mirror of
				https://github.com/acmesh-official/acme.sh
				synced 2025-11-04 13:55:56 +08:00 
			
		
		
		
	Compare commits
	
		
			19 Commits
		
	
	
		
			9d6d4e100e
			...
			eb50360d60
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					eb50360d60 | ||
| 
						 | 
					15197455f2 | ||
| 
						 | 
					2f5ea120cb | ||
| 
						 | 
					3f40380c69 | ||
| 
						 | 
					1116b73a08 | ||
| 
						 | 
					bfba44fbad | ||
| 
						 | 
					c466f063c8 | ||
| 
						 | 
					295af01687 | ||
| 
						 | 
					e7284df1df | ||
| 
						 | 
					3b46060caa | ||
| 
						 | 
					696182cfa4 | ||
| 
						 | 
					d1a1d1da8f | ||
| 
						 | 
					c508984f56 | ||
| 
						 | 
					54eba51b35 | ||
| 
						 | 
					c9854870de | ||
| 
						 | 
					54035a304e | ||
| 
						 | 
					5477af4256 | ||
| 
						 | 
					72bf38c47c | ||
| 
						 | 
					39180230b2 | 
							
								
								
									
										56
									
								
								deploy/cachefly.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										56
									
								
								deploy/cachefly.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,56 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to CacheFly
 | 
			
		||||
# https://api.cachefly.com/api/2.5/docs#tag/Certificates/paths/~1certificates/post
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export CACHEFLY_TOKEN="Your CacheFly API Token"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
CACHEFLY_API_BASE="https://api.cachefly.com/api/2.5"
 | 
			
		||||
 | 
			
		||||
cachefly_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$CACHEFLY_TOKEN" ]; then
 | 
			
		||||
    _err "CACHEFLY_TOKEN is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf CACHEFLY_TOKEN "$CACHEFLY_TOKEN"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Deploying certificate to CacheFly..."
 | 
			
		||||
 | 
			
		||||
  ## upload certificate
 | 
			
		||||
  string_fullchain=$(sed 's/$/\\n/' "$_cfullchain" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  _request_body="{\"certificate\":\"$string_fullchain\",\"certificateKey\":\"$string_key\"}"
 | 
			
		||||
  _debug _request_body "$_request_body"
 | 
			
		||||
  _debug CACHEFLY_TOKEN "$CACHEFLY_TOKEN"
 | 
			
		||||
  export _H1="Authorization: Bearer $CACHEFLY_TOKEN"
 | 
			
		||||
  _response=$(_post "$_request_body" "$CACHEFLY_API_BASE/certificates" "" "POST" "application/json")
 | 
			
		||||
 | 
			
		||||
  if _contains "$_response" "message"; then
 | 
			
		||||
    _err "Error in deploying $_cdomain certificate to CacheFly."
 | 
			
		||||
    _err "$_response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _debug response "$_response"
 | 
			
		||||
  _info "Domain $_cdomain certificate successfully deployed to CacheFly."
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										86
									
								
								deploy/directadmin.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										86
									
								
								deploy/directadmin.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,86 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to DirectAdmin
 | 
			
		||||
# https://docs.directadmin.com/directadmin/customizing-workflow/api-all-about.html#creating-a-login-key
 | 
			
		||||
# https://docs.directadmin.com/changelog/version-1.24.4.html#cmd-api-catch-all-pop-passwords-frontpage-protected-dirs-ssl-certs
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export DirectAdmin_SCHEME="https" # Optional, https or http, defaults to https
 | 
			
		||||
# export DirectAdmin_ENDPOINT="example.com:2222"
 | 
			
		||||
# export DirectAdmin_USERNAME="Your DirectAdmin Username"
 | 
			
		||||
# export DirectAdmin_KEY="Your DirectAdmin Login Key or Password"
 | 
			
		||||
# export DirectAdmin_MAIN_DOMAIN="Your DirectAdmin Main Domain, NOT Subdomain"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
directadmin_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DirectAdmin_ENDPOINT" ]; then
 | 
			
		||||
    _err "DirectAdmin_ENDPOINT is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_ENDPOINT "$DirectAdmin_ENDPOINT"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DirectAdmin_USERNAME" ]; then
 | 
			
		||||
    _err "DirectAdmin_USERNAME is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_USERNAME "$DirectAdmin_USERNAME"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DirectAdmin_KEY" ]; then
 | 
			
		||||
    _err "DirectAdmin_KEY is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_KEY "$DirectAdmin_KEY"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$DirectAdmin_MAIN_DOMAIN" ]; then
 | 
			
		||||
    _err "DirectAdmin_MAIN_DOMAIN is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DirectAdmin_MAIN_DOMAIN "$DirectAdmin_MAIN_DOMAIN"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Optional SCHEME
 | 
			
		||||
  _getdeployconf DirectAdmin_SCHEME
 | 
			
		||||
  # set default values for DirectAdmin_SCHEME
 | 
			
		||||
  [ -n "${DirectAdmin_SCHEME}" ] || DirectAdmin_SCHEME="https"
 | 
			
		||||
 | 
			
		||||
  _info "Deploying certificate to DirectAdmin..."
 | 
			
		||||
 | 
			
		||||
  # upload certificate
 | 
			
		||||
  string_cfullchain=$(sed 's/$/\\n/' "$_cfullchain" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  _request_body="{\"domain\":\"$DirectAdmin_MAIN_DOMAIN\",\"action\":\"save\",\"type\":\"paste\",\"certificate\":\"$string_key\n$string_cfullchain\n\"}"
 | 
			
		||||
  _debug _request_body "$_request_body"
 | 
			
		||||
  _debug DirectAdmin_ENDPOINT "$DirectAdmin_ENDPOINT"
 | 
			
		||||
  _debug DirectAdmin_USERNAME "$DirectAdmin_USERNAME"
 | 
			
		||||
  _debug DirectAdmin_KEY "$DirectAdmin_KEY"
 | 
			
		||||
  _debug DirectAdmin_MAIN_DOMAIN "$DirectAdmin_MAIN_DOMAIN"
 | 
			
		||||
  _response=$(_post "$_request_body" "$DirectAdmin_SCHEME://$DirectAdmin_USERNAME:$DirectAdmin_KEY@$DirectAdmin_ENDPOINT/CMD_API_SSL" "" "POST" "application/json")
 | 
			
		||||
 | 
			
		||||
  if _contains "$_response" "error=1"; then
 | 
			
		||||
    _err "Error in deploying $_cdomain certificate to DirectAdmin Domain $DirectAdmin_MAIN_DOMAIN."
 | 
			
		||||
    _err "$_response"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "$_response"
 | 
			
		||||
  _info "Domain $_cdomain certificate successfully deployed to DirectAdmin Domain $DirectAdmin_MAIN_DOMAIN."
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										86
									
								
								deploy/edgio.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										86
									
								
								deploy/edgio.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,86 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Here is a script to deploy cert to edgio using its API
 | 
			
		||||
# https://docs.edg.io/guides/v7/develop/rest_api/authentication
 | 
			
		||||
# https://docs.edg.io/rest_api/#tag/tls-certs/operation/postConfigV01TlsCerts
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export EDGIO_CLIENT_ID="Your Edgio Client ID"
 | 
			
		||||
# export EDGIO_CLIENT_SECRET="Your Edgio Client Secret"
 | 
			
		||||
# export EDGIO_ENVIRONMENT_ID="Your Edgio Environment ID"
 | 
			
		||||
 | 
			
		||||
# If have more than one Environment ID
 | 
			
		||||
# export EDGIO_ENVIRONMENT_ID="ENVIRONMENT_ID_1 ENVIRONMENT_ID_2"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
edgio_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$EDGIO_CLIENT_ID" ]; then
 | 
			
		||||
    _err "EDGIO_CLIENT_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf EDGIO_CLIENT_ID "$EDGIO_CLIENT_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$EDGIO_CLIENT_SECRET" ]; then
 | 
			
		||||
    _err "EDGIO_CLIENT_SECRET is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf EDGIO_CLIENT_SECRET "$EDGIO_CLIENT_SECRET"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$EDGIO_ENVIRONMENT_ID" ]; then
 | 
			
		||||
    _err "EDGIO_ENVIRONMENT_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf EDGIO_ENVIRONMENT_ID "$EDGIO_ENVIRONMENT_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Getting access token"
 | 
			
		||||
  _data="client_id=$EDGIO_CLIENT_ID&client_secret=$EDGIO_CLIENT_SECRET&grant_type=client_credentials&scope=app.config"
 | 
			
		||||
  _debug Get_access_token_data "$_data"
 | 
			
		||||
  _response=$(_post "$_data" "https://id.edgio.app/connect/token" "" "POST" "application/x-www-form-urlencoded")
 | 
			
		||||
  _debug Get_access_token_response "$_response"
 | 
			
		||||
  _access_token=$(echo "$_response" | _json_decode | _egrep_o '"access_token":"[^"]*' | cut -d : -f 2 | tr -d '"')
 | 
			
		||||
  _debug _access_token "$_access_token"
 | 
			
		||||
  if [ -z "$_access_token" ]; then
 | 
			
		||||
    _err "Error in getting access token"
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Uploading certificate"
 | 
			
		||||
  string_ccert=$(sed 's/$/\\n/' "$_ccert" | tr -d '\n')
 | 
			
		||||
  string_cca=$(sed 's/$/\\n/' "$_cca" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  for ENVIRONMENT_ID in $EDGIO_ENVIRONMENT_ID; do
 | 
			
		||||
    _data="{\"environment_id\":\"$ENVIRONMENT_ID\",\"primary_cert\":\"$string_ccert\",\"intermediate_cert\":\"$string_cca\",\"private_key\":\"$string_key\"}"
 | 
			
		||||
    _debug Upload_certificate_data "$_data"
 | 
			
		||||
    _H1="Authorization: Bearer $_access_token"
 | 
			
		||||
    _response=$(_post "$_data" "https://edgioapis.com/config/v0.1/tls-certs" "" "POST" "application/json")
 | 
			
		||||
    if _contains "$_response" "message"; then
 | 
			
		||||
      _err "Error in deploying $_cdomain certificate to Edgio ENVIRONMENT_ID $ENVIRONMENT_ID."
 | 
			
		||||
      _err "$_response"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _debug Upload_certificate_response "$_response"
 | 
			
		||||
    _info "Domain $_cdomain certificate successfully deployed to Edgio ENVIRONMENT_ID $ENVIRONMENT_ID."
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										131
									
								
								deploy/keyhelp.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										131
									
								
								deploy/keyhelp.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,131 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to KeyHelp
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export DEPLOY_KEYHELP_BASEURL="https://keyhelp.example.com"
 | 
			
		||||
# export DEPLOY_KEYHELP_USERNAME="Your KeyHelp Username"
 | 
			
		||||
# export DEPLOY_KEYHELP_PASSWORD="Your KeyHelp Password"
 | 
			
		||||
# export DEPLOY_KEYHELP_DOMAIN_ID="Depoly certificate to this Domain ID"
 | 
			
		||||
 | 
			
		||||
# Open the 'Edit domain' page, and you will see id=xxx at the end of the URL. This is the Domain ID.
 | 
			
		||||
# https://DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit&id=xxx
 | 
			
		||||
 | 
			
		||||
# If have more than one domain name
 | 
			
		||||
# export DEPLOY_KEYHELP_DOMAIN_ID="111 222 333"
 | 
			
		||||
 | 
			
		||||
keyhelp_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_BASEURL" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_BASEURL is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_BASEURL "$DEPLOY_KEYHELP_BASEURL"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_USERNAME" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_USERNAME is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_USERNAME "$DEPLOY_KEYHELP_USERNAME"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_PASSWORD" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_PASSWORD is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_PASSWORD "$DEPLOY_KEYHELP_PASSWORD"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  if [ -z "$DEPLOY_KEYHELP_DOMAIN_ID" ]; then
 | 
			
		||||
    _err "DEPLOY_KEYHELP_DOMAIN_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf DEPLOY_KEYHELP_DOMAIN_ID "$DEPLOY_KEYHELP_DOMAIN_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  # Optional DEPLOY_KEYHELP_ENFORCE_HTTPS
 | 
			
		||||
  _getdeployconf DEPLOY_KEYHELP_ENFORCE_HTTPS
 | 
			
		||||
  # set default values for DEPLOY_KEYHELP_ENFORCE_HTTPS
 | 
			
		||||
  [ -n "${DEPLOY_KEYHELP_ENFORCE_HTTPS}" ] || DEPLOY_KEYHELP_ENFORCE_HTTPS="1"
 | 
			
		||||
 | 
			
		||||
  _info "Logging in to keyhelp panel"
 | 
			
		||||
  username_encoded="$(printf "%s" "${DEPLOY_KEYHELP_USERNAME}" | _url_encode)"
 | 
			
		||||
  password_encoded="$(printf "%s" "${DEPLOY_KEYHELP_PASSWORD}" | _url_encode)"
 | 
			
		||||
  _H1="Content-Type: application/x-www-form-urlencoded"
 | 
			
		||||
  _response=$(_get "$DEPLOY_KEYHELP_BASEURL/index.php?submit=1&username=$username_encoded&password=$password_encoded" "TRUE")
 | 
			
		||||
  _cookie="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _head_n 1 | cut -d " " -f 2)"
 | 
			
		||||
 | 
			
		||||
  # If cookies is not empty then logon successful
 | 
			
		||||
  if [ -z "$_cookie" ]; then
 | 
			
		||||
    _err "Fail to get cookie."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
  _debug "cookie" "$_cookie"
 | 
			
		||||
 | 
			
		||||
  _info "Uploading certificate"
 | 
			
		||||
  _date=$(date +"%Y%m%d")
 | 
			
		||||
  encoded_key="$(_url_encode <"$_ckey")"
 | 
			
		||||
  encoded_ccert="$(_url_encode <"$_ccert")"
 | 
			
		||||
  encoded_cca="$(_url_encode <"$_cca")"
 | 
			
		||||
  certificate_name="$_cdomain-$_date"
 | 
			
		||||
 | 
			
		||||
  _request_body="submit=1&certificate_name=$certificate_name&add_type=upload&text_private_key=$encoded_key&text_certificate=$encoded_ccert&text_ca_certificate=$encoded_cca"
 | 
			
		||||
  _H1="Cookie: $_cookie"
 | 
			
		||||
  _response=$(_post "$_request_body" "$DEPLOY_KEYHELP_BASEURL/index.php?page=ssl_certificates&action=add" "" "POST")
 | 
			
		||||
  _message=$(echo "$_response" | grep -A 2 'message-body' | sed -n '/<div class="message-body ">/,/<\/div>/{//!p;}' | sed 's/<[^>]*>//g' | sed 's/^ *//;s/ *$//')
 | 
			
		||||
  _info "_message" "$_message"
 | 
			
		||||
  if [ -z "$_message" ]; then
 | 
			
		||||
    _err "Fail to upload certificate."
 | 
			
		||||
    return 1
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  for DOMAIN_ID in $DEPLOY_KEYHELP_DOMAIN_ID; do
 | 
			
		||||
    _info "Apply certificate to domain id $DOMAIN_ID"
 | 
			
		||||
    _response=$(_get "$DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit&id=$DOMAIN_ID")
 | 
			
		||||
    cert_value=$(echo "$_response" | grep "$certificate_name" | sed -n 's/.*value="\([^"]*\).*/\1/p')
 | 
			
		||||
    target_type=$(echo "$_response" | grep 'target_type' | grep 'checked' | sed -n 's/.*value="\([^"]*\).*/\1/p')
 | 
			
		||||
    if [ "$target_type" = "directory" ]; then
 | 
			
		||||
      path=$(echo "$_response" | awk '/name="path"/{getline; print}' | sed -n 's/.*value="\([^"]*\).*/\1/p')
 | 
			
		||||
    fi
 | 
			
		||||
    echo "$_response" | grep "is_prefer_https" | grep "checked" >/dev/null
 | 
			
		||||
    if [ $? -eq 0 ]; then
 | 
			
		||||
      is_prefer_https=1
 | 
			
		||||
    else
 | 
			
		||||
      is_prefer_https=0
 | 
			
		||||
    fi
 | 
			
		||||
    echo "$_response" | grep "hsts_enabled" | grep "checked" >/dev/null
 | 
			
		||||
    if [ $? -eq 0 ]; then
 | 
			
		||||
      hsts_enabled=1
 | 
			
		||||
    else
 | 
			
		||||
      hsts_enabled=0
 | 
			
		||||
    fi
 | 
			
		||||
    _debug "cert_value" "$cert_value"
 | 
			
		||||
    if [ -z "$cert_value" ]; then
 | 
			
		||||
      _err "Fail to get certificate id."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _request_body="submit=1&id=$DOMAIN_ID&target_type=$target_type&path=$path&is_prefer_https=$is_prefer_https&hsts_enabled=$hsts_enabled&certificate_type=custom&certificate_id=$cert_value&enforce_https=$DEPLOY_KEYHELP_ENFORCE_HTTPS"
 | 
			
		||||
    _response=$(_post "$_request_body" "$DEPLOY_KEYHELP_BASEURL/index.php?page=domains&action=edit" "" "POST")
 | 
			
		||||
    _message=$(echo "$_response" | grep -A 2 'message-body' | sed -n '/<div class="message-body ">/,/<\/div>/{//!p;}' | sed 's/<[^>]*>//g' | sed 's/^ *//;s/ *$//')
 | 
			
		||||
    _info "_message" "$_message"
 | 
			
		||||
    if [ -z "$_message" ]; then
 | 
			
		||||
      _err "Fail to apply certificate."
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  _info "Domain $_cdomain certificate successfully deployed to KeyHelp Domain ID $DEPLOY_KEYHELP_DOMAIN_ID."
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										69
									
								
								deploy/netlify.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										69
									
								
								deploy/netlify.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,69 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Script to deploy certificate to Netlify
 | 
			
		||||
# https://docs.netlify.com/api/get-started/#authentication
 | 
			
		||||
# https://open-api.netlify.com/#tag/sniCertificate
 | 
			
		||||
 | 
			
		||||
# This deployment required following variables
 | 
			
		||||
# export Netlify_ACCESS_TOKEN="Your Netlify Access Token"
 | 
			
		||||
# export Netlify_SITE_ID="Your Netlify Site ID"
 | 
			
		||||
 | 
			
		||||
# If have more than one SITE ID
 | 
			
		||||
# export Netlify_SITE_ID="SITE_ID_1 SITE_ID_2"
 | 
			
		||||
 | 
			
		||||
# returns 0 means success, otherwise error.
 | 
			
		||||
 | 
			
		||||
########  Public functions #####################
 | 
			
		||||
 | 
			
		||||
#domain keyfile certfile cafile fullchain
 | 
			
		||||
netlify_deploy() {
 | 
			
		||||
  _cdomain="$1"
 | 
			
		||||
  _ckey="$2"
 | 
			
		||||
  _ccert="$3"
 | 
			
		||||
  _cca="$4"
 | 
			
		||||
  _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
  _debug _cdomain "$_cdomain"
 | 
			
		||||
  _debug _ckey "$_ckey"
 | 
			
		||||
  _debug _ccert "$_ccert"
 | 
			
		||||
  _debug _cca "$_cca"
 | 
			
		||||
  _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
  if [ -z "$Netlify_ACCESS_TOKEN" ]; then
 | 
			
		||||
    _err "Netlify_ACCESS_TOKEN is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf Netlify_ACCESS_TOKEN "$Netlify_ACCESS_TOKEN"
 | 
			
		||||
  fi
 | 
			
		||||
  if [ -z "$Netlify_SITE_ID" ]; then
 | 
			
		||||
    _err "Netlify_SITE_ID is not defined."
 | 
			
		||||
    return 1
 | 
			
		||||
  else
 | 
			
		||||
    _savedomainconf Netlify_SITE_ID "$Netlify_SITE_ID"
 | 
			
		||||
  fi
 | 
			
		||||
 | 
			
		||||
  _info "Deploying certificate to Netlify..."
 | 
			
		||||
 | 
			
		||||
  ## upload certificate
 | 
			
		||||
  string_ccert=$(sed 's/$/\\n/' "$_ccert" | tr -d '\n')
 | 
			
		||||
  string_cca=$(sed 's/$/\\n/' "$_cca" | tr -d '\n')
 | 
			
		||||
  string_key=$(sed 's/$/\\n/' "$_ckey" | tr -d '\n')
 | 
			
		||||
 | 
			
		||||
  for SITE_ID in $Netlify_SITE_ID; do
 | 
			
		||||
    _request_body="{\"certificate\":\"$string_ccert\",\"key\":\"$string_key\",\"ca_certificates\":\"$string_cca\"}"
 | 
			
		||||
    _debug _request_body "$_request_body"
 | 
			
		||||
    _debug Netlify_ACCESS_TOKEN "$Netlify_ACCESS_TOKEN"
 | 
			
		||||
    export _H1="Authorization: Bearer $Netlify_ACCESS_TOKEN"
 | 
			
		||||
    _response=$(_post "$_request_body" "https://api.netlify.com/api/v1/sites/$SITE_ID/ssl" "" "POST" "application/json")
 | 
			
		||||
 | 
			
		||||
    if _contains "$_response" "\"error\""; then
 | 
			
		||||
      _err "Error in deploying $_cdomain certificate to Netlify SITE_ID $SITE_ID."
 | 
			
		||||
      _err "$_response"
 | 
			
		||||
      return 1
 | 
			
		||||
    fi
 | 
			
		||||
    _debug response "$_response"
 | 
			
		||||
    _info "Domain $_cdomain certificate successfully deployed to Netlify SITE_ID $SITE_ID."
 | 
			
		||||
  done
 | 
			
		||||
 | 
			
		||||
  return 0
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										139
									
								
								deploy/openhabian.sh
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										139
									
								
								deploy/openhabian.sh
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,139 @@
 | 
			
		||||
#!/usr/bin/env sh
 | 
			
		||||
 | 
			
		||||
# Deploy script to install keys to the openHAB keystore
 | 
			
		||||
 | 
			
		||||
# This script attempts to restart the openHAB service upon completion.
 | 
			
		||||
# In order for this to work, the user running acme.sh needs to be able
 | 
			
		||||
# to execute the DEPLOY_OPENHABIAN_RESTART command
 | 
			
		||||
# (default: sudo service openhab restart) without needing a password prompt.
 | 
			
		||||
# To ensure this deployment runs properly ensure permissions are configured
 | 
			
		||||
# correctly, or change the command variable as needed.
 | 
			
		||||
 | 
			
		||||
# Configuration options:
 | 
			
		||||
# DEPLOY_OPENHABIAN_KEYPASS :  The default should be appropriate here for most cases,
 | 
			
		||||
#                              but change this to change the password used for the keystore.
 | 
			
		||||
# DEPLOY_OPENHABIAN_KEYSTORE : The full path of the openHAB keystore file. This will
 | 
			
		||||
#                              default to a path based on the $OPENHAB_USERDATA directory.
 | 
			
		||||
#                              This should generate based on existing openHAB env vars.
 | 
			
		||||
# DEPLOY_OPENHABIAN_RESTART :  The command used to restart openHAB
 | 
			
		||||
 | 
			
		||||
openhabian_deploy() {
 | 
			
		||||
 | 
			
		||||
    # Name parameters, load configs
 | 
			
		||||
    _cdomain="$1"
 | 
			
		||||
    _ckey="$2"
 | 
			
		||||
    _ccert="$3"
 | 
			
		||||
    _cca="$4"
 | 
			
		||||
    _cfullchain="$5"
 | 
			
		||||
 | 
			
		||||
    _debug _cdomain "$_cdomain"
 | 
			
		||||
    _debug _ckey "$_ckey"
 | 
			
		||||
    _debug _ccert "$_ccert"
 | 
			
		||||
    _debug _cca "$_cca"
 | 
			
		||||
    _debug _cfullchain "$_cfullchain"
 | 
			
		||||
 | 
			
		||||
    _getdeployconf DEPLOY_OPENHABIAN_KEYSTORE
 | 
			
		||||
    _getdeployconf DEPLOY_OPENHABIAN_KEYPASS
 | 
			
		||||
    _getdeployconf DEPLOY_OPENHABIAN_RESTART
 | 
			
		||||
 | 
			
		||||
    _debug2 DEPLOY_OPENHABIAN_KEYSTORE "$DEPLOY_OPENHABIAN_KEYSTORE"
 | 
			
		||||
    _debug2 DEPLOY_OPENHABIAN_KEYPASS "$DEPLOY_OPENHABIAN_KEYPASS"
 | 
			
		||||
    _debug2 DEPLOY_OPENHABIAN_RESTART "$DEPLOY_OPENHABIAN_RESTART"
 | 
			
		||||
 | 
			
		||||
    # Define configurable options
 | 
			
		||||
    _openhab_keystore="${DEPLOY_OPENHABIAN_KEYSTORE:-${OPENHAB_USERDATA}/etc/keystore}"
 | 
			
		||||
    _openhab_keypass="${DEPLOY_OPENHABIAN_KEYPASS:-openhab}"
 | 
			
		||||
    _default_restart="sudo service openhab restart"
 | 
			
		||||
    _openhab_restart="${DEPLOY_OPENHABIAN_RESTART:-$_default_restart}"
 | 
			
		||||
 | 
			
		||||
    _debug _openhab_keystore "$_openhab_keystore"
 | 
			
		||||
    _debug _openhab_keypass "$_openhab_keypass"
 | 
			
		||||
    _debug _openhab_restart "$_openhab_restart"
 | 
			
		||||
 | 
			
		||||
    # Verify Dependencies
 | 
			
		||||
    if ! _exists keytool; then
 | 
			
		||||
        _err "keytool not found, please install keytool"
 | 
			
		||||
        return 1
 | 
			
		||||
    fi
 | 
			
		||||
    if [ ! -w "$_openhab_keystore" ]; then
 | 
			
		||||
        _err "The file $_openhab_keystore is not writable, please change the permission."
 | 
			
		||||
        return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Take a backup of the old keystore
 | 
			
		||||
    _debug "Storing a backup of the existing keystore at ${_openhab_keystore}.bak"
 | 
			
		||||
    cp "${_openhab_keystore}" "${_openhab_keystore}.bak"
 | 
			
		||||
 | 
			
		||||
    # Generate PKCS12 keystore
 | 
			
		||||
    _new_pkcs12="$(_mktemp)"
 | 
			
		||||
    # _toPkcs doesn't support -nodes param
 | 
			
		||||
    if ${ACME_OPENSSL_BIN:-openssl} pkcs12 \
 | 
			
		||||
        -export \
 | 
			
		||||
        -inkey "$_ckey" \
 | 
			
		||||
        -in "$_ccert" \
 | 
			
		||||
        -certfile "$_cca" \
 | 
			
		||||
        -name mykey \
 | 
			
		||||
        -out "$_new_pkcs12" \
 | 
			
		||||
        -nodes -passout "pass:$_openhab_keypass"; then
 | 
			
		||||
        _debug "Successfully created pkcs keystore"
 | 
			
		||||
    else
 | 
			
		||||
        _err "Error generating pkcs12."
 | 
			
		||||
        _err "Please re-run with --debug and report a bug."
 | 
			
		||||
        rm "$_new_pkcs12"
 | 
			
		||||
        return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Remove old cert from existing store
 | 
			
		||||
    if keytool -delete \
 | 
			
		||||
        -alias mykey \
 | 
			
		||||
        -deststorepass "$_openhab_keypass" \
 | 
			
		||||
        -keystore "$_openhab_keystore"; then
 | 
			
		||||
        _info "Successfully deleted old key"
 | 
			
		||||
    else
 | 
			
		||||
        _err "Error deleting old key"
 | 
			
		||||
        _err "Please re-run with --debug and report a bug."
 | 
			
		||||
        rm "$_new_pkcs12"
 | 
			
		||||
        return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Add new certificate to store
 | 
			
		||||
    if keytool -importkeystore \
 | 
			
		||||
        -srckeystore "$_new_pkcs12" \
 | 
			
		||||
        -srcstoretype PKCS12 \
 | 
			
		||||
        -srcstorepass "$_openhab_keypass" \
 | 
			
		||||
        -alias mykey \
 | 
			
		||||
        -destkeystore "$_openhab_keystore" \
 | 
			
		||||
        -deststoretype jks \
 | 
			
		||||
        -deststorepass "$_openhab_keypass" \
 | 
			
		||||
        -destalias mykey; then
 | 
			
		||||
        _info "Successfully imported new key"
 | 
			
		||||
    else
 | 
			
		||||
        _err "Failure when importing key"
 | 
			
		||||
        _err "Please re-run with --debug and report a bug."
 | 
			
		||||
        rm "$_new_pkcs12"
 | 
			
		||||
        return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    # Reload openHAB service
 | 
			
		||||
    if eval "$_openhab_restart"; then
 | 
			
		||||
        _info "Restarted openhab"
 | 
			
		||||
    else
 | 
			
		||||
        _err "Failed to restart openHAB, please restart openHAB manually."
 | 
			
		||||
        _err "The new key has been installed, but openHAB may not use it until restarted"
 | 
			
		||||
        _err "To prevent this error, override the restart command with DEPLOY_OPENHABIAN_RESTART \
 | 
			
		||||
            and ensure it can be called by the acme.sh user"
 | 
			
		||||
        return 1
 | 
			
		||||
    fi
 | 
			
		||||
 | 
			
		||||
    _savedeployconf DEPLOY_OPENHABIAN_KEYSTORE "$DEPLOY_OPENHABIAN_KEYSTORE"
 | 
			
		||||
    _savedeployconf DEPLOY_OPENHABIAN_KEYPASS "$DEPLOY_OPENHABIAN_KEYPASS"
 | 
			
		||||
    _savedeployconf DEPLOY_OPENHABIAN_RESTART "$DEPLOY_OPENHABIAN_RESTART"
 | 
			
		||||
 | 
			
		||||
    rm "$_new_pkcs12"
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
# Credits:
 | 
			
		||||
# This solution was heavily informed by a few existing scripts:
 | 
			
		||||
# - https://gist.github.com/jpmens/8029383
 | 
			
		||||
# - https://github.com/matsahm/openhab_change_ssl/blob/bd46986581631319606ae4c594d4ed774a67cd39/openhab_change_ssl
 | 
			
		||||
# Thank you!
 | 
			
		||||
		Reference in New Issue
	
	Block a user