO_PORT=5000
 | 
			
		||||
  _savedeployconf SYNO_SCHEME "$SYNO_SCHEME"
 | 
			
		||||
  _savedeployconf SYNO_HOSTNAME "$SYNO_HOSTNAME"
 | 
			
		||||
  _savedeployconf SYNO_PORT "$SYNO_PORT"
 | 
			
		||||
@@ -186,8 +186,8 @@ synology_dsm_deploy() {
 | 
			
		||||
      if [ -n "$SYNO_USE_TEMP_ADMIN" ]; then
 | 
			
		||||
        _getdeployconf SYNO_LOCAL_HOSTNAME
 | 
			
		||||
        _debug SYNO_LOCAL_HOSTNAME "${SYNO_LOCAL_HOSTNAME:-}"
 | 
			
		||||
        if [ "$SYNO_LOCAL_HOSTNAME" != "1" ] && [ "$SYNO_LOCAL_HOSTNAME" == "$SYNO_HOSTNAME" ]; then
 | 
			
		||||
          if [ "$SYNO_HOSTNAME" != "localhost" ] && [ "$SYNO_HOSTNAME" != "127.0.0.1" ]; then
 | 
			
		||||
        if [ "$SYNO_HOSTNAME" != "localhost" ] && [ "$SYNO_HOSTNAME" != "127.0.0.1" ]; then
 | 
			
		||||
          if [ "$SYNO_LOCAL_HOSTNAME" != "1" ]; then
 | 
			
		||||
            _err "SYNO_USE_TEMP_ADMIN=1 only support local deployment, though if you are sure that the hostname $SYNO_HOSTNAME is targeting to your **current local machine**, execute 'export SYNO_LOCAL_HOSTNAME=1' then rerun."
 | 
			
		||||
            return 1
 | 
			
		||||
          fi
 | 
			
		||||
@@ -320,7 +320,7 @@ synology_dsm_deploy() {
 | 
			
		||||
    _cleardeployconf SYNO_DEVICE_ID
 | 
			
		||||
    _cleardeployconf SYNO_DEVICE_NAME
 | 
			
		||||
    _savedeployconf SYNO_USE_TEMP_ADMIN "$SYNO_USE_TEMP_ADMIN"
 | 
			
		||||
    _savedeployconf SYNO_LOCAL_HOSTNAME "$SYNO_HOSTNAME"
 | 
			
		||||
    _savedeployconf SYNO_LOCAL_HOSTNAME "$SYNO_LOCAL_HOSTNAME"
 | 
			
		||||
  else
 | 
			
		||||
    _savedeployconf SYNO_USERNAME "$SYNO_USERNAME"
 | 
			
		||||
    _savedeployconf SYNO_PASSWORD "$SYNO_PASSWORD"
 | 
			
		||||
@@ -411,7 +411,7 @@ _temp_admin_create() {
 | 
			
		||||
  _username="$1"
 | 
			
		||||
  _password="$2"
 | 
			
		||||
  synouser --del "$_username" >/dev/null 2>/dev/null
 | 
			
		||||
  synouser --add "$_username" "$_password" "" 0 "scruelt@hotmail.com" 0 >/dev/null
 | 
			
		||||
  synouser --add "$_username" "$_password" "" 0 "" 0 >/dev/null
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_temp_admin_cleanup() {
 | 
			
		||||
 
 | 
			
		||||
@@ -9,7 +9,7 @@
 | 
			
		||||
#
 | 
			
		||||
# Following environment variables must be set:
 | 
			
		||||
#
 | 
			
		||||
# export DEPLOY_TRUENAS_APIKEY="<API_KEY_GENERATED_IN_THE_WEB_UI"
 | 
			
		||||
# export DEPLOY_TRUENAS_APIKEY="<API_KEY_GENERATED_IN_THE_WEB_UI>"
 | 
			
		||||
#
 | 
			
		||||
# The following environmental variables may be set if you don't like their
 | 
			
		||||
# default values:
 | 
			
		||||
@@ -64,6 +64,20 @@ truenas_deploy() {
 | 
			
		||||
  _response=$(_get "$_api_url/system/state")
 | 
			
		||||
  _info "TrueNAS system state: $_response."
 | 
			
		||||
 | 
			
		||||
  _info "Getting TrueNAS version"
 | 
			
		||||
  _response=$(_get "$_api_url/system/version")
 | 
			
		||||
 | 
			
		||||
  if echo "$_response" | grep -q "SCALE"; then
 | 
			
		||||
    _truenas_os=$(echo "$_response" | cut -d '-' -f 2)
 | 
			
		||||
    _truenas_version=$(echo "$_response" | cut -d '-' -f 3 | tr -d '"' | cut -d '.' -f 1,2)
 | 
			
		||||
  else
 | 
			
		||||
    _truenas_os="unknown"
 | 
			
		||||
    _truenas_version="unknown"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Detected TrueNAS system os: $_truenas_os"
 | 
			
		||||
  _info "Detected TrueNAS system version: $_truenas_version"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$_response" ]; then
 | 
			
		||||
    _err "Unable to authenticate to $_api_url."
 | 
			
		||||
    _err 'Check your connection settings are correct, e.g.'
 | 
			
		||||
@@ -115,27 +129,106 @@ truenas_deploy() {
 | 
			
		||||
 | 
			
		||||
  _debug3 _activate_result "$_activate_result"
 | 
			
		||||
 | 
			
		||||
  _info "Checking if WebDAV certificate is the same as the TrueNAS web UI"
 | 
			
		||||
  _webdav_list=$(_get "$_api_url/webdav")
 | 
			
		||||
  _webdav_cert_id=$(echo "$_webdav_list" | grep '"certssl":' | tr -d -- '"certsl: ,')
 | 
			
		||||
  _truenas_version_23_10="23.10"
 | 
			
		||||
  _truenas_version_24_10="24.10"
 | 
			
		||||
 | 
			
		||||
  if [ "$_webdav_cert_id" = "$_active_cert_id" ]; then
 | 
			
		||||
    _info "Updating the WebDAV certificate"
 | 
			
		||||
    _debug _webdav_cert_id "$_webdav_cert_id"
 | 
			
		||||
    _webdav_data="{\"certssl\": \"${_cert_id}\"}"
 | 
			
		||||
    _activate_webdav_cert="$(_post "$_webdav_data" "$_api_url/webdav" "" "PUT" "application/json")"
 | 
			
		||||
    _webdav_new_cert_id=$(echo "$_activate_webdav_cert" | _json_decode | grep '"certssl":' | sed -n 's/.*: \([0-9]\{1,\}\),\{0,1\}$/\1/p')
 | 
			
		||||
    if [ "$_webdav_new_cert_id" -eq "$_cert_id" ]; then
 | 
			
		||||
      _info "WebDAV certificate updated successfully"
 | 
			
		||||
    else
 | 
			
		||||
      _err "Unable to set WebDAV certificate"
 | 
			
		||||
      _debug3 _activate_webdav_cert "$_activate_webdav_cert"
 | 
			
		||||
  _check_version=$(printf "%s\n%s" "$_truenas_version_23_10" "$_truenas_version" | sort -V | head -n 1)
 | 
			
		||||
  if [ "$_truenas_os" != "SCALE" ] || [ "$_check_version" != "$_truenas_version_23_10" ]; then
 | 
			
		||||
    _info "Checking if WebDAV certificate is the same as the TrueNAS web UI"
 | 
			
		||||
    _webdav_list=$(_get "$_api_url/webdav")
 | 
			
		||||
    _webdav_cert_id=$(echo "$_webdav_list" | grep '"certssl":' | tr -d -- '"certsl: ,')
 | 
			
		||||
 | 
			
		||||
    if [ "$_webdav_cert_id" = "$_active_cert_id" ]; then
 | 
			
		||||
      _info "Updating the WebDAV certificate"
 | 
			
		||||
      _debug _webdav_cert_id "$_webdav_cert_id"
 | 
			
		||||
      _webdav_data="{\"certssl\": \"${_cert_id}\"}"
 | 
			
		||||
      _activate_webdav_cert="$(_post "$_webdav_data" "$_api_url/webdav" "" "PUT" "application/json")"
 | 
			
		||||
      _webdav_new_cert_id=$(echo "$_activate_webdav_cert" | _json_decode | grep '"certssl":' | sed -n 's/.*: \([0-9]\{1,\}\),\{0,1\}$/\1/p')
 | 
			
		||||
      if [ "$_webdav_new_cert_id" -eq "$_cert_id" ]; then
 | 
			
		||||
        _info "WebDAV certificate updated successfully"
 | 
			
		||||
      else
 | 
			
		||||
        _err "Unable to set WebDAV certificate"
 | 
			
		||||
        _debug3 _activate_webdav_cert "$_activate_webdav_cert"
 | 
			
		||||
        _debug3 _webdav_new_cert_id "$_webdav_new_cert_id"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
      _debug3 _webdav_new_cert_id "$_webdav_new_cert_id"
 | 
			
		||||
      return 1
 | 
			
		||||
    else
 | 
			
		||||
      _info "WebDAV certificate is not configured or is not the same as TrueNAS web UI"
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _info "Checking if S3 certificate is the same as the TrueNAS web UI"
 | 
			
		||||
    _s3_list=$(_get "$_api_url/s3")
 | 
			
		||||
    _s3_cert_id=$(echo "$_s3_list" | grep '"certificate":' | tr -d -- '"certifa:_ ,')
 | 
			
		||||
 | 
			
		||||
    if [ "$_s3_cert_id" = "$_active_cert_id" ]; then
 | 
			
		||||
      _info "Updating the S3 certificate"
 | 
			
		||||
      _debug _s3_cert_id "$_s3_cert_id"
 | 
			
		||||
      _s3_data="{\"certificate\": \"${_cert_id}\"}"
 | 
			
		||||
      _activate_s3_cert="$(_post "$_s3_data" "$_api_url/s3" "" "PUT" "application/json")"
 | 
			
		||||
      _s3_new_cert_id=$(echo "$_activate_s3_cert" | _json_decode | grep '"certificate":' | sed -n 's/.*: \([0-9]\{1,\}\),\{0,1\}$/\1/p')
 | 
			
		||||
      if [ "$_s3_new_cert_id" -eq "$_cert_id" ]; then
 | 
			
		||||
        _info "S3 certificate updated successfully"
 | 
			
		||||
      else
 | 
			
		||||
        _err "Unable to set S3 certificate"
 | 
			
		||||
        _debug3 _activate_s3_cert "$_activate_s3_cert"
 | 
			
		||||
        _debug3 _s3_new_cert_id "$_s3_new_cert_id"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
      _debug3 _activate_s3_cert "$_activate_s3_cert"
 | 
			
		||||
    else
 | 
			
		||||
      _info "S3 certificate is not configured or is not the same as TrueNAS web UI"
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$_truenas_os" = "SCALE" ]; then
 | 
			
		||||
    _check_version=$(printf "%s\n%s" "$_truenas_version_24_10" "$_truenas_version" | sort -V | head -n 1)
 | 
			
		||||
    if [ "$_check_version" != "$_truenas_version_24_10" ]; then
 | 
			
		||||
      _info "Checking if any chart release Apps is using the same certificate as TrueNAS web UI. Tool 'jq' is required"
 | 
			
		||||
      if _exists jq; then
 | 
			
		||||
        _info "Query all chart release"
 | 
			
		||||
        _release_list=$(_get "$_api_url/chart/release")
 | 
			
		||||
        _related_name_list=$(printf "%s" "$_release_list" | jq -r "[.[] | {name,certId: .config.ingress?.main.tls[]?.scaleCert} | select(.certId==$_active_cert_id) | .name ] | unique")
 | 
			
		||||
        _release_length=$(printf "%s" "$_related_name_list" | jq -r "length")
 | 
			
		||||
        _info "Found $_release_length related chart release in list: $_related_name_list"
 | 
			
		||||
        for i in $(seq 0 $((_release_length - 1))); do
 | 
			
		||||
          _release_name=$(echo "$_related_name_list" | jq -r ".[$i]")
 | 
			
		||||
          _info "Updating certificate from $_active_cert_id to $_cert_id for chart release: $_release_name"
 | 
			
		||||
          #Read the chart release configuration
 | 
			
		||||
          _chart_config=$(printf "%s" "$_release_list" | jq -r ".[] | select(.name==\"$_release_name\")")
 | 
			
		||||
          #Replace the old certificate id with the new one in path .config.ingress.main.tls[].scaleCert. Then update .config.ingress
 | 
			
		||||
          _updated_chart_config=$(printf "%s" "$_chart_config" | jq "(.config.ingress?.main.tls[]? | select(.scaleCert==$_active_cert_id) | .scaleCert  ) |= $_cert_id | .config.ingress ")
 | 
			
		||||
          _update_chart_result="$(_post "{\"values\" : { \"ingress\" : $_updated_chart_config } }" "$_api_url/chart/release/id/$_release_name" "" "PUT" "application/json")"
 | 
			
		||||
          _debug3 _update_chart_result "$_update_chart_result"
 | 
			
		||||
        done
 | 
			
		||||
      else
 | 
			
		||||
        _info "Tool 'jq' does not exists, skip chart release checking"
 | 
			
		||||
      fi
 | 
			
		||||
    else
 | 
			
		||||
      _info "Checking if any app is using the same certificate as TrueNAS web UI. Tool 'jq' is required"
 | 
			
		||||
      if _exists jq; then
 | 
			
		||||
        _info "Query all apps"
 | 
			
		||||
        _app_list=$(_get "$_api_url/app")
 | 
			
		||||
        _app_id_list=$(printf "%s" "$_app_list" | jq -r '.[].name')
 | 
			
		||||
        _app_length=$(echo "$_app_id_list" | wc -l)
 | 
			
		||||
        _info "Found $_app_length apps"
 | 
			
		||||
        _info "Checking for each app if an update is needed"
 | 
			
		||||
        for i in $(seq 1 "$_app_length"); do
 | 
			
		||||
          _app_id=$(echo "$_app_id_list" | sed -n "${i}p")
 | 
			
		||||
          _app_config="$(_post "\"$_app_id\"" "$_api_url/app/config" "" "POST" "application/json")"
 | 
			
		||||
          # Check if the app use the same certificate TrueNAS web UI
 | 
			
		||||
          _app_active_cert_config=$(echo "$_app_config" | tr -d '\000-\037' | _json_decode | jq -r ".ix_certificates[\"$_active_cert_id\"]")
 | 
			
		||||
          if [ "$_app_active_cert_config" != "null" ]; then
 | 
			
		||||
            _info "Updating certificate from $_active_cert_id to $_cert_id for app: $_app_id"
 | 
			
		||||
            #Replace the old certificate id with the new one in path
 | 
			
		||||
            _update_app_result="$(_post "{\"values\" : { \"network\": { \"certificate_id\": $_cert_id } } }" "$_api_url/app/id/$_app_id" "" "PUT" "application/json")"
 | 
			
		||||
            _debug3 _update_app_result "$_update_app_result"
 | 
			
		||||
          fi
 | 
			
		||||
        done
 | 
			
		||||
      else
 | 
			
		||||
        _info "Tool 'jq' does not exists, skip app checking"
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
    _debug3 _webdav_new_cert_id "$_webdav_new_cert_id"
 | 
			
		||||
  else
 | 
			
		||||
    _info "WebDAV certificate is not configured or is not the same as TrueNAS web UI"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Checking if FTP certificate is the same as the TrueNAS web UI"
 | 
			
		||||
@@ -161,50 +254,6 @@ truenas_deploy() {
 | 
			
		||||
    _info "FTP certificate is not configured or is not the same as TrueNAS web UI"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Checking if S3 certificate is the same as the TrueNAS web UI"
 | 
			
		||||
  _s3_list=$(_get "$_api_url/s3")
 | 
			
		||||
  _s3_cert_id=$(echo "$_s3_list" | grep '"certificate":' | tr -d -- '"certifa:_ ,')
 | 
			
		||||
 | 
			
		||||
  if [ "$_s3_cert_id" = "$_active_cert_id" ]; then
 | 
			
		||||
    _info "Updating the S3 certificate"
 | 
			
		||||
    _debug _s3_cert_id "$_s3_cert_id"
 | 
			
		||||
    _s3_data="{\"certificate\": \"${_cert_id}\"}"
 | 
			
		||||
    _activate_s3_cert="$(_post "$_s3_data" "$_api_url/s3" "" "PUT" "application/json")"
 | 
			
		||||
    _s3_new_cert_id=$(echo "$_activate_s3_cert" | _json_decode | grep '"certificate":' | sed -n 's/.*: \([0-9]\{1,\}\),\{0,1\}$/\1/p')
 | 
			
		||||
    if [ "$_s3_new_cert_id" -eq "$_cert_id" ]; then
 | 
			
		||||
      _info "S3 certificate updated successfully"
 | 
			
		||||
    else
 | 
			
		||||
      _err "Unable to set S3 certificate"
 | 
			
		||||
      _debug3 _activate_s3_cert "$_activate_s3_cert"
 | 
			
		||||
      _debug3 _s3_new_cert_id "$_s3_new_cert_id"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _debug3 _activate_s3_cert "$_activate_s3_cert"
 | 
			
		||||
  else
 | 
			
		||||
    _info "S3 certificate is not configured or is not the same as TrueNAS web UI"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Checking if any chart release Apps is using the same certificate as TrueNAS web UI. Tool 'jq' is required"
 | 
			
		||||
  if _exists jq; then
 | 
			
		||||
    _info "Query all chart release"
 | 
			
		||||
    _release_list=$(_get "$_api_url/chart/release")
 | 
			
		||||
    _related_name_list=$(printf "%s" "$_release_list" | jq -r "[.[] | {name,certId: .config.ingress?.main.tls[]?.scaleCert} | select(.certId==$_active_cert_id) | .name ] | unique")
 | 
			
		||||
    _release_length=$(printf "%s" "$_related_name_list" | jq -r "length")
 | 
			
		||||
    _info "Found $_release_length related chart release in list: $_related_name_list"
 | 
			
		||||
    for i in $(seq 0 $((_release_length - 1))); do
 | 
			
		||||
      _release_name=$(echo "$_related_name_list" | jq -r ".[$i]")
 | 
			
		||||
      _info "Updating certificate from $_active_cert_id to $_cert_id for chart release: $_release_name"
 | 
			
		||||
      #Read the chart release configuration
 | 
			
		||||
      _chart_config=$(printf "%s" "$_release_list" | jq -r ".[] | select(.name==\"$_release_name\")")
 | 
			
		||||
      #Replace the old certificate id with the new one in path .config.ingress.main.tls[].scaleCert. Then update .config.ingress
 | 
			
		||||
      _updated_chart_config=$(printf "%s" "$_chart_config" | jq "(.config.ingress?.main.tls[]? | select(.scaleCert==$_active_cert_id) | .scaleCert  ) |= $_cert_id | .config.ingress ")
 | 
			
		||||
      _update_chart_result="$(_post "{\"values\" : { \"ingress\" : $_updated_chart_config } }" "$_api_url/chart/release/id/$_release_name" "" "PUT" "application/json")"
 | 
			
		||||
      _debug3 _update_chart_result "$_update_chart_result"
 | 
			
		||||
    done
 | 
			
		||||
  else
 | 
			
		||||
    _info "Tool 'jq' does not exists, skip chart release checking"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Deleting old certificate"
 | 
			
		||||
  _delete_result="$(_post "" "$_api_url/certificate/id/$_active_cert_id" "" "DELETE" "application/json")"
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										343
									
								
								deploy/truenas_ws.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										343
									
								
								deploy/truenas_ws.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,343 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# TrueNAS deploy script for SCALE/CORE using websocket
 | 
			
		||||
# It is recommend to use a wildcard certificate
 | 
			
		||||
#
 | 
			
		||||
# Websocket Documentation: https://www.truenas.com/docs/api/scale_websocket_api.html
 | 
			
		||||
#
 | 
			
		||||
# Tested with TrueNAS Scale - Electric Eel 24.10
 | 
			
		||||
# Changes certificate in the following services:
 | 
			
		||||
#  - Web UI
 | 
			
		||||
#  - FTP
 | 
			
		||||
#  - iX Apps
 | 
			
		||||
#
 | 
			
		||||
# The following environment variables must be set:
 | 
			
		||||
# ------------------------------------------------
 | 
			
		||||
#
 | 
			
		||||
# # API KEY
 | 
			
		||||
# # Use the folowing URL to create a new API token: <TRUENAS_HOSTNAME OR IP>/ui/apikeys
 | 
			
		||||
# export DEPLOY_TRUENAS_APIKEY="<API_KEY_GENERATED_IN_THE_WEB_UI"
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
### Private functions
 | 
			
		||||
 | 
			
		||||
# Call websocket method
 | 
			
		||||
# Usage:
 | 
			
		||||
#   _ws_response=$(_ws_call "math.dummycalc" "'{"x": 4, "y": 5}'")
 | 
			
		||||
#   _info "$_ws_response"
 | 
			
		||||
#
 | 
			
		||||
# Output:
 | 
			
		||||
#   {"z": 9}
 | 
			
		||||
#
 | 
			
		||||
# Arguments:
 | 
			
		||||
#   $@ - midclt arguments for call
 | 
			
		||||
#
 | 
			
		||||
# Returns:
 | 
			
		||||
#   JSON/JOBID
 | 
			
		||||
_ws_call() {
 | 
			
		||||
  _debug "_ws_call arg1" "$1"
 | 
			
		||||
  _debug "_ws_call arg2" "$2"
 | 
			
		||||
  _debug "_ws_call arg3" "$3"
 | 
			
		||||
  if [ $# -eq 3 ]; then
 | 
			
		||||
    _ws_response=$(midclt --uri "$_ws_uri" -K "$DEPLOY_TRUENAS_APIKEY" call "$1" "$2" "$3")
 | 
			
		||||
  fi
 | 
			
		||||
  if [ $# -eq 2 ]; then
 | 
			
		||||
    _ws_response=$(midclt --uri "$_ws_uri" -K "$DEPLOY_TRUENAS_APIKEY" call "$1" "$2")
 | 
			
		||||
  fi
 | 
			
		||||
  if [ $# -eq 1 ]; then
 | 
			
		||||
    _ws_response=$(midclt --uri "$_ws_uri" -K "$DEPLOY_TRUENAS_APIKEY" call "$1")
 | 
			
		||||
  fi
 | 
			
		||||
  _debug "_ws_response" "$_ws_response"
 | 
			
		||||
  printf "%s" "$_ws_response"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Upload certificate with webclient api
 | 
			
		||||
_ws_upload_cert() {
 | 
			
		||||
 | 
			
		||||
  /usr/bin/env python - <<EOF
 | 
			
		||||
 | 
			
		||||
import sys
 | 
			
		||||
 | 
			
		||||
from truenas_api_client import Client
 | 
			
		||||
with Client(uri="$_ws_uri") as c:
 | 
			
		||||
 | 
			
		||||
  ### Login with API key
 | 
			
		||||
  print("I:Trying to upload new certificate...")
 | 
			
		||||
  ret = c.call("auth.login_with_api_key", "${DEPLOY_TRUENAS_APIKEY}")
 | 
			
		||||
  if ret:
 | 
			
		||||
    ### upload certificate
 | 
			
		||||
    with open('$1', 'r') as file:
 | 
			
		||||
      fullchain = file.read()
 | 
			
		||||
    with open('$2', 'r') as file:
 | 
			
		||||
      privatekey = file.read()
 | 
			
		||||
    ret = c.call("certificate.create", {"name": "$3", "create_type": "CERTIFICATE_CREATE_IMPORTED", "certificate": fullchain, "privatekey": privatekey, "passphrase": ""}, job=True)
 | 
			
		||||
    print("R:" + str(ret["id"]))
 | 
			
		||||
    sys.exit(0)
 | 
			
		||||
  else:
 | 
			
		||||
    print("R:0")
 | 
			
		||||
    print("E:_ws_upload_cert error!")
 | 
			
		||||
    sys.exit(7)
 | 
			
		||||
 | 
			
		||||
EOF
 | 
			
		||||
 | 
			
		||||
  return $?
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Check argument is a number
 | 
			
		||||
# Usage:
 | 
			
		||||
#
 | 
			
		||||
# Output:
 | 
			
		||||
#   n/a
 | 
			
		||||
#
 | 
			
		||||
# Arguments:
 | 
			
		||||
#   $1 - Anything
 | 
			
		||||
#
 | 
			
		||||
# Returns:
 | 
			
		||||
#   0: true
 | 
			
		||||
#   1: false
 | 
			
		||||
_ws_check_jobid() {
 | 
			
		||||
  case "$1" in
 | 
			
		||||
  [0-9]*)
 | 
			
		||||
    return 0
 | 
			
		||||
    ;;
 | 
			
		||||
  esac
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Wait for job to finish and return result as JSON
 | 
			
		||||
# Usage:
 | 
			
		||||
#   _ws_result=$(_ws_get_job_result "$_ws_jobid")
 | 
			
		||||
#   _new_certid=$(printf "%s" "$_ws_result" | jq -r '."id"')
 | 
			
		||||
#
 | 
			
		||||
# Output:
 | 
			
		||||
#   JSON result of the job
 | 
			
		||||
#
 | 
			
		||||
# Arguments:
 | 
			
		||||
#   $1 - JobID
 | 
			
		||||
#
 | 
			
		||||
# Returns:
 | 
			
		||||
#   n/a
 | 
			
		||||
_ws_get_job_result() {
 | 
			
		||||
  while true; do
 | 
			
		||||
    _sleep 2
 | 
			
		||||
    _ws_response=$(_ws_call "core.get_jobs" "[[\"id\", \"=\", $1]]")
 | 
			
		||||
    if [ "$(printf "%s" "$_ws_response" | jq -r '.[]."state"')" != "RUNNING" ]; then
 | 
			
		||||
      _ws_result="$(printf "%s" "$_ws_response" | jq '.[]."result"')"
 | 
			
		||||
      _debug "_ws_result" "$_ws_result"
 | 
			
		||||
      printf "%s" "$_ws_result"
 | 
			
		||||
      _ws_error="$(printf "%s" "$_ws_response" | jq '.[]."error"')"
 | 
			
		||||
      if [ "$_ws_error" != "null" ]; then
 | 
			
		||||
        _err "Job $1 failed:"
 | 
			
		||||
        _err "$_ws_error"
 | 
			
		||||
        return 7
 | 
			
		||||
      fi
 | 
			
		||||
      break
 | 
			
		||||
    fi
 | 
			
		||||
  done
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
########################
 | 
			
		||||
### Public functions ###
 | 
			
		||||
########################
 | 
			
		||||
 | 
			
		||||
# truenas_ws_deploy
 | 
			
		||||
#
 | 
			
		||||
# Deploy new certificate to TrueNAS services
 | 
			
		||||
#
 | 
			
		||||
# Arguments
 | 
			
		||||
#  1: Domain
 | 
			
		||||
#  2: Key-File
 | 
			
		||||
#  3: Certificate-File
 | 
			
		||||
#  4: CA-File
 | 
			
		||||
#  5: FullChain-File
 | 
			
		||||
# Returns:
 | 
			
		||||
#  0: Success
 | 
			
		||||
#  1: Missing API Key
 | 
			
		||||
#  2: TrueNAS not ready
 | 
			
		||||
#  3: Not a JobID
 | 
			
		||||
#  4: FTP cert error
 | 
			
		||||
#  5: WebUI cert error
 | 
			
		||||
#  6: Job error
 | 
			
		||||
#  7: WS call error
 | 
			
		||||
#
 | 
			
		||||
truenas_ws_deploy() {
 | 
			
		||||
  _domain="$1"
 | 
			
		||||
  _file_key="$2"
 | 
			
		||||
  _file_cert="$3"
 | 
			
		||||
  _file_ca="$4"
 | 
			
		||||
  _file_fullchain="$5"
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
  _debug _file_key "$_file_key"
 | 
			
		||||
  _debug _file_cert "$_file_cert"
 | 
			
		||||
  _debug _file_ca "$_file_ca"
 | 
			
		||||
  _debug _file_fullchain "$_file_fullchain"
 | 
			
		||||
 | 
			
		||||
  ########## Environment check
 | 
			
		||||
 | 
			
		||||
  _info "Checking environment variables..."
 | 
			
		||||
  _getdeployconf DEPLOY_TRUENAS_APIKEY
 | 
			
		||||
  _getdeployconf DEPLOY_TRUENAS_HOSTNAME
 | 
			
		||||
  _getdeployconf DEPLOY_TRUENAS_PROTOCOL
 | 
			
		||||
  # Check API Key
 | 
			
		||||
  if [ -z "$DEPLOY_TRUENAS_APIKEY" ]; then
 | 
			
		||||
    _err "TrueNAS API key not found, please set the DEPLOY_TRUENAS_APIKEY environment variable."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  # Check Hostname, default to localhost if not set
 | 
			
		||||
  if [ -z "$DEPLOY_TRUENAS_HOSTNAME" ]; then
 | 
			
		||||
    _info "TrueNAS hostname not set. Using 'localhost'."
 | 
			
		||||
    DEPLOY_TRUENAS_HOSTNAME="localhost"
 | 
			
		||||
  fi
 | 
			
		||||
  # Check protocol, default to ws if not set
 | 
			
		||||
  if [ -z "$DEPLOY_TRUENAS_PROTOCOL" ]; then
 | 
			
		||||
    _info "TrueNAS protocol not set. Using 'ws'."
 | 
			
		||||
    DEPLOY_TRUENAS_PROTOCOL="ws"
 | 
			
		||||
  fi
 | 
			
		||||
  _ws_uri="$DEPLOY_TRUENAS_PROTOCOL://$DEPLOY_TRUENAS_HOSTNAME/websocket"
 | 
			
		||||
  _debug2 DEPLOY_TRUENAS_HOSTNAME "$DEPLOY_TRUENAS_HOSTNAME"
 | 
			
		||||
  _debug2 DEPLOY_TRUENAS_PROTOCOL "$DEPLOY_TRUENAS_PROTOCOL"
 | 
			
		||||
  _debug _ws_uri "$_ws_uri"
 | 
			
		||||
  _secure_debug2 DEPLOY_TRUENAS_APIKEY "$DEPLOY_TRUENAS_APIKEY"
 | 
			
		||||
  _info "Environment variables: OK"
 | 
			
		||||
 | 
			
		||||
  ########## Health check
 | 
			
		||||
 | 
			
		||||
  _info "Checking TrueNAS health..."
 | 
			
		||||
  _ws_response=$(_ws_call "system.ready" | tr '[:lower:]' '[:upper:]')
 | 
			
		||||
  _ws_ret=$?
 | 
			
		||||
  if [ $_ws_ret -gt 0 ]; then
 | 
			
		||||
    _err "Error calling system.ready:"
 | 
			
		||||
    _err "$_ws_response"
 | 
			
		||||
    return $_ws_ret
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$_ws_response" != "TRUE" ]; then
 | 
			
		||||
    _err "TrueNAS is not ready."
 | 
			
		||||
    _err "Please check environment variables DEPLOY_TRUENAS_APIKEY, DEPLOY_TRUENAS_HOSTNAME and DEPLOY_TRUENAS_PROTOCOL."
 | 
			
		||||
    _err "Verify API key."
 | 
			
		||||
    return 2
 | 
			
		||||
  fi
 | 
			
		||||
  _savedeployconf DEPLOY_TRUENAS_APIKEY "$DEPLOY_TRUENAS_APIKEY"
 | 
			
		||||
  _savedeployconf DEPLOY_TRUENAS_HOSTNAME "$DEPLOY_TRUENAS_HOSTNAME"
 | 
			
		||||
  _savedeployconf DEPLOY_TRUENAS_PROTOCOL "$DEPLOY_TRUENAS_PROTOCOL"
 | 
			
		||||
  _info "TrueNAS health: OK"
 | 
			
		||||
 | 
			
		||||
  ########## System info
 | 
			
		||||
 | 
			
		||||
  _info "Gather system info..."
 | 
			
		||||
  _ws_response=$(_ws_call "system.info")
 | 
			
		||||
  _truenas_version=$(printf "%s" "$_ws_response" | jq -r '."version"')
 | 
			
		||||
  _info "TrueNAS version: $_truenas_version"
 | 
			
		||||
 | 
			
		||||
  ########## Gather current certificate
 | 
			
		||||
 | 
			
		||||
  _info "Gather current WebUI certificate..."
 | 
			
		||||
  _ws_response="$(_ws_call "system.general.config")"
 | 
			
		||||
  _ui_certificate_id=$(printf "%s" "$_ws_response" | jq -r '."ui_certificate"."id"')
 | 
			
		||||
  _ui_certificate_name=$(printf "%s" "$_ws_response" | jq -r '."ui_certificate"."name"')
 | 
			
		||||
  _info "Current WebUI certificate ID: $_ui_certificate_id"
 | 
			
		||||
  _info "Current WebUI certificate name: $_ui_certificate_name"
 | 
			
		||||
 | 
			
		||||
  ########## Upload new certificate
 | 
			
		||||
 | 
			
		||||
  _info "Upload new certificate..."
 | 
			
		||||
  _certname="acme_$(_utc_date | tr -d '\-\:' | tr ' ' '_')"
 | 
			
		||||
  _info "New WebUI certificate name: $_certname"
 | 
			
		||||
  _debug _certname "$_certname"
 | 
			
		||||
  _ws_out=$(_ws_upload_cert "$_file_fullchain" "$_file_key" "$_certname")
 | 
			
		||||
 | 
			
		||||
  echo "$_ws_out" | while IFS= read -r LINE; do
 | 
			
		||||
    case "$LINE" in
 | 
			
		||||
    I:*)
 | 
			
		||||
      _info "${LINE#I:}"
 | 
			
		||||
      ;;
 | 
			
		||||
    D:*)
 | 
			
		||||
      _debug "${LINE#D:}"
 | 
			
		||||
      ;;
 | 
			
		||||
    E*)
 | 
			
		||||
      _err "${LINE#E:}"
 | 
			
		||||
      ;;
 | 
			
		||||
    *) ;;
 | 
			
		||||
 | 
			
		||||
    esac
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  _new_certid=$(echo "$_ws_out" | grep 'R:' | cut -d ':' -f 2)
 | 
			
		||||
 | 
			
		||||
  _info "New certificate ID: $_new_certid"
 | 
			
		||||
 | 
			
		||||
  ########## FTP
 | 
			
		||||
 | 
			
		||||
  _info "Replace FTP certificate..."
 | 
			
		||||
  _ws_response=$(_ws_call "ftp.update" "{\"ssltls_certificate\": $_new_certid}")
 | 
			
		||||
  _ftp_certid=$(printf "%s" "$_ws_response" | jq -r '."ssltls_certificate"')
 | 
			
		||||
  if [ "$_ftp_certid" != "$_new_certid" ]; then
 | 
			
		||||
    _err "Cannot set FTP certificate."
 | 
			
		||||
    _debug "_ws_response" "$_ws_response"
 | 
			
		||||
    return 4
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  ########## ix Apps (SCALE only)
 | 
			
		||||
 | 
			
		||||
  _info "Replace app certificates..."
 | 
			
		||||
  _ws_response=$(_ws_call "app.query")
 | 
			
		||||
  for _app_name in $(printf "%s" "$_ws_response" | jq -r '.[]."name"'); do
 | 
			
		||||
    _info "Checking app $_app_name..."
 | 
			
		||||
    _ws_response=$(_ws_call "app.config" "$_app_name")
 | 
			
		||||
    if [ "$(printf "%s" "$_ws_response" | jq -r '."network" | has("certificate_id")')" = "true" ]; then
 | 
			
		||||
      _info "App has certificate option, setup new certificate..."
 | 
			
		||||
      _info "App will be redeployed after updating the certificate."
 | 
			
		||||
      _ws_jobid=$(_ws_call "app.update" "$_app_name" "{\"values\": {\"network\": {\"certificate_id\": $_new_certid}}}")
 | 
			
		||||
      _debug "_ws_jobid" "$_ws_jobid"
 | 
			
		||||
      if ! _ws_check_jobid "$_ws_jobid"; then
 | 
			
		||||
        _err "No JobID returned from websocket method."
 | 
			
		||||
        return 3
 | 
			
		||||
      fi
 | 
			
		||||
      _ws_result=$(_ws_get_job_result "$_ws_jobid")
 | 
			
		||||
      _ws_ret=$?
 | 
			
		||||
      if [ $_ws_ret -gt 0 ]; then
 | 
			
		||||
        return $_ws_ret
 | 
			
		||||
      fi
 | 
			
		||||
      _debug "_ws_result" "$_ws_result"
 | 
			
		||||
      _info "App certificate replaced."
 | 
			
		||||
    else
 | 
			
		||||
      _info "App has no certificate option, skipping..."
 | 
			
		||||
    fi
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  ########## WebUI
 | 
			
		||||
 | 
			
		||||
  _info "Replace WebUI certificate..."
 | 
			
		||||
  _ws_response=$(_ws_call "system.general.update" "{\"ui_certificate\": $_new_certid}")
 | 
			
		||||
  _changed_certid=$(printf "%s" "$_ws_response" | jq -r '."ui_certificate"."id"')
 | 
			
		||||
  if [ "$_changed_certid" != "$_new_certid" ]; then
 | 
			
		||||
    _err "WebUI certificate change error.."
 | 
			
		||||
    return 5
 | 
			
		||||
  else
 | 
			
		||||
    _info "WebUI certificate replaced."
 | 
			
		||||
  fi
 | 
			
		||||
  _info "Restarting WebUI..."
 | 
			
		||||
  _ws_response=$(_ws_call "system.general.ui_restart")
 | 
			
		||||
  _info "Waiting for UI restart..."
 | 
			
		||||
  _sleep 15
 | 
			
		||||
 | 
			
		||||
  ########## Certificates
 | 
			
		||||
 | 
			
		||||
  _info "Deleting old certificate..."
 | 
			
		||||
  _ws_jobid=$(_ws_call "certificate.delete" "$_ui_certificate_id")
 | 
			
		||||
  if ! _ws_check_jobid "$_ws_jobid"; then
 | 
			
		||||
    _err "No JobID returned from websocket method."
 | 
			
		||||
    return 3
 | 
			
		||||
  fi
 | 
			
		||||
  _ws_result=$(_ws_get_job_result "$_ws_jobid")
 | 
			
		||||
  _ws_ret=$?
 | 
			
		||||
  if [ $_ws_ret -gt 0 ]; then
 | 
			
		||||
    return $_ws_ret
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Have a nice day...bye!"
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										145
									
								
								deploy/unifi.sh
									
									
									
									
									
								
							
							
						
						
									
										145
									
								
								deploy/unifi.sh
									
									
									
									
									
								
							@@ -5,6 +5,15 @@
 | 
			
		||||
#   - self-hosted Unifi Controller
 | 
			
		||||
#   - Unifi Cloud Key (Gen1/2/2+)
 | 
			
		||||
#   - Unifi Cloud Key running UnifiOS (v2.0.0+, Gen2/2+ only)
 | 
			
		||||
#   - Unifi Dream Machine
 | 
			
		||||
#       This has not been tested on other "all-in-one" devices such as
 | 
			
		||||
#       UDM Pro or Unifi Express.
 | 
			
		||||
#
 | 
			
		||||
#       OS Version v2.0.0+
 | 
			
		||||
#       Network Application version 7.0.0+
 | 
			
		||||
#       OS version ~3.1 removed java and keytool from the UnifiOS.
 | 
			
		||||
#       Using PKCS12 format keystore appears to work fine.
 | 
			
		||||
#
 | 
			
		||||
# Please report bugs to https://github.com/acmesh-official/acme.sh/issues/3359
 | 
			
		||||
 | 
			
		||||
#returns 0 means success, otherwise error.
 | 
			
		||||
@@ -21,7 +30,9 @@
 | 
			
		||||
# Keystore password (built into Unifi Controller, not a user-set password):
 | 
			
		||||
#DEPLOY_UNIFI_KEYPASS="aircontrolenterprise"
 | 
			
		||||
# Command to restart Unifi Controller:
 | 
			
		||||
#DEPLOY_UNIFI_RELOAD="service unifi restart"
 | 
			
		||||
# DEPLOY_UNIFI_RELOAD="systemctl restart unifi"
 | 
			
		||||
# System Properties file location for controller
 | 
			
		||||
#DEPLOY_UNIFI_SYSTEM_PROPERTIES="/usr/lib/unifi/data/system.properties"
 | 
			
		||||
#
 | 
			
		||||
# Settings for Unifi Cloud Key Gen1 (nginx admin pages):
 | 
			
		||||
# Directory where cloudkey.crt and cloudkey.key live:
 | 
			
		||||
@@ -34,7 +45,7 @@
 | 
			
		||||
# Directory where unifi-core.crt and unifi-core.key live:
 | 
			
		||||
#DEPLOY_UNIFI_CORE_CONFIG="/data/unifi-core/config/"
 | 
			
		||||
# Command to restart unifi-core:
 | 
			
		||||
#DEPLOY_UNIFI_RELOAD="systemctl restart unifi-core"
 | 
			
		||||
# DEPLOY_UNIFI_OS_RELOAD="systemctl restart unifi-core"
 | 
			
		||||
#
 | 
			
		||||
# At least one of DEPLOY_UNIFI_KEYSTORE, DEPLOY_UNIFI_CLOUDKEY_CERTDIR,
 | 
			
		||||
# or DEPLOY_UNIFI_CORE_CONFIG must exist to receive the deployed certs.
 | 
			
		||||
@@ -60,12 +71,16 @@ unifi_deploy() {
 | 
			
		||||
  _getdeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR
 | 
			
		||||
  _getdeployconf DEPLOY_UNIFI_CORE_CONFIG
 | 
			
		||||
  _getdeployconf DEPLOY_UNIFI_RELOAD
 | 
			
		||||
  _getdeployconf DEPLOY_UNIFI_SYSTEM_PROPERTIES
 | 
			
		||||
  _getdeployconf DEPLOY_UNIFI_OS_RELOAD
 | 
			
		||||
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_KEYSTORE "$DEPLOY_UNIFI_KEYSTORE"
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_KEYPASS "$DEPLOY_UNIFI_KEYPASS"
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR"
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG"
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD"
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_OS_RELOAD "$DEPLOY_UNIFI_OS_RELOAD"
 | 
			
		||||
  _debug2 DEPLOY_UNIFI_SYSTEM_PROPERTIES "$DEPLOY_UNIFI_SYSTEM_PROPERTIES"
 | 
			
		||||
 | 
			
		||||
  # Space-separated list of environments detected and installed:
 | 
			
		||||
  _services_updated=""
 | 
			
		||||
@@ -74,14 +89,16 @@ unifi_deploy() {
 | 
			
		||||
  _reload_cmd=""
 | 
			
		||||
 | 
			
		||||
  # Unifi Controller environment (self hosted or any Cloud Key) --
 | 
			
		||||
  # auto-detect by file /usr/lib/unifi/data/keystore:
 | 
			
		||||
  # auto-detect by file /usr/lib/unifi/data/keystore
 | 
			
		||||
  _unifi_keystore="${DEPLOY_UNIFI_KEYSTORE:-/usr/lib/unifi/data/keystore}"
 | 
			
		||||
  if [ -f "$_unifi_keystore" ]; then
 | 
			
		||||
    _info "Installing certificate for Unifi Controller (Java keystore)"
 | 
			
		||||
    _debug _unifi_keystore "$_unifi_keystore"
 | 
			
		||||
    if ! _exists keytool; then
 | 
			
		||||
      _err "keytool not found"
 | 
			
		||||
      return 1
 | 
			
		||||
      _do_keytool=0
 | 
			
		||||
      _info "Installing certificate for Unifi Controller (PKCS12 keystore)."
 | 
			
		||||
    else
 | 
			
		||||
      _do_keytool=1
 | 
			
		||||
      _info "Installing certificate for Unifi Controller (Java keystore)"
 | 
			
		||||
    fi
 | 
			
		||||
    if [ ! -w "$_unifi_keystore" ]; then
 | 
			
		||||
      _err "The file $_unifi_keystore is not writable, please change the permission."
 | 
			
		||||
@@ -92,6 +109,7 @@ unifi_deploy() {
 | 
			
		||||
 | 
			
		||||
    _debug "Generate import pkcs12"
 | 
			
		||||
    _import_pkcs12="$(_mktemp)"
 | 
			
		||||
    _debug "_toPkcs $_import_pkcs12 $_ckey $_ccert $_cca $_unifi_keypass unifi root"
 | 
			
		||||
    _toPkcs "$_import_pkcs12" "$_ckey" "$_ccert" "$_cca" "$_unifi_keypass" unifi root
 | 
			
		||||
    # shellcheck disable=SC2181
 | 
			
		||||
    if [ "$?" != "0" ]; then
 | 
			
		||||
@@ -99,22 +117,77 @@ unifi_deploy() {
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _debug "Import into keystore: $_unifi_keystore"
 | 
			
		||||
    if keytool -importkeystore \
 | 
			
		||||
      -deststorepass "$_unifi_keypass" -destkeypass "$_unifi_keypass" -destkeystore "$_unifi_keystore" \
 | 
			
		||||
      -srckeystore "$_import_pkcs12" -srcstoretype PKCS12 -srcstorepass "$_unifi_keypass" \
 | 
			
		||||
      -alias unifi -noprompt; then
 | 
			
		||||
      _debug "Import keystore success!"
 | 
			
		||||
      rm "$_import_pkcs12"
 | 
			
		||||
    # Save the existing keystore in case something goes wrong.
 | 
			
		||||
    mv -f "${_unifi_keystore}" "${_unifi_keystore}"_original
 | 
			
		||||
    _info "Previous keystore saved to ${_unifi_keystore}_original."
 | 
			
		||||
 | 
			
		||||
    if [ "$_do_keytool" -eq 1 ]; then
 | 
			
		||||
      _debug "Import into keystore: $_unifi_keystore"
 | 
			
		||||
      if keytool -importkeystore \
 | 
			
		||||
        -deststorepass "$_unifi_keypass" -destkeypass "$_unifi_keypass" -destkeystore "$_unifi_keystore" \
 | 
			
		||||
        -srckeystore "$_import_pkcs12" -srcstoretype PKCS12 -srcstorepass "$_unifi_keypass" \
 | 
			
		||||
        -alias unifi -noprompt; then
 | 
			
		||||
        _debug "Import keystore success!"
 | 
			
		||||
      else
 | 
			
		||||
        _err "Error importing into Unifi Java keystore."
 | 
			
		||||
        _err "Please re-run with --debug and report a bug."
 | 
			
		||||
        _info "Restoring original keystore."
 | 
			
		||||
        mv -f "${_unifi_keystore}"_original "${_unifi_keystore}"
 | 
			
		||||
        rm "$_import_pkcs12"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    else
 | 
			
		||||
      _err "Error importing into Unifi Java keystore."
 | 
			
		||||
      _err "Please re-run with --debug and report a bug."
 | 
			
		||||
      rm "$_import_pkcs12"
 | 
			
		||||
      return 1
 | 
			
		||||
      _debug "Copying new keystore to $_unifi_keystore"
 | 
			
		||||
      cp -f "$_import_pkcs12" "$_unifi_keystore"
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if systemctl -q is-active unifi; then
 | 
			
		||||
      _reload_cmd="${_reload_cmd:+$_reload_cmd && }service unifi restart"
 | 
			
		||||
    # correct file ownership according to the directory, the keystore is placed in
 | 
			
		||||
    _unifi_keystore_dir=$(dirname "${_unifi_keystore}")
 | 
			
		||||
    _unifi_keystore_dir_owner=$(find "${_unifi_keystore_dir}" -maxdepth 0 -printf '%u\n')
 | 
			
		||||
    _unifi_keystore_owner=$(find "${_unifi_keystore}" -maxdepth 0 -printf '%u\n')
 | 
			
		||||
    if ! [ "${_unifi_keystore_owner}" = "${_unifi_keystore_dir_owner}" ]; then
 | 
			
		||||
      _debug "Changing keystore owner to ${_unifi_keystore_dir_owner}"
 | 
			
		||||
      chown "$_unifi_keystore_dir_owner" "${_unifi_keystore}" >/dev/null 2>&1 # fail quietly if we're not running as root
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Update unifi service for certificate cipher compatibility
 | 
			
		||||
    _unifi_system_properties="${DEPLOY_UNIFI_SYSTEM_PROPERTIES:-/usr/lib/unifi/data/system.properties}"
 | 
			
		||||
    if ${ACME_OPENSSL_BIN:-openssl} pkcs12 \
 | 
			
		||||
      -in "$_import_pkcs12" \
 | 
			
		||||
      -password pass:aircontrolenterprise \
 | 
			
		||||
      -nokeys | ${ACME_OPENSSL_BIN:-openssl} x509 -text \
 | 
			
		||||
      -noout | grep -i "signature" | grep -iq ecdsa >/dev/null 2>&1; then
 | 
			
		||||
      if [ -f "$(dirname "${DEPLOY_UNIFI_KEYSTORE}")/system.properties" ]; then
 | 
			
		||||
        _unifi_system_properties="$(dirname "${DEPLOY_UNIFI_KEYSTORE}")/system.properties"
 | 
			
		||||
      else
 | 
			
		||||
        _unifi_system_properties="/usr/lib/unifi/data/system.properties"
 | 
			
		||||
      fi
 | 
			
		||||
      if [ -f "${_unifi_system_properties}" ]; then
 | 
			
		||||
        cp -f "${_unifi_system_properties}" "${_unifi_system_properties}"_original
 | 
			
		||||
        _info "Updating system configuration for cipher compatibility."
 | 
			
		||||
        _info "Saved original system config to ${_unifi_system_properties}_original"
 | 
			
		||||
        sed -i '/unifi\.https\.ciphers/d' "${_unifi_system_properties}"
 | 
			
		||||
        echo "unifi.https.ciphers=ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES128-GCM-SHA256" >>"${_unifi_system_properties}"
 | 
			
		||||
        sed -i '/unifi\.https\.sslEnabledProtocols/d' "${_unifi_system_properties}"
 | 
			
		||||
        echo "unifi.https.sslEnabledProtocols=TLSv1.3,TLSv1.2" >>"${_unifi_system_properties}"
 | 
			
		||||
        _info "System configuration updated."
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    rm "$_import_pkcs12"
 | 
			
		||||
 | 
			
		||||
    # Restarting unifi-core will bring up unifi, doing it out of order results in
 | 
			
		||||
    # a certificate error, and breaks wifiman.
 | 
			
		||||
    # Restart if we aren't doing Unifi OS (e.g. unifi-core service), otherwise stop for later restart.
 | 
			
		||||
    _unifi_reload="${DEPLOY_UNIFI_RELOAD:-systemctl restart unifi}"
 | 
			
		||||
    if [ ! -f "${DEPLOY_UNIFI_CORE_CONFIG:-/data/unifi-core/config}/unifi-core.key" ]; then
 | 
			
		||||
      _reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_reload"
 | 
			
		||||
    else
 | 
			
		||||
      _info "Stopping Unifi Controller for later restart."
 | 
			
		||||
      _unifi_stop=$(echo "${_unifi_reload}" | sed -e 's/restart/stop/')
 | 
			
		||||
      $_unifi_stop
 | 
			
		||||
      _reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_reload"
 | 
			
		||||
      _info "Unifi Controller stopped."
 | 
			
		||||
    fi
 | 
			
		||||
    _services_updated="${_services_updated} unifi"
 | 
			
		||||
    _info "Install Unifi Controller certificate success!"
 | 
			
		||||
@@ -134,13 +207,24 @@ unifi_deploy() {
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    # Cloud Key expects to load the keystore from /etc/ssl/private/unifi.keystore.jks.
 | 
			
		||||
    # Normally /usr/lib/unifi/data/keystore is a symlink there (so the keystore was
 | 
			
		||||
    # updated above), but if not, we don't know how to handle this installation:
 | 
			
		||||
    if ! cmp -s "$_unifi_keystore" "${_cloudkey_certdir}/unifi.keystore.jks"; then
 | 
			
		||||
      _err "Unsupported Cloud Key configuration: keystore not found at '${_cloudkey_certdir}/unifi.keystore.jks'"
 | 
			
		||||
      return 1
 | 
			
		||||
    # It appears that unifi won't start if this is a symlink, so we'll copy it instead.
 | 
			
		||||
 | 
			
		||||
    # if ! cmp -s "$_unifi_keystore" "${_cloudkey_certdir}/unifi.keystore.jks"; then
 | 
			
		||||
    #   _err "Unsupported Cloud Key configuration: keystore not found at '${_cloudkey_certdir}/unifi.keystore.jks'"
 | 
			
		||||
    #   return 1
 | 
			
		||||
    # fi
 | 
			
		||||
 | 
			
		||||
    _info "Updating ${_cloudkey_certdir}/unifi.keystore.jks"
 | 
			
		||||
    if [ -e "${_cloudkey_certdir}/unifi.keystore.jks" ]; then
 | 
			
		||||
      if [ -L "${_cloudkey_certdir}/unifi.keystore.jks" ]; then
 | 
			
		||||
        rm -f "${_cloudkey_certdir}/unifi.keystore.jks"
 | 
			
		||||
      else
 | 
			
		||||
        mv "${_cloudkey_certdir}/unifi.keystore.jks" "${_cloudkey_certdir}/unifi.keystore.jks_original"
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    cp "${_unifi_keystore}" "${_cloudkey_certdir}/unifi.keystore.jks"
 | 
			
		||||
 | 
			
		||||
    cat "$_cfullchain" >"${_cloudkey_certdir}/cloudkey.crt"
 | 
			
		||||
    cat "$_ckey" >"${_cloudkey_certdir}/cloudkey.key"
 | 
			
		||||
    (cd "$_cloudkey_certdir" && tar -cf cert.tar cloudkey.crt cloudkey.key unifi.keystore.jks)
 | 
			
		||||
@@ -165,12 +249,17 @@ unifi_deploy() {
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Save the existing certs in case something goes wrong.
 | 
			
		||||
    cp -f "${_unifi_core_config}"/unifi-core.crt "${_unifi_core_config}"/unifi-core_original.crt
 | 
			
		||||
    cp -f "${_unifi_core_config}"/unifi-core.key "${_unifi_core_config}"/unifi-core_original.key
 | 
			
		||||
    _info "Previous certificate and key saved to ${_unifi_core_config}/unifi-core_original.crt.key."
 | 
			
		||||
 | 
			
		||||
    cat "$_cfullchain" >"${_unifi_core_config}/unifi-core.crt"
 | 
			
		||||
    cat "$_ckey" >"${_unifi_core_config}/unifi-core.key"
 | 
			
		||||
 | 
			
		||||
    if systemctl -q is-active unifi-core; then
 | 
			
		||||
      _reload_cmd="${_reload_cmd:+$_reload_cmd && }systemctl restart unifi-core"
 | 
			
		||||
    fi
 | 
			
		||||
    _unifi_os_reload="${DEPLOY_UNIFI_OS_RELOAD:-systemctl restart unifi-core}"
 | 
			
		||||
    _reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_os_reload"
 | 
			
		||||
 | 
			
		||||
    _info "Install UnifiOS certificate success!"
 | 
			
		||||
    _services_updated="${_services_updated} unifi-core"
 | 
			
		||||
  elif [ "$DEPLOY_UNIFI_CORE_CONFIG" ]; then
 | 
			
		||||
@@ -209,6 +298,8 @@ unifi_deploy() {
 | 
			
		||||
  _savedeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR"
 | 
			
		||||
  _savedeployconf DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG"
 | 
			
		||||
  _savedeployconf DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD"
 | 
			
		||||
  _savedeployconf DEPLOY_UNIFI_OS_RELOAD "$DEPLOY_UNIFI_OS_RELOAD"
 | 
			
		||||
  _savedeployconf DEPLOY_UNIFI_SYSTEM_PROPERTIES "$DEPLOY_UNIFI_SYSTEM_PROPERTIES"
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -80,10 +80,15 @@ vault_deploy() {
 | 
			
		||||
  if [ -n "$VAULT_RENEW_TOKEN" ]; then
 | 
			
		||||
    URL="$VAULT_ADDR/v1/auth/token/renew-self"
 | 
			
		||||
    _info "Renew the Vault token to default TTL"
 | 
			
		||||
    if ! _post "" "$URL" >/dev/null; then
 | 
			
		||||
    _response=$(_post "" "$URL")
 | 
			
		||||
    if [ "$?" != "0" ]; then
 | 
			
		||||
      _err "Failed to renew the Vault token"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
      _err "Failed to renew the Vault token: $_response"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  URL="$VAULT_ADDR/v1/$VAULT_PREFIX/$_cdomain"
 | 
			
		||||
@@ -91,29 +96,85 @@ vault_deploy() {
 | 
			
		||||
  if [ -n "$VAULT_FABIO_MODE" ]; then
 | 
			
		||||
    _info "Writing certificate and key to $URL in Fabio mode"
 | 
			
		||||
    if [ -n "$VAULT_KV_V2" ]; then
 | 
			
		||||
      _post "{ \"data\": {\"cert\": \"$_cfullchain\", \"key\": \"$_ckey\"} }" "$URL" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{ \"data\": {\"cert\": \"$_cfullchain\", \"key\": \"$_ckey\"} }" "$URL")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    else
 | 
			
		||||
      _post "{\"cert\": \"$_cfullchain\", \"key\": \"$_ckey\"}" "$URL" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"cert\": \"$_cfullchain\", \"key\": \"$_ckey\"}" "$URL")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
  else
 | 
			
		||||
    if [ -n "$VAULT_KV_V2" ]; then
 | 
			
		||||
      _info "Writing certificate to $URL/cert.pem"
 | 
			
		||||
      _post "{\"data\": {\"value\": \"$_ccert\"}}" "$URL/cert.pem" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"data\": {\"value\": \"$_ccert\"}}" "$URL/cert.pem")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing cert.pem: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      _info "Writing key to $URL/cert.key"
 | 
			
		||||
      _post "{\"data\": {\"value\": \"$_ckey\"}}" "$URL/cert.key" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"data\": {\"value\": \"$_ckey\"}}" "$URL/cert.key")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing cert.key: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      _info "Writing CA certificate to $URL/ca.pem"
 | 
			
		||||
      _post "{\"data\": {\"value\": \"$_cca\"}}" "$URL/ca.pem" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"data\": {\"value\": \"$_cca\"}}" "$URL/ca.pem")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing ca.pem: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      _info "Writing full-chain certificate to $URL/fullchain.pem"
 | 
			
		||||
      _post "{\"data\": {\"value\": \"$_cfullchain\"}}" "$URL/fullchain.pem" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"data\": {\"value\": \"$_cfullchain\"}}" "$URL/fullchain.pem")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing fullchain.pem: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    else
 | 
			
		||||
      _info "Writing certificate to $URL/cert.pem"
 | 
			
		||||
      _post "{\"value\": \"$_ccert\"}" "$URL/cert.pem" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"value\": \"$_ccert\"}" "$URL/cert.pem")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing cert.pem: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      _info "Writing key to $URL/cert.key"
 | 
			
		||||
      _post "{\"value\": \"$_ckey\"}" "$URL/cert.key" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"value\": \"$_ckey\"}" "$URL/cert.key")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing cert.key: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      _info "Writing CA certificate to $URL/ca.pem"
 | 
			
		||||
      _post "{\"value\": \"$_cca\"}" "$URL/ca.pem" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"value\": \"$_cca\"}" "$URL/ca.pem")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing ca.pem: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      _info "Writing full-chain certificate to $URL/fullchain.pem"
 | 
			
		||||
      _post "{\"value\": \"$_cfullchain\"}" "$URL/fullchain.pem" >/dev/null || return 1
 | 
			
		||||
      _response=$(_post "{\"value\": \"$_cfullchain\"}" "$URL/fullchain.pem")
 | 
			
		||||
      if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
      if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
        _err "Vault error writing fullchain.pem: $_response"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # To make it compatible with the wrong ca path `chain.pem` which was used in former versions
 | 
			
		||||
@@ -121,11 +182,20 @@ vault_deploy() {
 | 
			
		||||
      _err "The CA certificate has moved from chain.pem to ca.pem, if you don't depend on chain.pem anymore, you can delete it to avoid this warning"
 | 
			
		||||
      _info "Updating CA certificate to $URL/chain.pem for backward compatibility"
 | 
			
		||||
      if [ -n "$VAULT_KV_V2" ]; then
 | 
			
		||||
        _post "{\"data\": {\"value\": \"$_cca\"}}" "$URL/chain.pem" >/dev/null || return 1
 | 
			
		||||
        _response=$(_post "{\"data\": {\"value\": \"$_cca\"}}" "$URL/chain.pem")
 | 
			
		||||
        if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
        if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
          _err "Vault error writing chain.pem: $_response"
 | 
			
		||||
          return 1
 | 
			
		||||
        fi
 | 
			
		||||
      else
 | 
			
		||||
        _post "{\"value\": \"$_cca\"}" "$URL/chain.pem" >/dev/null || return 1
 | 
			
		||||
        _response=$(_post "{\"value\": \"$_cca\"}" "$URL/chain.pem")
 | 
			
		||||
        if [ "$?" != "0" ]; then return 1; fi
 | 
			
		||||
        if echo "$_response" | grep -q '"errors":\['; then
 | 
			
		||||
          _err "Vault error writing chain.pem: $_response"
 | 
			
		||||
          return 1
 | 
			
		||||
        fi
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -106,5 +106,5 @@ vsftpd_deploy() {
 | 
			
		||||
    fi
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  return 0
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										500
									
								
								deploy/zyxel_gs1900.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										500
									
								
								deploy/zyxel_gs1900.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,500 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Deploy certificates to Zyxel GS1900 series switches
 | 
			
		||||
#
 | 
			
		||||
# This script uses the https web administration interface in order
 | 
			
		||||
# to upload updated certificates to Zyxel GS1900 series switches.
 | 
			
		||||
# Only a few models have been tested but untested switches from the
 | 
			
		||||
# same model line may work as well. If you test and confirm a switch
 | 
			
		||||
# as working please submit a pull request updating this compatibility
 | 
			
		||||
# list!
 | 
			
		||||
#
 | 
			
		||||
# Known Issues:
 | 
			
		||||
#   1. This is a consumer grade switch and is a bit underpowered
 | 
			
		||||
#      the longer the RSA key size the slower your switch web UI
 | 
			
		||||
#      will be. RSA 2048 will work, RSA 4096 will work but you may
 | 
			
		||||
#      experience performance problems.
 | 
			
		||||
#   2. You must use RSA certificates. The switch will reject EC-256
 | 
			
		||||
#      and EC-384 certificates in firmware 2.80
 | 
			
		||||
#      See: https://community.zyxel.com/en/discussion/21506/bug-cannot-import-ssl-cert-on-gs1900-8-and-gs1900-24e-firmware-v2-80/
 | 
			
		||||
#
 | 
			
		||||
# Current GS1900 Switch Compatibility:
 | 
			
		||||
#   GS1900-8    - Working as of firmware V2.80
 | 
			
		||||
#   GS1900-8HP  - Untested
 | 
			
		||||
#   GS1900-10HP - Untested
 | 
			
		||||
#   GS1900-16   - Untested
 | 
			
		||||
#   GS1900-24   - Untested
 | 
			
		||||
#   GS1900-24E  - Working as of firmware V2.80
 | 
			
		||||
#   GS1900-24EP - Untested
 | 
			
		||||
#   GS1900-24HP - Untested
 | 
			
		||||
#   GS1900-48   - Untested
 | 
			
		||||
#   GS1900-48HP - Untested
 | 
			
		||||
#
 | 
			
		||||
# Prerequisite Setup Steps:
 | 
			
		||||
#   1. Install at least firmware V2.80 on your switch
 | 
			
		||||
#   2. Enable HTTPS web management on your switch
 | 
			
		||||
#
 | 
			
		||||
# Usage:
 | 
			
		||||
#   1. Ensure the switch has firmware V2.80 or later.
 | 
			
		||||
#   2. Ensure the switch has HTTPS management enabled.
 | 
			
		||||
#   3. Set the appropriate environment variables for your environment.
 | 
			
		||||
#
 | 
			
		||||
#      DEPLOY_ZYXEL_SWITCH          - The switch hostname. (Default: _cdomain)
 | 
			
		||||
#      DEPLOY_ZYXEL_SWITCH_USER     - The webadmin user. (Default: admin)
 | 
			
		||||
#      DEPLOY_ZYXEL_SWITCH_PASSWORD - The webadmin password for the switch.
 | 
			
		||||
#      DEPLOY_ZYXEL_SWITCH_REBOOT   - If "1" reboot after update. (Default: "0")
 | 
			
		||||
#
 | 
			
		||||
#   4. Run the deployment plugin:
 | 
			
		||||
#      acme.sh --deploy --deploy-hook zyxel_gs1900 -d example.com
 | 
			
		||||
#
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
zyxel_gs1900_deploy() {
 | 
			
		||||
  _zyxel_gs1900_minimum_firmware_version="v2.80"
 | 
			
		||||
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug2 _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  _getdeployconf DEPLOY_ZYXEL_SWITCH
 | 
			
		||||
  _getdeployconf DEPLOY_ZYXEL_SWITCH_USER
 | 
			
		||||
  _getdeployconf DEPLOY_ZYXEL_SWITCH_PASSWORD
 | 
			
		||||
  _getdeployconf DEPLOY_ZYXEL_SWITCH_REBOOT
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_ZYXEL_SWITCH" ]; then
 | 
			
		||||
    DEPLOY_ZYXEL_SWITCH="$_cdomain"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_ZYXEL_SWITCH_USER" ]; then
 | 
			
		||||
    DEPLOY_ZYXEL_SWITCH_USER="admin"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_ZYXEL_SWITCH_PASSWORD" ]; then
 | 
			
		||||
    DEPLOY_ZYXEL_SWITCH_PASSWORD="1234"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_ZYXEL_SWITCH_REBOOT" ]; then
 | 
			
		||||
    DEPLOY_ZYXEL_SWITCH_REBOOT="0"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _savedeployconf DEPLOY_ZYXEL_SWITCH "$DEPLOY_ZYXEL_SWITCH"
 | 
			
		||||
  _savedeployconf DEPLOY_ZYXEL_SWITCH_USER "$DEPLOY_ZYXEL_SWITCH_USER"
 | 
			
		||||
  _savedeployconf DEPLOY_ZYXEL_SWITCH_PASSWORD "$DEPLOY_ZYXEL_SWITCH_PASSWORD"
 | 
			
		||||
  _savedeployconf DEPLOY_ZYXEL_SWITCH_REBOOT "$DEPLOY_ZYXEL_SWITCH_REBOOT"
 | 
			
		||||
 | 
			
		||||
  _debug DEPLOY_ZYXEL_SWITCH "$DEPLOY_ZYXEL_SWITCH"
 | 
			
		||||
  _debug DEPLOY_ZYXEL_SWITCH_USER "$DEPLOY_ZYXEL_SWITCH_USER"
 | 
			
		||||
  _secure_debug DEPLOY_ZYXEL_SWITCH_PASSWORD "$DEPLOY_ZYXEL_SWITCH_PASSWORD"
 | 
			
		||||
  _debug DEPLOY_ZYXEL_SWITCH_REBOOT "$DEPLOY_ZYXEL_SWITCH_REBOOT"
 | 
			
		||||
 | 
			
		||||
  _zyxel_switch_base_uri="https://${DEPLOY_ZYXEL_SWITCH}"
 | 
			
		||||
 | 
			
		||||
  _info "Beginning to deploy to a Zyxel GS1900 series switch at ${_zyxel_switch_base_uri}."
 | 
			
		||||
  _zyxel_gs1900_deployment_precheck || return $?
 | 
			
		||||
 | 
			
		||||
  _zyxel_gs1900_should_update
 | 
			
		||||
  if [ "$?" != "0" ]; then
 | 
			
		||||
    _info "The switch already has our certificate installed. No update required."
 | 
			
		||||
    return 0
 | 
			
		||||
  else
 | 
			
		||||
    _info "The switch does not yet have our certificate installed."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Logging into the switch web interface."
 | 
			
		||||
  _zyxel_gs1900_login || return $?
 | 
			
		||||
 | 
			
		||||
  _info "Validating the switch is compatible with this deployment process."
 | 
			
		||||
  _zyxel_gs1900_validate_device_compatibility || return $?
 | 
			
		||||
 | 
			
		||||
  _info "Uploading the certificate."
 | 
			
		||||
  _zyxel_gs1900_upload_certificate || return $?
 | 
			
		||||
 | 
			
		||||
  if [ "$DEPLOY_ZYXEL_SWITCH_REBOOT" = "1" ]; then
 | 
			
		||||
    _info "Rebooting the switch."
 | 
			
		||||
    _zyxel_gs1900_trigger_reboot || return $?
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_zyxel_gs1900_deployment_precheck() {
 | 
			
		||||
  # Initialize the keylength if it isn't already
 | 
			
		||||
  if [ -z "$Le_Keylength" ]; then
 | 
			
		||||
    Le_Keylength=""
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if _isEccKey "$Le_Keylength"; then
 | 
			
		||||
    _info "Warning: Zyxel GS1900 switches are not currently known to work with ECC keys!"
 | 
			
		||||
    _info "You can continue, but your switch may reject your key."
 | 
			
		||||
  elif [ -n "$Le_Keylength" ] && [ "$Le_Keylength" -gt "2048" ]; then
 | 
			
		||||
    _info "Warning: Your RSA key length is greater than 2048!"
 | 
			
		||||
    _info "You can continue, but you may experience performance issues in the web administration interface."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Check the server for some common failure modes prior to authentication and certificate upload in order to avoid
 | 
			
		||||
  # sending a certificate when we may not want to.
 | 
			
		||||
  test_login_response=$(_post "username=test&password=test&login=true;" "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi?cmd=0.html" '' "POST" "application/x-www-form-urlencoded" 2>&1)
 | 
			
		||||
  test_login_page_exitcode="$?"
 | 
			
		||||
  _debug3 "Test Login Response: ${test_login_response}"
 | 
			
		||||
  if [ "$test_login_page_exitcode" -ne "0" ]; then
 | 
			
		||||
    if { [ "${ACME_USE_WGET:-0}" = "0" ] && [ "$test_login_page_exitcode" = "60" ]; } || { [ "${ACME_USE_WGET:-0}" = "1" ] && [ "$test_login_page_exitcode" = "5" ]; }; then
 | 
			
		||||
      _err "The SSL certificate at $_zyxel_switch_base_uri could not be validated."
 | 
			
		||||
      _err "Please double check your hostname, port, and that you are actually connecting to your switch."
 | 
			
		||||
      _err "If the problem persists then please ensure that the certificate is not self-signed, has not"
 | 
			
		||||
      _err "expired, and matches the switch hostname. If you expect validation to fail then you can disable"
 | 
			
		||||
      _err "certificate validation by running with --insecure."
 | 
			
		||||
      return 1
 | 
			
		||||
    elif [ "${ACME_USE_WGET:-0}" = "0" ] && [ "$test_login_page_exitcode" = "56" ]; then
 | 
			
		||||
      _debug3 "Intentionally ignore curl exit code 56 in our precheck"
 | 
			
		||||
    else
 | 
			
		||||
      _err "Failed to submit the initial login attempt to $_zyxel_switch_base_uri."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_zyxel_gs1900_login() {
 | 
			
		||||
  # Login to the switch and set the appropriate auth cookie in _H1
 | 
			
		||||
  username_encoded=$(printf "%s" "$DEPLOY_ZYXEL_SWITCH_USER" | _url_encode)
 | 
			
		||||
  password_encoded=$(_zyxel_gs1900_password_obfuscate "$DEPLOY_ZYXEL_SWITCH_PASSWORD" | _url_encode)
 | 
			
		||||
 | 
			
		||||
  login_response=$(_post "username=${username_encoded}&password=${password_encoded}&login=true;" "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi?cmd=0.html" '' "POST" "application/x-www-form-urlencoded" | tr -d '\n')
 | 
			
		||||
  auth_response=$(_post "authId=${login_response}&login_chk=true" "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi?cmd=0.html" '' "POST" "application/x-www-form-urlencoded" | tr -d '\n')
 | 
			
		||||
  if [ "$auth_response" != "OK" ]; then
 | 
			
		||||
    _err "Login failed due to invalid credentials."
 | 
			
		||||
    _err "Please double check the configured username and password and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  sessionid=$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'HTTPS_XSSID=[^;]*;' | tr -d ';')
 | 
			
		||||
  _secure_debug2 "sessionid" "$sessionid"
 | 
			
		||||
 | 
			
		||||
  export _H1="Cookie: $sessionid"
 | 
			
		||||
  _secure_debug2 "_H1" "$_H1"
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_zyxel_gs1900_validate_device_compatibility() {
 | 
			
		||||
  # Check the switches model and firmware version and throw errors
 | 
			
		||||
  # if this script isn't compatible.
 | 
			
		||||
  device_info_html=$(_get "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi?cmd=12" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  model_name=$(_zyxel_gs1900_get_model "$device_info_html")
 | 
			
		||||
  _debug2 "model_name" "$model_name"
 | 
			
		||||
  if [ -z "$model_name" ]; then
 | 
			
		||||
    _err "Could not find the switch model name."
 | 
			
		||||
    _err "Please re-run with --debug and report a bug."
 | 
			
		||||
    return $?
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! expr "$model_name" : "GS1900-" >/dev/null; then
 | 
			
		||||
    _err "Switch is an unsupported model: $model_name"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  firmware_version=$(_zyxel_gs1900_get_firmware_version "$device_info_html")
 | 
			
		||||
  _debug2 "firmware_version" "$firmware_version"
 | 
			
		||||
  if [ -z "$firmware_version" ]; then
 | 
			
		||||
    _err "Could not find the switch firmware version."
 | 
			
		||||
    _err "Please re-run with --debug and report a bug."
 | 
			
		||||
    return $?
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug2 "_zyxel_gs1900_minimum_firmware_version" "$_zyxel_gs1900_minimum_firmware_version"
 | 
			
		||||
  minimum_major_version=$(_zyxel_gs1900_parse_major_version "$_zyxel_gs1900_minimum_firmware_version")
 | 
			
		||||
  _debug2 "minimum_major_version" "$minimum_major_version"
 | 
			
		||||
  minimum_minor_version=$(_zyxel_gs1900_parse_minor_version "$_zyxel_gs1900_minimum_firmware_version")
 | 
			
		||||
  _debug2 "minimum_minor_version" "$minimum_minor_version"
 | 
			
		||||
 | 
			
		||||
  _debug2 "firmware_version" "$firmware_version"
 | 
			
		||||
  firmware_major_version=$(_zyxel_gs1900_parse_major_version "$firmware_version")
 | 
			
		||||
  _debug2 "firmware_major_version" "$firmware_major_version"
 | 
			
		||||
  firmware_minor_version=$(_zyxel_gs1900_parse_minor_version "$firmware_version")
 | 
			
		||||
  _debug2 "firmware_minor_version" "$firmware_minor_version"
 | 
			
		||||
 | 
			
		||||
  _ret=0
 | 
			
		||||
  if [ "$firmware_major_version" -lt "$minimum_major_version" ]; then
 | 
			
		||||
    _ret=1
 | 
			
		||||
  elif [ "$firmware_major_version" -eq "$minimum_major_version" ] && [ "$firmware_minor_version" -lt "$minimum_minor_version" ]; then
 | 
			
		||||
    _ret=1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ "$_ret" != "0" ]; then
 | 
			
		||||
    _err "Unsupported firmware version $firmware_version. Please upgrade to at least version $_zyxel_gs1900_minimum_firmware_version."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  return $?
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_zyxel_gs1900_should_update() {
 | 
			
		||||
  # Get the remote certificate serial number
 | 
			
		||||
  _remote_cert=$(${ACME_OPENSSL_BIN:-openssl} s_client -showcerts -connect "${DEPLOY_ZYXEL_SWITCH}:443" 2>/dev/null </dev/null | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p')
 | 
			
		||||
  _debug3 "_remote_cert" "$_remote_cert"
 | 
			
		||||
 | 
			
		||||
  _remote_cert_serial=$(printf "%s" "${_remote_cert}" | ${ACME_OPENSSL_BIN:-openssl} x509 -noout -serial)
 | 
			
		||||
  _debug2 "_remote_cert_serial" "$_remote_cert_serial"
 | 
			
		||||
 | 
			
		||||
  # Get our certificate serial number
 | 
			
		||||
  _our_cert_serial=$(${ACME_OPENSSL_BIN:-openssl} x509 -noout -serial <"${_ccert}")
 | 
			
		||||
  _debug2 "_our_cert_serial" "$_our_cert_serial"
 | 
			
		||||
 | 
			
		||||
  [ "${_remote_cert_serial}" != "${_our_cert_serial}" ]
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_zyxel_gs1900_upload_certificate() {
 | 
			
		||||
  # Generate a PKCS12 certificate with a temporary password since the web interface
 | 
			
		||||
  # requires a password be present. Then upload that certificate.
 | 
			
		||||
  temp_cert_password=$(head /dev/urandom | tr -dc 'A-Za-z0-9' | head -c 64)
 | 
			
		||||
  _secure_debug2 "temp_cert_password" "$temp_cert_password"
 | 
			
		||||
 | 
			
		||||
  temp_pkcs12="$(_mktemp)"
 | 
			
		||||
  _debug2 "temp_pkcs12" "$temp_pkcs12"
 | 
			
		||||
  _toPkcs "$temp_pkcs12" "$_ckey" "$_ccert" "$_cca" "$temp_cert_password"
 | 
			
		||||
  if [ "$?" != "0" ]; then
 | 
			
		||||
    _err "Failed to generate a pkcs12 certificate."
 | 
			
		||||
    _err "Please re-run with --debug and report a bug."
 | 
			
		||||
 | 
			
		||||
    # ensure the temporary certificate file is cleaned up
 | 
			
		||||
    [ -f "${temp_pkcs12}" ] && rm -f "${temp_pkcs12}"
 | 
			
		||||
 | 
			
		||||
    return $?
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Load the upload page
 | 
			
		||||
  upload_page_html=$(_get "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi?cmd=5914" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  # Get the first instance of XSSID from the upload page
 | 
			
		||||
  form_xss_value=$(printf "%s" "$upload_page_html" | _egrep_o 'name="XSSID"\s*value="[^"]+"' | sed 's/^.*="\([^"]\{1,\}\)"$/\1/g' | head -n 1)
 | 
			
		||||
  _secure_debug2 "form_xss_value" "$form_xss_value"
 | 
			
		||||
 | 
			
		||||
  _info "Generating the certificate upload request"
 | 
			
		||||
  upload_post_request="$(_mktemp)"
 | 
			
		||||
  upload_post_boundary="---------------------------$(date +%Y%m%d%H%M%S)"
 | 
			
		||||
 | 
			
		||||
  {
 | 
			
		||||
    printf -- "--%s\r\n" "${upload_post_boundary}"
 | 
			
		||||
    printf "Content-Disposition: form-data; name=\"XSSID\"\r\n\r\n%s\r\n" "${form_xss_value}"
 | 
			
		||||
    printf -- "--%s\r\n" "${upload_post_boundary}"
 | 
			
		||||
    printf "Content-Disposition: form-data; name=\"http_file\"; filename=\"temp_pkcs12.pfx\"\r\n"
 | 
			
		||||
    printf "Content-Type: application/pkcs12\r\n\r\n"
 | 
			
		||||
    cat "${temp_pkcs12}"
 | 
			
		||||
    printf "\r\n"
 | 
			
		||||
    printf -- "--%s\r\n" "${upload_post_boundary}"
 | 
			
		||||
    printf "Content-Disposition: form-data; name=\"pwd\"\r\n\r\n%s\r\n" "${temp_cert_password}"
 | 
			
		||||
    printf -- "--%s\r\n" "${upload_post_boundary}"
 | 
			
		||||
    printf "Content-Disposition: form-data; name=\"cmd\"\r\n\r\n%s\r\n" "31"
 | 
			
		||||
    printf -- "--%s\r\n" "${upload_post_boundary}"
 | 
			
		||||
    printf "Content-Disposition: form-data; name=\"sysSubmit\"\r\n\r\n%s\r\n" "Import"
 | 
			
		||||
    printf -- "--%s--\r\n" "${upload_post_boundary}"
 | 
			
		||||
  } >"${upload_post_request}"
 | 
			
		||||
 | 
			
		||||
  _info "Upload certificate to the switch"
 | 
			
		||||
 | 
			
		||||
  # Unfortunately we cannot rely upon the switch response across switch models
 | 
			
		||||
  # to return a consistent body return - so we cannot inspect the result of this
 | 
			
		||||
  # upload to determine success.
 | 
			
		||||
  upload_response=$(_zyxel_upload_pkcs12 "${upload_post_request}" "${upload_post_boundary}" 2>&1)
 | 
			
		||||
  _debug3 "Upload response: ${upload_response}"
 | 
			
		||||
  rm "${upload_post_request}"
 | 
			
		||||
 | 
			
		||||
  # Pause for a few seconds to give the switch a chance to process the certificate
 | 
			
		||||
  # For some reason I've found this to be necessary on my GS1900-24E
 | 
			
		||||
  _debug2 "Waiting 4 seconds for the switch to process the newly uploaded certificate."
 | 
			
		||||
  sleep "4"
 | 
			
		||||
 | 
			
		||||
  # Check to see whether or not our update was successful
 | 
			
		||||
  _ret=0
 | 
			
		||||
  _zyxel_gs1900_should_update
 | 
			
		||||
  if [ "$?" != "0" ]; then
 | 
			
		||||
    _info "The certificate was updated successfully"
 | 
			
		||||
  else
 | 
			
		||||
    _ret=1
 | 
			
		||||
    _err "The certificate upload does not appear to have worked."
 | 
			
		||||
    _err "The remote certificate does not match the certificate we tried to upload."
 | 
			
		||||
    _err "Please re-run with --debug 2 and review for unexpected errors. If none can be found please submit a bug."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # ensure the temporary files are cleaned up
 | 
			
		||||
  [ -f "${temp_pkcs12}" ] && rm -f "${temp_pkcs12}"
 | 
			
		||||
 | 
			
		||||
  return $_ret
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# make the certificate upload request using either
 | 
			
		||||
# --data binary with @ for file access in CURL
 | 
			
		||||
# or using --post-file for wget to ensure we upload
 | 
			
		||||
# the pkcs12 without getting tripped up on null bytes
 | 
			
		||||
#
 | 
			
		||||
# Usage _zyxel_upload_pkcs12 [body file name] [post boundary marker]
 | 
			
		||||
_zyxel_upload_pkcs12() {
 | 
			
		||||
  bodyfilename="$1"
 | 
			
		||||
  multipartformmarker="$2"
 | 
			
		||||
  _post_url="${_zyxel_switch_base_uri}/cgi-bin/httpuploadcert.cgi"
 | 
			
		||||
  httpmethod="POST"
 | 
			
		||||
  _postContentType="multipart/form-data; boundary=${multipartformmarker}"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$httpmethod" ]; then
 | 
			
		||||
    httpmethod="POST"
 | 
			
		||||
  fi
 | 
			
		||||
  _debug $httpmethod
 | 
			
		||||
  _debug "_post_url" "$_post_url"
 | 
			
		||||
  _debug2 "bodyfilename" "$bodyfilename"
 | 
			
		||||
  _debug2 "_postContentType" "$_postContentType"
 | 
			
		||||
 | 
			
		||||
  _inithttp
 | 
			
		||||
 | 
			
		||||
  if [ "$_ACME_CURL" ] && [ "${ACME_USE_WGET:-0}" = "0" ]; then
 | 
			
		||||
    _CURL="$_ACME_CURL"
 | 
			
		||||
    if [ "$HTTPS_INSECURE" ]; then
 | 
			
		||||
      _CURL="$_CURL --insecure  "
 | 
			
		||||
    fi
 | 
			
		||||
    if [ "$httpmethod" = "HEAD" ]; then
 | 
			
		||||
      _CURL="$_CURL -I  "
 | 
			
		||||
    fi
 | 
			
		||||
    _debug "_CURL" "$_CURL"
 | 
			
		||||
 | 
			
		||||
    response="$($_CURL --user-agent "$USER_AGENT" -X $httpmethod -H "$_H1" -H "$_H2" -H "$_H3" -H "$_H4" -H "$_H5" --data-binary "@${bodyfilename}" "$_post_url")"
 | 
			
		||||
 | 
			
		||||
    _ret="$?"
 | 
			
		||||
    if [ "$_ret" != "0" ]; then
 | 
			
		||||
      _err "Please refer to https://curl.haxx.se/libcurl/c/libcurl-errors.html for error code: $_ret"
 | 
			
		||||
      if [ "$DEBUG" ] && [ "$DEBUG" -ge "2" ]; then
 | 
			
		||||
        _err "Here is the curl dump log:"
 | 
			
		||||
        _err "$(cat "$_CURL_DUMP")"
 | 
			
		||||
      fi
 | 
			
		||||
    fi
 | 
			
		||||
  elif [ "$_ACME_WGET" ]; then
 | 
			
		||||
    _WGET="$_ACME_WGET"
 | 
			
		||||
    if [ "$HTTPS_INSECURE" ]; then
 | 
			
		||||
      _WGET="$_WGET --no-check-certificate "
 | 
			
		||||
    fi
 | 
			
		||||
    _debug "_WGET" "$_WGET"
 | 
			
		||||
 | 
			
		||||
    response="$($_WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --post-file="${bodyfilename}" "$_post_url" 2>"$HTTP_HEADER")"
 | 
			
		||||
 | 
			
		||||
    _ret="$?"
 | 
			
		||||
    if [ "$_ret" = "8" ]; then
 | 
			
		||||
      _ret=0
 | 
			
		||||
      _debug "wget returned 8 as the server returned a 'Bad Request' response. Let's process the response later."
 | 
			
		||||
    fi
 | 
			
		||||
    if [ "$_ret" != "0" ]; then
 | 
			
		||||
      _err "Please refer to https://www.gnu.org/software/wget/manual/html_node/Exit-Status.html for error code: $_ret"
 | 
			
		||||
    fi
 | 
			
		||||
    if _contains "$_WGET" " -d "; then
 | 
			
		||||
      # Demultiplex wget debug output
 | 
			
		||||
      cat "$HTTP_HEADER" >&2
 | 
			
		||||
      _sed_i '/^[^ ][^ ]/d; /^ *$/d' "$HTTP_HEADER"
 | 
			
		||||
    fi
 | 
			
		||||
    # remove leading whitespaces from header to match curl format
 | 
			
		||||
    _sed_i 's/^  //g' "$HTTP_HEADER"
 | 
			
		||||
  else
 | 
			
		||||
    _ret="$?"
 | 
			
		||||
    _err "Neither curl nor wget have been found, cannot make $httpmethod request."
 | 
			
		||||
  fi
 | 
			
		||||
  _debug "_ret" "$_ret"
 | 
			
		||||
  printf "%s" "$response"
 | 
			
		||||
  return $_ret
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_zyxel_gs1900_trigger_reboot() {
 | 
			
		||||
  # Trigger a reboot via the management reboot page in the web ui
 | 
			
		||||
  reboot_page_html=$(_get "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi?cmd=5888" | tr -d '\n')
 | 
			
		||||
  reboot_xss_value=$(printf "%s" "$reboot_page_html" | _egrep_o 'name="XSSID"\s*value="[^"]+"' | sed 's/^.*="\([^"]\{1,\}\)"$/\1/g')
 | 
			
		||||
  _secure_debug2 "reboot_xss_value" "$reboot_xss_value"
 | 
			
		||||
 | 
			
		||||
  reboot_response_html=$(_post "XSSID=${reboot_xss_value}&cmd=5889&sysSubmit=Reboot" "${_zyxel_switch_base_uri}/cgi-bin/dispatcher.cgi" '' "POST" "application/x-www-form-urlencoded")
 | 
			
		||||
  reboot_message=$(printf "%s" "$reboot_response_html" | tr -d '\t\r\n\v\f' | _egrep_o "Rebooting now...")
 | 
			
		||||
 | 
			
		||||
  if [ -z "$reboot_message" ]; then
 | 
			
		||||
    _err "Failed to trigger switch reboot!"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# password
 | 
			
		||||
_zyxel_gs1900_password_obfuscate() {
 | 
			
		||||
  # Return the password obfuscated via the same method used by the
 | 
			
		||||
  # switch's web UI login process
 | 
			
		||||
  echo "$1" | awk '{
 | 
			
		||||
    encoded = "";
 | 
			
		||||
    password = $1;
 | 
			
		||||
    allowed = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
 | 
			
		||||
    len = length($1);
 | 
			
		||||
    pwi = length($1);
 | 
			
		||||
 | 
			
		||||
    for (i=1; i <= (321 - pwi); i++)
 | 
			
		||||
    {
 | 
			
		||||
      if (0 == i % 5 && pwi > 0)
 | 
			
		||||
      {
 | 
			
		||||
        encoded = (encoded)(substr(password, pwi--, 1));
 | 
			
		||||
      }
 | 
			
		||||
      else if (i == 123)
 | 
			
		||||
      {
 | 
			
		||||
        if (len < 10)
 | 
			
		||||
        {
 | 
			
		||||
          encoded = (encoded)(0);
 | 
			
		||||
        }
 | 
			
		||||
        else
 | 
			
		||||
        {
 | 
			
		||||
          encoded = (encoded)(int(len / 10));
 | 
			
		||||
        }
 | 
			
		||||
      }
 | 
			
		||||
      else if (i == 289)
 | 
			
		||||
      {
 | 
			
		||||
        encoded = (encoded)(len % 10)
 | 
			
		||||
      }
 | 
			
		||||
      else
 | 
			
		||||
      {
 | 
			
		||||
        encoded = (encoded)(substr(allowed, int(rand() * length(allowed)), 1))
 | 
			
		||||
      }
 | 
			
		||||
    }
 | 
			
		||||
    printf("%s", encoded);
 | 
			
		||||
  }'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# html label
 | 
			
		||||
_zyxel_html_table_lookup() {
 | 
			
		||||
  # Look up a value in the html representing the status page of the switch
 | 
			
		||||
  # when provided with the html of the page and the label (i.e. "Model Name:")
 | 
			
		||||
  html="$1"
 | 
			
		||||
  label=$(printf "%s" "$2" | tr -d ' ')
 | 
			
		||||
  lookup_result=$(printf "%s" "$html" | tr -d "\t\r\n\v\f" | sed 's/<tr>/\n<tr>/g' | sed 's/<td[^>]*>/<td>/g' | tr -d ' ' | grep -i "$label" | sed "s/<tr><td>$label<\/td><td>\([^<]\{1,\}\)<\/td><\/tr>/\1/i")
 | 
			
		||||
  printf "%s" "$lookup_result"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# html
 | 
			
		||||
_zyxel_gs1900_get_model() {
 | 
			
		||||
  html="$1"
 | 
			
		||||
  model_name=$(_zyxel_html_table_lookup "$html" "Model Name:")
 | 
			
		||||
  printf "%s" "$model_name"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# html
 | 
			
		||||
_zyxel_gs1900_get_firmware_version() {
 | 
			
		||||
  html="$1"
 | 
			
		||||
  firmware_version=$(_zyxel_html_table_lookup "$html" "Firmware Version:" | _egrep_o "V[^.]+.[^(]+")
 | 
			
		||||
  printf "%s" "$firmware_version"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# version_number
 | 
			
		||||
_zyxel_gs1900_parse_major_version() {
 | 
			
		||||
  printf "%s" "$1" | sed 's/^V\([0-9]\{1,\}\).\{1,\}$/\1/gi'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# version_number
 | 
			
		||||
_zyxel_gs1900_parse_minor_version() {
 | 
			
		||||
  printf "%s" "$1" | sed 's/^.\{1,\}\.\([0-9]\{1,\}\)$/\1/gi'
 | 
			
		||||
}
 | 
			
		||||
@@ -128,7 +128,7 @@ _1984hosting_login() {
 | 
			
		||||
 | 
			
		||||
  _get "https://1984.hosting/accounts/login/" | grep "csrfmiddlewaretoken"
 | 
			
		||||
  csrftoken="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'csrftoken=[^;]*;' | tr -d ';')"
 | 
			
		||||
  sessionid="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'sessionid=[^;]*;' | tr -d ';')"
 | 
			
		||||
  sessionid="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'cookie1984nammnamm=[^;]*;' | tr -d ';')"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$csrftoken" ] || [ -z "$sessionid" ]; then
 | 
			
		||||
    _err "One or more cookies are empty: '$csrftoken', '$sessionid'."
 | 
			
		||||
@@ -145,7 +145,7 @@ _1984hosting_login() {
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
 | 
			
		||||
  if _contains "$response" '"loggedin": true'; then
 | 
			
		||||
    One984HOSTING_SESSIONID_COOKIE="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'sessionid=[^;]*;' | tr -d ';')"
 | 
			
		||||
    One984HOSTING_SESSIONID_COOKIE="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'cookie1984nammnamm=[^;]*;' | tr -d ';')"
 | 
			
		||||
    One984HOSTING_CSRFTOKEN_COOKIE="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'csrftoken=[^;]*;' | tr -d ';')"
 | 
			
		||||
    export One984HOSTING_SESSIONID_COOKIE
 | 
			
		||||
    export One984HOSTING_CSRFTOKEN_COOKIE
 | 
			
		||||
 
 | 
			
		||||
@@ -1,17 +1,17 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_active24_info='Active24.com
 | 
			
		||||
Site: Active24.com
 | 
			
		||||
dns_active24_info='Active24.cz
 | 
			
		||||
Site: Active24.cz
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi#dns_active24
 | 
			
		||||
Options:
 | 
			
		||||
 ACTIVE24_Token API Token
 | 
			
		||||
 Active24_ApiKey API Key. Called "Identifier" in the Active24 Admin
 | 
			
		||||
 Active24_ApiSecret API Secret. Called "Secret key" in the Active24 Admin
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2059
 | 
			
		||||
Author: Milan Pála
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
ACTIVE24_Api="https://api.active24.com"
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
Active24_Api="https://rest.active24.cz"
 | 
			
		||||
# export Active24_ApiKey=ak48l3h7-ak5d-qn4t-p8gc-b6fs8c3l
 | 
			
		||||
# export Active24_ApiSecret=ajvkeo3y82ndsu2smvxy3o36496dcascksldncsq
 | 
			
		||||
 | 
			
		||||
# Usage: add  _acme-challenge.www.domain.com   "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
# Used to add txt record
 | 
			
		||||
@@ -22,8 +22,8 @@ dns_active24_add() {
 | 
			
		||||
  _active24_init
 | 
			
		||||
 | 
			
		||||
  _info "Adding txt record"
 | 
			
		||||
  if _active24_rest POST "dns/$_domain/txt/v1" "{\"name\":\"$_sub_domain\",\"text\":\"$txtvalue\",\"ttl\":0}"; then
 | 
			
		||||
    if _contains "$response" "errors"; then
 | 
			
		||||
  if _active24_rest POST "/v2/service/$_service_id/dns/record" "{\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"content\":\"$txtvalue\",\"ttl\":300}"; then
 | 
			
		||||
    if _contains "$response" "error"; then
 | 
			
		||||
      _err "Add txt record error."
 | 
			
		||||
      return 1
 | 
			
		||||
    else
 | 
			
		||||
@@ -31,6 +31,7 @@ dns_active24_add() {
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _err "Add txt record error."
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
@@ -44,19 +45,25 @@ dns_active24_rm() {
 | 
			
		||||
  _active24_init
 | 
			
		||||
 | 
			
		||||
  _debug "Getting txt records"
 | 
			
		||||
  _active24_rest GET "dns/$_domain/records/v1"
 | 
			
		||||
  # The API needs to send data in body in order the filter to work
 | 
			
		||||
  # TODO: web can also add content $txtvalue to filter and then get the id from response
 | 
			
		||||
  _active24_rest GET "/v2/service/$_service_id/dns/record" "{\"page\":1,\"descending\":true,\"sortBy\":\"name\",\"rowsPerPage\":100,\"totalRecords\":0,\"filters\":{\"type\":[\"TXT\"],\"name\":\"${_sub_domain}\"}}"
 | 
			
		||||
  #_active24_rest GET "/v2/service/$_service_id/dns/record?rowsPerPage=100"
 | 
			
		||||
 | 
			
		||||
  if _contains "$response" "errors"; then
 | 
			
		||||
  if _contains "$response" "error"; then
 | 
			
		||||
    _err "Error"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  hash_ids=$(echo "$response" | _egrep_o "[^{]+${txtvalue}[^}]+" | _egrep_o "hashId\":\"[^\"]+" | cut -c10-)
 | 
			
		||||
  # Note: it might never be more than one record actually, NEEDS more INVESTIGATION
 | 
			
		||||
  record_ids=$(printf "%s" "$response" | _egrep_o "[^{]+${txtvalue}[^}]+" | _egrep_o '"id" *: *[^,]+' | cut -d ':' -f 2)
 | 
			
		||||
  _debug2 record_ids "$record_ids"
 | 
			
		||||
 | 
			
		||||
  for hash_id in $hash_ids; do
 | 
			
		||||
    _debug "Removing hash_id" "$hash_id"
 | 
			
		||||
    if _active24_rest DELETE "dns/$_domain/$hash_id/v1" ""; then
 | 
			
		||||
      if _contains "$response" "errors"; then
 | 
			
		||||
  for redord_id in $record_ids; do
 | 
			
		||||
    _debug "Removing record_id" "$redord_id"
 | 
			
		||||
    _debug "txtvalue" "$txtvalue"
 | 
			
		||||
    if _active24_rest DELETE "/v2/service/$_service_id/dns/record/$redord_id" ""; then
 | 
			
		||||
      if _contains "$response" "error"; then
 | 
			
		||||
        _err "Unable to remove txt record."
 | 
			
		||||
        return 1
 | 
			
		||||
      else
 | 
			
		||||
@@ -70,23 +77,17 @@ dns_active24_rm() {
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below ##################################
 | 
			
		||||
#_acme-challenge.www.domain.com
 | 
			
		||||
#returns
 | 
			
		||||
# _sub_domain=_acme-challenge.www
 | 
			
		||||
# _domain=domain.com
 | 
			
		||||
# _domain_id=sdjkglgdfewsdfg
 | 
			
		||||
_get_root() {
 | 
			
		||||
  domain=$1
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  if ! _active24_rest GET "dns/domains/v1"; then
 | 
			
		||||
  if ! _active24_rest GET "/v1/user/self/service"; then
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug "h" "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -94,7 +95,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "\"$h\"" >/dev/null; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
@@ -104,21 +105,98 @@ _get_root() {
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_active24_rest() {
 | 
			
		||||
  m=$1
 | 
			
		||||
  ep="$2"
 | 
			
		||||
  data="$3"
 | 
			
		||||
  _debug "$ep"
 | 
			
		||||
_active24_init() {
 | 
			
		||||
  Active24_ApiKey="${Active24_ApiKey:-$(_readaccountconf_mutable Active24_ApiKey)}"
 | 
			
		||||
  Active24_ApiSecret="${Active24_ApiSecret:-$(_readaccountconf_mutable Active24_ApiSecret)}"
 | 
			
		||||
  #Active24_ServiceId="${Active24_ServiceId:-$(_readaccountconf_mutable Active24_ServiceId)}"
 | 
			
		||||
 | 
			
		||||
  export _H1="Authorization: Bearer $ACTIVE24_Token"
 | 
			
		||||
 | 
			
		||||
  if [ "$m" != "GET" ]; then
 | 
			
		||||
    _debug "data" "$data"
 | 
			
		||||
    response="$(_post "$data" "$ACTIVE24_Api/$ep" "" "$m" "application/json")"
 | 
			
		||||
  else
 | 
			
		||||
    response="$(_get "$ACTIVE24_Api/$ep")"
 | 
			
		||||
  if [ -z "$Active24_ApiKey" ] || [ -z "$Active24_ApiSecret" ]; then
 | 
			
		||||
    Active24_ApiKey=""
 | 
			
		||||
    Active24_ApiSecret=""
 | 
			
		||||
    _err "You don't specify Active24 api key and ApiSecret yet."
 | 
			
		||||
    _err "Please create your key and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the credentials to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable Active24_ApiKey "$Active24_ApiKey"
 | 
			
		||||
  _saveaccountconf_mutable Active24_ApiSecret "$Active24_ApiSecret"
 | 
			
		||||
 | 
			
		||||
  _debug "A24 API CHECK"
 | 
			
		||||
  if ! _active24_rest GET "/v2/check"; then
 | 
			
		||||
    _err "A24 API check failed with: $response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! echo "$response" | tr -d " " | grep \"verified\":true >/dev/null; then
 | 
			
		||||
    _err "A24 API check failed with: $response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug "First detect the root zone"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
    _err "invalid domain"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug _sub_domain "$_sub_domain"
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
  _active24_get_service_id "$_domain"
 | 
			
		||||
  _debug _service_id "$_service_id"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_active24_get_service_id() {
 | 
			
		||||
  _d=$1
 | 
			
		||||
  if ! _active24_rest GET "/v1/user/self/zone/${_d}"; then
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    response=$(echo "$response" | _json_decode)
 | 
			
		||||
    _service_id=$(echo "$response" | _egrep_o '"id" *: *[^,]+' | cut -d ':' -f 2)
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_active24_rest() {
 | 
			
		||||
  m=$1
 | 
			
		||||
  ep_qs=$2 # with query string
 | 
			
		||||
  # ep=$2
 | 
			
		||||
  ep=$(printf "%s" "$ep_qs" | cut -d '?' -f1) # no query string
 | 
			
		||||
  data="$3"
 | 
			
		||||
 | 
			
		||||
  _debug "A24 $ep"
 | 
			
		||||
  _debug "A24 $Active24_ApiKey"
 | 
			
		||||
  _debug "A24 $Active24_ApiSecret"
 | 
			
		||||
 | 
			
		||||
  timestamp=$(_time)
 | 
			
		||||
  datez=$(date -u +"%Y%m%dT%H%M%SZ")
 | 
			
		||||
  canonicalRequest="${m} ${ep} ${timestamp}"
 | 
			
		||||
  signature=$(printf "%s" "$canonicalRequest" | _hmac sha1 "$(printf "%s" "$Active24_ApiSecret" | _hex_dump | tr -d " ")" hex)
 | 
			
		||||
  authorization64="$(printf "%s:%s" "$Active24_ApiKey" "$signature" | _base64)"
 | 
			
		||||
 | 
			
		||||
  export _H1="Date: ${datez}"
 | 
			
		||||
  export _H2="Accept: application/json"
 | 
			
		||||
  export _H3="Content-Type: application/json"
 | 
			
		||||
  export _H4="Authorization: Basic ${authorization64}"
 | 
			
		||||
 | 
			
		||||
  _debug2 H1 "$_H1"
 | 
			
		||||
  _debug2 H2 "$_H2"
 | 
			
		||||
  _debug2 H3 "$_H3"
 | 
			
		||||
  _debug2 H4 "$_H4"
 | 
			
		||||
 | 
			
		||||
  # _sleep 1
 | 
			
		||||
 | 
			
		||||
  if [ "$m" != "GET" ]; then
 | 
			
		||||
    _debug2 "${m} $Active24_Api${ep_qs}"
 | 
			
		||||
    _debug "data" "$data"
 | 
			
		||||
    response="$(_post "$data" "$Active24_Api${ep_qs}" "" "$m" "application/json")"
 | 
			
		||||
  else
 | 
			
		||||
    if [ -z "$data" ]; then
 | 
			
		||||
      _debug2 "GET $Active24_Api${ep_qs}"
 | 
			
		||||
      response="$(_get "$Active24_Api${ep_qs}")"
 | 
			
		||||
    else
 | 
			
		||||
      _debug2 "GET $Active24_Api${ep_qs} with data: ${data}"
 | 
			
		||||
      response="$(_post "$data" "$Active24_Api${ep_qs}" "" "$m" "application/json")"
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
  if [ "$?" != "0" ]; then
 | 
			
		||||
    _err "error $ep"
 | 
			
		||||
    return 1
 | 
			
		||||
@@ -126,23 +204,3 @@ _active24_rest() {
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_active24_init() {
 | 
			
		||||
  ACTIVE24_Token="${ACTIVE24_Token:-$(_readaccountconf_mutable ACTIVE24_Token)}"
 | 
			
		||||
  if [ -z "$ACTIVE24_Token" ]; then
 | 
			
		||||
    ACTIVE24_Token=""
 | 
			
		||||
    _err "You didn't specify a Active24 api token yet."
 | 
			
		||||
    _err "Please create the token and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _saveaccountconf_mutable ACTIVE24_Token "$ACTIVE24_Token"
 | 
			
		||||
 | 
			
		||||
  _debug "First detect the root zone"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
    _err "invalid domain"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _debug _sub_domain "$_sub_domain"
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -95,7 +95,7 @@ _get_root() {
 | 
			
		||||
  if _ad_rest GET "domain/"; then
 | 
			
		||||
    response="$(echo "$response" | tr -d "\n" | sed 's/{/\n&/g')"
 | 
			
		||||
    while true; do
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
      _debug h "$h"
 | 
			
		||||
      if [ -z "$h" ]; then
 | 
			
		||||
        #not valid
 | 
			
		||||
@@ -106,7 +106,7 @@ _get_root() {
 | 
			
		||||
      if [ "$hostedzone" ]; then
 | 
			
		||||
        _domain_id=$(printf "%s\n" "$hostedzone" | _egrep_o "\"id\":\s*[0-9]+" | _head_n 1 | cut -d : -f 2 | tr -d \ )
 | 
			
		||||
        if [ "$_domain_id" ]; then
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
          _domain=$h
 | 
			
		||||
          return 0
 | 
			
		||||
        fi
 | 
			
		||||
 
 | 
			
		||||
@@ -9,25 +9,19 @@ Options:
 | 
			
		||||
 Ali_Secret API Secret
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
Ali_API="https://alidns.aliyuncs.com/"
 | 
			
		||||
# NOTICE:
 | 
			
		||||
# This file is referenced by Alibaba Cloud Services deploy hooks
 | 
			
		||||
# https://github.com/acmesh-official/acme.sh/pull/5205#issuecomment-2357867276
 | 
			
		||||
# Be careful when modifying this file, especially when making breaking changes for common functions
 | 
			
		||||
 | 
			
		||||
Ali_DNS_API="https://alidns.aliyuncs.com/"
 | 
			
		||||
 | 
			
		||||
#Usage: dns_ali_add   _acme-challenge.www.domain.com   "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
dns_ali_add() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
 | 
			
		||||
  Ali_Key="${Ali_Key:-$(_readaccountconf_mutable Ali_Key)}"
 | 
			
		||||
  Ali_Secret="${Ali_Secret:-$(_readaccountconf_mutable Ali_Secret)}"
 | 
			
		||||
  if [ -z "$Ali_Key" ] || [ -z "$Ali_Secret" ]; then
 | 
			
		||||
    Ali_Key=""
 | 
			
		||||
    Ali_Secret=""
 | 
			
		||||
    _err "You don't specify aliyun api key and secret yet."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the api key and secret to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable Ali_Key "$Ali_Key"
 | 
			
		||||
  _saveaccountconf_mutable Ali_Secret "$Ali_Secret"
 | 
			
		||||
  _prepare_ali_credentials || return 1
 | 
			
		||||
 | 
			
		||||
  _debug "First detect the root zone"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
@@ -52,14 +46,74 @@ dns_ali_rm() {
 | 
			
		||||
  _clean
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below ##################################
 | 
			
		||||
####################  Alibaba Cloud common functions below  ####################
 | 
			
		||||
 | 
			
		||||
_prepare_ali_credentials() {
 | 
			
		||||
  Ali_Key="${Ali_Key:-$(_readaccountconf_mutable Ali_Key)}"
 | 
			
		||||
  Ali_Secret="${Ali_Secret:-$(_readaccountconf_mutable Ali_Secret)}"
 | 
			
		||||
  if [ -z "$Ali_Key" ] || [ -z "$Ali_Secret" ]; then
 | 
			
		||||
    Ali_Key=""
 | 
			
		||||
    Ali_Secret=""
 | 
			
		||||
    _err "You don't specify aliyun api key and secret yet."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the api key and secret to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable Ali_Key "$Ali_Key"
 | 
			
		||||
  _saveaccountconf_mutable Ali_Secret "$Ali_Secret"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# act ign mtd
 | 
			
		||||
_ali_rest() {
 | 
			
		||||
  act="$1"
 | 
			
		||||
  ign="$2"
 | 
			
		||||
  mtd="${3:-GET}"
 | 
			
		||||
 | 
			
		||||
  signature=$(printf "%s" "$mtd&%2F&$(printf "%s" "$query" | _url_encode upper-hex)" | _hmac "sha1" "$(printf "%s" "$Ali_Secret&" | _hex_dump | tr -d " ")" | _base64)
 | 
			
		||||
  signature=$(printf "%s" "$signature" | _url_encode upper-hex)
 | 
			
		||||
  url="$endpoint?Signature=$signature"
 | 
			
		||||
 | 
			
		||||
  if [ "$mtd" = "GET" ]; then
 | 
			
		||||
    url="$url&$query"
 | 
			
		||||
    response="$(_get "$url")"
 | 
			
		||||
  else
 | 
			
		||||
    response="$(_post "$query" "$url" "" "$mtd" "application/x-www-form-urlencoded")"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _ret="$?"
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  if [ "$_ret" != "0" ]; then
 | 
			
		||||
    _err "Error <$act>"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$ign" ]; then
 | 
			
		||||
    message="$(echo "$response" | _egrep_o "\"Message\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \")"
 | 
			
		||||
    if [ "$message" ]; then
 | 
			
		||||
      _err "$message"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_ali_nonce() {
 | 
			
		||||
  #_head_n 1 </dev/urandom | _digest "sha256" hex | cut -c 1-31
 | 
			
		||||
  #Not so good...
 | 
			
		||||
  date +"%s%N" | sed 's/%N//g'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_timestamp() {
 | 
			
		||||
  date -u +"%Y-%m-%dT%H%%3A%M%%3A%SZ"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below  ####################
 | 
			
		||||
 | 
			
		||||
_get_root() {
 | 
			
		||||
  domain=$1
 | 
			
		||||
  i=2
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -71,7 +125,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "PageNumber"; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _debug _sub_domain "$_sub_domain"
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      _debug _domain "$_domain"
 | 
			
		||||
@@ -83,52 +137,10 @@ _get_root() {
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_ali_rest() {
 | 
			
		||||
  signature=$(printf "%s" "GET&%2F&$(_ali_urlencode "$query")" | _hmac "sha1" "$(printf "%s" "$Ali_Secret&" | _hex_dump | tr -d " ")" | _base64)
 | 
			
		||||
  signature=$(_ali_urlencode "$signature")
 | 
			
		||||
  url="$Ali_API?$query&Signature=$signature"
 | 
			
		||||
 | 
			
		||||
  if ! response="$(_get "$url")"; then
 | 
			
		||||
    _err "Error <$1>"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  if [ -z "$2" ]; then
 | 
			
		||||
    message="$(echo "$response" | _egrep_o "\"Message\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \")"
 | 
			
		||||
    if [ "$message" ]; then
 | 
			
		||||
      _err "$message"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_ali_urlencode() {
 | 
			
		||||
  _str="$1"
 | 
			
		||||
  _str_len=${#_str}
 | 
			
		||||
  _u_i=1
 | 
			
		||||
  while [ "$_u_i" -le "$_str_len" ]; do
 | 
			
		||||
    _str_c="$(printf "%s" "$_str" | cut -c "$_u_i")"
 | 
			
		||||
    case $_str_c in [a-zA-Z0-9.~_-])
 | 
			
		||||
      printf "%s" "$_str_c"
 | 
			
		||||
      ;;
 | 
			
		||||
    *)
 | 
			
		||||
      printf "%%%02X" "'$_str_c"
 | 
			
		||||
      ;;
 | 
			
		||||
    esac
 | 
			
		||||
    _u_i="$(_math "$_u_i" + 1)"
 | 
			
		||||
  done
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_ali_nonce() {
 | 
			
		||||
  #_head_n 1 </dev/urandom | _digest "sha256" hex | cut -c 1-31
 | 
			
		||||
  #Not so good...
 | 
			
		||||
  date +"%s%N" | sed 's/%N//g'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_check_exist_query() {
 | 
			
		||||
  _qdomain="$1"
 | 
			
		||||
  _qsubdomain="$2"
 | 
			
		||||
  endpoint=$Ali_DNS_API
 | 
			
		||||
  query=''
 | 
			
		||||
  query=$query'AccessKeyId='$Ali_Key
 | 
			
		||||
  query=$query'&Action=DescribeDomainRecords'
 | 
			
		||||
@@ -144,6 +156,7 @@ _check_exist_query() {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_add_record_query() {
 | 
			
		||||
  endpoint=$Ali_DNS_API
 | 
			
		||||
  query=''
 | 
			
		||||
  query=$query'AccessKeyId='$Ali_Key
 | 
			
		||||
  query=$query'&Action=AddDomainRecord'
 | 
			
		||||
@@ -160,6 +173,7 @@ _add_record_query() {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_delete_record_query() {
 | 
			
		||||
  endpoint=$Ali_DNS_API
 | 
			
		||||
  query=''
 | 
			
		||||
  query=$query'AccessKeyId='$Ali_Key
 | 
			
		||||
  query=$query'&Action=DeleteDomainRecord'
 | 
			
		||||
@@ -173,6 +187,7 @@ _delete_record_query() {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_describe_records_query() {
 | 
			
		||||
  endpoint=$Ali_DNS_API
 | 
			
		||||
  query=''
 | 
			
		||||
  query=$query'AccessKeyId='$Ali_Key
 | 
			
		||||
  query=$query'&Action=DescribeDomainRecords'
 | 
			
		||||
@@ -203,7 +218,3 @@ _clean() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_timestamp() {
 | 
			
		||||
  date -u +"%Y-%m-%dT%H%%3A%M%%3A%SZ"
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -1,11 +1,12 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# Alviy domain api
 | 
			
		||||
#
 | 
			
		||||
# Get API key and secret from https://cloud.alviy.com/token
 | 
			
		||||
#
 | 
			
		||||
# Alviy_token="some-secret-key"
 | 
			
		||||
#
 | 
			
		||||
# Ex.: acme.sh --issue --staging --dns dns_alviy -d "*.s.example.com" -d "s.example.com"
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_alviy_info='Alviy.com
 | 
			
		||||
Site: Alviy.com
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_alviy
 | 
			
		||||
Options:
 | 
			
		||||
 Alviy_token API token. Get it from the https://cloud.alviy.com/token
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/5115
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
Alviy_Api="https://cloud.alviy.com/api/v1"
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -131,7 +131,7 @@ _get_root() {
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -140,7 +140,7 @@ _get_root() {
 | 
			
		||||
 | 
			
		||||
    _anx_rest GET "zone.json/${h}"
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\""; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -107,7 +107,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -120,7 +120,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"domain\":\"$h\""; then
 | 
			
		||||
      _domain_id=$(echo "$response" | cut -d : -f 3 | cut -d , -f 1 | tr -d \")
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -117,7 +117,7 @@ _get_root() {
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -132,7 +132,7 @@ _get_root() {
 | 
			
		||||
      _domain_id=$(echo "$response" | _normalizeJson | tr -d "{}" | tr "," "\n" | grep "\"id\": *\"" | cut -d : -f 2 | tr -d \" | _head_n 1 | tr -d " ")
 | 
			
		||||
      _debug _domain_id "$_domain_id"
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -110,7 +110,7 @@ _get_autodns_zone() {
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
@@ -128,7 +128,7 @@ _get_autodns_zone() {
 | 
			
		||||
    if _contains "$autodns_response" "<summary>1</summary>" >/dev/null; then
 | 
			
		||||
      _zone="$(echo "$autodns_response" | _egrep_o '<name>[^<]*</name>' | cut -d '>' -f 2 | cut -d '<' -f 1)"
 | 
			
		||||
      _system_ns="$(echo "$autodns_response" | _egrep_o '<system_ns>[^<]*</system_ns>' | cut -d '>' -f 2 | cut -d '<' -f 1)"
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -158,7 +158,7 @@ _get_root() {
 | 
			
		||||
 | 
			
		||||
  # iterate over names (a.b.c.d -> b.c.d -> c.d -> d)
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100 | sed 's/\./\\./g')
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100 | sed 's/\./\\./g')
 | 
			
		||||
    _debug "Checking domain: $h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      _error "invalid domain"
 | 
			
		||||
@@ -174,7 +174,7 @@ _get_root() {
 | 
			
		||||
        if [ "$hostedzone" ]; then
 | 
			
		||||
          _domain_id=$(printf "%s\n" "$hostedzone" | _egrep_o "<Id>.*<.Id>" | head -n 1 | _egrep_o ">.*<" | tr -d "<>")
 | 
			
		||||
          if [ "$_domain_id" ]; then
 | 
			
		||||
            _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
            _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
            _domain=$h
 | 
			
		||||
            return 0
 | 
			
		||||
          fi
 | 
			
		||||
 
 | 
			
		||||
@@ -100,7 +100,7 @@ _get_root() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      # not valid
 | 
			
		||||
@@ -111,7 +111,7 @@ _get_root() {
 | 
			
		||||
      _domain_id=$(echo "$response" | tr '{' "\n" | grep "\"domain\":\"$h\"" | _egrep_o "\"id\":[0-9]*" | _head_n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      _debug _domain_id "$_domain_id"
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -9,14 +9,17 @@ Options:
 | 
			
		||||
 AZUREDNS_APPID App ID. App ID of the service principal
 | 
			
		||||
 AZUREDNS_CLIENTSECRET Client Secret. Secret from creating the service principal
 | 
			
		||||
 AZUREDNS_MANAGEDIDENTITY Use Managed Identity. Use Managed Identity assigned to a resource instead of a service principal. "true"/"false"
 | 
			
		||||
 AZUREDNS_BEARERTOKEN Bearer Token. Used instead of service principal credentials or managed identity. Optional.
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
wiki=https://github.com/acmesh-official/acme.sh/wiki/How-to-use-Azure-DNS
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
# Usage: add  _acme-challenge.www.domain.com   "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
# Used to add txt record
 | 
			
		||||
#
 | 
			
		||||
# Ref: https://docs.microsoft.com/en-us/rest/api/dns/recordsets/createorupdate
 | 
			
		||||
# Ref: https://learn.microsoft.com/en-us/rest/api/dns/record-sets/create-or-update?view=rest-dns-2018-05-01&tabs=HTTP
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
dns_azure_add() {
 | 
			
		||||
@@ -29,6 +32,7 @@ dns_azure_add() {
 | 
			
		||||
    AZUREDNS_TENANTID=""
 | 
			
		||||
    AZUREDNS_APPID=""
 | 
			
		||||
    AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
    AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
    _err "You didn't specify the Azure Subscription ID"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
@@ -43,37 +47,45 @@ dns_azure_add() {
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_TENANTID ""
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_APPID ""
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_CLIENTSECRET ""
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_BEARERTOKEN ""
 | 
			
		||||
  else
 | 
			
		||||
    _info "You didn't ask to use Azure managed identity, checking service principal credentials"
 | 
			
		||||
    _info "You didn't ask to use Azure managed identity, checking service principal credentials or provided bearer token"
 | 
			
		||||
    AZUREDNS_TENANTID="${AZUREDNS_TENANTID:-$(_readaccountconf_mutable AZUREDNS_TENANTID)}"
 | 
			
		||||
    AZUREDNS_APPID="${AZUREDNS_APPID:-$(_readaccountconf_mutable AZUREDNS_APPID)}"
 | 
			
		||||
    AZUREDNS_CLIENTSECRET="${AZUREDNS_CLIENTSECRET:-$(_readaccountconf_mutable AZUREDNS_CLIENTSECRET)}"
 | 
			
		||||
    AZUREDNS_BEARERTOKEN="${AZUREDNS_BEARERTOKEN:-$(_readaccountconf_mutable AZUREDNS_BEARERTOKEN)}"
 | 
			
		||||
    if [ -z "$AZUREDNS_BEARERTOKEN" ]; then
 | 
			
		||||
      if [ -z "$AZUREDNS_TENANTID" ]; then
 | 
			
		||||
        AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
        AZUREDNS_TENANTID=""
 | 
			
		||||
        AZUREDNS_APPID=""
 | 
			
		||||
        AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
        AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
        _err "You didn't specify the Azure Tenant ID "
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
    if [ -z "$AZUREDNS_TENANTID" ]; then
 | 
			
		||||
      AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
      AZUREDNS_TENANTID=""
 | 
			
		||||
      AZUREDNS_APPID=""
 | 
			
		||||
      AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
      _err "You didn't specify the Azure Tenant ID "
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
      if [ -z "$AZUREDNS_APPID" ]; then
 | 
			
		||||
        AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
        AZUREDNS_TENANTID=""
 | 
			
		||||
        AZUREDNS_APPID=""
 | 
			
		||||
        AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
        AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
        _err "You didn't specify the Azure App ID"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
    if [ -z "$AZUREDNS_APPID" ]; then
 | 
			
		||||
      AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
      AZUREDNS_TENANTID=""
 | 
			
		||||
      AZUREDNS_APPID=""
 | 
			
		||||
      AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
      _err "You didn't specify the Azure App ID"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if [ -z "$AZUREDNS_CLIENTSECRET" ]; then
 | 
			
		||||
      AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
      AZUREDNS_TENANTID=""
 | 
			
		||||
      AZUREDNS_APPID=""
 | 
			
		||||
      AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
      _err "You didn't specify the Azure Client Secret"
 | 
			
		||||
      return 1
 | 
			
		||||
      if [ -z "$AZUREDNS_CLIENTSECRET" ]; then
 | 
			
		||||
        AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
        AZUREDNS_TENANTID=""
 | 
			
		||||
        AZUREDNS_APPID=""
 | 
			
		||||
        AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
        AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
        _err "You didn't specify the Azure Client Secret"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    else
 | 
			
		||||
      _info "Using provided bearer token"
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    #save account details to account conf file, don't opt in for azure manages identity check.
 | 
			
		||||
@@ -81,9 +93,14 @@ dns_azure_add() {
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_TENANTID "$AZUREDNS_TENANTID"
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_APPID "$AZUREDNS_APPID"
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_CLIENTSECRET "$AZUREDNS_CLIENTSECRET"
 | 
			
		||||
    _saveaccountconf_mutable AZUREDNS_BEARERTOKEN "$AZUREDNS_BEARERTOKEN"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  accesstoken=$(_azure_getaccess_token "$AZUREDNS_MANAGEDIDENTITY" "$AZUREDNS_TENANTID" "$AZUREDNS_APPID" "$AZUREDNS_CLIENTSECRET")
 | 
			
		||||
  if [ -z "$AZUREDNS_BEARERTOKEN" ]; then
 | 
			
		||||
    accesstoken=$(_azure_getaccess_token "$AZUREDNS_MANAGEDIDENTITY" "$AZUREDNS_TENANTID" "$AZUREDNS_APPID" "$AZUREDNS_CLIENTSECRET")
 | 
			
		||||
  else
 | 
			
		||||
    accesstoken=$(echo "$AZUREDNS_BEARERTOKEN" | sed "s/Bearer //g")
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! _get_root "$fulldomain" "$AZUREDNS_SUBSCRIPTIONID" "$accesstoken"; then
 | 
			
		||||
    _err "invalid domain"
 | 
			
		||||
@@ -133,7 +150,7 @@ dns_azure_add() {
 | 
			
		||||
# Usage: fulldomain txtvalue
 | 
			
		||||
# Used to remove the txt record after validation
 | 
			
		||||
#
 | 
			
		||||
# Ref: https://docs.microsoft.com/en-us/rest/api/dns/recordsets/delete
 | 
			
		||||
# Ref: https://learn.microsoft.com/en-us/rest/api/dns/record-sets/delete?view=rest-dns-2018-05-01&tabs=HTTP
 | 
			
		||||
#
 | 
			
		||||
dns_azure_rm() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
@@ -145,6 +162,7 @@ dns_azure_rm() {
 | 
			
		||||
    AZUREDNS_TENANTID=""
 | 
			
		||||
    AZUREDNS_APPID=""
 | 
			
		||||
    AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
    AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
    _err "You didn't specify the Azure Subscription ID "
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
@@ -153,40 +171,51 @@ dns_azure_rm() {
 | 
			
		||||
  if [ "$AZUREDNS_MANAGEDIDENTITY" = true ]; then
 | 
			
		||||
    _info "Using Azure managed identity"
 | 
			
		||||
  else
 | 
			
		||||
    _info "You didn't ask to use Azure managed identity, checking service principal credentials"
 | 
			
		||||
    _info "You didn't ask to use Azure managed identity, checking service principal credentials or provided bearer token"
 | 
			
		||||
    AZUREDNS_TENANTID="${AZUREDNS_TENANTID:-$(_readaccountconf_mutable AZUREDNS_TENANTID)}"
 | 
			
		||||
    AZUREDNS_APPID="${AZUREDNS_APPID:-$(_readaccountconf_mutable AZUREDNS_APPID)}"
 | 
			
		||||
    AZUREDNS_CLIENTSECRET="${AZUREDNS_CLIENTSECRET:-$(_readaccountconf_mutable AZUREDNS_CLIENTSECRET)}"
 | 
			
		||||
    AZUREDNS_BEARERTOKEN="${AZUREDNS_BEARERTOKEN:-$(_readaccountconf_mutable AZUREDNS_BEARERTOKEN)}"
 | 
			
		||||
    if [ -z "$AZUREDNS_BEARERTOKEN" ]; then
 | 
			
		||||
      if [ -z "$AZUREDNS_TENANTID" ]; then
 | 
			
		||||
        AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
        AZUREDNS_TENANTID=""
 | 
			
		||||
        AZUREDNS_APPID=""
 | 
			
		||||
        AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
        AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
        _err "You didn't specify the Azure Tenant ID "
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
    if [ -z "$AZUREDNS_TENANTID" ]; then
 | 
			
		||||
      AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
      AZUREDNS_TENANTID=""
 | 
			
		||||
      AZUREDNS_APPID=""
 | 
			
		||||
      AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
      _err "You didn't specify the Azure Tenant ID "
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
      if [ -z "$AZUREDNS_APPID" ]; then
 | 
			
		||||
        AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
        AZUREDNS_TENANTID=""
 | 
			
		||||
        AZUREDNS_APPID=""
 | 
			
		||||
        AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
        AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
        _err "You didn't specify the Azure App ID"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
    if [ -z "$AZUREDNS_APPID" ]; then
 | 
			
		||||
      AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
      AZUREDNS_TENANTID=""
 | 
			
		||||
      AZUREDNS_APPID=""
 | 
			
		||||
      AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
      _err "You didn't specify the Azure App ID"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if [ -z "$AZUREDNS_CLIENTSECRET" ]; then
 | 
			
		||||
      AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
      AZUREDNS_TENANTID=""
 | 
			
		||||
      AZUREDNS_APPID=""
 | 
			
		||||
      AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
      _err "You didn't specify the Azure Client Secret"
 | 
			
		||||
      return 1
 | 
			
		||||
      if [ -z "$AZUREDNS_CLIENTSECRET" ]; then
 | 
			
		||||
        AZUREDNS_SUBSCRIPTIONID=""
 | 
			
		||||
        AZUREDNS_TENANTID=""
 | 
			
		||||
        AZUREDNS_APPID=""
 | 
			
		||||
        AZUREDNS_CLIENTSECRET=""
 | 
			
		||||
        AZUREDNS_BEARERTOKEN=""
 | 
			
		||||
        _err "You didn't specify the Azure Client Secret"
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
    else
 | 
			
		||||
      _info "Using provided bearer token"
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  accesstoken=$(_azure_getaccess_token "$AZUREDNS_MANAGEDIDENTITY" "$AZUREDNS_TENANTID" "$AZUREDNS_APPID" "$AZUREDNS_CLIENTSECRET")
 | 
			
		||||
  if [ -z "$AZUREDNS_BEARERTOKEN" ]; then
 | 
			
		||||
    accesstoken=$(_azure_getaccess_token "$AZUREDNS_MANAGEDIDENTITY" "$AZUREDNS_TENANTID" "$AZUREDNS_APPID" "$AZUREDNS_CLIENTSECRET")
 | 
			
		||||
  else
 | 
			
		||||
    accesstoken=$(echo "$AZUREDNS_BEARERTOKEN" | sed "s/Bearer //g")
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! _get_root "$fulldomain" "$AZUREDNS_SUBSCRIPTIONID" "$accesstoken"; then
 | 
			
		||||
    _err "invalid domain"
 | 
			
		||||
@@ -265,10 +294,10 @@ _azure_rest() {
 | 
			
		||||
    if [ "$_code" = "401" ]; then
 | 
			
		||||
      # we have an invalid access token set to expired
 | 
			
		||||
      _saveaccountconf_mutable AZUREDNS_TOKENVALIDTO "0"
 | 
			
		||||
      _err "access denied make sure your Azure settings are correct. See $WIKI"
 | 
			
		||||
      _err "Access denied. Invalid access token. Make sure your Azure settings are correct. See: $wiki"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    # See https://docs.microsoft.com/en-us/azure/architecture/best-practices/retry-service-specific#general-rest-and-retry-guidelines for retryable HTTP codes
 | 
			
		||||
    # See https://learn.microsoft.com/en-us/azure/architecture/best-practices/retry-service-specific#general-rest-and-retry-guidelines for retryable HTTP codes
 | 
			
		||||
    if [ "$_ret" != "0" ] || [ -z "$_code" ] || [ "$_code" = "408" ] || [ "$_code" = "500" ] || [ "$_code" = "503" ] || [ "$_code" = "504" ]; then
 | 
			
		||||
      _request_retry_times="$(_math "$_request_retry_times" + 1)"
 | 
			
		||||
      _info "REST call error $_code retrying $ep in $_request_retry_times s"
 | 
			
		||||
@@ -286,14 +315,14 @@ _azure_rest() {
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
## Ref: https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-protocols-oauth-service-to-service#request-an-access-token
 | 
			
		||||
## Ref: https://learn.microsoft.com/en-us/entra/identity-platform/v2-oauth2-client-creds-grant-flow#request-an-access-token
 | 
			
		||||
_azure_getaccess_token() {
 | 
			
		||||
  managedIdentity=$1
 | 
			
		||||
  tenantID=$2
 | 
			
		||||
  clientID=$3
 | 
			
		||||
  clientSecret=$4
 | 
			
		||||
 | 
			
		||||
  accesstoken="${AZUREDNS_BEARERTOKEN:-$(_readaccountconf_mutable AZUREDNS_BEARERTOKEN)}"
 | 
			
		||||
  accesstoken="${AZUREDNS_ACCESSTOKEN:-$(_readaccountconf_mutable AZUREDNS_ACCESSTOKEN)}"
 | 
			
		||||
  expires_on="${AZUREDNS_TOKENVALIDTO:-$(_readaccountconf_mutable AZUREDNS_TOKENVALIDTO)}"
 | 
			
		||||
 | 
			
		||||
  # can we reuse the bearer token?
 | 
			
		||||
@@ -310,9 +339,18 @@ _azure_getaccess_token() {
 | 
			
		||||
  _debug "getting new bearer token"
 | 
			
		||||
 | 
			
		||||
  if [ "$managedIdentity" = true ]; then
 | 
			
		||||
    # https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/how-to-use-vm-token#get-a-token-using-http
 | 
			
		||||
    export _H1="Metadata: true"
 | 
			
		||||
    response="$(_get http://169.254.169.254/metadata/identity/oauth2/token\?api-version=2018-02-01\&resource=https://management.azure.com/)"
 | 
			
		||||
    # https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/how-to-use-vm-token#get-a-token-using-http
 | 
			
		||||
    if [ -n "$IDENTITY_ENDPOINT" ]; then
 | 
			
		||||
      # Some Azure environments may set IDENTITY_ENDPOINT (formerly MSI_ENDPOINT) to have an alternative metadata endpoint
 | 
			
		||||
      url="$IDENTITY_ENDPOINT?api-version=2019-08-01&resource=https://management.azure.com/"
 | 
			
		||||
      headers="X-IDENTITY-HEADER: $IDENTITY_HEADER"
 | 
			
		||||
    else
 | 
			
		||||
      url="http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https://management.azure.com/"
 | 
			
		||||
      headers="Metadata: true"
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    export _H1="$headers"
 | 
			
		||||
    response="$(_get "$url")"
 | 
			
		||||
    response="$(echo "$response" | _normalizeJson)"
 | 
			
		||||
    accesstoken=$(echo "$response" | _egrep_o "\"access_token\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
    expires_on=$(echo "$response" | _egrep_o "\"expires_on\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
@@ -330,14 +368,14 @@ _azure_getaccess_token() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$accesstoken" ]; then
 | 
			
		||||
    _err "no acccess token received. Check your Azure settings see $WIKI"
 | 
			
		||||
    _err "No acccess token received. Check your Azure settings. See: $wiki"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  if [ "$_ret" != "0" ]; then
 | 
			
		||||
    _err "error $response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _saveaccountconf_mutable AZUREDNS_BEARERTOKEN "$accesstoken"
 | 
			
		||||
  _saveaccountconf_mutable AZUREDNS_ACCESSTOKEN "$accesstoken"
 | 
			
		||||
  _saveaccountconf_mutable AZUREDNS_TOKENVALIDTO "$expires_on"
 | 
			
		||||
  printf "%s" "$accesstoken"
 | 
			
		||||
  return 0
 | 
			
		||||
@@ -350,15 +388,18 @@ _get_root() {
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  ## Ref: https://docs.microsoft.com/en-us/rest/api/dns/zones/list
 | 
			
		||||
  ## returns up to 100 zones in one response therefore handling more results is not not implemented
 | 
			
		||||
  ## (ZoneListResult with  continuation token for the next page of results)
 | 
			
		||||
  ## Per https://docs.microsoft.com/en-us/azure/azure-subscription-service-limits#dns-limits you are limited to 100 Zone/subscriptions anyways
 | 
			
		||||
  ## Ref: https://learn.microsoft.com/en-us/rest/api/dns/zones/list?view=rest-dns-2018-05-01&tabs=HTTP
 | 
			
		||||
  ## returns up to 100 zones in one response. Handling more results is not implemented
 | 
			
		||||
  ## (ZoneListResult with continuation token for the next page of results)
 | 
			
		||||
  ##
 | 
			
		||||
  ## TODO: handle more than 100 results, as per:
 | 
			
		||||
  ## https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-dns-limits
 | 
			
		||||
  ## The new limit is 250 Public DNS zones per subscription, while the old limit was only 100
 | 
			
		||||
  ##
 | 
			
		||||
  _azure_rest GET "https://management.azure.com/subscriptions/$subscriptionId/providers/Microsoft.Network/dnszones?\$top=500&api-version=2017-09-01" "" "$accesstoken"
 | 
			
		||||
  # Find matching domain name in Json response
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug2 "Checking domain: $h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -373,7 +414,7 @@ _get_root() {
 | 
			
		||||
          #create the record at the domain apex (@) if only the domain name was provided as --domain-alias
 | 
			
		||||
          _sub_domain="@"
 | 
			
		||||
        else
 | 
			
		||||
          _sub_domain=$(echo "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _sub_domain=$(echo "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        fi
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										281
									
								
								dnsapi/dns_beget.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										281
									
								
								dnsapi/dns_beget.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,281 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_beget_info='Beget.com
 | 
			
		||||
Site: Beget.com
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_beget
 | 
			
		||||
Options:
 | 
			
		||||
 BEGET_User API user
 | 
			
		||||
 BEGET_Password API password
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/6200
 | 
			
		||||
Author: ARNik <arnik@arnik.ru>
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
Beget_Api="https://api.beget.com/api"
 | 
			
		||||
 | 
			
		||||
####################  Public functions ####################
 | 
			
		||||
 | 
			
		||||
# Usage: add  _acme-challenge.www.domain.com   "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
# Used to add txt record
 | 
			
		||||
dns_beget_add() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
  _debug "dns_beget_add() $fulldomain $txtvalue"
 | 
			
		||||
  fulldomain=$(echo "$fulldomain" | _lower_case)
 | 
			
		||||
 | 
			
		||||
  Beget_Username="${Beget_Username:-$(_readaccountconf_mutable Beget_Username)}"
 | 
			
		||||
  Beget_Password="${Beget_Password:-$(_readaccountconf_mutable Beget_Password)}"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$Beget_Username" ] || [ -z "$Beget_Password" ]; then
 | 
			
		||||
    Beget_Username=""
 | 
			
		||||
    Beget_Password=""
 | 
			
		||||
    _err "You must export variables: Beget_Username, and Beget_Password"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the credentials to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable Beget_Username "$Beget_Username"
 | 
			
		||||
  _saveaccountconf_mutable Beget_Password "$Beget_Password"
 | 
			
		||||
 | 
			
		||||
  _info "Prepare subdomain."
 | 
			
		||||
  if ! _prepare_subdomain "$fulldomain"; then
 | 
			
		||||
    _err "Can't prepare subdomain."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Get domain records"
 | 
			
		||||
  data="{\"fqdn\":\"$fulldomain\"}"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/dns/getData" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't get domain records."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Add new TXT record"
 | 
			
		||||
  data="{\"fqdn\":\"$fulldomain\",\"records\":{"
 | 
			
		||||
  data=${data}$(_parce_records "$res" "A")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "AAAA")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "CAA")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "MX")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "SRV")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "TXT")
 | 
			
		||||
  data=$(echo "$data" | sed 's/,$//')
 | 
			
		||||
  data=${data}'}}'
 | 
			
		||||
 | 
			
		||||
  str=$(_txt_to_dns_json "$txtvalue")
 | 
			
		||||
  data=$(_add_record "$data" "TXT" "$str")
 | 
			
		||||
 | 
			
		||||
  res=$(_api_call "$Beget_Api/dns/changeRecords" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't change domain records."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage: fulldomain txtvalue
 | 
			
		||||
# Used to remove the txt record after validation
 | 
			
		||||
dns_beget_rm() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
  _debug "dns_beget_rm() $fulldomain $txtvalue"
 | 
			
		||||
  fulldomain=$(echo "$fulldomain" | _lower_case)
 | 
			
		||||
 | 
			
		||||
  Beget_Username="${Beget_Username:-$(_readaccountconf_mutable Beget_Username)}"
 | 
			
		||||
  Beget_Password="${Beget_Password:-$(_readaccountconf_mutable Beget_Password)}"
 | 
			
		||||
 | 
			
		||||
  _info "Get current domain records"
 | 
			
		||||
  data="{\"fqdn\":\"$fulldomain\"}"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/dns/getData" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't get domain records."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Remove TXT record"
 | 
			
		||||
  data="{\"fqdn\":\"$fulldomain\",\"records\":{"
 | 
			
		||||
  data=${data}$(_parce_records "$res" "A")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "AAAA")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "CAA")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "MX")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "SRV")
 | 
			
		||||
  data=${data}$(_parce_records "$res" "TXT")
 | 
			
		||||
  data=$(echo "$data" | sed 's/,$//')
 | 
			
		||||
  data=${data}'}}'
 | 
			
		||||
 | 
			
		||||
  str=$(_txt_to_dns_json "$txtvalue")
 | 
			
		||||
  data=$(_rm_record "$data" "$str")
 | 
			
		||||
 | 
			
		||||
  res=$(_api_call "$Beget_Api/dns/changeRecords" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't change domain records."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below ####################
 | 
			
		||||
 | 
			
		||||
# Create subdomain if needed
 | 
			
		||||
# Usage: _prepare_subdomain [fulldomain]
 | 
			
		||||
_prepare_subdomain() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
 | 
			
		||||
  _info "Detect the root zone"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
    _err "invalid domain"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _debug _domain_id "$_domain_id"
 | 
			
		||||
  _debug _sub_domain "$_sub_domain"
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$_sub_domain" ]; then
 | 
			
		||||
    _debug "$fulldomain is a root domain."
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Get subdomain list"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/domain/getSubdomainList")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't get subdomain list."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if _contains "$res" "\"fqdn\":\"$fulldomain\""; then
 | 
			
		||||
    _debug "Subdomain $fulldomain already exist."
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Subdomain $fulldomain does not exist. Let's create one."
 | 
			
		||||
  data="{\"subdomain\":\"$_sub_domain\",\"domain_id\":$_domain_id}"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/domain/addSubdomainVirtual" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't create subdomain."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug "Cleanup subdomen records"
 | 
			
		||||
  data="{\"fqdn\":\"$fulldomain\",\"records\":{}}"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/dns/changeRecords" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _debug "Can't cleanup $fulldomain records."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  data="{\"fqdn\":\"www.$fulldomain\",\"records\":{}}"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/dns/changeRecords" "$data")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _debug "Can't cleanup www.$fulldomain records."
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage: _get_root _acme-challenge.www.domain.com
 | 
			
		||||
#returns
 | 
			
		||||
# _sub_domain=_acme-challenge.www
 | 
			
		||||
# _domain=domain.com
 | 
			
		||||
# _domain_id=32436365
 | 
			
		||||
_get_root() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  _debug "Get domain list"
 | 
			
		||||
  res=$(_api_call "$Beget_Api/domain/getList")
 | 
			
		||||
  if ! _is_api_reply_ok "$res"; then
 | 
			
		||||
    _err "Can't get domain list."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$fulldomain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$res" "$h"; then
 | 
			
		||||
      _domain_id=$(echo "$res" | _egrep_o "\"id\":[0-9]*,\"fqdn\":\"$h\"" | cut -d , -f1 | cut -d : -f2)
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        if [ "$h" != "$fulldomain" ]; then
 | 
			
		||||
          _sub_domain=$(echo "$fulldomain" | cut -d . -f 1-"$p")
 | 
			
		||||
        else
 | 
			
		||||
          _sub_domain=""
 | 
			
		||||
        fi
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    p="$i"
 | 
			
		||||
    i=$(_math "$i" + 1)
 | 
			
		||||
  done
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Parce DNS records from json string
 | 
			
		||||
# Usage: _parce_records [j_str] [record_name]
 | 
			
		||||
_parce_records() {
 | 
			
		||||
  j_str=$1
 | 
			
		||||
  record_name=$2
 | 
			
		||||
  res="\"$record_name\":["
 | 
			
		||||
  res=${res}$(echo "$j_str" | _egrep_o "\"$record_name\":\[.*" | cut -d '[' -f2 | cut -d ']' -f1)
 | 
			
		||||
  res=${res}"],"
 | 
			
		||||
  echo "$res"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage: _add_record [data] [record_name] [record_data]
 | 
			
		||||
_add_record() {
 | 
			
		||||
  data=$1
 | 
			
		||||
  record_name=$2
 | 
			
		||||
  record_data=$3
 | 
			
		||||
  echo "$data" | sed "s/\"$record_name\":\[/\"$record_name\":\[$record_data,/" | sed "s/,\]/\]/"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage: _rm_record [data] [record_data]
 | 
			
		||||
_rm_record() {
 | 
			
		||||
  data=$1
 | 
			
		||||
  record_data=$2
 | 
			
		||||
  echo "$data" | sed "s/$record_data//g" | sed "s/,\+/,/g" |
 | 
			
		||||
    sed "s/{,/{/g" | sed "s/,}/}/g" |
 | 
			
		||||
    sed "s/\[,/\[/g" | sed "s/,\]/\]/g"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_txt_to_dns_json() {
 | 
			
		||||
  echo "{\"ttl\":600,\"txtdata\":\"$1\"}"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage: _api_call [api_url] [input_data]
 | 
			
		||||
_api_call() {
 | 
			
		||||
  api_url="$1"
 | 
			
		||||
  input_data="$2"
 | 
			
		||||
 | 
			
		||||
  _debug "_api_call $api_url"
 | 
			
		||||
  _debug "Request: $input_data"
 | 
			
		||||
 | 
			
		||||
  # res=$(curl -s -L -D ./http.header \
 | 
			
		||||
  # "$api_url" \
 | 
			
		||||
  # --data-urlencode login=$Beget_Username \
 | 
			
		||||
  # --data-urlencode passwd=$Beget_Password \
 | 
			
		||||
  # --data-urlencode input_format=json \
 | 
			
		||||
  # --data-urlencode output_format=json \
 | 
			
		||||
  # --data-urlencode "input_data=$input_data")
 | 
			
		||||
 | 
			
		||||
  url="$api_url?login=$Beget_Username&passwd=$Beget_Password&input_format=json&output_format=json"
 | 
			
		||||
  if [ -n "$input_data" ]; then
 | 
			
		||||
    url=${url}"&input_data="
 | 
			
		||||
    url=${url}$(echo "$input_data" | _url_encode)
 | 
			
		||||
  fi
 | 
			
		||||
  res=$(_get "$url")
 | 
			
		||||
 | 
			
		||||
  _debug "Reply: $res"
 | 
			
		||||
  echo "$res"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage: _is_api_reply_ok [api_reply]
 | 
			
		||||
_is_api_reply_ok() {
 | 
			
		||||
  _contains "$1" '^{"status":"success","answer":{"status":"success","result":.*}}$'
 | 
			
		||||
}
 | 
			
		||||
@@ -7,7 +7,7 @@ Options:
 | 
			
		||||
 BOOKMYNAME_USERNAME Username
 | 
			
		||||
 BOOKMYNAME_PASSWORD Password
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/3209
 | 
			
		||||
Author: Neilpang
 | 
			
		||||
Author: @Neilpang
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 
 | 
			
		||||
@@ -196,7 +196,7 @@ _get_base_domain() {
 | 
			
		||||
    _debug2 domain_list "$domain_list"
 | 
			
		||||
 | 
			
		||||
    i=1
 | 
			
		||||
    while [ $i -gt 0 ]; do
 | 
			
		||||
    while [ "$i" -gt 0 ]; do
 | 
			
		||||
      ## get next longest domain
 | 
			
		||||
      _domain=$(printf "%s" "$fulldomain" | cut -d . -f "$i"-"$MAX_DOM")
 | 
			
		||||
      ## check we got something back from our cut (or are we at the end)
 | 
			
		||||
@@ -208,7 +208,7 @@ _get_base_domain() {
 | 
			
		||||
      ## check if it exists
 | 
			
		||||
      if [ -n "$found" ]; then
 | 
			
		||||
        ## exists - exit loop returning the parts
 | 
			
		||||
        sub_point=$(_math $i - 1)
 | 
			
		||||
        sub_point=$(_math "$i" - 1)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$fulldomain" | cut -d . -f 1-"$sub_point")
 | 
			
		||||
        _domain_id="$(echo "$found" | _egrep_o "Id\"\s*\:\s*\"*[0-9]+" | _egrep_o "[0-9]+")"
 | 
			
		||||
        _debug _domain_id "$_domain_id"
 | 
			
		||||
@@ -218,11 +218,11 @@ _get_base_domain() {
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
      ## increment cut point $i
 | 
			
		||||
      i=$(_math $i + 1)
 | 
			
		||||
      i=$(_math "$i" + 1)
 | 
			
		||||
    done
 | 
			
		||||
 | 
			
		||||
    if [ -z "$found" ]; then
 | 
			
		||||
      page=$(_math $page + 1)
 | 
			
		||||
      page=$(_math "$page" + 1)
 | 
			
		||||
      nextpage="https://api.bunny.net/dnszone?page=$page"
 | 
			
		||||
      ## Find the next page if we don't have a match.
 | 
			
		||||
      hasnextpage="$(echo "$domain_list" | _egrep_o "\"HasMoreItems\"\s*:\s*true")"
 | 
			
		||||
 
 | 
			
		||||
@@ -186,7 +186,7 @@ _get_root() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -206,7 +206,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\"" || _contains "$response" '"total_count":1'; then
 | 
			
		||||
      _domain_id=$(echo "$response" | _egrep_o "\[.\"id\": *\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \" | tr -d " ")
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -164,7 +164,7 @@ _dns_cloudns_get_zone_info() {
 | 
			
		||||
_dns_cloudns_get_zone_name() {
 | 
			
		||||
  i=2
 | 
			
		||||
  while true; do
 | 
			
		||||
    zoneForCheck=$(printf "%s" "$1" | cut -d . -f $i-100)
 | 
			
		||||
    zoneForCheck=$(printf "%s" "$1" | cut -d . -f "$i"-100)
 | 
			
		||||
 | 
			
		||||
    if [ -z "$zoneForCheck" ]; then
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -197,10 +197,11 @@ _dns_cloudns_http_api_call() {
 | 
			
		||||
    auth_user="auth-id=$CLOUDNS_AUTH_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  encoded_password=$(echo "$CLOUDNS_AUTH_PASSWORD" | tr -d "\n\r" | _url_encode)
 | 
			
		||||
  if [ -z "$2" ]; then
 | 
			
		||||
    data="$auth_user&auth-password=$CLOUDNS_AUTH_PASSWORD"
 | 
			
		||||
    data="$auth_user&auth-password=$encoded_password"
 | 
			
		||||
  else
 | 
			
		||||
    data="$auth_user&auth-password=$CLOUDNS_AUTH_PASSWORD&$2"
 | 
			
		||||
    data="$auth_user&auth-password=$encoded_password&$2"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  response="$(_get "$CLOUDNS_API/$method?$data")"
 | 
			
		||||
 
 | 
			
		||||
@@ -131,7 +131,7 @@ _cn_get_root() {
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    _debug _H1 "${_H1}"
 | 
			
		||||
 | 
			
		||||
@@ -149,7 +149,7 @@ _cn_get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$_cn_zonelist" "\"name\":\"$h\"" >/dev/null; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    else
 | 
			
		||||
 
 | 
			
		||||
@@ -237,7 +237,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100).
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100).
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -251,7 +251,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\"" >/dev/null; then
 | 
			
		||||
      _domain_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":\"[^\"]*\"" | head -n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -117,12 +117,12 @@ dns_constellix_rm() {
 | 
			
		||||
####################  Private functions below ##################################
 | 
			
		||||
 | 
			
		||||
_get_root() {
 | 
			
		||||
  domain=$1
 | 
			
		||||
  domain=$(echo "$1" | _lower_case)
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  _debug "Detecting root zone"
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
@@ -134,7 +134,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\""; then
 | 
			
		||||
      _domain_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":[0-9]*" | cut -d ':' -f 2)
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d '.' -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d '.' -f 1-"$p")
 | 
			
		||||
        _domain="$h"
 | 
			
		||||
 | 
			
		||||
        _debug _domain_id "$_domain_id"
 | 
			
		||||
@@ -156,6 +156,9 @@ _constellix_rest() {
 | 
			
		||||
  data="$3"
 | 
			
		||||
  _debug "$ep"
 | 
			
		||||
 | 
			
		||||
  # Prevent rate limit
 | 
			
		||||
  _sleep 2
 | 
			
		||||
 | 
			
		||||
  rdate=$(date +"%s")"000"
 | 
			
		||||
  hmac=$(printf "%s" "$rdate" | _hmac sha1 "$(printf "%s" "$CONSTELLIX_Secret" | _hex_dump | tr -d ' ')" | _base64)
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -142,7 +142,7 @@ _get_root() {
 | 
			
		||||
  i=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
 
 | 
			
		||||
@@ -215,10 +215,8 @@ _cyon_change_domain_env() {
 | 
			
		||||
 | 
			
		||||
  if ! _cyon_check_if_2fa_missed "${domain_env_response}"; then return 1; fi
 | 
			
		||||
 | 
			
		||||
  domain_env_success="$(printf "%s" "${domain_env_response}" | _egrep_o '"authenticated":\w*' | cut -d : -f 2)"
 | 
			
		||||
 | 
			
		||||
  # Bail if domain environment change fails.
 | 
			
		||||
  if [ "${domain_env_success}" != "true" ]; then
 | 
			
		||||
  if [ "$(printf "%s" "${domain_env_response}" | _cyon_get_environment_change_status)" != "true" ]; then
 | 
			
		||||
    _err "    $(printf "%s" "${domain_env_response}" | _cyon_get_response_message)"
 | 
			
		||||
    _err ""
 | 
			
		||||
    return 1
 | 
			
		||||
@@ -232,7 +230,7 @@ _cyon_add_txt() {
 | 
			
		||||
  _info "  - Adding DNS TXT entry..."
 | 
			
		||||
 | 
			
		||||
  add_txt_url="https://my.cyon.ch/domain/dnseditor/add-record-async"
 | 
			
		||||
  add_txt_data="zone=${fulldomain_idn}.&ttl=900&type=TXT&value=${txtvalue}"
 | 
			
		||||
  add_txt_data="name=${fulldomain_idn}.&ttl=900&type=TXT&dnscontent=${txtvalue}"
 | 
			
		||||
 | 
			
		||||
  add_txt_response="$(_post "$add_txt_data" "$add_txt_url")"
 | 
			
		||||
  _debug add_txt_response "${add_txt_response}"
 | 
			
		||||
@@ -241,9 +239,10 @@ _cyon_add_txt() {
 | 
			
		||||
 | 
			
		||||
  add_txt_message="$(printf "%s" "${add_txt_response}" | _cyon_get_response_message)"
 | 
			
		||||
  add_txt_status="$(printf "%s" "${add_txt_response}" | _cyon_get_response_status)"
 | 
			
		||||
  add_txt_validation="$(printf "%s" "${add_txt_response}" | _cyon_get_validation_status)"
 | 
			
		||||
 | 
			
		||||
  # Bail if adding TXT entry fails.
 | 
			
		||||
  if [ "${add_txt_status}" != "true" ]; then
 | 
			
		||||
  if [ "${add_txt_status}" != "true" ] || [ "${add_txt_validation}" != "true" ]; then
 | 
			
		||||
    _err "    ${add_txt_message}"
 | 
			
		||||
    _err ""
 | 
			
		||||
    return 1
 | 
			
		||||
@@ -305,13 +304,21 @@ _cyon_get_response_message() {
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_cyon_get_response_status() {
 | 
			
		||||
  _egrep_o '"status":\w*' | cut -d : -f 2
 | 
			
		||||
  _egrep_o '"status":[a-zA-z0-9]*' | cut -d : -f 2
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_cyon_get_validation_status() {
 | 
			
		||||
  _egrep_o '"valid":[a-zA-z0-9]*' | cut -d : -f 2
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_cyon_get_response_success() {
 | 
			
		||||
  _egrep_o '"onSuccess":"[^"]*"' | cut -d : -f 2 | tr -d '"'
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_cyon_get_environment_change_status() {
 | 
			
		||||
  _egrep_o '"authenticated":[a-zA-z0-9]*' | cut -d : -f 2
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_cyon_check_if_2fa_missed() {
 | 
			
		||||
  # Did we miss the 2FA?
 | 
			
		||||
  if test "${1#*multi_factor_form}" != "${1}"; then
 | 
			
		||||
 
 | 
			
		||||
@@ -61,7 +61,7 @@ _get_root() {
 | 
			
		||||
  # response will contain "list[]=example.com&list[]=example.org"
 | 
			
		||||
  _da_api CMD_API_SHOW_DOMAINS "" "${domain}"
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      # not valid
 | 
			
		||||
@@ -69,7 +69,7 @@ _get_root() {
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    if _contains "$response" "$h" >/dev/null; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -6,7 +6,7 @@ Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi#dns_ddnss
 | 
			
		||||
Options:
 | 
			
		||||
 DDNSS_Token API Token
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2230
 | 
			
		||||
Author: RaidenII, helbgd, mod242
 | 
			
		||||
Author: @helbgd, @mod242
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
DDNSS_DNS_API="https://ddnss.de/upd.php"
 | 
			
		||||
 
 | 
			
		||||
@@ -176,7 +176,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -188,7 +188,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\"" >/dev/null; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -203,7 +203,7 @@ _get_base_domain() {
 | 
			
		||||
    _debug2 domain_list "$domain_list"
 | 
			
		||||
 | 
			
		||||
    i=1
 | 
			
		||||
    while [ $i -gt 0 ]; do
 | 
			
		||||
    while [ "$i" -gt 0 ]; do
 | 
			
		||||
      ## get next longest domain
 | 
			
		||||
      _domain=$(printf "%s" "$fulldomain" | cut -d . -f "$i"-"$MAX_DOM")
 | 
			
		||||
      ## check we got something back from our cut (or are we at the end)
 | 
			
		||||
@@ -215,14 +215,14 @@ _get_base_domain() {
 | 
			
		||||
      ## check if it exists
 | 
			
		||||
      if [ -n "$found" ]; then
 | 
			
		||||
        ## exists - exit loop returning the parts
 | 
			
		||||
        sub_point=$(_math $i - 1)
 | 
			
		||||
        sub_point=$(_math "$i" - 1)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$fulldomain" | cut -d . -f 1-"$sub_point")
 | 
			
		||||
        _debug _domain "$_domain"
 | 
			
		||||
        _debug _sub_domain "$_sub_domain"
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
      ## increment cut point $i
 | 
			
		||||
      i=$(_math $i + 1)
 | 
			
		||||
      i=$(_math "$i" + 1)
 | 
			
		||||
    done
 | 
			
		||||
 | 
			
		||||
    if [ -z "$found" ]; then
 | 
			
		||||
 
 | 
			
		||||
@@ -84,7 +84,7 @@ _get_root() {
 | 
			
		||||
  domain=$1
 | 
			
		||||
  i=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    _domain=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    _domain=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$_domain"
 | 
			
		||||
    if [ -z "$_domain" ]; then
 | 
			
		||||
      return 1
 | 
			
		||||
 
 | 
			
		||||
@@ -7,7 +7,7 @@ Options:
 | 
			
		||||
 DNSHOME_Subdomain Subdomain
 | 
			
		||||
 DNSHOME_SubdomainPassword Subdomain Password
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/3819
 | 
			
		||||
Author: dnsHome.de https://github.com/dnsHome-de
 | 
			
		||||
Author: @dnsHome-de
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
# Usage: add subdomain.ddnsdomain.tld "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
 
 | 
			
		||||
@@ -92,7 +92,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  previous=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      # not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -105,7 +105,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" 'not found'; then
 | 
			
		||||
      _debug "$h not found"
 | 
			
		||||
    else
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$previous)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$previous")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
 | 
			
		||||
      _debug _domain "$_domain"
 | 
			
		||||
 
 | 
			
		||||
@@ -2,7 +2,6 @@
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_doapi_info='Domain-Offensive do.de
 | 
			
		||||
 Official LetsEncrypt API for do.de / Domain-Offensive.
 | 
			
		||||
 This is different from the dns_do adapter, because dns_do is only usable for enterprise customers.
 | 
			
		||||
 This API is also available to private customers/individuals.
 | 
			
		||||
Site: do.de
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi#dns_doapi
 | 
			
		||||
@@ -11,7 +10,7 @@ Options:
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2057
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
DO_API="https://www.do.de/api/letsencrypt"
 | 
			
		||||
DO_API="https://my.do.de/api/letsencrypt"
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -93,7 +93,7 @@ _get_domainid() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug "h" "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -102,7 +102,7 @@ _get_domainid() {
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "\"$h\"" >/dev/null; then
 | 
			
		||||
      # We have found the domain name.
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      _domainid=$(printf "%s" "$response" | _egrep_o "[^{]*\"domain\":\"$_domain\"[^}]*" | _egrep_o "\"id\":[0-9]+" | cut -d : -f 2)
 | 
			
		||||
      return 0
 | 
			
		||||
 
 | 
			
		||||
@@ -109,7 +109,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -123,7 +123,7 @@ _get_root() {
 | 
			
		||||
      _domain_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      _debug _domain_id "$_domain_id"
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _debug _sub_domain "$_sub_domain"
 | 
			
		||||
        _domain="$h"
 | 
			
		||||
        _debug _domain "$_domain"
 | 
			
		||||
 
 | 
			
		||||
@@ -109,7 +109,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -123,7 +123,7 @@ _get_root() {
 | 
			
		||||
      _domain_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      _debug _domain_id "$_domain_id"
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _debug _sub_domain "$_sub_domain"
 | 
			
		||||
        _domain="$h"
 | 
			
		||||
        _debug _domain "$_domain"
 | 
			
		||||
 
 | 
			
		||||
@@ -5,7 +5,7 @@ Site: www.DuckDNS.org
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi#dns_duckdns
 | 
			
		||||
Options:
 | 
			
		||||
 DuckDNS_Token API Token
 | 
			
		||||
Author: RaidenII
 | 
			
		||||
Author: @RaidenII
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
DuckDNS_API="https://www.duckdns.org/update"
 | 
			
		||||
 
 | 
			
		||||
@@ -110,7 +110,7 @@ _get_root() {
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -118,7 +118,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" ">$h.</origin>"; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -8,7 +8,7 @@ Options:
 | 
			
		||||
 DYN_Customer Customer
 | 
			
		||||
 DYN_Username API Username
 | 
			
		||||
 DYN_Password Secret
 | 
			
		||||
Author: Gerd Naschenweng <https://github.com/magicdude4eva>
 | 
			
		||||
Author: Gerd Naschenweng <@magicdude4eva>
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
# Dyn Managed DNS API
 | 
			
		||||
 
 | 
			
		||||
@@ -126,7 +126,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -140,7 +140,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"domainName\":\"$h\"" >/dev/null; then
 | 
			
		||||
      dnsId=$(printf "%s" "$response" | tr -d "{}" | cut -d , -f 2 | cut -d : -f 2)
 | 
			
		||||
      _domain_name=$h
 | 
			
		||||
      _node=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _node=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
    p=$i
 | 
			
		||||
 
 | 
			
		||||
@@ -8,7 +8,7 @@ Options:
 | 
			
		||||
OptionsAlt:
 | 
			
		||||
 KEY Path to SSH private key file. E.g. "/root/.ssh/dynv6"
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2702
 | 
			
		||||
Author: StefanAbl
 | 
			
		||||
Author: @StefanAbl
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
dynv6_api="https://dynv6.com/api/v2"
 | 
			
		||||
@@ -16,8 +16,8 @@ dynv6_api="https://dynv6.com/api/v2"
 | 
			
		||||
# Please Read this guide first: https://github.com/Neilpang/acme.sh/wiki/DNS-API-Dev-Guide
 | 
			
		||||
#Usage: dns_dynv6_add  _acme-challenge.www.domain.com  "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
dns_dynv6_add() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
  fulldomain="$(echo "$1" | _lower_case)"
 | 
			
		||||
  txtvalue="$2"
 | 
			
		||||
  _info "Using dynv6 api"
 | 
			
		||||
  _debug fulldomain "$fulldomain"
 | 
			
		||||
  _debug txtvalue "$txtvalue"
 | 
			
		||||
@@ -43,15 +43,14 @@ dns_dynv6_add() {
 | 
			
		||||
      _err "Something went wrong! it does not seem like the record was added successfully"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  return 1
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
#Usage: fulldomain txtvalue
 | 
			
		||||
#Remove the txt record after validation.
 | 
			
		||||
dns_dynv6_rm() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
  fulldomain="$(echo "$1" | _lower_case)"
 | 
			
		||||
  txtvalue="$2"
 | 
			
		||||
  _info "Using dynv6 API"
 | 
			
		||||
  _debug fulldomain "$fulldomain"
 | 
			
		||||
  _debug txtvalue "$txtvalue"
 | 
			
		||||
@@ -206,7 +205,7 @@ _get_zone_id() {
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  zone_id="$(echo "$response" | tr '}' '\n' | grep "$selected" | tr ',' '\n' | grep id | tr -d '"')"
 | 
			
		||||
  zone_id="$(echo "$response" | tr '}' '\n' | grep "$selected" | tr ',' '\n' | grep '"id":' | tr -d '"')"
 | 
			
		||||
  _zone_id="${zone_id#id:}"
 | 
			
		||||
  _debug "zone id: $_zone_id"
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -7,7 +7,7 @@ Options:
 | 
			
		||||
 EASYDNS_Token API Token
 | 
			
		||||
 EASYDNS_Key API Key
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2647
 | 
			
		||||
Author: Neilpang, wurzelpanzer <wurzelpanzer@maximolider.net>
 | 
			
		||||
Author: @Neilpang, wurzelpanzer <wurzelpanzer@maximolider.net>
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
# API Documentation: https://sandbox.rest.easydns.net:3001/
 | 
			
		||||
@@ -121,7 +121,7 @@ _get_root() {
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -133,7 +133,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "\"status\":200"; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										163
									
								
								dnsapi/dns_edgecenter.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										163
									
								
								dnsapi/dns_edgecenter.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,163 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_edgecenter_info='EdgeCenter.ru
 | 
			
		||||
Site: EdgeCenter.ru
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_edgecenter
 | 
			
		||||
Options:
 | 
			
		||||
 EDGECENTER_API_KEY API Key
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/6313
 | 
			
		||||
Author: Konstantin Ruchev <konstantin.ruchev@edgecenter.ru>
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
EDGECENTER_API="https://api.edgecenter.ru"
 | 
			
		||||
DOMAIN_TYPE=
 | 
			
		||||
DOMAIN_MASTER=
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#Usage: dns_edgecenter_add   _acme-challenge.www.domain.com   "TXT_RECORD_VALUE"
 | 
			
		||||
dns_edgecenter_add() {
 | 
			
		||||
  fulldomain="$1"
 | 
			
		||||
  txtvalue="$2"
 | 
			
		||||
 | 
			
		||||
  _info "Using EdgeCenter DNS API"
 | 
			
		||||
 | 
			
		||||
  if ! _dns_edgecenter_init_check; then
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug "Detecting root zone for $fulldomain"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  subdomain="${fulldomain%."$_zone"}"
 | 
			
		||||
  subdomain=${subdomain%.}
 | 
			
		||||
 | 
			
		||||
  _debug "Zone: $_zone"
 | 
			
		||||
  _debug "Subdomain: $subdomain"
 | 
			
		||||
  _debug "TXT value: $txtvalue"
 | 
			
		||||
 | 
			
		||||
  payload='{"resource_records": [ { "content": ["'"$txtvalue"'"] } ], "ttl": 60 }'
 | 
			
		||||
  _dns_edgecenter_http_api_call "post" "dns/v2/zones/$_zone/$subdomain.$_zone/txt" "$payload"
 | 
			
		||||
 | 
			
		||||
  if _contains "$response" '"error":"rrset is already exists"'; then
 | 
			
		||||
    _debug "RRSet exists, merging values"
 | 
			
		||||
    _dns_edgecenter_http_api_call "get" "dns/v2/zones/$_zone/$subdomain.$_zone/txt"
 | 
			
		||||
    current="$response"
 | 
			
		||||
    newlist=""
 | 
			
		||||
    for v in $(echo "$current" | sed -n 's/.*"content":\["\([^"]*\)"\].*/\1/p'); do
 | 
			
		||||
      newlist="$newlist {\"content\":[\"$v\"]},"
 | 
			
		||||
    done
 | 
			
		||||
    newlist="$newlist{\"content\":[\"$txtvalue\"]}"
 | 
			
		||||
    putdata="{\"resource_records\":[${newlist}]}
 | 
			
		||||
"
 | 
			
		||||
    _dns_edgecenter_http_api_call "put" "dns/v2/zones/$_zone/$subdomain.$_zone/txt" "$putdata"
 | 
			
		||||
    _info "Updated existing RRSet with new TXT value."
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if _contains "$response" '"exception":'; then
 | 
			
		||||
    _err "Record cannot be added."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "TXT record added successfully."
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#Usage: dns_edgecenter_rm   _acme-challenge.www.domain.com   "TXT_RECORD_VALUE"
 | 
			
		||||
dns_edgecenter_rm() {
 | 
			
		||||
  fulldomain="$1"
 | 
			
		||||
  txtvalue="$2"
 | 
			
		||||
 | 
			
		||||
  _info "Removing TXT record for $fulldomain"
 | 
			
		||||
 | 
			
		||||
  if ! _dns_edgecenter_init_check; then
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  subdomain="${fulldomain%."$_zone"}"
 | 
			
		||||
  subdomain=${subdomain%.}
 | 
			
		||||
 | 
			
		||||
  _dns_edgecenter_http_api_call "delete" "dns/v2/zones/$_zone/$subdomain.$_zone/txt"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$response" ]; then
 | 
			
		||||
    _info "TXT record deleted successfully."
 | 
			
		||||
  else
 | 
			
		||||
    _info "TXT record may not have been deleted: $response"
 | 
			
		||||
  fi
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
####################  Private functions below ##################################
 | 
			
		||||
 | 
			
		||||
_dns_edgecenter_init_check() {
 | 
			
		||||
  EDGECENTER_API_KEY="${EDGECENTER_API_KEY:-$(_readaccountconf_mutable EDGECENTER_API_KEY)}"
 | 
			
		||||
  if [ -z "$EDGECENTER_API_KEY" ]; then
 | 
			
		||||
    _err "EDGECENTER_API_KEY was not exported."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _saveaccountconf_mutable EDGECENTER_API_KEY "$EDGECENTER_API_KEY"
 | 
			
		||||
  export _H1="Authorization: APIKey $EDGECENTER_API_KEY"
 | 
			
		||||
 | 
			
		||||
  _dns_edgecenter_http_api_call "get" "dns/v2/clients/me/features"
 | 
			
		||||
  if ! _contains "$response" '"id":'; then
 | 
			
		||||
    _err "Invalid API key."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_get_root() {
 | 
			
		||||
  domain="$1"
 | 
			
		||||
  i=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _dns_edgecenter_http_api_call "get" "dns/v2/zones/$h"
 | 
			
		||||
    if ! _contains "$response" 'zone is not found'; then
 | 
			
		||||
      _zone="$h"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
    i=$((i + 1))
 | 
			
		||||
  done
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_dns_edgecenter_http_api_call() {
 | 
			
		||||
  mtd="$1"
 | 
			
		||||
  endpoint="$2"
 | 
			
		||||
  data="$3"
 | 
			
		||||
 | 
			
		||||
  export _H1="Authorization: APIKey $EDGECENTER_API_KEY"
 | 
			
		||||
 | 
			
		||||
  case "$mtd" in
 | 
			
		||||
  get)
 | 
			
		||||
    response="$(_get "$EDGECENTER_API/$endpoint")"
 | 
			
		||||
    ;;
 | 
			
		||||
  post)
 | 
			
		||||
    response="$(_post "$data" "$EDGECENTER_API/$endpoint")"
 | 
			
		||||
    ;;
 | 
			
		||||
  delete)
 | 
			
		||||
    response="$(_post "" "$EDGECENTER_API/$endpoint" "" "DELETE")"
 | 
			
		||||
    ;;
 | 
			
		||||
  put)
 | 
			
		||||
    response="$(_post "$data" "$EDGECENTER_API/$endpoint" "" "PUT")"
 | 
			
		||||
    ;;
 | 
			
		||||
  *)
 | 
			
		||||
    _err "Unknown HTTP method $mtd"
 | 
			
		||||
    return 1
 | 
			
		||||
    ;;
 | 
			
		||||
  esac
 | 
			
		||||
 | 
			
		||||
  _debug "HTTP $mtd response: $response"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
@@ -151,7 +151,7 @@ _get_root() {
 | 
			
		||||
  response="$_euserv_domain_orders"
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(echo "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(echo "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -159,7 +159,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "$h"; then
 | 
			
		||||
      _sub_domain=$(echo "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(echo "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      if ! _euserv_get_domain_id "$_domain"; then
 | 
			
		||||
        _err "invalid domain"
 | 
			
		||||
 
 | 
			
		||||
@@ -119,7 +119,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -130,7 +130,7 @@ _get_root() {
 | 
			
		||||
      _domain_id=$(echo "$response" | tr '{' "\n" | grep "\"name\":\"$h\"" | _egrep_o "\"id\":[^,]+" | _head_n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      _domain_token=$(echo "$response" | tr '{' "\n" | grep "\"name\":\"$h\"" | _egrep_o "\"token\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      if [ "$_domain_token" ] && [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -9,7 +9,7 @@ Issues: github.com/acmesh-official/acme.sh/issues/3998
 | 
			
		||||
Author: Timur Umarov <inbox@tumarov.com>
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
FORNEX_API_URL="https://fornex.com/api/dns/v0.1"
 | 
			
		||||
FORNEX_API_URL="https://fornex.com/api"
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
@@ -30,12 +30,10 @@ dns_fornex_add() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Adding record"
 | 
			
		||||
  if _rest POST "$_domain/entry_set/add/" "host=$fulldomain&type=TXT&value=$txtvalue&apikey=$FORNEX_API_KEY"; then
 | 
			
		||||
  if _rest POST "dns/domain/$_domain/entry_set/" "{\"host\" : \"${fulldomain}\" , \"type\" : \"TXT\" , \"value\" : \"${txtvalue}\" , \"ttl\" : null}"; then
 | 
			
		||||
    _debug _response "$response"
 | 
			
		||||
    if _contains "$response" '"ok": true' || _contains "$response" 'Такая запись уже существует.'; then
 | 
			
		||||
      _info "Added, OK"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
    _info "Added, OK"
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
  _err "Add txt record error."
 | 
			
		||||
  return 1
 | 
			
		||||
@@ -58,21 +56,21 @@ dns_fornex_rm() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug "Getting txt records"
 | 
			
		||||
  _rest GET "$_domain/entry_set.json?apikey=$FORNEX_API_KEY"
 | 
			
		||||
  _rest GET "dns/domain/$_domain/entry_set?type=TXT&q=$fulldomain"
 | 
			
		||||
 | 
			
		||||
  if ! _contains "$response" "$txtvalue"; then
 | 
			
		||||
    _err "Txt record not found"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _record_id="$(echo "$response" | _egrep_o "{[^{]*\"value\"*:*\"$txtvalue\"[^}]*}" | sed -n -e 's#.*"id": \([0-9]*\).*#\1#p')"
 | 
			
		||||
  _record_id="$(echo "$response" | _egrep_o "\{[^\{]*\"value\"*:*\"$txtvalue\"[^\}]*\}" | sed -n -e 's#.*"id":\([0-9]*\).*#\1#p')"
 | 
			
		||||
  _debug "_record_id" "$_record_id"
 | 
			
		||||
  if [ -z "$_record_id" ]; then
 | 
			
		||||
    _err "can not find _record_id"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! _rest POST "$_domain/entry_set/$_record_id/delete/" "apikey=$FORNEX_API_KEY"; then
 | 
			
		||||
  if ! _rest DELETE "dns/domain/$_domain/entry_set/$_record_id/"; then
 | 
			
		||||
    _err "Delete record error."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
@@ -90,18 +88,18 @@ _get_root() {
 | 
			
		||||
 | 
			
		||||
  i=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if ! _rest GET "domain_list.json?q=$h&apikey=$FORNEX_API_KEY"; then
 | 
			
		||||
    if ! _rest GET "dns/domain/?q=$h"; then
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "\"$h\"" >/dev/null; then
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\"" >/dev/null; then
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    else
 | 
			
		||||
@@ -134,7 +132,9 @@ _rest() {
 | 
			
		||||
  data="$3"
 | 
			
		||||
  _debug "$ep"
 | 
			
		||||
 | 
			
		||||
  export _H1="Accept: application/json"
 | 
			
		||||
  export _H1="Authorization: Api-Key $FORNEX_API_KEY"
 | 
			
		||||
  export _H2="Content-Type: application/json"
 | 
			
		||||
  export _H3="Accept: application/json"
 | 
			
		||||
 | 
			
		||||
  if [ "$m" != "GET" ]; then
 | 
			
		||||
    _debug data "$data"
 | 
			
		||||
 
 | 
			
		||||
@@ -7,7 +7,7 @@ Options:
 | 
			
		||||
 FREEDNS_User Username
 | 
			
		||||
 FREEDNS_Password Password
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2305
 | 
			
		||||
Author: David Kerr <https://github.com/dkerr64>
 | 
			
		||||
Author: David Kerr <@dkerr64>
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										105
									
								
								dnsapi/dns_freemyip.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										105
									
								
								dnsapi/dns_freemyip.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,105 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_freemyip_info='FreeMyIP.com
 | 
			
		||||
Site: FreeMyIP.com
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_freemyip
 | 
			
		||||
Options:
 | 
			
		||||
 FREEMYIP_Token API Token
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/6247
 | 
			
		||||
Author: Recolic Keghart <root@recolic.net>, @Giova96
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
FREEMYIP_DNS_API="https://freemyip.com/update?"
 | 
			
		||||
 | 
			
		||||
################ Public functions ################
 | 
			
		||||
 | 
			
		||||
#Usage: dns_freemyip_add    fulldomain    txtvalue
 | 
			
		||||
dns_freemyip_add() {
 | 
			
		||||
  fulldomain="$1"
 | 
			
		||||
  txtvalue="$2"
 | 
			
		||||
 | 
			
		||||
  _info "Add TXT record $txtvalue for $fulldomain using freemyip.com api"
 | 
			
		||||
 | 
			
		||||
  FREEMYIP_Token="${FREEMYIP_Token:-$(_readaccountconf_mutable FREEMYIP_Token)}"
 | 
			
		||||
  if [ -z "$FREEMYIP_Token" ]; then
 | 
			
		||||
    FREEMYIP_Token=""
 | 
			
		||||
    _err "You don't specify FREEMYIP_Token yet."
 | 
			
		||||
    _err "Please specify your token and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the credentials to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable FREEMYIP_Token "$FREEMYIP_Token"
 | 
			
		||||
 | 
			
		||||
  if _is_root_domain_published "$fulldomain"; then
 | 
			
		||||
    _err "freemyip API don't allow you to set multiple TXT record for the same subdomain!"
 | 
			
		||||
    _err "You must apply certificate for only one domain at a time!"
 | 
			
		||||
    _err "===="
 | 
			
		||||
    _err "For example, aaa.yourdomain.freemyip.com and bbb.yourdomain.freemyip.com and yourdomain.freemyip.com ALWAYS share the same TXT record. They will overwrite each other if you apply multiple domain at the same time."
 | 
			
		||||
    _debug "If you are testing this workflow in github pipeline or acmetest, please set TEST_DNS_NO_SUBDOMAIN=1 and TEST_DNS_NO_WILDCARD=1"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # txtvalue must be url-encoded. But it's not necessary for acme txt value.
 | 
			
		||||
  _freemyip_get_until_ok "${FREEMYIP_DNS_API}token=$FREEMYIP_Token&domain=$fulldomain&txt=$txtvalue" 2>&1
 | 
			
		||||
  return $?
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#Usage: dns_freemyip_rm    fulldomain    txtvalue
 | 
			
		||||
dns_freemyip_rm() {
 | 
			
		||||
  fulldomain="$1"
 | 
			
		||||
  txtvalue="$2"
 | 
			
		||||
 | 
			
		||||
  _info "Delete TXT record $txtvalue for $fulldomain using freemyip.com api"
 | 
			
		||||
 | 
			
		||||
  FREEMYIP_Token="${FREEMYIP_Token:-$(_readaccountconf_mutable FREEMYIP_Token)}"
 | 
			
		||||
  if [ -z "$FREEMYIP_Token" ]; then
 | 
			
		||||
    FREEMYIP_Token=""
 | 
			
		||||
    _err "You don't specify FREEMYIP_Token yet."
 | 
			
		||||
    _err "Please specify your token and try again."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the credentials to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable FREEMYIP_Token "$FREEMYIP_Token"
 | 
			
		||||
 | 
			
		||||
  # Leave the TXT record as empty or "null" to delete the record.
 | 
			
		||||
  _freemyip_get_until_ok "${FREEMYIP_DNS_API}token=$FREEMYIP_Token&domain=$fulldomain&txt=" 2>&1
 | 
			
		||||
  return $?
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
################ Private functions below  ################
 | 
			
		||||
_get_root() {
 | 
			
		||||
  _fmi_d="$1"
 | 
			
		||||
 | 
			
		||||
  echo "$_fmi_d" | rev | cut -d '.' -f 1-3 | rev
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# There is random failure while calling freemyip API too fast. This function automatically retry until success.
 | 
			
		||||
_freemyip_get_until_ok() {
 | 
			
		||||
  _fmi_url="$1"
 | 
			
		||||
  for i in $(seq 1 8); do
 | 
			
		||||
    _debug "HTTP GET freemyip.com API '$_fmi_url', retry $i/8..."
 | 
			
		||||
    _get "$_fmi_url" | tee /dev/fd/2 | grep OK && return 0
 | 
			
		||||
    _sleep 1 # DO NOT send the request too fast
 | 
			
		||||
  done
 | 
			
		||||
  _err "Failed to request freemyip API: $_fmi_url . Server does not say 'OK'"
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Verify in public dns if domain is already there.
 | 
			
		||||
_is_root_domain_published() {
 | 
			
		||||
  _fmi_d="$1"
 | 
			
		||||
  _webroot="$(_get_root "$_fmi_d")"
 | 
			
		||||
 | 
			
		||||
  _info "Verifying '""$_fmi_d""' freemyip webroot (""$_webroot"") is not published yet"
 | 
			
		||||
  for i in $(seq 1 3); do
 | 
			
		||||
    _debug "'$_webroot' ns lookup, retry $i/3..."
 | 
			
		||||
    if [ "$(_ns_lookup "$_fmi_d" TXT)" ]; then
 | 
			
		||||
      _debug "'$_webroot' already has a TXT record published!"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
    _sleep 10 # Give it some time to propagate the TXT record
 | 
			
		||||
  done
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
@@ -95,7 +95,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -112,7 +112,7 @@ _get_root() {
 | 
			
		||||
    elif _contains "$response" '"code": 404'; then
 | 
			
		||||
      _debug "$h not found"
 | 
			
		||||
    else
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -28,7 +28,7 @@ dns_gcore_add() {
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the api key to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable GCORE_Key "$GCORE_Key"
 | 
			
		||||
  _saveaccountconf_mutable GCORE_Key "$GCORE_Key" "base64"
 | 
			
		||||
 | 
			
		||||
  _debug "First detect the zone name"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
@@ -138,7 +138,7 @@ _get_root() {
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -152,7 +152,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\""; then
 | 
			
		||||
      _zone_name=$h
 | 
			
		||||
      if [ "$_zone_name" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -148,7 +148,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -161,7 +161,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" '"code":"NOT_FOUND"'; then
 | 
			
		||||
      _debug "$h not found"
 | 
			
		||||
    else
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -202,7 +202,7 @@ find_zone() {
 | 
			
		||||
  # Walk through all possible zone names
 | 
			
		||||
  strip_counter=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    attempted_zone=$(echo "${domain}" | cut -d . -f ${strip_counter}-)
 | 
			
		||||
    attempted_zone=$(echo "${domain}" | cut -d . -f "${strip_counter}"-)
 | 
			
		||||
 | 
			
		||||
    # All possible zone names have been tried
 | 
			
		||||
    if [ -z "${attempted_zone}" ]; then
 | 
			
		||||
 
 | 
			
		||||
@@ -132,7 +132,7 @@ _dns_googledomains_get_zone() {
 | 
			
		||||
 | 
			
		||||
  i=2
 | 
			
		||||
  while true; do
 | 
			
		||||
    curr=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    curr=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug curr "$curr"
 | 
			
		||||
 | 
			
		||||
    if [ -z "$curr" ]; then
 | 
			
		||||
 
 | 
			
		||||
@@ -143,7 +143,7 @@ _find_zone() {
 | 
			
		||||
  # Walk through all possible zone names
 | 
			
		||||
  _strip_counter=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    _attempted_zone=$(echo "$_domain" | cut -d . -f ${_strip_counter}-)
 | 
			
		||||
    _attempted_zone=$(echo "$_domain" | cut -d . -f "${_strip_counter}"-)
 | 
			
		||||
 | 
			
		||||
    # All possible zone names have been tried
 | 
			
		||||
    if [ -z "$_attempted_zone" ]; then
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										45
									
								
								dnsapi/dns_he_ddns.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										45
									
								
								dnsapi/dns_he_ddns.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,45 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_he_ddns_info='Hurricane Electric HE.net DDNS
 | 
			
		||||
Site: dns.he.net
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_he_ddns
 | 
			
		||||
Options:
 | 
			
		||||
 HE_DDNS_KEY The DDNS key
 | 
			
		||||
Issues: https://github.com/acmesh-official/acme.sh/issues/5238
 | 
			
		||||
Author: Markku Leiniö
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
HE_DDNS_URL="https://dyn.dns.he.net/nic/update"
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#Usage: dns_he_ddns_add   _acme-challenge.www.domain.com   "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
 | 
			
		||||
dns_he_ddns_add() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
  HE_DDNS_KEY="${HE_DDNS_KEY:-$(_readaccountconf_mutable HE_DDNS_KEY)}"
 | 
			
		||||
  if [ -z "$HE_DDNS_KEY" ]; then
 | 
			
		||||
    HE_DDNS_KEY=""
 | 
			
		||||
    _err "You didn't specify a DDNS key for accessing the TXT record in HE API."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  #Save the DDNS key to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable HE_DDNS_KEY "$HE_DDNS_KEY"
 | 
			
		||||
 | 
			
		||||
  _info "Using Hurricane Electric DDNS API"
 | 
			
		||||
  _debug fulldomain "$fulldomain"
 | 
			
		||||
  _debug txtvalue "$txtvalue"
 | 
			
		||||
 | 
			
		||||
  response="$(_post "hostname=$fulldomain&password=$HE_DDNS_KEY&txt=$txtvalue" "$HE_DDNS_URL")"
 | 
			
		||||
  _info "Response: $response"
 | 
			
		||||
  _contains "$response" "good" && return 0 || return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# dns_he_ddns_rm() is not doing anything because the API call always updates the
 | 
			
		||||
# contents of the existing record (that the API key gives access to).
 | 
			
		||||
 | 
			
		||||
dns_he_ddns_rm() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  _debug "Delete TXT record called for '${fulldomain}', not doing anything."
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										6
									
								
								dnsapi/dns_hetzner.sh
									
									
									
									
									
										
										
										Normal file → Executable file
									
								
							
							
						
						
									
										6
									
								
								dnsapi/dns_hetzner.sh
									
									
									
									
									
										
										
										Normal file → Executable file
									
								
							@@ -181,7 +181,7 @@ _get_root() {
 | 
			
		||||
 | 
			
		||||
  _debug "Trying to get zone id by domain name for '$domain_without_acme'."
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -193,7 +193,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" "\"name\":\"$h\"" || _contains "$response" '"total_entries":1'; then
 | 
			
		||||
      _domain_id=$(echo "$response" | _egrep_o "\[.\"id\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain=$h
 | 
			
		||||
        HETZNER_Zone_ID=$_domain_id
 | 
			
		||||
        _savedomainconf "$domain_param_name" "$HETZNER_Zone_ID"
 | 
			
		||||
@@ -212,7 +212,7 @@ _get_root() {
 | 
			
		||||
_response_has_error() {
 | 
			
		||||
  unset _response_error
 | 
			
		||||
 | 
			
		||||
  err_part="$(echo "$response" | _egrep_o '"error":{[^}]*}')"
 | 
			
		||||
  err_part="$(echo "$response" | _egrep_o '"error":\{[^\}]*\}')"
 | 
			
		||||
 | 
			
		||||
  if [ -n "$err_part" ]; then
 | 
			
		||||
    err_code=$(echo "$err_part" | _egrep_o '"code":[0-9]+' | cut -d : -f 2)
 | 
			
		||||
 
 | 
			
		||||
@@ -123,7 +123,7 @@ _get_root() {
 | 
			
		||||
  i=1
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -135,7 +135,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "CODE=200"; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain=$h
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -133,7 +133,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    while true; do
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f ${i}-100)
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f "${i}"-100)
 | 
			
		||||
      _debug h "$h"
 | 
			
		||||
      if [ -z "$h" ]; then
 | 
			
		||||
        #not valid
 | 
			
		||||
@@ -141,7 +141,7 @@ _get_root() {
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      if _contains "$response" "\"$h\""; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-${p})
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"${p}")
 | 
			
		||||
        _domain=${h}
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
 
 | 
			
		||||
@@ -163,6 +163,15 @@ _inwx_check_cookie() {
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_htmlEscape() {
 | 
			
		||||
  _s="$1"
 | 
			
		||||
  _s=$(echo "$_s" | sed "s/&/&/g")
 | 
			
		||||
  _s=$(echo "$_s" | sed "s/</\</g")
 | 
			
		||||
  _s=$(echo "$_s" | sed "s/>/\>/g")
 | 
			
		||||
  _s=$(echo "$_s" | sed 's/"/\"/g')
 | 
			
		||||
  printf -- %s "$_s"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_inwx_login() {
 | 
			
		||||
 | 
			
		||||
  if _inwx_check_cookie; then
 | 
			
		||||
@@ -170,6 +179,8 @@ _inwx_login() {
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  XML_PASS=$(_htmlEscape "$INWX_Password")
 | 
			
		||||
 | 
			
		||||
  xml_content=$(printf '<?xml version="1.0" encoding="UTF-8"?>
 | 
			
		||||
  <methodCall>
 | 
			
		||||
  <methodName>account.login</methodName>
 | 
			
		||||
@@ -193,7 +204,7 @@ _inwx_login() {
 | 
			
		||||
    </value>
 | 
			
		||||
   </param>
 | 
			
		||||
  </params>
 | 
			
		||||
  </methodCall>' "$INWX_User" "$INWX_Password")
 | 
			
		||||
  </methodCall>' "$INWX_User" "$XML_PASS")
 | 
			
		||||
 | 
			
		||||
  response="$(_post "$xml_content" "$INWX_Api" "" "POST")"
 | 
			
		||||
 | 
			
		||||
@@ -282,7 +293,7 @@ _get_root() {
 | 
			
		||||
 | 
			
		||||
  response="$(_post "$xml_content" "$INWX_Api" "" "POST")"
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
@@ -290,7 +301,7 @@ _get_root() {
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "$h"; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
@@ -87,7 +87,7 @@ _get_root() {
 | 
			
		||||
    _response="$(echo "$_response" | tr -d "\n")"
 | 
			
		||||
 | 
			
		||||
    while true; do
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
      if [ -z "$h" ]; then
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
@@ -96,7 +96,7 @@ _get_root() {
 | 
			
		||||
      if [ "$_zone" ]; then
 | 
			
		||||
        _zone_id=$(printf "%s\n" "$_zone" | _egrep_o "\"id\":\"[a-fA-F0-9\-]*\"" | _head_n 1 | cut -d : -f 2 | tr -d '\"')
 | 
			
		||||
        if [ "$_zone_id" ]; then
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
          _domain=$h
 | 
			
		||||
 | 
			
		||||
          return 0
 | 
			
		||||
 
 | 
			
		||||
@@ -1,12 +1,14 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_ionos_cloud_info='IONOS Cloud DNS
 | 
			
		||||
Site: ionos.com
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_ionos_cloud
 | 
			
		||||
Options:
 | 
			
		||||
 IONOS_TOKEN API Token.
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/5243
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
# Supports IONOS Cloud DNS API v1.15.4
 | 
			
		||||
#
 | 
			
		||||
# Usage:
 | 
			
		||||
#   Export IONOS_TOKEN before calling acme.sh:
 | 
			
		||||
#   $ export IONOS_TOKEN="..."
 | 
			
		||||
#
 | 
			
		||||
#   $ acme.sh --issue --dns dns_ionos_cloud ...
 | 
			
		||||
 | 
			
		||||
IONOS_CLOUD_API="https://dns.de-fra.ionos.com"
 | 
			
		||||
IONOS_CLOUD_ROUTE_ZONES="/zones"
 | 
			
		||||
 
 | 
			
		||||
@@ -14,6 +14,8 @@ Options:
 | 
			
		||||
# User must provide login data and URL to the ISPConfig installation incl. port.
 | 
			
		||||
# The remote user in ISPConfig must have access to:
 | 
			
		||||
# - DNS txt Functions
 | 
			
		||||
# - DNS zone functions
 | 
			
		||||
# - Client functions
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -135,7 +135,7 @@ _get_root() {
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug2 "Checking domain: $h"
 | 
			
		||||
    if ! jd_rest GET "domain"; then
 | 
			
		||||
      _err "error get domain list"
 | 
			
		||||
@@ -153,7 +153,7 @@ _get_root() {
 | 
			
		||||
      if [ "$hostedzone" ]; then
 | 
			
		||||
        _domain_id="$(echo "$hostedzone" | tr ',' '\n' | grep "\"id\":" | cut -d : -f 2)"
 | 
			
		||||
        if [ "$_domain_id" ]; then
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
          _domain=$h
 | 
			
		||||
          return 0
 | 
			
		||||
        fi
 | 
			
		||||
 
 | 
			
		||||
@@ -7,7 +7,7 @@ Options:
 | 
			
		||||
 JOKER_USERNAME Username
 | 
			
		||||
 JOKER_PASSWORD Password
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/2840
 | 
			
		||||
Author: <https://github.com/aattww/>
 | 
			
		||||
Author: @aattww
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
JOKER_API="https://svc.joker.com/nic/replace"
 | 
			
		||||
@@ -80,7 +80,7 @@ _get_root() {
 | 
			
		||||
  fulldomain=$1
 | 
			
		||||
  i=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$fulldomain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$fulldomain" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug h "$h"
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      return 1
 | 
			
		||||
 
 | 
			
		||||
@@ -102,7 +102,7 @@ _get_root() {
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
@@ -113,7 +113,7 @@ _get_root() {
 | 
			
		||||
    if _contains "$response" '"OK":false'; then
 | 
			
		||||
      _debug "$h not found"
 | 
			
		||||
    else
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										100
									
								
								dnsapi/dns_la.sh
									
									
									
									
									
								
							
							
						
						
									
										100
									
								
								dnsapi/dns_la.sh
									
									
									
									
									
								
							@@ -1,14 +1,17 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# LA_Id="123"
 | 
			
		||||
# LA_Sk="456"
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_la_info='dns.la
 | 
			
		||||
Site: dns.la
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_la
 | 
			
		||||
Options:
 | 
			
		||||
 LA_Id API ID
 | 
			
		||||
 LA_Key API key
 | 
			
		||||
 LA_Id APIID
 | 
			
		||||
 LA_Sk APISecret
 | 
			
		||||
 LA_Token 用冒号连接 APIID APISecret 再base64生成
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/4257
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
LA_Api="https://api.dns.la/api"
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
@@ -19,18 +22,23 @@ dns_la_add() {
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
 | 
			
		||||
  LA_Id="${LA_Id:-$(_readaccountconf_mutable LA_Id)}"
 | 
			
		||||
  LA_Key="${LA_Key:-$(_readaccountconf_mutable LA_Key)}"
 | 
			
		||||
  LA_Sk="${LA_Sk:-$(_readaccountconf_mutable LA_Sk)}"
 | 
			
		||||
  _log "LA_Id=$LA_Id"
 | 
			
		||||
  _log "LA_Sk=$LA_Sk"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$LA_Id" ] || [ -z "$LA_Key" ]; then
 | 
			
		||||
  if [ -z "$LA_Id" ] || [ -z "$LA_Sk" ]; then
 | 
			
		||||
    LA_Id=""
 | 
			
		||||
    LA_Key=""
 | 
			
		||||
    LA_Sk=""
 | 
			
		||||
    _err "You didn't specify a dnsla api id and key yet."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  #save the api key and email to the account conf file.
 | 
			
		||||
  _saveaccountconf_mutable LA_Id "$LA_Id"
 | 
			
		||||
  _saveaccountconf_mutable LA_Key "$LA_Key"
 | 
			
		||||
  _saveaccountconf_mutable LA_Sk "$LA_Sk"
 | 
			
		||||
 | 
			
		||||
  # generate dnsla token
 | 
			
		||||
  _la_token
 | 
			
		||||
 | 
			
		||||
  _debug "First detect the root zone"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
@@ -42,11 +50,13 @@ dns_la_add() {
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
 | 
			
		||||
  _info "Adding record"
 | 
			
		||||
  if _la_rest "record.ashx?cmd=create&apiid=$LA_Id&apipass=$LA_Key&rtype=json&domainid=$_domain_id&host=$_sub_domain&recordtype=TXT&recorddata=$txtvalue&recordline="; then
 | 
			
		||||
    if _contains "$response" '"resultid":'; then
 | 
			
		||||
 | 
			
		||||
  # record type is enum in new api, 16 for TXT
 | 
			
		||||
  if _la_post "{\"domainId\":\"$_domain_id\",\"type\":16,\"host\":\"$_sub_domain\",\"data\":\"$txtvalue\",\"ttl\":600}" "record"; then
 | 
			
		||||
    if _contains "$response" '"id":'; then
 | 
			
		||||
      _info "Added, OK"
 | 
			
		||||
      return 0
 | 
			
		||||
    elif _contains "$response" '"code":532'; then
 | 
			
		||||
    elif _contains "$response" '"msg":"与已有记录冲突"'; then
 | 
			
		||||
      _info "Already exists, OK"
 | 
			
		||||
      return 0
 | 
			
		||||
    else
 | 
			
		||||
@@ -54,7 +64,7 @@ dns_la_add() {
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  fi
 | 
			
		||||
  _err "Add txt record error."
 | 
			
		||||
  _err "Add txt record failed."
 | 
			
		||||
  return 1
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
@@ -65,7 +75,9 @@ dns_la_rm() {
 | 
			
		||||
  txtvalue=$2
 | 
			
		||||
 | 
			
		||||
  LA_Id="${LA_Id:-$(_readaccountconf_mutable LA_Id)}"
 | 
			
		||||
  LA_Key="${LA_Key:-$(_readaccountconf_mutable LA_Key)}"
 | 
			
		||||
  LA_Sk="${LA_Sk:-$(_readaccountconf_mutable LA_Sk)}"
 | 
			
		||||
 | 
			
		||||
  _la_token
 | 
			
		||||
 | 
			
		||||
  _debug "First detect the root zone"
 | 
			
		||||
  if ! _get_root "$fulldomain"; then
 | 
			
		||||
@@ -77,27 +89,29 @@ dns_la_rm() {
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
 | 
			
		||||
  _debug "Getting txt records"
 | 
			
		||||
  if ! _la_rest "record.ashx?cmd=listn&apiid=$LA_Id&apipass=$LA_Key&rtype=json&domainid=$_domain_id&domain=$_domain&host=$_sub_domain&recordtype=TXT&recorddata=$txtvalue"; then
 | 
			
		||||
  # record type is enum in new api, 16 for TXT
 | 
			
		||||
  if ! _la_get "recordList?pageIndex=1&pageSize=10&domainId=$_domain_id&host=$_sub_domain&type=16&data=$txtvalue"; then
 | 
			
		||||
    _err "Error"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if ! _contains "$response" '"recordid":'; then
 | 
			
		||||
  if ! _contains "$response" '"id":'; then
 | 
			
		||||
    _info "Don't need to remove."
 | 
			
		||||
    return 0
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  record_id=$(printf "%s" "$response" | grep '"recordid":' | cut -d : -f 2 | cut -d , -f 1 | tr -d '\r' | tr -d '\n')
 | 
			
		||||
  record_id=$(printf "%s" "$response" | grep '"id":' | _head_n 1 | sed 's/.*"id": *"\([^"]*\)".*/\1/')
 | 
			
		||||
  _debug "record_id" "$record_id"
 | 
			
		||||
  if [ -z "$record_id" ]; then
 | 
			
		||||
    _err "Can not get record id to remove."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  if ! _la_rest "record.ashx?cmd=remove&apiid=$LA_Id&apipass=$LA_Key&rtype=json&domainid=$_domain_id&domain=$_domain&recordid=$record_id"; then
 | 
			
		||||
  # remove record in new api is RESTful
 | 
			
		||||
  if ! _la_post "" "record?id=$record_id" "DELETE"; then
 | 
			
		||||
    _err "Delete record error."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _contains "$response" '"code":300'
 | 
			
		||||
  _contains "$response" '"code":200'
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -113,20 +127,21 @@ _get_root() {
 | 
			
		||||
  p=1
 | 
			
		||||
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if ! _la_rest "domain.ashx?cmd=get&apiid=$LA_Id&apipass=$LA_Key&rtype=json&domain=$h"; then
 | 
			
		||||
    if ! _la_get "domain?domain=$h"; then
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" '"domainid":'; then
 | 
			
		||||
      _domain_id=$(printf "%s" "$response" | grep '"domainid":' | cut -d : -f 2 | cut -d , -f 1 | tr -d '\r' | tr -d '\n')
 | 
			
		||||
    if _contains "$response" '"domain":'; then
 | 
			
		||||
      _domain_id=$(echo "$response" | sed -n 's/.*"id":"\([^"]*\)".*/\1/p')
 | 
			
		||||
      _log "_domain_id" "$_domain_id"
 | 
			
		||||
      if [ "$_domain_id" ]; then
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
        _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
        _domain="$h"
 | 
			
		||||
        return 0
 | 
			
		||||
      fi
 | 
			
		||||
@@ -143,6 +158,21 @@ _la_rest() {
 | 
			
		||||
  url="$LA_Api/$1"
 | 
			
		||||
  _debug "$url"
 | 
			
		||||
 | 
			
		||||
  if ! response="$(_get "$url" "Authorization: Basic $LA_Token" | tr -d ' ' | tr "}" ",")"; then
 | 
			
		||||
    _err "Error: $url"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_la_get() {
 | 
			
		||||
  url="$LA_Api/$1"
 | 
			
		||||
  _debug "$url"
 | 
			
		||||
 | 
			
		||||
  export _H1="Authorization: Basic $LA_Token"
 | 
			
		||||
 | 
			
		||||
  if ! response="$(_get "$url" | tr -d ' ' | tr "}" ",")"; then
 | 
			
		||||
    _err "Error: $url"
 | 
			
		||||
    return 1
 | 
			
		||||
@@ -151,3 +181,29 @@ _la_rest() {
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Usage:  _la_post body url [POST|PUT|DELETE]
 | 
			
		||||
_la_post() {
 | 
			
		||||
  body=$1
 | 
			
		||||
  url="$LA_Api/$2"
 | 
			
		||||
  http_method=$3
 | 
			
		||||
  _debug "$body"
 | 
			
		||||
  _debug "$url"
 | 
			
		||||
 | 
			
		||||
  export _H1="Authorization: Basic $LA_Token"
 | 
			
		||||
 | 
			
		||||
  if ! response="$(_post "$body" "$url" "" "$http_method")"; then
 | 
			
		||||
    _err "Error: $url"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _debug2 response "$response"
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
_la_token() {
 | 
			
		||||
  LA_Token=$(printf "%s:%s" "$LA_Id" "$LA_Sk" | _base64)
 | 
			
		||||
  _debug "$LA_Token"
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -1,13 +1,13 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Created by Laraveluser
 | 
			
		||||
#
 | 
			
		||||
# Pass credentials before "acme.sh --issue --dns dns_limacity ..."
 | 
			
		||||
# --
 | 
			
		||||
# export LIMACITY_APIKEY="<API-KEY>"
 | 
			
		||||
# --
 | 
			
		||||
#
 | 
			
		||||
# Pleas note: APIKEY must have following roles: dns.admin, domains.reader
 | 
			
		||||
# shellcheck disable=SC2034
 | 
			
		||||
dns_limacity_info='lima-city.de
 | 
			
		||||
Site: www.lima-city.de
 | 
			
		||||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_limacity
 | 
			
		||||
Options:
 | 
			
		||||
 LIMACITY_APIKEY API Key. Note: The API Key must have following roles: dns.admin, domains.reader
 | 
			
		||||
Issues: github.com/acmesh-official/acme.sh/issues/4758
 | 
			
		||||
Author: @Laraveluser
 | 
			
		||||
'
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
@@ -69,7 +69,7 @@ _lima_get_domain_id() {
 | 
			
		||||
  if [ "$(echo "$domains" | _egrep_o "\{.*""domains""")" ]; then
 | 
			
		||||
    response="$(echo "$domains" | tr -d "\n" | tr '{' "|" | sed 's/|/&{/g' | tr "|" "\n")"
 | 
			
		||||
    while true; do
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
      _debug h "$h"
 | 
			
		||||
      if [ -z "$h" ]; then
 | 
			
		||||
        #not valid
 | 
			
		||||
@@ -80,7 +80,7 @@ _lima_get_domain_id() {
 | 
			
		||||
      if [ "$hostedzone" ]; then
 | 
			
		||||
        LIMACITY_DOMAINID=$(printf "%s\n" "$hostedzone" | _egrep_o "\"id\":\s*[0-9]+" | _head_n 1 | cut -d : -f 2 | tr -d \ )
 | 
			
		||||
        if [ "$LIMACITY_DOMAINID" ]; then
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
          _domain=$h
 | 
			
		||||
          return 0
 | 
			
		||||
        fi
 | 
			
		||||
 
 | 
			
		||||
@@ -136,7 +136,7 @@ _get_root() {
 | 
			
		||||
  if _rest GET "domain.list"; then
 | 
			
		||||
    response="$(echo "$response" | tr -d "\n" | tr '{' "|" | sed 's/|/&{/g' | tr "|" "\n")"
 | 
			
		||||
    while true; do
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
      _debug h "$h"
 | 
			
		||||
      if [ -z "$h" ]; then
 | 
			
		||||
        #not valid
 | 
			
		||||
@@ -147,7 +147,7 @@ _get_root() {
 | 
			
		||||
      if [ "$hostedzone" ]; then
 | 
			
		||||
        _domain_id=$(printf "%s\n" "$hostedzone" | _egrep_o "\"DOMAINID\":\s*[0-9]+" | _head_n 1 | cut -d : -f 2 | tr -d \ )
 | 
			
		||||
        if [ "$_domain_id" ]; then
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
          _domain=$h
 | 
			
		||||
          return 0
 | 
			
		||||
        fi
 | 
			
		||||
 
 | 
			
		||||
@@ -76,7 +76,7 @@ dns_linode_v4_rm() {
 | 
			
		||||
  _debug _sub_domain "$_sub_domain"
 | 
			
		||||
  _debug _domain "$_domain"
 | 
			
		||||
 | 
			
		||||
  if _rest GET "/$_domain_id/records" && [ -n "$response" ]; then
 | 
			
		||||
  if _H4="X-Filter: { \"type\": \"TXT\", \"name\": \"$_sub_domain\" }" _rest GET "/$_domain_id/records" && [ -n "$response" ]; then
 | 
			
		||||
    response="$(echo "$response" | tr -d "\n" | tr '{' "|" | sed 's/|/&{/g' | tr "|" "\n")"
 | 
			
		||||
 | 
			
		||||
    resource="$(echo "$response" | _egrep_o "\{.*\"name\": *\"$_sub_domain\".*}")"
 | 
			
		||||
@@ -131,34 +131,42 @@ _Linode_API() {
 | 
			
		||||
# _domain=domain.com
 | 
			
		||||
# _domain_id=12345
 | 
			
		||||
_get_root() {
 | 
			
		||||
  domain=$1
 | 
			
		||||
  full_host_str="$1"
 | 
			
		||||
 | 
			
		||||
  i=2
 | 
			
		||||
  p=1
 | 
			
		||||
  while true; do
 | 
			
		||||
    # loop through the received string (e.g.  _acme-challenge.sub3.sub2.sub1.domain.tld),
 | 
			
		||||
    # starting from the lowest subdomain, and check if it's a hosted domain
 | 
			
		||||
    tst_hosted_domain=$(printf "%s" "$full_host_str" | cut -d . -f "$i"-100)
 | 
			
		||||
    _debug tst_hosted_domain "$tst_hosted_domain"
 | 
			
		||||
    if [ -z "$tst_hosted_domain" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      _err "Couldn't get domain from string '$full_host_str'."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
  if _rest GET; then
 | 
			
		||||
    response="$(echo "$response" | tr -d "\n" | tr '{' "|" | sed 's/|/&{/g' | tr "|" "\n")"
 | 
			
		||||
    while true; do
 | 
			
		||||
      h=$(printf "%s" "$domain" | cut -d . -f $i-100)
 | 
			
		||||
      _debug h "$h"
 | 
			
		||||
      if [ -z "$h" ]; then
 | 
			
		||||
        #not valid
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      hostedzone="$(echo "$response" | _egrep_o "\{.*\"domain\": *\"$h\".*}")"
 | 
			
		||||
    _debug "Querying Linode APIv4 for hosted zone: $tst_hosted_domain"
 | 
			
		||||
    if _H4="X-Filter: {\"domain\":\"$tst_hosted_domain\"}" _rest GET; then
 | 
			
		||||
      _debug "Got response from API: $response"
 | 
			
		||||
      response="$(echo "$response" | tr -d "\n" | tr '{' "|" | sed 's/|/&{/g' | tr "|" "\n")"
 | 
			
		||||
      hostedzone="$(echo "$response" | _egrep_o "\{.*\"domain\": *\"$tst_hosted_domain\".*}")"
 | 
			
		||||
      if [ "$hostedzone" ]; then
 | 
			
		||||
        _domain_id=$(printf "%s\n" "$hostedzone" | _egrep_o "\"id\": *[0-9]+" | _head_n 1 | cut -d : -f 2 | tr -d \ )
 | 
			
		||||
        _debug "Found domain hosted on Linode DNS. Zone: $tst_hosted_domain, id: $_domain_id"
 | 
			
		||||
        if [ "$_domain_id" ]; then
 | 
			
		||||
          _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
          _domain=$h
 | 
			
		||||
          _sub_domain=$(printf "%s" "$full_host_str" | cut -d . -f 1-"$p")
 | 
			
		||||
          _domain=$tst_hosted_domain
 | 
			
		||||
          return 0
 | 
			
		||||
        fi
 | 
			
		||||
        return 1
 | 
			
		||||
      fi
 | 
			
		||||
 | 
			
		||||
      p=$i
 | 
			
		||||
      i=$(_math "$i" + 1)
 | 
			
		||||
    done
 | 
			
		||||
  fi
 | 
			
		||||
    fi
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  return 1
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -180,14 +180,14 @@ _get_root() {
 | 
			
		||||
 | 
			
		||||
  response="$(_post "$xml_content" "$LOOPIA_Api" "" "POST")"
 | 
			
		||||
  while true; do
 | 
			
		||||
    h=$(echo "$domain" | cut -d . -f $i-100)
 | 
			
		||||
    h=$(echo "$domain" | cut -d . -f "$i"-100)
 | 
			
		||||
    if [ -z "$h" ]; then
 | 
			
		||||
      #not valid
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    if _contains "$response" "$h"; then
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
 | 
			
		||||
      _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p")
 | 
			
		||||
      _domain="$h"
 | 
			
		||||
      return 0
 | 
			
		||||
    fi
 | 
			
		||||
 
 | 
			
		||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user