mirror of
https://github.com/acmesh-official/acme.sh
synced 2025-11-03 21:42:09 +08:00
Compare commits
18 Commits
3c1f0725fb
...
d527e41efd
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
d527e41efd | ||
|
|
15197455f2 | ||
|
|
2584f09083 | ||
|
|
d439933b52 | ||
|
|
3252e0ce2e | ||
|
|
014a781426 | ||
|
|
2f5ea120cb | ||
|
|
3f40380c69 | ||
|
|
1116b73a08 | ||
|
|
bfba44fbad | ||
|
|
c466f063c8 | ||
|
|
295af01687 | ||
|
|
e7284df1df | ||
|
|
3b46060caa | ||
|
|
696182cfa4 | ||
|
|
d1a1d1da8f | ||
|
|
c508984f56 | ||
|
|
54eba51b35 |
4
acme.sh
4
acme.sh
@@ -5804,7 +5804,7 @@ list() {
|
||||
_sep="|"
|
||||
if [ "$_raw" ]; then
|
||||
if [ -z "$_domain" ]; then
|
||||
printf "%s\n" "Main_Domain${_sep}KeyLength${_sep}SAN_Domains${_sep}CA${_sep}Created${_sep}Renew"
|
||||
printf "%s\n" "Main_Domain${_sep}KeyLength${_sep}SAN_Domains${_sep}Profile${_sep}CA${_sep}Created${_sep}Renew"
|
||||
fi
|
||||
for di in "${CERT_HOME}"/*.*/; do
|
||||
d=$(basename "$di")
|
||||
@@ -5819,7 +5819,7 @@ list() {
|
||||
. "$DOMAIN_CONF"
|
||||
_ca="$(_getCAShortName "$Le_API")"
|
||||
if [ -z "$_domain" ]; then
|
||||
printf "%s\n" "$Le_Domain${_sep}\"$Le_Keylength\"${_sep}$Le_Alt${_sep}$_ca${_sep}$Le_CertCreateTimeStr${_sep}$Le_NextRenewTimeStr"
|
||||
printf "%s\n" "$Le_Domain${_sep}\"$Le_Keylength\"${_sep}$Le_Alt${_sep}$Le_Certificate_Profile${_sep}$_ca${_sep}$Le_CertCreateTimeStr${_sep}$Le_NextRenewTimeStr"
|
||||
else
|
||||
if [ "$_domain" = "$d" ]; then
|
||||
cat "$DOMAIN_CONF"
|
||||
|
||||
56
deploy/cachefly.sh
Normal file
56
deploy/cachefly.sh
Normal file
@@ -0,0 +1,56 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
# Script to deploy certificate to CacheFly
|
||||
# https://api.cachefly.com/api/2.5/docs#tag/Certificates/paths/~1certificates/post
|
||||
|
||||
# This deployment required following variables
|
||||
# export CACHEFLY_TOKEN="Your CacheFly API Token"
|
||||
|
||||
# returns 0 means success, otherwise error.
|
||||
|
||||
######## Public functions #####################
|
||||
|
||||
#domain keyfile certfile cafile fullchain
|
||||
CACHEFLY_API_BASE="https://api.cachefly.com/api/2.5"
|
||||
|
||||
cachefly_deploy() {
|
||||
_cdomain="$1"
|
||||
_ckey="$2"
|
||||
_ccert="$3"
|
||||
_cca="$4"
|
||||
_cfullchain="$5"
|
||||
|
||||
_debug _cdomain "$_cdomain"
|
||||
_debug _ckey "$_ckey"
|
||||
_debug _ccert "$_ccert"
|
||||
_debug _cca "$_cca"
|
||||
_debug _cfullchain "$_cfullchain"
|
||||
|
||||
if [ -z "$CACHEFLY_TOKEN" ]; then
|
||||
_err "CACHEFLY_TOKEN is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf CACHEFLY_TOKEN "$CACHEFLY_TOKEN"
|
||||
fi
|
||||
|
||||
_info "Deploying certificate to CacheFly..."
|
||||
|
||||
## upload certificate
|
||||
string_fullchain=$(sed 's/$/\\n/' "$_cfullchain" | tr -d '\n')
|
||||
string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
|
||||
|
||||
_request_body="{\"certificate\":\"$string_fullchain\",\"certificateKey\":\"$string_key\"}"
|
||||
_debug _request_body "$_request_body"
|
||||
_debug CACHEFLY_TOKEN "$CACHEFLY_TOKEN"
|
||||
export _H1="Authorization: Bearer $CACHEFLY_TOKEN"
|
||||
_response=$(_post "$_request_body" "$CACHEFLY_API_BASE/certificates" "" "POST" "application/json")
|
||||
|
||||
if _contains "$_response" "message"; then
|
||||
_err "Error in deploying $_cdomain certificate to CacheFly."
|
||||
_err "$_response"
|
||||
return 1
|
||||
fi
|
||||
_debug response "$_response"
|
||||
_info "Domain $_cdomain certificate successfully deployed to CacheFly."
|
||||
return 0
|
||||
}
|
||||
86
deploy/directadmin.sh
Normal file
86
deploy/directadmin.sh
Normal file
@@ -0,0 +1,86 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
# Script to deploy certificate to DirectAdmin
|
||||
# https://docs.directadmin.com/directadmin/customizing-workflow/api-all-about.html#creating-a-login-key
|
||||
# https://docs.directadmin.com/changelog/version-1.24.4.html#cmd-api-catch-all-pop-passwords-frontpage-protected-dirs-ssl-certs
|
||||
|
||||
# This deployment required following variables
|
||||
# export DirectAdmin_SCHEME="https" # Optional, https or http, defaults to https
|
||||
# export DirectAdmin_ENDPOINT="example.com:2222"
|
||||
# export DirectAdmin_USERNAME="Your DirectAdmin Username"
|
||||
# export DirectAdmin_KEY="Your DirectAdmin Login Key or Password"
|
||||
# export DirectAdmin_MAIN_DOMAIN="Your DirectAdmin Main Domain, NOT Subdomain"
|
||||
|
||||
# returns 0 means success, otherwise error.
|
||||
|
||||
######## Public functions #####################
|
||||
|
||||
#domain keyfile certfile cafile fullchain
|
||||
directadmin_deploy() {
|
||||
_cdomain="$1"
|
||||
_ckey="$2"
|
||||
_ccert="$3"
|
||||
_cca="$4"
|
||||
_cfullchain="$5"
|
||||
|
||||
_debug _cdomain "$_cdomain"
|
||||
_debug _ckey "$_ckey"
|
||||
_debug _ccert "$_ccert"
|
||||
_debug _cca "$_cca"
|
||||
_debug _cfullchain "$_cfullchain"
|
||||
|
||||
if [ -z "$DirectAdmin_ENDPOINT" ]; then
|
||||
_err "DirectAdmin_ENDPOINT is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DirectAdmin_ENDPOINT "$DirectAdmin_ENDPOINT"
|
||||
fi
|
||||
if [ -z "$DirectAdmin_USERNAME" ]; then
|
||||
_err "DirectAdmin_USERNAME is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DirectAdmin_USERNAME "$DirectAdmin_USERNAME"
|
||||
fi
|
||||
if [ -z "$DirectAdmin_KEY" ]; then
|
||||
_err "DirectAdmin_KEY is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DirectAdmin_KEY "$DirectAdmin_KEY"
|
||||
fi
|
||||
if [ -z "$DirectAdmin_MAIN_DOMAIN" ]; then
|
||||
_err "DirectAdmin_MAIN_DOMAIN is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DirectAdmin_MAIN_DOMAIN "$DirectAdmin_MAIN_DOMAIN"
|
||||
fi
|
||||
|
||||
# Optional SCHEME
|
||||
_getdeployconf DirectAdmin_SCHEME
|
||||
# set default values for DirectAdmin_SCHEME
|
||||
[ -n "${DirectAdmin_SCHEME}" ] || DirectAdmin_SCHEME="https"
|
||||
|
||||
_info "Deploying certificate to DirectAdmin..."
|
||||
|
||||
# upload certificate
|
||||
string_cfullchain=$(sed 's/$/\\n/' "$_cfullchain" | tr -d '\n')
|
||||
string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
|
||||
|
||||
_request_body="{\"domain\":\"$DirectAdmin_MAIN_DOMAIN\",\"action\":\"save\",\"type\":\"paste\",\"certificate\":\"$string_key\n$string_cfullchain\n\"}"
|
||||
_debug _request_body "$_request_body"
|
||||
_debug DirectAdmin_ENDPOINT "$DirectAdmin_ENDPOINT"
|
||||
_debug DirectAdmin_USERNAME "$DirectAdmin_USERNAME"
|
||||
_debug DirectAdmin_KEY "$DirectAdmin_KEY"
|
||||
_debug DirectAdmin_MAIN_DOMAIN "$DirectAdmin_MAIN_DOMAIN"
|
||||
_response=$(_post "$_request_body" "$DirectAdmin_SCHEME://$DirectAdmin_USERNAME:$DirectAdmin_KEY@$DirectAdmin_ENDPOINT/CMD_API_SSL" "" "POST" "application/json")
|
||||
|
||||
if _contains "$_response" "error=1"; then
|
||||
_err "Error in deploying $_cdomain certificate to DirectAdmin Domain $DirectAdmin_MAIN_DOMAIN."
|
||||
_err "$_response"
|
||||
return 1
|
||||
fi
|
||||
|
||||
_info "$_response"
|
||||
_info "Domain $_cdomain certificate successfully deployed to DirectAdmin Domain $DirectAdmin_MAIN_DOMAIN."
|
||||
|
||||
return 0
|
||||
}
|
||||
86
deploy/edgio.sh
Normal file
86
deploy/edgio.sh
Normal file
@@ -0,0 +1,86 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
# Here is a script to deploy cert to edgio using its API
|
||||
# https://docs.edg.io/guides/v7/develop/rest_api/authentication
|
||||
# https://docs.edg.io/rest_api/#tag/tls-certs/operation/postConfigV01TlsCerts
|
||||
|
||||
# This deployment required following variables
|
||||
# export EDGIO_CLIENT_ID="Your Edgio Client ID"
|
||||
# export EDGIO_CLIENT_SECRET="Your Edgio Client Secret"
|
||||
# export EDGIO_ENVIRONMENT_ID="Your Edgio Environment ID"
|
||||
|
||||
# If have more than one Environment ID
|
||||
# export EDGIO_ENVIRONMENT_ID="ENVIRONMENT_ID_1 ENVIRONMENT_ID_2"
|
||||
|
||||
# returns 0 means success, otherwise error.
|
||||
|
||||
######## Public functions #####################
|
||||
|
||||
#domain keyfile certfile cafile fullchain
|
||||
edgio_deploy() {
|
||||
_cdomain="$1"
|
||||
_ckey="$2"
|
||||
_ccert="$3"
|
||||
_cca="$4"
|
||||
_cfullchain="$5"
|
||||
|
||||
_debug _cdomain "$_cdomain"
|
||||
_debug _ckey "$_ckey"
|
||||
_debug _ccert "$_ccert"
|
||||
_debug _cca "$_cca"
|
||||
_debug _cfullchain "$_cfullchain"
|
||||
|
||||
if [ -z "$EDGIO_CLIENT_ID" ]; then
|
||||
_err "EDGIO_CLIENT_ID is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf EDGIO_CLIENT_ID "$EDGIO_CLIENT_ID"
|
||||
fi
|
||||
|
||||
if [ -z "$EDGIO_CLIENT_SECRET" ]; then
|
||||
_err "EDGIO_CLIENT_SECRET is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf EDGIO_CLIENT_SECRET "$EDGIO_CLIENT_SECRET"
|
||||
fi
|
||||
|
||||
if [ -z "$EDGIO_ENVIRONMENT_ID" ]; then
|
||||
_err "EDGIO_ENVIRONMENT_ID is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf EDGIO_ENVIRONMENT_ID "$EDGIO_ENVIRONMENT_ID"
|
||||
fi
|
||||
|
||||
_info "Getting access token"
|
||||
_data="client_id=$EDGIO_CLIENT_ID&client_secret=$EDGIO_CLIENT_SECRET&grant_type=client_credentials&scope=app.config"
|
||||
_debug Get_access_token_data "$_data"
|
||||
_response=$(_post "$_data" "https://id.edgio.app/connect/token" "" "POST" "application/x-www-form-urlencoded")
|
||||
_debug Get_access_token_response "$_response"
|
||||
_access_token=$(echo "$_response" | _json_decode | _egrep_o '"access_token":"[^"]*' | cut -d : -f 2 | tr -d '"')
|
||||
_debug _access_token "$_access_token"
|
||||
if [ -z "$_access_token" ]; then
|
||||
_err "Error in getting access token"
|
||||
return 1
|
||||
fi
|
||||
|
||||
_info "Uploading certificate"
|
||||
string_ccert=$(sed 's/$/\\n/' "$_ccert" | tr -d '\n')
|
||||
string_cca=$(sed 's/$/\\n/' "$_cca" | tr -d '\n')
|
||||
string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
|
||||
|
||||
for ENVIRONMENT_ID in $EDGIO_ENVIRONMENT_ID; do
|
||||
_data="{\"environment_id\":\"$ENVIRONMENT_ID\",\"primary_cert\":\"$string_ccert\",\"intermediate_cert\":\"$string_cca\",\"private_key\":\"$string_key\"}"
|
||||
_debug Upload_certificate_data "$_data"
|
||||
_H1="Authorization: Bearer $_access_token"
|
||||
_response=$(_post "$_data" "https://edgioapis.com/config/v0.1/tls-certs" "" "POST" "application/json")
|
||||
if _contains "$_response" "message"; then
|
||||
_err "Error in deploying $_cdomain certificate to Edgio ENVIRONMENT_ID $ENVIRONMENT_ID."
|
||||
_err "$_response"
|
||||
return 1
|
||||
fi
|
||||
_debug Upload_certificate_response "$_response"
|
||||
_info "Domain $_cdomain certificate successfully deployed to Edgio ENVIRONMENT_ID $ENVIRONMENT_ID."
|
||||
done
|
||||
|
||||
return 0
|
||||
}
|
||||
131
deploy/keyhelp.sh
Normal file
131
deploy/keyhelp.sh
Normal file
@@ -0,0 +1,131 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
# Script to deploy certificate to KeyHelp
|
||||
# This deployment required following variables
|
||||
# export DEPLOY_KEYHELP_BASEURL="https://keyhelp.example.com"
|
||||
# export DEPLOY_KEYHELP_USERNAME="Your KeyHelp Username"
|
||||
# export DEPLOY_KEYHELP_PASSWORD="Your KeyHelp Password"
|
||||
# export DEPLOY_KEYHELP_DOMAIN_ID="Depoly certificate to this Domain ID"
|
||||
|
||||
# Open the 'Edit domain' page, and you will see id=xxx at the end of the URL. This is the Domain ID.
|
||||
# https://DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit&id=xxx
|
||||
|
||||
# If have more than one domain name
|
||||
# export DEPLOY_KEYHELP_DOMAIN_ID="111 222 333"
|
||||
|
||||
keyhelp_deploy() {
|
||||
_cdomain="$1"
|
||||
_ckey="$2"
|
||||
_ccert="$3"
|
||||
_cca="$4"
|
||||
_cfullchain="$5"
|
||||
|
||||
_debug _cdomain "$_cdomain"
|
||||
_debug _ckey "$_ckey"
|
||||
_debug _ccert "$_ccert"
|
||||
_debug _cca "$_cca"
|
||||
_debug _cfullchain "$_cfullchain"
|
||||
|
||||
if [ -z "$DEPLOY_KEYHELP_BASEURL" ]; then
|
||||
_err "DEPLOY_KEYHELP_BASEURL is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DEPLOY_KEYHELP_BASEURL "$DEPLOY_KEYHELP_BASEURL"
|
||||
fi
|
||||
|
||||
if [ -z "$DEPLOY_KEYHELP_USERNAME" ]; then
|
||||
_err "DEPLOY_KEYHELP_USERNAME is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DEPLOY_KEYHELP_USERNAME "$DEPLOY_KEYHELP_USERNAME"
|
||||
fi
|
||||
|
||||
if [ -z "$DEPLOY_KEYHELP_PASSWORD" ]; then
|
||||
_err "DEPLOY_KEYHELP_PASSWORD is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DEPLOY_KEYHELP_PASSWORD "$DEPLOY_KEYHELP_PASSWORD"
|
||||
fi
|
||||
|
||||
if [ -z "$DEPLOY_KEYHELP_DOMAIN_ID" ]; then
|
||||
_err "DEPLOY_KEYHELP_DOMAIN_ID is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf DEPLOY_KEYHELP_DOMAIN_ID "$DEPLOY_KEYHELP_DOMAIN_ID"
|
||||
fi
|
||||
|
||||
# Optional DEPLOY_KEYHELP_ENFORCE_HTTPS
|
||||
_getdeployconf DEPLOY_KEYHELP_ENFORCE_HTTPS
|
||||
# set default values for DEPLOY_KEYHELP_ENFORCE_HTTPS
|
||||
[ -n "${DEPLOY_KEYHELP_ENFORCE_HTTPS}" ] || DEPLOY_KEYHELP_ENFORCE_HTTPS="1"
|
||||
|
||||
_info "Logging in to keyhelp panel"
|
||||
username_encoded="$(printf "%s" "${DEPLOY_KEYHELP_USERNAME}" | _url_encode)"
|
||||
password_encoded="$(printf "%s" "${DEPLOY_KEYHELP_PASSWORD}" | _url_encode)"
|
||||
_H1="Content-Type: application/x-www-form-urlencoded"
|
||||
_response=$(_get "$DEPLOY_KEYHELP_BASEURL/index.php?submit=1&username=$username_encoded&password=$password_encoded" "TRUE")
|
||||
_cookie="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _head_n 1 | cut -d " " -f 2)"
|
||||
|
||||
# If cookies is not empty then logon successful
|
||||
if [ -z "$_cookie" ]; then
|
||||
_err "Fail to get cookie."
|
||||
return 1
|
||||
fi
|
||||
_debug "cookie" "$_cookie"
|
||||
|
||||
_info "Uploading certificate"
|
||||
_date=$(date +"%Y%m%d")
|
||||
encoded_key="$(_url_encode <"$_ckey")"
|
||||
encoded_ccert="$(_url_encode <"$_ccert")"
|
||||
encoded_cca="$(_url_encode <"$_cca")"
|
||||
certificate_name="$_cdomain-$_date"
|
||||
|
||||
_request_body="submit=1&certificate_name=$certificate_name&add_type=upload&text_private_key=$encoded_key&text_certificate=$encoded_ccert&text_ca_certificate=$encoded_cca"
|
||||
_H1="Cookie: $_cookie"
|
||||
_response=$(_post "$_request_body" "$DEPLOY_KEYHELP_BASEURL/index.php?page=ssl_certificates&action=add" "" "POST")
|
||||
_message=$(echo "$_response" | grep -A 2 'message-body' | sed -n '/<div class="message-body ">/,/<\/div>/{//!p;}' | sed 's/<[^>]*>//g' | sed 's/^ *//;s/ *$//')
|
||||
_info "_message" "$_message"
|
||||
if [ -z "$_message" ]; then
|
||||
_err "Fail to upload certificate."
|
||||
return 1
|
||||
fi
|
||||
|
||||
for DOMAIN_ID in $DEPLOY_KEYHELP_DOMAIN_ID; do
|
||||
_info "Apply certificate to domain id $DOMAIN_ID"
|
||||
_response=$(_get "$DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit&id=$DOMAIN_ID")
|
||||
cert_value=$(echo "$_response" | grep "$certificate_name" | sed -n 's/.*value="\([^"]*\).*/\1/p')
|
||||
target_type=$(echo "$_response" | grep 'target_type' | grep 'checked' | sed -n 's/.*value="\([^"]*\).*/\1/p')
|
||||
if [ "$target_type" = "directory" ]; then
|
||||
path=$(echo "$_response" | awk '/name="path"/{getline; print}' | sed -n 's/.*value="\([^"]*\).*/\1/p')
|
||||
fi
|
||||
echo "$_response" | grep "is_prefer_https" | grep "checked" >/dev/null
|
||||
if [ $? -eq 0 ]; then
|
||||
is_prefer_https=1
|
||||
else
|
||||
is_prefer_https=0
|
||||
fi
|
||||
echo "$_response" | grep "hsts_enabled" | grep "checked" >/dev/null
|
||||
if [ $? -eq 0 ]; then
|
||||
hsts_enabled=1
|
||||
else
|
||||
hsts_enabled=0
|
||||
fi
|
||||
_debug "cert_value" "$cert_value"
|
||||
if [ -z "$cert_value" ]; then
|
||||
_err "Fail to get certificate id."
|
||||
return 1
|
||||
fi
|
||||
|
||||
_request_body="submit=1&id=$DOMAIN_ID&target_type=$target_type&path=$path&is_prefer_https=$is_prefer_https&hsts_enabled=$hsts_enabled&certificate_type=custom&certificate_id=$cert_value&enforce_https=$DEPLOY_KEYHELP_ENFORCE_HTTPS"
|
||||
_response=$(_post "$_request_body" "$DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit" "" "POST")
|
||||
_message=$(echo "$_response" | grep -A 2 'message-body' | sed -n '/<div class="message-body ">/,/<\/div>/{//!p;}' | sed 's/<[^>]*>//g' | sed 's/^ *//;s/ *$//')
|
||||
_info "_message" "$_message"
|
||||
if [ -z "$_message" ]; then
|
||||
_err "Fail to apply certificate."
|
||||
return 1
|
||||
fi
|
||||
done
|
||||
|
||||
_info "Domain $_cdomain certificate successfully deployed to KeyHelp Domain ID $DEPLOY_KEYHELP_DOMAIN_ID."
|
||||
return 0
|
||||
}
|
||||
148
deploy/localcopy.sh
Normal file
148
deploy/localcopy.sh
Normal file
@@ -0,0 +1,148 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
# Deploy-hook to very simply copy files to set directories and then
|
||||
# execute whatever reloadcmd the admin needs afterwards. This can be
|
||||
# useful for configurations where the "multideploy" hook (in development)
|
||||
# is used or when an admin wants ACME.SH to renew certs but needs to
|
||||
# manually configure deployment via an external script
|
||||
# (e.g. The deploy-freenas script for TrueNAS Core/Scale
|
||||
# https://github.com/danb35/deploy-freenas/ )
|
||||
#
|
||||
# If the same file is configured for the certificate key
|
||||
# and the certificate and/or full chain, a combined PEM file will
|
||||
# be output instead.
|
||||
#
|
||||
# Environment variables to be utilized are as follows:
|
||||
#
|
||||
# DEPLOY_LOCALCOPY_CERTKEY - /path/to/target/cert.key
|
||||
# DEPLOY_LOCALCOPY_CERTIFICATE - /path/to/target/cert.cer
|
||||
# DEPLOY_LOCALCOPY_FULLCHAIN - /path/to/target/fullchain.cer
|
||||
# DEPLOY_LOCALCOPY_CA - /path/to/target/ca.cer
|
||||
# DEPLOY_LOCALCOPY_PFX - /path/to/target/cert.pfx
|
||||
# DEPLOY_LOCALCOPY_RELOADCMD - "echo 'this is my cmd'"
|
||||
|
||||
######## Public functions #####################
|
||||
|
||||
#domain keyfile certfile cafile fullchain
|
||||
localcopy_deploy() {
|
||||
_cdomain="$1"
|
||||
_ckey="$2"
|
||||
_ccert="$3"
|
||||
_cca="$4"
|
||||
_cfullchain="$5"
|
||||
_cpfx="$6"
|
||||
|
||||
_debug _cdomain "$_cdomain"
|
||||
_debug _ckey "$_ckey"
|
||||
_debug _ccert "$_ccert"
|
||||
_debug _cca "$_cca"
|
||||
_debug _cfullchain "$_cfullchain"
|
||||
_debug _cpfx "$_cpfx"
|
||||
|
||||
_getdeployconf DEPLOY_LOCALCOPY_CERTIFICATE
|
||||
_getdeployconf DEPLOY_LOCALCOPY_CERTKEY
|
||||
_getdeployconf DEPLOY_LOCALCOPY_FULLCHAIN
|
||||
_getdeployconf DEPLOY_LOCALCOPY_CA
|
||||
_getdeployconf DEPLOY_LOCALCOPY_RELOADCMD
|
||||
_getdeployconf DEPLOY_LOCALCOPY_PFX
|
||||
_combined_target=""
|
||||
_combined_srccert=""
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_CERTKEY" ] &&
|
||||
{ [ "$DEPLOY_LOCALCOPY_CERTKEY" = "$DEPLOY_LOCALCOPY_FULLCHAIN" ] ||
|
||||
[ "$DEPLOY_LOCALCOPY_CERTKEY" = "$DEPLOY_LOCALCOPY_CERTIFICATE" ]; }; then
|
||||
|
||||
_combined_target="$DEPLOY_LOCALCOPY_CERTKEY"
|
||||
_savedeployconf DEPLOY_LOCALCOPY_CERTKEY "$DEPLOY_LOCALCOPY_CERTKEY"
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_CERTKEY" = "$DEPLOY_LOCALCOPY_CERTIFICATE" ]; then
|
||||
_combined_srccert="$_ccert"
|
||||
_savedeployconf DEPLOY_LOCALCOPY_CERTIFICATE "$DEPLOY_LOCALCOPY_CERTIFICATE"
|
||||
DEPLOY_LOCALCOPY_CERTIFICATE=""
|
||||
fi
|
||||
if [ "$DEPLOY_LOCALCOPY_CERTKEY" = "$DEPLOY_LOCALCOPY_FULLCHAIN" ]; then
|
||||
_combined_srccert="$_cfullchain"
|
||||
_savedeployconf DEPLOY_LOCALCOPY_FULLCHAIN "$DEPLOY_LOCALCOPY_FULLCHAIN"
|
||||
DEPLOY_LOCALCOPY_FULLCHAIN=""
|
||||
fi
|
||||
DEPLOY_LOCALCOPY_CERTKEY=""
|
||||
_info "Creating combined PEM at $_combined_target"
|
||||
_tmpfile="$(mktemp)"
|
||||
if ! cat "$_combined_srccert" "$_ckey" >"$_tmpfile"; then
|
||||
_err "Failed to build combined PEM file"
|
||||
return 1
|
||||
fi
|
||||
if ! mv "$_tmpfile" "$_combined_target"; then
|
||||
_err "Failed to move combined PEM into place"
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_CERTIFICATE" ]; then
|
||||
_info "Copying certificate"
|
||||
_debug "Copying $_ccert to $DEPLOY_LOCALCOPY_CERTIFICATE"
|
||||
if ! eval "cp $_ccert $DEPLOY_LOCALCOPY_CERTIFICATE"; then
|
||||
_err "Failed to copy certificate, aborting."
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_CERTKEY" ]; then
|
||||
_info "Copying certificate key"
|
||||
_debug "Copying $_ckey to $DEPLOY_LOCALCOPY_CERTKEY"
|
||||
if ! eval "cp $_ckey $DEPLOY_LOCALCOPY_CERTKEY"; then
|
||||
_err "Failed to copy certificate key, aborting."
|
||||
return 1
|
||||
fi
|
||||
_savedeployconf DEPLOY_LOCALCOPY_CERTKEY "$DEPLOY_LOCALCOPY_CERTKEY"
|
||||
fi
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_FULLCHAIN" ]; then
|
||||
_info "Copying fullchain"
|
||||
_debug "Copying $_cfullchain to $DEPLOY_LOCALCOPY_FULLCHAIN"
|
||||
if ! eval "cp $_cfullchain $DEPLOY_LOCALCOPY_FULLCHAIN"; then
|
||||
_err "Failed to copy fullchain, aborting."
|
||||
return 1
|
||||
fi
|
||||
_savedeployconf DEPLOY_LOCALCOPY_FULLCHAIN "$DEPLOY_LOCALCOPY_FULLCHAIN"
|
||||
fi
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_CA" ]; then
|
||||
_info "Copying CA"
|
||||
_debug "Copying $_cca to $DEPLOY_LOCALCOPY_CA"
|
||||
if ! eval "cp $_cca $DEPLOY_LOCALCOPY_CA"; then
|
||||
_err "Failed to copy CA, aborting."
|
||||
return 1
|
||||
fi
|
||||
_savedeployconf DEPLOY_LOCALCOPY_CA "$DEPLOY_LOCALCOPY_CA"
|
||||
fi
|
||||
|
||||
if [ "$DEPLOY_LOCALCOPY_PFX" ]; then
|
||||
_info "Copying PFX"
|
||||
_debug "Copying $_cpfx to $DEPLOY_LOCALCOPY_PFX"
|
||||
if ! eval "cp $_cpfx $DEPLOY_LOCALCOPY_PFX"; then
|
||||
_err "Failed to copy PFX, aborting."
|
||||
return 1
|
||||
fi
|
||||
_savedeployconf DEPLOY_LOCALCOPY_PFX "$DEPLOY_LOCALCOPY_PFX"
|
||||
fi
|
||||
|
||||
_reload=$DEPLOY_LOCALCOPY_RELOADCMD
|
||||
_debug "Running reloadcmd $_reload"
|
||||
|
||||
if [ -z "$_reload" ]; then
|
||||
_info "Reloadcmd not provided, skipping."
|
||||
else
|
||||
_info "Reloading"
|
||||
if eval "$_reload"; then
|
||||
_info "Reload successful."
|
||||
_savedeployconf DEPLOY_LOCALCOPY_RELOADCMD "$DEPLOY_LOCALCOPY_RELOADCMD" "base64"
|
||||
else
|
||||
_err "Reload failed."
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
|
||||
_info "$(__green "'localcopy' deploy success")"
|
||||
return 0
|
||||
}
|
||||
69
deploy/netlify.sh
Normal file
69
deploy/netlify.sh
Normal file
@@ -0,0 +1,69 @@
|
||||
#!/usr/bin/env sh
|
||||
|
||||
# Script to deploy certificate to Netlify
|
||||
# https://docs.netlify.com/api/get-started/#authentication
|
||||
# https://open-api.netlify.com/#tag/sniCertificate
|
||||
|
||||
# This deployment required following variables
|
||||
# export Netlify_ACCESS_TOKEN="Your Netlify Access Token"
|
||||
# export Netlify_SITE_ID="Your Netlify Site ID"
|
||||
|
||||
# If have more than one SITE ID
|
||||
# export Netlify_SITE_ID="SITE_ID_1 SITE_ID_2"
|
||||
|
||||
# returns 0 means success, otherwise error.
|
||||
|
||||
######## Public functions #####################
|
||||
|
||||
#domain keyfile certfile cafile fullchain
|
||||
netlify_deploy() {
|
||||
_cdomain="$1"
|
||||
_ckey="$2"
|
||||
_ccert="$3"
|
||||
_cca="$4"
|
||||
_cfullchain="$5"
|
||||
|
||||
_debug _cdomain "$_cdomain"
|
||||
_debug _ckey "$_ckey"
|
||||
_debug _ccert "$_ccert"
|
||||
_debug _cca "$_cca"
|
||||
_debug _cfullchain "$_cfullchain"
|
||||
|
||||
if [ -z "$Netlify_ACCESS_TOKEN" ]; then
|
||||
_err "Netlify_ACCESS_TOKEN is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf Netlify_ACCESS_TOKEN "$Netlify_ACCESS_TOKEN"
|
||||
fi
|
||||
if [ -z "$Netlify_SITE_ID" ]; then
|
||||
_err "Netlify_SITE_ID is not defined."
|
||||
return 1
|
||||
else
|
||||
_savedomainconf Netlify_SITE_ID "$Netlify_SITE_ID"
|
||||
fi
|
||||
|
||||
_info "Deploying certificate to Netlify..."
|
||||
|
||||
## upload certificate
|
||||
string_ccert=$(sed 's/$/\\n/' "$_ccert" | tr -d '\n')
|
||||
string_cca=$(sed 's/$/\\n/' "$_cca" | tr -d '\n')
|
||||
string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
|
||||
|
||||
for SITE_ID in $Netlify_SITE_ID; do
|
||||
_request_body="{\"certificate\":\"$string_ccert\",\"key\":\"$string_key\",\"ca_certificates\":\"$string_cca\"}"
|
||||
_debug _request_body "$_request_body"
|
||||
_debug Netlify_ACCESS_TOKEN "$Netlify_ACCESS_TOKEN"
|
||||
export _H1="Authorization: Bearer $Netlify_ACCESS_TOKEN"
|
||||
_response=$(_post "$_request_body" "https://api.netlify.com/api/v1/sites/$SITE_ID/ssl" "" "POST" "application/json")
|
||||
|
||||
if _contains "$_response" "\"error\""; then
|
||||
_err "Error in deploying $_cdomain certificate to Netlify SITE_ID $SITE_ID."
|
||||
_err "$_response"
|
||||
return 1
|
||||
fi
|
||||
_debug response "$_response"
|
||||
_info "Domain $_cdomain certificate successfully deployed to Netlify SITE_ID $SITE_ID."
|
||||
done
|
||||
|
||||
return 0
|
||||
}
|
||||
Reference in New Issue
Block a user