Browse Source
Revert "Merge remote-tracking branch 'upstream/master'"
Revert "Merge remote-tracking branch 'upstream/master'"
This reverts commitpull/2873/head2c9ba1d04e, reversing changes made to8f37cbb991.
47 changed files with 304 additions and 2354 deletions
-
4.github/ISSUE_TEMPLATE.md
-
2.github/PULL_REQUEST_TEMPLATE.md
-
28.github/auto-comment.yml
-
2.travis.yml
-
99README.md
-
105acme.sh
-
2deploy/README.md
-
2deploy/docker.sh
-
50deploy/haproxy.sh
-
139deploy/panos.sh
-
10deploy/qiniu.sh
-
26deploy/routeros.sh
-
155deploy/synology_dsm.sh
-
2dnsapi/README.md
-
254dnsapi/dns_1984hosting.sh
-
17dnsapi/dns_aws.sh
-
2dnsapi/dns_azure.sh
-
28dnsapi/dns_cf.sh
-
197dnsapi/dns_clouddns.sh
-
141dnsapi/dns_constellix.sh
-
2dnsapi/dns_cyon.sh
-
2dnsapi/dns_ddnss.sh
-
14dnsapi/dns_dp.sh
-
121dnsapi/dns_dynv6.sh
-
2dnsapi/dns_freedns.sh
-
2dnsapi/dns_gcloud.sh
-
5dnsapi/dns_inwx.sh
-
129dnsapi/dns_joker.sh
-
168dnsapi/dns_kas.sh
-
12dnsapi/dns_lexicon.sh
-
10dnsapi/dns_linode_v4.sh
-
2dnsapi/dns_me.sh
-
2dnsapi/dns_miab.sh
-
159dnsapi/dns_misaka.sh
-
4dnsapi/dns_myapi.sh
-
94dnsapi/dns_nic.sh
-
88dnsapi/dns_nm.sh
-
2dnsapi/dns_openprovider.sh
-
273dnsapi/dns_opnsense.sh
-
4dnsapi/dns_ovh.sh
-
2dnsapi/dns_pleskxml.sh
-
2dnsapi/dns_rackspace.sh
-
2dnsapi/dns_servercow.sh
-
2dnsapi/dns_unoeuro.sh
-
122dnsapi/dns_yandex.sh
-
4dnsapi/dns_zone.sh
-
64notify/cqhttp.sh
@ -1,28 +0,0 @@ |
|||||
# Comment to a new issue. |
|
||||
issuesOpened: > |
|
||||
If this is a bug report, please upgrade to the latest code and try again: |
|
||||
|
|
||||
如果有 bug, 请先更新到最新版试试: |
|
||||
|
|
||||
```sh |
|
||||
acme.sh --upgrade |
|
||||
``` |
|
||||
|
|
||||
please also provide the log with `--debug 2`. |
|
||||
|
|
||||
see: https://github.com/acmesh-official/acme.sh/wiki/How-to-debug-acme.sh |
|
||||
|
|
||||
|
|
||||
pullRequestOpened: > |
|
||||
First, never send a PR to `master` branch, it will never be accepted. Please send to the `dev` branch instead. |
|
||||
|
|
||||
If this is a PR to support new DNS API or new notification API, please read this guide first: |
|
||||
https://github.com/acmesh-official/acme.sh/wiki/DNS-API-Dev-Guide |
|
||||
|
|
||||
Please check the guide items one by one. |
|
||||
|
|
||||
Then add your usage here: |
|
||||
https://github.com/acmesh-official/acme.sh/wiki/dnsapi |
|
||||
|
|
||||
|
|
||||
|
|
||||
@ -1,139 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
# Script to deploy certificates to Palo Alto Networks PANOS via API |
|
||||
# Note PANOS API KEY and IP address needs to be set prior to running. |
|
||||
# The following variables exported from environment will be used. |
|
||||
# If not set then values previously saved in domain.conf file are used. |
|
||||
# |
|
||||
# Firewall admin with superuser and IP address is required. |
|
||||
# |
|
||||
# export PANOS_USER="" # required |
|
||||
# export PANOS_PASS="" # required |
|
||||
# export PANOS_HOST="" # required |
|
||||
|
|
||||
# This function is to parse the XML |
|
||||
parse_response() { |
|
||||
type=$2 |
|
||||
if [ "$type" = 'keygen' ]; then |
|
||||
status=$(echo "$1" | sed 's/^.*\(['\'']\)\([a-z]*\)'\''.*/\2/g') |
|
||||
if [ "$status" = "success" ]; then |
|
||||
panos_key=$(echo "$1" | sed 's/^.*\(<key>\)\(.*\)<\/key>.*/\2/g') |
|
||||
_panos_key=$panos_key |
|
||||
else |
|
||||
message="PAN-OS Key could not be set." |
|
||||
fi |
|
||||
else |
|
||||
status=$(echo "$1" | sed 's/^.*"\([a-z]*\)".*/\1/g') |
|
||||
message=$(echo "$1" | sed 's/^.*<result>\(.*\)<\/result.*/\1/g') |
|
||||
fi |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
deployer() { |
|
||||
content="" |
|
||||
type=$1 # Types are keygen, cert, key, commit |
|
||||
_debug "**** Deploying $type *****" |
|
||||
panos_url="https://$_panos_host/api/" |
|
||||
if [ "$type" = 'keygen' ]; then |
|
||||
_H1="Content-Type: application/x-www-form-urlencoded" |
|
||||
content="type=keygen&user=$_panos_user&password=$_panos_pass" |
|
||||
# content="$content${nl}--$delim${nl}Content-Disposition: form-data; type=\"keygen\"; user=\"$_panos_user\"; password=\"$_panos_pass\"${nl}Content-Type: application/octet-stream${nl}${nl}" |
|
||||
fi |
|
||||
|
|
||||
if [ "$type" = 'cert' ] || [ "$type" = 'key' ]; then |
|
||||
#Generate DEIM |
|
||||
delim="-----MultipartDelimiter$(date "+%s%N")" |
|
||||
nl="\015\012" |
|
||||
#Set Header |
|
||||
export _H1="Content-Type: multipart/form-data; boundary=$delim" |
|
||||
if [ "$type" = 'cert' ]; then |
|
||||
panos_url="${panos_url}?type=import" |
|
||||
content="--$delim${nl}Content-Disposition: form-data; name=\"category\"\r\n\r\ncertificate" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"certificate-name\"\r\n\r\n$_cdomain" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"key\"\r\n\r\n$_panos_key" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"format\"\r\n\r\npem" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"file\"; filename=\"$(basename "$_cfullchain")\"${nl}Content-Type: application/octet-stream${nl}${nl}$(cat "$_cfullchain")" |
|
||||
fi |
|
||||
if [ "$type" = 'key' ]; then |
|
||||
panos_url="${panos_url}?type=import" |
|
||||
content="--$delim${nl}Content-Disposition: form-data; name=\"category\"\r\n\r\nprivate-key" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"certificate-name\"\r\n\r\n$_cdomain" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"key\"\r\n\r\n$_panos_key" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"format\"\r\n\r\npem" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"passphrase\"\r\n\r\n123456" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"file\"; filename=\"$(basename "$_ckey")\"${nl}Content-Type: application/octet-stream${nl}${nl}$(cat "$_ckey")" |
|
||||
fi |
|
||||
#Close multipart |
|
||||
content="$content${nl}--$delim--${nl}${nl}" |
|
||||
#Convert CRLF |
|
||||
content=$(printf %b "$content") |
|
||||
fi |
|
||||
|
|
||||
if [ "$type" = 'commit' ]; then |
|
||||
export _H1="Content-Type: application/x-www-form-urlencoded" |
|
||||
cmd=$(printf "%s" "<commit><partial><$_panos_user></$_panos_user></partial></commit>" | _url_encode) |
|
||||
content="type=commit&key=$_panos_key&cmd=$cmd" |
|
||||
fi |
|
||||
response=$(_post "$content" "$panos_url" "" "POST") |
|
||||
parse_response "$response" "$type" |
|
||||
# Saving response to variables |
|
||||
response_status=$status |
|
||||
#DEBUG |
|
||||
_debug response_status "$response_status" |
|
||||
if [ "$response_status" = "success" ]; then |
|
||||
_debug "Successfully deployed $type" |
|
||||
return 0 |
|
||||
else |
|
||||
_err "Deploy of type $type failed. Try deploying with --debug to troubleshoot." |
|
||||
_debug "$message" |
|
||||
return 1 |
|
||||
fi |
|
||||
} |
|
||||
|
|
||||
# This is the main function that will call the other functions to deploy everything. |
|
||||
panos_deploy() { |
|
||||
_cdomain="$1" |
|
||||
_ckey="$2" |
|
||||
_cfullchain="$5" |
|
||||
# PANOS ENV VAR check |
|
||||
if [ -z "$PANOS_USER" ] || [ -z "$PANOS_PASS" ] || [ -z "$PANOS_HOST" ]; then |
|
||||
_debug "No ENV variables found lets check for saved variables" |
|
||||
_getdeployconf PANOS_USER |
|
||||
_getdeployconf PANOS_PASS |
|
||||
_getdeployconf PANOS_HOST |
|
||||
_panos_user=$PANOS_USER |
|
||||
_panos_pass=$PANOS_PASS |
|
||||
_panos_host=$PANOS_HOST |
|
||||
if [ -z "$_panos_user" ] && [ -z "$_panos_pass" ] && [ -z "$_panos_host" ]; then |
|
||||
_err "No host, user and pass found.. If this is the first time deploying please set PANOS_HOST, PANOS_USER and PANOS_PASS in environment variables. Delete them after you have succesfully deployed certs." |
|
||||
return 1 |
|
||||
else |
|
||||
_debug "Using saved env variables." |
|
||||
fi |
|
||||
else |
|
||||
_debug "Detected ENV variables to be saved to the deploy conf." |
|
||||
# Encrypt and save user |
|
||||
_savedeployconf PANOS_USER "$PANOS_USER" 1 |
|
||||
_savedeployconf PANOS_PASS "$PANOS_PASS" 1 |
|
||||
_savedeployconf PANOS_HOST "$PANOS_HOST" 1 |
|
||||
_panos_user="$PANOS_USER" |
|
||||
_panos_pass="$PANOS_PASS" |
|
||||
_panos_host="$PANOS_HOST" |
|
||||
fi |
|
||||
_debug "Let's use username and pass to generate token." |
|
||||
if [ -z "$_panos_user" ] || [ -z "$_panos_pass" ] || [ -z "$_panos_host" ]; then |
|
||||
_err "Please pass username and password and host as env variables PANOS_USER, PANOS_PASS and PANOS_HOST" |
|
||||
return 1 |
|
||||
else |
|
||||
_debug "Getting PANOS KEY" |
|
||||
deployer keygen |
|
||||
if [ -z "$_panos_key" ]; then |
|
||||
_err "Missing apikey." |
|
||||
return 1 |
|
||||
else |
|
||||
deployer cert |
|
||||
deployer key |
|
||||
deployer commit |
|
||||
fi |
|
||||
fi |
|
||||
} |
|
||||
@ -1,155 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
# Here is a script to deploy cert to Synology DSM |
|
||||
# |
|
||||
# it requires the jq and curl are in the $PATH and the following |
|
||||
# environment variables must be set: |
|
||||
# |
|
||||
# SYNO_Username - Synology Username to login (must be an administrator) |
|
||||
# SYNO_Password - Synology Password to login |
|
||||
# SYNO_Certificate - Certificate description to target for replacement |
|
||||
# |
|
||||
# The following environmental variables may be set if you don't like their |
|
||||
# default values: |
|
||||
# |
|
||||
# SYNO_Scheme - defaults to http |
|
||||
# SYNO_Hostname - defaults to localhost |
|
||||
# SYNO_Port - defaults to 5000 |
|
||||
# SYNO_DID - device ID to skip OTP - defaults to empty |
|
||||
# |
|
||||
#returns 0 means success, otherwise error. |
|
||||
|
|
||||
######## Public functions ##################### |
|
||||
|
|
||||
_syno_get_cookie_data() { |
|
||||
grep "\W$1=" "$HTTP_HEADER" | grep "^Set-Cookie:" | _tail_n 1 | _egrep_o "$1=[^;]*;" | tr -d ';' |
|
||||
} |
|
||||
|
|
||||
#domain keyfile certfile cafile fullchain |
|
||||
synology_dsm_deploy() { |
|
||||
|
|
||||
_cdomain="$1" |
|
||||
_ckey="$2" |
|
||||
_ccert="$3" |
|
||||
_cca="$4" |
|
||||
|
|
||||
_debug _cdomain "$_cdomain" |
|
||||
|
|
||||
# Get Username and Password, but don't save until we successfully authenticate |
|
||||
_getdeployconf SYNO_Username |
|
||||
_getdeployconf SYNO_Password |
|
||||
_getdeployconf SYNO_Create |
|
||||
_getdeployconf SYNO_DID |
|
||||
if [ -z "$SYNO_Username" ] || [ -z "$SYNO_Password" ]; then |
|
||||
SYNO_Username="" |
|
||||
SYNO_Password="" |
|
||||
_err "SYNO_Username & SYNO_Password must be set" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug2 SYNO_Username "$SYNO_Username" |
|
||||
_secure_debug2 SYNO_Password "$SYNO_Password" |
|
||||
|
|
||||
# Optional scheme, hostname, and port for Synology DSM |
|
||||
_getdeployconf SYNO_Scheme |
|
||||
_getdeployconf SYNO_Hostname |
|
||||
_getdeployconf SYNO_Port |
|
||||
|
|
||||
# default vaules for scheme, hostname, and port |
|
||||
# defaulting to localhost and http because it's localhost... |
|
||||
[ -n "${SYNO_Scheme}" ] || SYNO_Scheme="http" |
|
||||
[ -n "${SYNO_Hostname}" ] || SYNO_Hostname="localhost" |
|
||||
[ -n "${SYNO_Port}" ] || SYNO_Port="5000" |
|
||||
|
|
||||
_savedeployconf SYNO_Scheme "$SYNO_Scheme" |
|
||||
_savedeployconf SYNO_Hostname "$SYNO_Hostname" |
|
||||
_savedeployconf SYNO_Port "$SYNO_Port" |
|
||||
|
|
||||
_debug2 SYNO_Scheme "$SYNO_Scheme" |
|
||||
_debug2 SYNO_Hostname "$SYNO_Hostname" |
|
||||
_debug2 SYNO_Port "$SYNO_Port" |
|
||||
|
|
||||
# Get the certificate description, but don't save it until we verfiy it's real |
|
||||
_getdeployconf SYNO_Certificate |
|
||||
if [ -z "${SYNO_Certificate:?}" ]; then |
|
||||
_err "SYNO_Certificate needs to be defined (with the Certificate description name)" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug SYNO_Certificate "$SYNO_Certificate" |
|
||||
|
|
||||
_base_url="$SYNO_Scheme://$SYNO_Hostname:$SYNO_Port" |
|
||||
_debug _base_url "$_base_url" |
|
||||
|
|
||||
# Login, get the token from JSON and session id from cookie |
|
||||
_info "Logging into $SYNO_Hostname:$SYNO_Port" |
|
||||
response=$(_get "$_base_url/webman/login.cgi?username=$SYNO_Username&passwd=$SYNO_Password&enable_syno_token=yes&device_id=$SYNO_DID") |
|
||||
token=$(echo "$response" | grep "SynoToken" | sed -n 's/.*"SynoToken" *: *"\([^"]*\).*/\1/p') |
|
||||
_debug3 response "$response" |
|
||||
|
|
||||
if [ -z "$token" ]; then |
|
||||
_err "Unable to authenticate to $SYNO_Hostname:$SYNO_Port using $SYNO_Scheme." |
|
||||
_err "Check your username and password." |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_H1="Cookie: $(_syno_get_cookie_data "id"); $(_syno_get_cookie_data "smid")" |
|
||||
_H2="X-SYNO-TOKEN: $token" |
|
||||
export _H1 |
|
||||
export _H2 |
|
||||
_debug2 H1 "${_H1}" |
|
||||
_debug2 H2 "${_H2}" |
|
||||
|
|
||||
# Now that we know the username and password are good, save them |
|
||||
_savedeployconf SYNO_Username "$SYNO_Username" |
|
||||
_savedeployconf SYNO_Password "$SYNO_Password" |
|
||||
_savedeployconf SYNO_DID "$SYNO_DID" |
|
||||
_debug token "$token" |
|
||||
|
|
||||
_info "Getting certificates in Synology DSM" |
|
||||
response=$(_post "api=SYNO.Core.Certificate.CRT&method=list&version=1" "$_base_url/webapi/entry.cgi") |
|
||||
_debug3 response "$response" |
|
||||
id=$(echo "$response" | sed -n "s/.*\"desc\":\"$SYNO_Certificate\",\"id\":\"\([^\"]*\).*/\1/p") |
|
||||
_debug2 id "$id" |
|
||||
|
|
||||
if [ -z "$id" ] && [ -z "${SYNO_Create:?}" ]; then |
|
||||
_err "Unable to find certificate: $SYNO_Certificate and \$SYNO_Create is not set" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
# we've verified this certificate description is a thing, so save it |
|
||||
_savedeployconf SYNO_Certificate "$SYNO_Certificate" |
|
||||
|
|
||||
default=false |
|
||||
if echo "$response" | sed -n "s/.*\"desc\":\"$SYNO_Certificate\",\([^{]*\).*/\1/p" | grep -- 'is_default":true' >/dev/null; then |
|
||||
default=true |
|
||||
fi |
|
||||
_debug2 default "$default" |
|
||||
|
|
||||
_info "Generate form POST request" |
|
||||
nl="\015\012" |
|
||||
delim="--------------------------$(_utc_date | tr -d -- '-: ')" |
|
||||
content="--$delim${nl}Content-Disposition: form-data; name=\"key\"; filename=\"$(basename "$_ckey")\"${nl}Content-Type: application/octet-stream${nl}${nl}$(cat "$_ckey")\012" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"cert\"; filename=\"$(basename "$_ccert")\"${nl}Content-Type: application/octet-stream${nl}${nl}$(cat "$_ccert")\012" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"inter_cert\"; filename=\"$(basename "$_cca")\"${nl}Content-Type: application/octet-stream${nl}${nl}$(cat "$_cca")\012" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"id\"${nl}${nl}$id" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"desc\"${nl}${nl}${SYNO_Certificate}" |
|
||||
content="$content${nl}--$delim${nl}Content-Disposition: form-data; name=\"as_default\"${nl}${nl}${default}" |
|
||||
content="$content${nl}--$delim--${nl}" |
|
||||
content="$(printf "%b_" "$content")" |
|
||||
content="${content%_}" # protect trailing \n |
|
||||
|
|
||||
_info "Upload certificate to the Synology DSM" |
|
||||
response=$(_post "$content" "$_base_url/webapi/entry.cgi?api=SYNO.Core.Certificate&method=import&version=1&SynoToken=$token" "" "POST" "multipart/form-data; boundary=${delim}") |
|
||||
_debug3 response "$response" |
|
||||
|
|
||||
if ! echo "$response" | grep '"error":' >/dev/null; then |
|
||||
if echo "$response" | grep '"restart_httpd":true' >/dev/null; then |
|
||||
_info "http services were restarted" |
|
||||
else |
|
||||
_info "http services were NOT restarted" |
|
||||
fi |
|
||||
return 0 |
|
||||
else |
|
||||
_err "Unable to update certificate, error code $response" |
|
||||
return 1 |
|
||||
fi |
|
||||
} |
|
||||
@ -1,254 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
#This file name is "dns_1984hosting.sh" |
|
||||
#So, here must be a method dns_1984hosting_add() |
|
||||
#Which will be called by acme.sh to add the txt record to your api system. |
|
||||
#returns 0 means success, otherwise error. |
|
||||
# |
|
||||
#Author: Adrian Fedoreanu |
|
||||
#Report Bugs here: https://github.com/acmesh-official/acme.sh |
|
||||
# or here... https://github.com/acmesh-official/acme.sh/issues/2851 |
|
||||
# |
|
||||
######## Public functions ##################### |
|
||||
|
|
||||
# Export 1984HOSTING username and password in following variables |
|
||||
# |
|
||||
# One984HOSTING_Username=username |
|
||||
# One984HOSTING_Password=password |
|
||||
# |
|
||||
# sessionid cookie is saved in ~/.acme.sh/account.conf |
|
||||
# username/password need to be set only when changed. |
|
||||
|
|
||||
#Usage: dns_1984hosting_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|
||||
dns_1984hosting_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
_info "Add TXT record using 1984Hosting" |
|
||||
_debug fulldomain "$fulldomain" |
|
||||
_debug txtvalue "$txtvalue" |
|
||||
|
|
||||
if ! _1984hosting_login; then |
|
||||
_err "1984Hosting login failed for user $One984HOSTING_Username. Check $HTTP_HEADER file" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_debug "First detect the root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" "$fulldomain" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
|
|
||||
_1984hosting_add_txt_record "$_domain" "$_sub_domain" "$txtvalue" |
|
||||
return $? |
|
||||
} |
|
||||
|
|
||||
#Usage: fulldomain txtvalue |
|
||||
#Remove the txt record after validation. |
|
||||
dns_1984hosting_rm() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
_info "Delete TXT record using 1984Hosting" |
|
||||
_debug fulldomain "$fulldomain" |
|
||||
_debug txtvalue "$txtvalue" |
|
||||
|
|
||||
if ! _1984hosting_login; then |
|
||||
_err "1984Hosting login failed for user $One984HOSTING_Username. Check $HTTP_HEADER file" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_debug "First detect the root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" "$fulldomain" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
|
|
||||
_1984hosting_delete_txt_record "$_domain" "$_sub_domain" |
|
||||
return $? |
|
||||
} |
|
||||
|
|
||||
#################### Private functions below ################################## |
|
||||
|
|
||||
# usage _1984hosting_add_txt_record domain subdomain value |
|
||||
# returns 0 success |
|
||||
_1984hosting_add_txt_record() { |
|
||||
_debug "Add TXT record $1 with value '$3'" |
|
||||
domain="$1" |
|
||||
subdomain="$2" |
|
||||
value="$(printf '%s' "$3" | _url_encode)" |
|
||||
url="https://management.1984hosting.com/domains/entry/" |
|
||||
|
|
||||
postdata="entry=new" |
|
||||
postdata="$postdata&type=TXT" |
|
||||
postdata="$postdata&ttl=3600" |
|
||||
postdata="$postdata&zone=$domain" |
|
||||
postdata="$postdata&host=$subdomain" |
|
||||
postdata="$postdata&rdata=%22$value%22" |
|
||||
_debug2 postdata "$postdata" |
|
||||
|
|
||||
_authpost "$postdata" "$url" |
|
||||
response="$(echo "$_response" | _normalizeJson)" |
|
||||
_debug2 response "$response" |
|
||||
|
|
||||
if _contains "$response" '"haserrors": true'; then |
|
||||
_err "1984Hosting failed to add TXT record for $subdomain bad RC from _post" |
|
||||
return 1 |
|
||||
elif _contains "$response" "<html>"; then |
|
||||
_err "1984Hosting failed to add TXT record for $subdomain. Check $HTTP_HEADER file" |
|
||||
return 1 |
|
||||
elif [ "$response" = '{"auth": false, "ok": false}' ]; then |
|
||||
_err "1984Hosting failed to add TXT record for $subdomain. Invalid or expired cookie" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Added acme challenge TXT record for $fulldomain at 1984Hosting" |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
# usage _1984hosting_delete_txt_record entry_id |
|
||||
# returns 0 success |
|
||||
_1984hosting_delete_txt_record() { |
|
||||
_debug "Delete $fulldomain TXT record" |
|
||||
domain="$1" |
|
||||
subdomain="$2" |
|
||||
url="https://management.1984hosting.com/domains" |
|
||||
|
|
||||
_htmlget "$url" "$domain" |
|
||||
_debug2 _response "$_response" |
|
||||
zone_id="$(echo "$_response" | _egrep_o 'zone\/[0-9]+')" |
|
||||
_debug2 zone_id "$zone_id" |
|
||||
if [ -z "$zone_id" ]; then |
|
||||
_err "Error getting zone_id for $1" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_htmlget "$url/$zone_id" "$subdomain" |
|
||||
_debug2 _response "$_response" |
|
||||
entry_id="$(echo "$_response" | _egrep_o 'entry_[0-9]+' | sed 's/entry_//')" |
|
||||
_debug2 entry_id "$entry_id" |
|
||||
if [ -z "$entry_id" ]; then |
|
||||
_err "Error getting TXT entry_id for $1" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_authpost "entry=$entry_id" "$url/delentry/" |
|
||||
response="$(echo "$_response" | _normalizeJson)" |
|
||||
_debug2 response "$response" |
|
||||
|
|
||||
if ! _contains "$response" '"ok": true'; then |
|
||||
_err "1984Hosting failed to delete TXT record for $entry_id bad RC from _post" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Deleted acme challenge TXT record for $fulldomain at 1984Hosting" |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
# usage: _1984hosting_login username password |
|
||||
# returns 0 success |
|
||||
_1984hosting_login() { |
|
||||
if ! _check_credentials; then return 1; fi |
|
||||
|
|
||||
if _check_cookie; then |
|
||||
_debug "Already logged in" |
|
||||
return 0 |
|
||||
fi |
|
||||
|
|
||||
_debug "Login to 1984Hosting as user $One984HOSTING_Username" |
|
||||
username=$(printf '%s' "$One984HOSTING_Username" | _url_encode) |
|
||||
password=$(printf '%s' "$One984HOSTING_Password" | _url_encode) |
|
||||
url="https://management.1984hosting.com/accounts/checkuserauth/" |
|
||||
|
|
||||
response="$(_post "username=$username&password=$password&otpkey=" "$url")" |
|
||||
response="$(echo "$response" | _normalizeJson)" |
|
||||
_debug2 response "$response" |
|
||||
|
|
||||
if [ "$response" = '{"loggedin": true, "ok": true}' ]; then |
|
||||
One984HOSTING_COOKIE="$(grep '^Set-Cookie:' "$HTTP_HEADER" | _tail_n 1 | _egrep_o 'sessionid=[^;]*;' | tr -d ';')" |
|
||||
export One984HOSTING_COOKIE |
|
||||
_saveaccountconf_mutable One984HOSTING_COOKIE "$One984HOSTING_COOKIE" |
|
||||
return 0 |
|
||||
fi |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
_check_credentials() { |
|
||||
if [ -z "$One984HOSTING_Username" ] || [ -z "$One984HOSTING_Password" ]; then |
|
||||
One984HOSTING_Username="" |
|
||||
One984HOSTING_Password="" |
|
||||
_err "You haven't specified 1984Hosting username or password yet." |
|
||||
_err "Please export as One984HOSTING_Username / One984HOSTING_Password and try again." |
|
||||
return 1 |
|
||||
fi |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
_check_cookie() { |
|
||||
One984HOSTING_COOKIE="${One984HOSTING_COOKIE:-$(_readaccountconf_mutable One984HOSTING_COOKIE)}" |
|
||||
if [ -z "$One984HOSTING_COOKIE" ]; then |
|
||||
_debug "No cached cookie found" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_authget "https://management.1984hosting.com/accounts/loginstatus/" |
|
||||
response="$(echo "$_response" | _normalizeJson)" |
|
||||
if [ "$_response" = '{"ok": true}' ]; then |
|
||||
_debug "Cached cookie still valid" |
|
||||
return 0 |
|
||||
fi |
|
||||
_debug "Cached cookie no longer valid" |
|
||||
One984HOSTING_COOKIE="" |
|
||||
_saveaccountconf_mutable One984HOSTING_COOKIE "$One984HOSTING_COOKIE" |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
#_acme-challenge.www.domain.com |
|
||||
#returns |
|
||||
# _sub_domain=_acme-challenge.www |
|
||||
# _domain=domain.com |
|
||||
_get_root() { |
|
||||
domain="$1" |
|
||||
i=2 |
|
||||
p=1 |
|
||||
while true; do |
|
||||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|
||||
|
|
||||
if [ -z "$h" ]; then |
|
||||
#not valid |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_authget "https://management.1984hosting.com/domains/soacheck/?zone=$h&nameserver=ns0.1984.is." |
|
||||
if _contains "$_response" "serial"; then |
|
||||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|
||||
_domain="$h" |
|
||||
return 0 |
|
||||
fi |
|
||||
p=$i |
|
||||
i=$(_math "$i" + 1) |
|
||||
done |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
# add extra headers to request |
|
||||
_authget() { |
|
||||
export _H1="Cookie: $One984HOSTING_COOKIE" |
|
||||
_response=$(_get "$1") |
|
||||
} |
|
||||
|
|
||||
# truncate huge HTML response |
|
||||
# echo: Argument list too long |
|
||||
_htmlget() { |
|
||||
export _H1="Cookie: $One984HOSTING_COOKIE" |
|
||||
_response=$(_get "$1" | grep "$2" | _head_n 1) |
|
||||
} |
|
||||
|
|
||||
# add extra headers to request |
|
||||
_authpost() { |
|
||||
export _H1="Cookie: $One984HOSTING_COOKIE" |
|
||||
_response=$(_post "$1" "$2") |
|
||||
} |
|
||||
@ -1,197 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
# Author: Radek Sprta <sprta@vshosting.cz> |
|
||||
|
|
||||
#CLOUDDNS_EMAIL=XXXXX |
|
||||
#CLOUDDNS_PASSWORD="YYYYYYYYY" |
|
||||
#CLOUDDNS_CLIENT_ID=XXXXX |
|
||||
|
|
||||
CLOUDDNS_API='https://admin.vshosting.cloud/clouddns' |
|
||||
CLOUDDNS_LOGIN_API='https://admin.vshosting.cloud/api/public/auth/login' |
|
||||
|
|
||||
######## Public functions ##################### |
|
||||
|
|
||||
# Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|
||||
dns_clouddns_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
_debug "fulldomain" "$fulldomain" |
|
||||
|
|
||||
CLOUDDNS_CLIENT_ID="${CLOUDDNS_CLIENT_ID:-$(_readaccountconf_mutable CLOUDDNS_CLIENT_ID)}" |
|
||||
CLOUDDNS_EMAIL="${CLOUDDNS_EMAIL:-$(_readaccountconf_mutable CLOUDDNS_EMAIL)}" |
|
||||
CLOUDDNS_PASSWORD="${CLOUDDNS_PASSWORD:-$(_readaccountconf_mutable CLOUDDNS_PASSWORD)}" |
|
||||
|
|
||||
if [ -z "$CLOUDDNS_PASSWORD" ] || [ -z "$CLOUDDNS_EMAIL" ] || [ -z "$CLOUDDNS_CLIENT_ID" ]; then |
|
||||
CLOUDDNS_CLIENT_ID="" |
|
||||
CLOUDDNS_EMAIL="" |
|
||||
CLOUDDNS_PASSWORD="" |
|
||||
_err "You didn't specify a CloudDNS password, email and client ID yet." |
|
||||
return 1 |
|
||||
fi |
|
||||
if ! _contains "$CLOUDDNS_EMAIL" "@"; then |
|
||||
_err "It seems that the CLOUDDNS_EMAIL=$CLOUDDNS_EMAIL is not a valid email address." |
|
||||
_err "Please check and retry." |
|
||||
return 1 |
|
||||
fi |
|
||||
# Save CloudDNS client id, email and password to config file |
|
||||
_saveaccountconf_mutable CLOUDDNS_CLIENT_ID "$CLOUDDNS_CLIENT_ID" |
|
||||
_saveaccountconf_mutable CLOUDDNS_EMAIL "$CLOUDDNS_EMAIL" |
|
||||
_saveaccountconf_mutable CLOUDDNS_PASSWORD "$CLOUDDNS_PASSWORD" |
|
||||
|
|
||||
_debug "First detect the root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "Invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug _domain_id "$_domain_id" |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
|
|
||||
# Add TXT record |
|
||||
data="{\"type\":\"TXT\",\"name\":\"$fulldomain.\",\"value\":\"$txtvalue\",\"domainId\":\"$_domain_id\"}" |
|
||||
if _clouddns_api POST "record-txt" "$data"; then |
|
||||
if _contains "$response" "$txtvalue"; then |
|
||||
_info "Added, OK" |
|
||||
elif _contains "$response" '"code":4136'; then |
|
||||
_info "Already exists, OK" |
|
||||
else |
|
||||
_err "Add TXT record error." |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
|
|
||||
_debug "Publishing record changes" |
|
||||
_clouddns_api PUT "domain/$_domain_id/publish" "{\"soaTtl\":300}" |
|
||||
} |
|
||||
|
|
||||
# Usage: rm _acme-challenge.www.domain.com |
|
||||
dns_clouddns_rm() { |
|
||||
fulldomain=$1 |
|
||||
_debug "fulldomain" "$fulldomain" |
|
||||
|
|
||||
CLOUDDNS_CLIENT_ID="${CLOUDDNS_CLIENT_ID:-$(_readaccountconf_mutable CLOUDDNS_CLIENT_ID)}" |
|
||||
CLOUDDNS_EMAIL="${CLOUDDNS_EMAIL:-$(_readaccountconf_mutable CLOUDDNS_EMAIL)}" |
|
||||
CLOUDDNS_PASSWORD="${CLOUDDNS_PASSWORD:-$(_readaccountconf_mutable CLOUDDNS_PASSWORD)}" |
|
||||
|
|
||||
_debug "First detect the root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "Invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug _domain_id "$_domain_id" |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
|
|
||||
# Get record ID |
|
||||
_clouddns_api GET "domain/$_domain_id" |
|
||||
if _contains "$response" "lastDomainRecordList"; then |
|
||||
re="\"lastDomainRecordList\".*\"id\":\"([^\"}]*)\"[^}]*\"name\":\"$fulldomain.\"," |
|
||||
_last_domains=$(echo "$response" | _egrep_o "$re") |
|
||||
re2="\"id\":\"([^\"}]*)\"[^}]*\"name\":\"$fulldomain.\"," |
|
||||
_record_id=$(echo "$_last_domains" | _egrep_o "$re2" | _head_n 1 | cut -d : -f 2 | cut -d , -f 1 | tr -d "\"") |
|
||||
_debug _record_id "$_record_id" |
|
||||
else |
|
||||
_err "Could not retrieve record ID" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Removing record" |
|
||||
if _clouddns_api DELETE "record/$_record_id"; then |
|
||||
if _contains "$response" "\"error\":"; then |
|
||||
_err "Could not remove record" |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
|
|
||||
_debug "Publishing record changes" |
|
||||
_clouddns_api PUT "domain/$_domain_id/publish" "{\"soaTtl\":300}" |
|
||||
} |
|
||||
|
|
||||
#################### Private functions below ################################## |
|
||||
|
|
||||
# Usage: _get_root _acme-challenge.www.domain.com |
|
||||
# Returns: |
|
||||
# _sub_domain=_acme-challenge.www |
|
||||
# _domain=domain.com |
|
||||
# _domain_id=sdjkglgdfewsdfg |
|
||||
_get_root() { |
|
||||
domain=$1 |
|
||||
|
|
||||
# Get domain root |
|
||||
data="{\"search\": [{\"name\": \"clientId\", \"operator\": \"eq\", \"value\": \"$CLOUDDNS_CLIENT_ID\"}]}" |
|
||||
_clouddns_api "POST" "domain/search" "$data" |
|
||||
domain_slice="$domain" |
|
||||
while [ -z "$domain_root" ]; do |
|
||||
if _contains "$response" "\"domainName\":\"$domain_slice\.\""; then |
|
||||
domain_root="$domain_slice" |
|
||||
_debug domain_root "$domain_root" |
|
||||
fi |
|
||||
domain_slice="$(echo "$domain_slice" | cut -d . -f 2-)" |
|
||||
done |
|
||||
|
|
||||
# Get domain id |
|
||||
data="{\"search\": [{\"name\": \"clientId\", \"operator\": \"eq\", \"value\": \"$CLOUDDNS_CLIENT_ID\"}, \ |
|
||||
{\"name\": \"domainName\", \"operator\": \"eq\", \"value\": \"$domain_root.\"}]}" |
|
||||
_clouddns_api "POST" "domain/search" "$data" |
|
||||
if _contains "$response" "\"id\":\""; then |
|
||||
re='domainType\":\"[^\"]*\",\"id\":\"([^\"]*)\",' # Match domain id |
|
||||
_domain_id=$(echo "$response" | _egrep_o "$re" | _head_n 1 | cut -d : -f 3 | tr -d "\",") |
|
||||
if [ "$_domain_id" ]; then |
|
||||
_sub_domain=$(printf "%s" "$domain" | sed "s/.$domain_root//") |
|
||||
_domain="$domain_root" |
|
||||
return 0 |
|
||||
fi |
|
||||
_err 'Domain name not found on your CloudDNS account' |
|
||||
return 1 |
|
||||
fi |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
# Usage: _clouddns_api GET domain/search '{"data": "value"}' |
|
||||
# Returns: |
|
||||
# response='{"message": "api response"}' |
|
||||
_clouddns_api() { |
|
||||
method=$1 |
|
||||
endpoint="$2" |
|
||||
data="$3" |
|
||||
_debug endpoint "$endpoint" |
|
||||
|
|
||||
if [ -z "$CLOUDDNS_TOKEN" ]; then |
|
||||
_clouddns_login |
|
||||
fi |
|
||||
_debug CLOUDDNS_TOKEN "$CLOUDDNS_TOKEN" |
|
||||
|
|
||||
export _H1="Content-Type: application/json" |
|
||||
export _H2="Authorization: Bearer $CLOUDDNS_TOKEN" |
|
||||
|
|
||||
if [ "$method" != "GET" ]; then |
|
||||
_debug data "$data" |
|
||||
response="$(_post "$data" "$CLOUDDNS_API/$endpoint" "" "$method" | tr -d '\t\r\n ')" |
|
||||
else |
|
||||
response="$(_get "$CLOUDDNS_API/$endpoint" | tr -d '\t\r\n ')" |
|
||||
fi |
|
||||
|
|
||||
# shellcheck disable=SC2181 |
|
||||
if [ "$?" != "0" ]; then |
|
||||
_err "Error $endpoint" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug2 response "$response" |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
# Returns: |
|
||||
# CLOUDDNS_TOKEN=dslfje2rj23l |
|
||||
_clouddns_login() { |
|
||||
login_data="{\"email\": \"$CLOUDDNS_EMAIL\", \"password\": \"$CLOUDDNS_PASSWORD\"}" |
|
||||
response="$(_post "$login_data" "$CLOUDDNS_LOGIN_API" "" "POST" "Content-Type: application/json")" |
|
||||
|
|
||||
if _contains "$response" "\"accessToken\":\""; then |
|
||||
CLOUDDNS_TOKEN=$(echo "$response" | _egrep_o "\"accessToken\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \") |
|
||||
export CLOUDDNS_TOKEN |
|
||||
else |
|
||||
echo 'Could not get CloudDNS access token; check your credentials' |
|
||||
return 1 |
|
||||
fi |
|
||||
return 0 |
|
||||
} |
|
||||
@ -1,141 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
# Author: Wout Decre <wout@canodus.be> |
|
||||
|
|
||||
CONSTELLIX_Api="https://api.dns.constellix.com/v1" |
|
||||
#CONSTELLIX_Key="XXX" |
|
||||
#CONSTELLIX_Secret="XXX" |
|
||||
|
|
||||
######## Public functions ##################### |
|
||||
|
|
||||
# Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|
||||
# Used to add txt record |
|
||||
dns_constellix_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
CONSTELLIX_Key="${CONSTELLIX_Key:-$(_readaccountconf_mutable CONSTELLIX_Key)}" |
|
||||
CONSTELLIX_Secret="${CONSTELLIX_Secret:-$(_readaccountconf_mutable CONSTELLIX_Secret)}" |
|
||||
|
|
||||
if [ -z "$CONSTELLIX_Key" ] || [ -z "$CONSTELLIX_Secret" ]; then |
|
||||
_err "You did not specify the Contellix API key and secret yet." |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_saveaccountconf_mutable CONSTELLIX_Key "$CONSTELLIX_Key" |
|
||||
_saveaccountconf_mutable CONSTELLIX_Secret "$CONSTELLIX_Secret" |
|
||||
|
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "Invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Adding TXT record" |
|
||||
if _constellix_rest POST "domains/${_domain_id}/records" "[{\"type\":\"txt\",\"add\":true,\"set\":{\"name\":\"${_sub_domain}\",\"ttl\":120,\"roundRobin\":[{\"value\":\"${txtvalue}\"}]}}]"; then |
|
||||
if printf -- "%s" "$response" | grep "{\"success\":\"1 record(s) added, 0 record(s) updated, 0 record(s) deleted\"}" >/dev/null; then |
|
||||
_info "Added" |
|
||||
return 0 |
|
||||
else |
|
||||
_err "Error adding TXT record" |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
} |
|
||||
|
|
||||
# Usage: fulldomain txtvalue |
|
||||
# Used to remove the txt record after validation |
|
||||
dns_constellix_rm() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
CONSTELLIX_Key="${CONSTELLIX_Key:-$(_readaccountconf_mutable CONSTELLIX_Key)}" |
|
||||
CONSTELLIX_Secret="${CONSTELLIX_Secret:-$(_readaccountconf_mutable CONSTELLIX_Secret)}" |
|
||||
|
|
||||
if [ -z "$CONSTELLIX_Key" ] || [ -z "$CONSTELLIX_Secret" ]; then |
|
||||
_err "You did not specify the Contellix API key and secret yet." |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "Invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Removing TXT record" |
|
||||
if _constellix_rest POST "domains/${_domain_id}/records" "[{\"type\":\"txt\",\"delete\":true,\"filter\":{\"field\":\"name\",\"op\":\"eq\",\"value\":\"${_sub_domain}\"}}]"; then |
|
||||
if printf -- "%s" "$response" | grep "{\"success\":\"0 record(s) added, 0 record(s) updated, 1 record(s) deleted\"}" >/dev/null; then |
|
||||
_info "Removed" |
|
||||
return 0 |
|
||||
else |
|
||||
_err "Error removing TXT record" |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
} |
|
||||
|
|
||||
#################### Private functions below ################################## |
|
||||
|
|
||||
_get_root() { |
|
||||
domain=$1 |
|
||||
i=2 |
|
||||
p=1 |
|
||||
_debug "Detecting root zone" |
|
||||
while true; do |
|
||||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|
||||
if [ -z "$h" ]; then |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
if ! _constellix_rest GET "domains/search?exact=$h"; then |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
if _contains "$response" "\"name\":\"$h\""; then |
|
||||
_domain_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":[0-9]+" | cut -d ':' -f 2) |
|
||||
if [ "$_domain_id" ]; then |
|
||||
_sub_domain=$(printf "%s" "$domain" | cut -d '.' -f 1-$p) |
|
||||
_domain="$h" |
|
||||
|
|
||||
_debug _domain_id "$_domain_id" |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
return 0 |
|
||||
fi |
|
||||
return 1 |
|
||||
fi |
|
||||
p=$i |
|
||||
i=$(_math "$i" + 1) |
|
||||
done |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
_constellix_rest() { |
|
||||
m=$1 |
|
||||
ep="$2" |
|
||||
data="$3" |
|
||||
_debug "$ep" |
|
||||
|
|
||||
rdate=$(date +"%s")"000" |
|
||||
hmac=$(printf "%s" "$rdate" | _hmac sha1 "$(printf "%s" "$CONSTELLIX_Secret" | _hex_dump | tr -d ' ')" | _base64) |
|
||||
|
|
||||
export _H1="x-cnsdns-apiKey: $CONSTELLIX_Key" |
|
||||
export _H2="x-cnsdns-requestDate: $rdate" |
|
||||
export _H3="x-cnsdns-hmac: $hmac" |
|
||||
export _H4="Accept: application/json" |
|
||||
export _H5="Content-Type: application/json" |
|
||||
|
|
||||
if [ "$m" != "GET" ]; then |
|
||||
_debug data "$data" |
|
||||
response="$(_post "$data" "$CONSTELLIX_Api/$ep" "" "$m")" |
|
||||
else |
|
||||
response="$(_get "$CONSTELLIX_Api/$ep")" |
|
||||
fi |
|
||||
|
|
||||
if [ "$?" != "0" ]; then |
|
||||
_err "Error $ep" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_debug response "$response" |
|
||||
return 0 |
|
||||
} |
|
||||
@ -1,121 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
#Author StefanAbl |
|
||||
#Usage specify a private keyfile to use with dynv6 'export KEY="path/to/keyfile"' |
|
||||
#if no keyfile is specified, you will be asked if you want to create one in /home/$USER/.ssh/dynv6 and /home/$USER/.ssh/dynv6.pub |
|
||||
######## Public functions ##################### |
|
||||
# Please Read this guide first: https://github.com/Neilpang/acme.sh/wiki/DNS-API-Dev-Guide |
|
||||
#Usage: dns_myapi_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|
||||
dns_dynv6_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
_info "Using dynv6 api" |
|
||||
_debug fulldomain "$fulldomain" |
|
||||
_debug txtvalue "$txtvalue" |
|
||||
_get_keyfile |
|
||||
_info "using keyfile $dynv6_keyfile" |
|
||||
_get_domain "$fulldomain" |
|
||||
_your_hosts="$(ssh -i "$dynv6_keyfile" api@dynv6.com hosts)" |
|
||||
if ! _contains "$_your_hosts" "$_host"; then |
|
||||
_debug "The host is $_host and the record $_record" |
|
||||
_debug "Dynv6 returned $_your_hosts" |
|
||||
_err "The host $_host does not exists on your dynv6 account" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug "found host on your account" |
|
||||
returnval="$(ssh -i "$dynv6_keyfile" api@dynv6.com hosts \""$_host"\" records set \""$_record"\" txt data \""$txtvalue"\")" |
|
||||
_debug "Dynv6 returend this after record was added: $returnval" |
|
||||
if _contains "$returnval" "created"; then |
|
||||
return 0 |
|
||||
elif _contains "$returnval" "updated"; then |
|
||||
return 0 |
|
||||
else |
|
||||
_err "Something went wrong! it does not seem like the record was added succesfully" |
|
||||
return 1 |
|
||||
fi |
|
||||
return 1 |
|
||||
} |
|
||||
#Usage: fulldomain txtvalue |
|
||||
#Remove the txt record after validation. |
|
||||
dns_dynv6_rm() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
_info "Using dynv6 api" |
|
||||
_debug fulldomain "$fulldomain" |
|
||||
_debug txtvalue "$txtvalue" |
|
||||
_get_keyfile |
|
||||
_info "using keyfile $dynv6_keyfile" |
|
||||
_get_domain "$fulldomain" |
|
||||
_your_hosts="$(ssh -i "$dynv6_keyfile" api@dynv6.com hosts)" |
|
||||
if ! _contains "$_your_hosts" "$_host"; then |
|
||||
_debug "The host is $_host and the record $_record" |
|
||||
_debug "Dynv6 returned $_your_hosts" |
|
||||
_err "The host $_host does not exists on your dynv6 account" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug "found host on your account" |
|
||||
_info "$(ssh -i "$dynv6_keyfile" api@dynv6.com hosts "\"$_host\"" records del "\"$_record\"" txt)" |
|
||||
return 0 |
|
||||
|
|
||||
} |
|
||||
#################### Private functions below ################################## |
|
||||
#Usage: No Input required |
|
||||
#returns |
|
||||
#dynv6_keyfile the path to the new keyfile that has been generated |
|
||||
_generate_new_key() { |
|
||||
dynv6_keyfile="$(eval echo ~"$USER")/.ssh/dynv6" |
|
||||
_info "Path to key file used: $dynv6_keyfile" |
|
||||
if [ ! -f "$dynv6_keyfile" ] && [ ! -f "$dynv6_keyfile.pub" ]; then |
|
||||
_debug "generating key in $dynv6_keyfile and $dynv6_keyfile.pub" |
|
||||
ssh-keygen -f "$dynv6_keyfile" -t ssh-ed25519 -N '' |
|
||||
else |
|
||||
_err "There is already a file in $dynv6_keyfile or $dynv6_keyfile.pub" |
|
||||
return 1 |
|
||||
fi |
|
||||
} |
|
||||
#Usage: _acme-challenge.www.example.dynv6.net |
|
||||
#returns |
|
||||
#_host= example.dynv6.net |
|
||||
#_record=_acme-challenge.www |
|
||||
#aborts if not a valid domain |
|
||||
_get_domain() { |
|
||||
_full_domain="$1" |
|
||||
_debug "getting domain for $_full_domain" |
|
||||
if ! _contains "$_full_domain" 'dynv6.net' && ! _contains "$_full_domain" 'dns.army' && ! _contains "$_full_domain" 'dns.navy'; then |
|
||||
_err "The hosts does not seem to be a dynv6 host" |
|
||||
return 1 |
|
||||
fi |
|
||||
_record="${_full_domain%.*}" |
|
||||
_record="${_record%.*}" |
|
||||
_record="${_record%.*}" |
|
||||
_debug "The record we are ging to use is $_record" |
|
||||
_host="$_full_domain" |
|
||||
while [ "$(echo "$_host" | grep -o '\.' | wc -l)" != "2" ]; do |
|
||||
_host="${_host#*.}" |
|
||||
done |
|
||||
_debug "And the host is $_host" |
|
||||
return 0 |
|
||||
|
|
||||
} |
|
||||
|
|
||||
# Usage: No input required |
|
||||
#returns |
|
||||
#dynv6_keyfile path to the key that will be used |
|
||||
_get_keyfile() { |
|
||||
_debug "get keyfile method called" |
|
||||
dynv6_keyfile="${dynv6_keyfile:-$(_readaccountconf_mutable dynv6_keyfile)}" |
|
||||
_debug Your key is "$dynv6_keyfile" |
|
||||
if [ -z "$dynv6_keyfile" ]; then |
|
||||
if [ -z "$KEY" ]; then |
|
||||
_err "You did not specify a key to use with dynv6" |
|
||||
_info "Creating new dynv6 api key to add to dynv6.com" |
|
||||
_generate_new_key |
|
||||
_info "Please add this key to dynv6.com $(cat "$dynv6_keyfile.pub")" |
|
||||
_info "Hit Enter to contiue" |
|
||||
read -r _ |
|
||||
#save the credentials to the account conf file. |
|
||||
else |
|
||||
dynv6_keyfile="$KEY" |
|
||||
fi |
|
||||
_saveaccountconf_mutable dynv6_keyfile "$dynv6_keyfile" |
|
||||
fi |
|
||||
} |
|
||||
@ -1,129 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
# Joker.com API for acme.sh |
|
||||
# |
|
||||
# This script adds the necessary TXT record to a domain in Joker.com. |
|
||||
# |
|
||||
# You must activate Dynamic DNS in Joker.com DNS configuration first. |
|
||||
# Username and password below refer to Dynamic DNS authentication, |
|
||||
# not your Joker.com login credentials. |
|
||||
# See: https://joker.com/faq/content/11/427/en/what-is-dynamic-dns-dyndns.html |
|
||||
# |
|
||||
# NOTE: This script does not support wildcard certificates, because |
|
||||
# Joker.com API does not support adding two TXT records with the same |
|
||||
# subdomain. Adding the second record will overwrite the first one. |
|
||||
# See: https://joker.com/faq/content/6/496/en/let_s-encrypt-support.html |
|
||||
# "... this request will replace all TXT records for the specified |
|
||||
# label by the provided content" |
|
||||
# |
|
||||
# Author: aattww (https://github.com/aattww/) |
|
||||
# |
|
||||
# Report bugs to https://github.com/acmesh-official/acme.sh/issues/2840 |
|
||||
# |
|
||||
# JOKER_USERNAME="xxxx" |
|
||||
# JOKER_PASSWORD="xxxx" |
|
||||
|
|
||||
JOKER_API="https://svc.joker.com/nic/replace" |
|
||||
|
|
||||
######## Public functions ##################### |
|
||||
|
|
||||
#Usage: dns_joker_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|
||||
dns_joker_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
JOKER_USERNAME="${JOKER_USERNAME:-$(_readaccountconf_mutable JOKER_USERNAME)}" |
|
||||
JOKER_PASSWORD="${JOKER_PASSWORD:-$(_readaccountconf_mutable JOKER_PASSWORD)}" |
|
||||
|
|
||||
if [ -z "$JOKER_USERNAME" ] || [ -z "$JOKER_PASSWORD" ]; then |
|
||||
_err "No Joker.com username and password specified." |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_saveaccountconf_mutable JOKER_USERNAME "$JOKER_USERNAME" |
|
||||
_saveaccountconf_mutable JOKER_PASSWORD "$JOKER_PASSWORD" |
|
||||
|
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "Invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Adding TXT record" |
|
||||
if _joker_rest "username=$JOKER_USERNAME&password=$JOKER_PASSWORD&zone=$_domain&label=$_sub_domain&type=TXT&value=$txtvalue"; then |
|
||||
if _startswith "$response" "OK"; then |
|
||||
_info "Added, OK" |
|
||||
return 0 |
|
||||
fi |
|
||||
fi |
|
||||
_err "Error adding TXT record." |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
#fulldomain txtvalue |
|
||||
dns_joker_rm() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
JOKER_USERNAME="${JOKER_USERNAME:-$(_readaccountconf_mutable JOKER_USERNAME)}" |
|
||||
JOKER_PASSWORD="${JOKER_PASSWORD:-$(_readaccountconf_mutable JOKER_PASSWORD)}" |
|
||||
|
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "Invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "Removing TXT record" |
|
||||
# TXT record is removed by setting its value to empty. |
|
||||
if _joker_rest "username=$JOKER_USERNAME&password=$JOKER_PASSWORD&zone=$_domain&label=$_sub_domain&type=TXT&value="; then |
|
||||
if _startswith "$response" "OK"; then |
|
||||
_info "Removed, OK" |
|
||||
return 0 |
|
||||
fi |
|
||||
fi |
|
||||
_err "Error removing TXT record." |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
#################### Private functions below ################################## |
|
||||
#_acme-challenge.www.domain.com |
|
||||
#returns |
|
||||
# _sub_domain=_acme-challenge.www |
|
||||
# _domain=domain.com |
|
||||
_get_root() { |
|
||||
fulldomain=$1 |
|
||||
i=1 |
|
||||
while true; do |
|
||||
h=$(printf "%s" "$fulldomain" | cut -d . -f $i-100) |
|
||||
_debug h "$h" |
|
||||
if [ -z "$h" ]; then |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
# Try to remove a test record. With correct root domain, username and password this will return "OK: ..." regardless |
|
||||
# of record in question existing or not. |
|
||||
if _joker_rest "username=$JOKER_USERNAME&password=$JOKER_PASSWORD&zone=$h&label=jokerTXTUpdateTest&type=TXT&value="; then |
|
||||
if _startswith "$response" "OK"; then |
|
||||
_sub_domain="$(echo "$fulldomain" | sed "s/\\.$h\$//")" |
|
||||
_domain=$h |
|
||||
return 0 |
|
||||
fi |
|
||||
fi |
|
||||
|
|
||||
i=$(_math "$i" + 1) |
|
||||
done |
|
||||
|
|
||||
_debug "Root domain not found" |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
_joker_rest() { |
|
||||
data="$1" |
|
||||
_debug data "$data" |
|
||||
|
|
||||
if ! response="$(_post "$data" "$JOKER_API" "" "POST")"; then |
|
||||
_err "Error POSTing" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug response "$response" |
|
||||
return 0 |
|
||||
} |
|
||||
@ -1,168 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
######################################################################## |
|
||||
# All-inkl Kasserver hook script for acme.sh |
|
||||
# |
|
||||
# Environment variables: |
|
||||
# |
|
||||
# - $KAS_Login (Kasserver API login name) |
|
||||
# - $KAS_Authtype (Kasserver API auth type. Default: sha1) |
|
||||
# - $KAS_Authdata (Kasserver API auth data.) |
|
||||
# |
|
||||
# Author: Martin Kammerlander, Phlegx Systems OG <martin.kammerlander@phlegx.com> |
|
||||
# Updated by: Marc-Oliver Lange <git@die-lang.es> |
|
||||
# Credits: Inspired by dns_he.sh. Thanks a lot man! |
|
||||
# Git repo: https://github.com/phlegx/acme.sh |
|
||||
# TODO: Better Error handling |
|
||||
######################################################################## |
|
||||
KAS_Api="https://kasapi.kasserver.com/dokumentation/formular.php" |
|
||||
######## Public functions ##################### |
|
||||
dns_kas_add() { |
|
||||
_fulldomain=$1 |
|
||||
_txtvalue=$2 |
|
||||
_info "Using DNS-01 All-inkl/Kasserver hook" |
|
||||
_info "Adding $_fulldomain DNS TXT entry on All-inkl/Kasserver" |
|
||||
_info "Check and Save Props" |
|
||||
_check_and_save |
|
||||
_info "Checking Zone and Record_Name" |
|
||||
_get_zone_and_record_name "$_fulldomain" |
|
||||
_info "Getting Record ID" |
|
||||
_get_record_id |
|
||||
|
|
||||
_info "Creating TXT DNS record" |
|
||||
params="?kas_login=$KAS_Login" |
|
||||
params="$params&kas_auth_type=$KAS_Authtype" |
|
||||
params="$params&kas_auth_data=$KAS_Authdata" |
|
||||
params="$params&var1=record_name" |
|
||||
params="$params&wert1=$_record_name" |
|
||||
params="$params&var2=record_type" |
|
||||
params="$params&wert2=TXT" |
|
||||
params="$params&var3=record_data" |
|
||||
params="$params&wert3=$_txtvalue" |
|
||||
params="$params&var4=record_aux" |
|
||||
params="$params&wert4=0" |
|
||||
params="$params&kas_action=add_dns_settings" |
|
||||
params="$params&var5=zone_host" |
|
||||
params="$params&wert5=$_zone" |
|
||||
_debug2 "Wait for 10 seconds by default before calling KAS API." |
|
||||
_sleep 10 |
|
||||
response="$(_get "$KAS_Api$params")" |
|
||||
_debug2 "response" "$response" |
|
||||
|
|
||||
if ! _contains "$response" "TRUE"; then |
|
||||
_err "An unkown error occurred, please check manually." |
|
||||
return 1 |
|
||||
fi |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
dns_kas_rm() { |
|
||||
_fulldomain=$1 |
|
||||
_txtvalue=$2 |
|
||||
_info "Using DNS-01 All-inkl/Kasserver hook" |
|
||||
_info "Cleaning up after All-inkl/Kasserver hook" |
|
||||
_info "Removing $_fulldomain DNS TXT entry on All-inkl/Kasserver" |
|
||||
|
|
||||
_info "Check and Save Props" |
|
||||
_check_and_save |
|
||||
_info "Checking Zone and Record_Name" |
|
||||
_get_zone_and_record_name "$_fulldomain" |
|
||||
_info "Getting Record ID" |
|
||||
_get_record_id |
|
||||
|
|
||||
# If there is a record_id, delete the entry |
|
||||
if [ -n "$_record_id" ]; then |
|
||||
params="?kas_login=$KAS_Login" |
|
||||
params="$params&kas_auth_type=$KAS_Authtype" |
|
||||
params="$params&kas_auth_data=$KAS_Authdata" |
|
||||
params="$params&kas_action=delete_dns_settings" |
|
||||
|
|
||||
for i in $_record_id; do |
|
||||
params2="$params&var1=record_id" |
|
||||
params2="$params2&wert1=$i" |
|
||||
_debug2 "Wait for 10 seconds by default before calling KAS API." |
|
||||
_sleep 10 |
|
||||
response="$(_get "$KAS_Api$params2")" |
|
||||
_debug2 "response" "$response" |
|
||||
if ! _contains "$response" "TRUE"; then |
|
||||
_err "Either the txt record is not found or another error occurred, please check manually." |
|
||||
return 1 |
|
||||
fi |
|
||||
done |
|
||||
else # Cannot delete or unkown error |
|
||||
_err "No record_id found that can be deleted. Please check manually." |
|
||||
return 1 |
|
||||
fi |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
########################## PRIVATE FUNCTIONS ########################### |
|
||||
|
|
||||
# Checks for the ENV variables and saves them |
|
||||
_check_and_save() { |
|
||||
KAS_Login="${KAS_Login:-$(_readaccountconf_mutable KAS_Login)}" |
|
||||
KAS_Authtype="${KAS_Authtype:-$(_readaccountconf_mutable KAS_Authtype)}" |
|
||||
KAS_Authdata="${KAS_Authdata:-$(_readaccountconf_mutable KAS_Authdata)}" |
|
||||
|
|
||||
if [ -z "$KAS_Login" ] || [ -z "$KAS_Authtype" ] || [ -z "$KAS_Authdata" ]; then |
|
||||
KAS_Login= |
|
||||
KAS_Authtype= |
|
||||
KAS_Authdata= |
|
||||
_err "No auth details provided. Please set user credentials using the \$KAS_Login, \$KAS_Authtype, and \$KAS_Authdata environment variables." |
|
||||
return 1 |
|
||||
fi |
|
||||
_saveaccountconf_mutable KAS_Login "$KAS_Login" |
|
||||
_saveaccountconf_mutable KAS_Authtype "$KAS_Authtype" |
|
||||
_saveaccountconf_mutable KAS_Authdata "$KAS_Authdata" |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
# Gets back the base domain/zone and record name. |
|
||||
# See: https://github.com/Neilpang/acme.sh/wiki/DNS-API-Dev-Guide |
|
||||
_get_zone_and_record_name() { |
|
||||
params="?kas_login=$KAS_Login" |
|
||||
params="?kas_login=$KAS_Login" |
|
||||
params="$params&kas_auth_type=$KAS_Authtype" |
|
||||
params="$params&kas_auth_data=$KAS_Authdata" |
|
||||
params="$params&kas_action=get_domains" |
|
||||
|
|
||||
_debug2 "Wait for 10 seconds by default before calling KAS API." |
|
||||
_sleep 10 |
|
||||
response="$(_get "$KAS_Api$params")" |
|
||||
_debug2 "response" "$response" |
|
||||
_zonen="$(echo "$response" | tr -d "\n\r" | tr -d " " | tr '[]' '<>' | sed "s/=>Array/\n=> Array/g" | tr ' ' '\n' | grep "domain_name" | tr '<' '\n' | grep "domain_name" | sed "s/domain_name>=>//g")" |
|
||||
_domain="$1" |
|
||||
_temp_domain="$(echo "$1" | sed 's/\.$//')" |
|
||||
_rootzone="$_domain" |
|
||||
for i in $_zonen; do |
|
||||
l1=${#_rootzone} |
|
||||
l2=${#i} |
|
||||
if _endswith "$_domain" "$i" && [ "$l1" -ge "$l2" ]; then |
|
||||
_rootzone="$i" |
|
||||
fi |
|
||||
done |
|
||||
_zone="${_rootzone}." |
|
||||
_temp_record_name="$(echo "$_temp_domain" | sed "s/$_rootzone//g")" |
|
||||
_record_name="$(echo "$_temp_record_name" | sed 's/\.$//')" |
|
||||
_debug2 "Zone:" "$_zone" |
|
||||
_debug2 "Domain:" "$_domain" |
|
||||
_debug2 "Record_Name:" "$_record_name" |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
# Retrieve the DNS record ID |
|
||||
_get_record_id() { |
|
||||
params="?kas_login=$KAS_Login" |
|
||||
params="$params&kas_auth_type=$KAS_Authtype" |
|
||||
params="$params&kas_auth_data=$KAS_Authdata" |
|
||||
params="$params&kas_action=get_dns_settings" |
|
||||
params="$params&var1=zone_host" |
|
||||
params="$params&wert1=$_zone" |
|
||||
|
|
||||
_debug2 "Wait for 10 seconds by default before calling KAS API." |
|
||||
_sleep 10 |
|
||||
response="$(_get "$KAS_Api$params")" |
|
||||
_debug2 "response" "$response" |
|
||||
_record_id="$(echo "$response" | tr -d "\n\r" | tr -d " " | tr '[]' '<>' | sed "s/=>Array/\n=> Array/g" | tr ' ' '\n' | grep "=>$_record_name<" | grep '>TXT<' | tr '<' '\n' | grep record_id | sed "s/record_id>=>//g")" |
|
||||
_debug2 _record_id "$_record_id" |
|
||||
return 0 |
|
||||
} |
|
||||
@ -1,159 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
# bug reports to support+acmesh@misaka.io |
|
||||
# based on dns_nsone.sh by dev@1e.ca |
|
||||
|
|
||||
# |
|
||||
#Misaka_Key="sdfsdfsdfljlbjkljlkjsdfoiwje" |
|
||||
# |
|
||||
|
|
||||
Misaka_Api="https://dnsapi.misaka.io/dns" |
|
||||
|
|
||||
######## Public functions ##################### |
|
||||
|
|
||||
#Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|
||||
dns_misaka_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
if [ -z "$Misaka_Key" ]; then |
|
||||
Misaka_Key="" |
|
||||
_err "You didn't specify misaka.io dns api key yet." |
|
||||
_err "Please create you key and try again." |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
#save the api key and email to the account conf file. |
|
||||
_saveaccountconf Misaka_Key "$Misaka_Key" |
|
||||
|
|
||||
_debug "checking root zone [$fulldomain]" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
|
|
||||
_debug "Getting txt records" |
|
||||
_misaka_rest GET "zones/${_domain}/recordsets?search=${_sub_domain}" |
|
||||
|
|
||||
if ! _contains "$response" "\"results\":"; then |
|
||||
_err "Error" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
count=$(printf "%s\n" "$response" | _egrep_o "\"name\":\"$_sub_domain\",[^{]*\"type\":\"TXT\"" | wc -l | tr -d " ") |
|
||||
_debug count "$count" |
|
||||
if [ "$count" = "0" ]; then |
|
||||
_info "Adding record" |
|
||||
|
|
||||
if _misaka_rest PUT "zones/${_domain}/recordsets/${_sub_domain}/TXT" "{\"records\":[{\"value\":\"\\\"$txtvalue\\\"\"}],\"filters\":[],\"ttl\":1}"; then |
|
||||
_debug response "$response" |
|
||||
if _contains "$response" "$_sub_domain"; then |
|
||||
_info "Added" |
|
||||
return 0 |
|
||||
else |
|
||||
_err "Add txt record error." |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
_err "Add txt record error." |
|
||||
else |
|
||||
_info "Updating record" |
|
||||
|
|
||||
_misaka_rest POST "zones/${_domain}/recordsets/${_sub_domain}/TXT?append=true" "{\"records\": [{\"value\": \"\\\"$txtvalue\\\"\"}],\"ttl\":1}" |
|
||||
if [ "$?" = "0" ] && _contains "$response" "$_sub_domain"; then |
|
||||
_info "Updated!" |
|
||||
#todo: check if the record takes effect |
|
||||
return 0 |
|
||||
fi |
|
||||
_err "Update error" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
} |
|
||||
|
|
||||
#fulldomain |
|
||||
dns_misaka_rm() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
_debug "First detect the root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug _sub_domain "$_sub_domain" |
|
||||
_debug _domain "$_domain" |
|
||||
|
|
||||
_debug "Getting txt records" |
|
||||
_misaka_rest GET "zones/${_domain}/recordsets?search=${_sub_domain}" |
|
||||
|
|
||||
count=$(printf "%s\n" "$response" | _egrep_o "\"name\":\"$_sub_domain\",[^{]*\"type\":\"TXT\"" | wc -l | tr -d " ") |
|
||||
_debug count "$count" |
|
||||
if [ "$count" = "0" ]; then |
|
||||
_info "Don't need to remove." |
|
||||
else |
|
||||
if ! _misaka_rest DELETE "zones/${_domain}/recordsets/${_sub_domain}/TXT"; then |
|
||||
_err "Delete record error." |
|
||||
return 1 |
|
||||
fi |
|
||||
_contains "$response" "" |
|
||||
fi |
|
||||
} |
|
||||
|
|
||||
#################### Private functions below ################################## |
|
||||
#_acme-challenge.www.domain.com |
|
||||
#returns |
|
||||
# _sub_domain=_acme-challenge.www |
|
||||
# _domain=domain.com |
|
||||
# _domain_id=sdjkglgdfewsdfg |
|
||||
_get_root() { |
|
||||
domain=$1 |
|
||||
i=2 |
|
||||
p=1 |
|
||||
if ! _misaka_rest GET "zones?limit=1000"; then |
|
||||
return 1 |
|
||||
fi |
|
||||
while true; do |
|
||||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|
||||
_debug h "$h" |
|
||||
if [ -z "$h" ]; then |
|
||||
#not valid |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
if _contains "$response" "\"name\":\"$h\""; then |
|
||||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|
||||
_domain="$h" |
|
||||
return 0 |
|
||||
fi |
|
||||
p=$i |
|
||||
i=$(_math "$i" + 1) |
|
||||
done |
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
_misaka_rest() { |
|
||||
m=$1 |
|
||||
ep="$2" |
|
||||
data="$3" |
|
||||
_debug "$ep" |
|
||||
|
|
||||
export _H1="Content-Type: application/json" |
|
||||
export _H2="User-Agent: acme.sh/$VER misaka-dns-acmesh/20191213" |
|
||||
export _H3="Authorization: Token $Misaka_Key" |
|
||||
|
|
||||
if [ "$m" != "GET" ]; then |
|
||||
_debug data "$data" |
|
||||
response="$(_post "$data" "$Misaka_Api/$ep" "" "$m")" |
|
||||
else |
|
||||
response="$(_get "$Misaka_Api/$ep")" |
|
||||
fi |
|
||||
|
|
||||
if [ "$?" != "0" ]; then |
|
||||
_err "error $ep" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug2 response "$response" |
|
||||
return 0 |
|
||||
} |
|
||||
@ -1,88 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
######################################################################## |
|
||||
# https://namemaster.de hook script for acme.sh |
|
||||
# |
|
||||
# Environment variables: |
|
||||
# |
|
||||
# - $NM_user (your namemaster.de API username) |
|
||||
# - $NM_sha256 (your namemaster.de API password_as_sha256hash) |
|
||||
# |
|
||||
# Author: Thilo Gass <thilo.gass@gmail.com> |
|
||||
# Git repo: https://github.com/ThiloGa/acme.sh |
|
||||
|
|
||||
#-- dns_nm_add() - Add TXT record -------------------------------------- |
|
||||
# Usage: dns_nm_add _acme-challenge.subdomain.domain.com "XyZ123..." |
|
||||
|
|
||||
namemaster_api="https://namemaster.de/api/api.php" |
|
||||
|
|
||||
dns_nm_add() { |
|
||||
fulldomain=$1 |
|
||||
txt_value=$2 |
|
||||
_info "Using DNS-01 namemaster hook" |
|
||||
|
|
||||
NM_user="${NM_user:-$(_readaccountconf_mutable NM_user)}" |
|
||||
NM_sha256="${NM_sha256:-$(_readaccountconf_mutable NM_sha256)}" |
|
||||
if [ -z "$NM_user" ] || [ -z "$NM_sha256" ]; then |
|
||||
NM_user="" |
|
||||
NM_sha256="" |
|
||||
_err "No auth details provided. Please set user credentials using the \$NM_user and \$NM_sha256 environment variables." |
|
||||
return 1 |
|
||||
fi |
|
||||
#save the api user and sha256 password to the account conf file. |
|
||||
_debug "Save user and hash" |
|
||||
_saveaccountconf_mutable NM_user "$NM_user" |
|
||||
_saveaccountconf_mutable NM_sha256 "$NM_sha256" |
|
||||
|
|
||||
_debug "First detect the root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" "$fulldomain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_info "die Zone lautet:" "$zone" |
|
||||
|
|
||||
get="$namemaster_api?User=$NM_user&Password=$NM_sha256&Antwort=csv&Typ=ACME&zone=$zone&hostname=$fulldomain&TXT=$txt_value&Action=Auto&Lifetime=3600" |
|
||||
|
|
||||
if ! erg="$(_get "$get")"; then |
|
||||
_err "error Adding $fulldomain TXT: $txt_value" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
if _contains "$erg" "Success"; then |
|
||||
_info "Success, TXT Added, OK" |
|
||||
else |
|
||||
_err "error Adding $fulldomain TXT: $txt_value erg: $erg" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_debug "ok Auto $fulldomain TXT: $txt_value erg: $erg" |
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
dns_nm_rm() { |
|
||||
|
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
_info "TXT enrty in $fulldomain is deleted automatically" |
|
||||
_debug fulldomain "$fulldomain" |
|
||||
_debug txtvalue "$txtvalue" |
|
||||
|
|
||||
} |
|
||||
|
|
||||
_get_root() { |
|
||||
|
|
||||
domain=$1 |
|
||||
|
|
||||
get="$namemaster_api?User=$NM_user&Password=$NM_sha256&Typ=acme&hostname=$domain&Action=getzone&antwort=csv" |
|
||||
|
|
||||
if ! zone="$(_get "$get")"; then |
|
||||
_err "error getting Zone" |
|
||||
return 1 |
|
||||
else |
|
||||
if _contains "$zone" "hostname not found"; then |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
|
|
||||
} |
|
||||
@ -1,273 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
#OPNsense Bind API |
|
||||
#https://docs.opnsense.org/development/api.html |
|
||||
# |
|
||||
#OPNs_Host="opnsense.example.com" |
|
||||
#OPNs_Port="443" |
|
||||
# optional, defaults to 443 if unset |
|
||||
#OPNs_Key="qocfU9RSbt8vTIBcnW8bPqCrpfAHMDvj5OzadE7Str+rbjyCyk7u6yMrSCHtBXabgDDXx/dY0POUp7ZA" |
|
||||
#OPNs_Token="pZEQ+3ce8dDlfBBdg3N8EpqpF5I1MhFqdxX06le6Gl8YzyQvYCfCzNaFX9O9+IOSyAs7X71fwdRiZ+Lv" |
|
||||
#OPNs_Api_Insecure=0 |
|
||||
# optional, defaults to 0 if unset |
|
||||
# Set 1 for insecure and 0 for secure -> difference is whether ssl cert is checked for validity (0) or whether it is just accepted (1) |
|
||||
|
|
||||
######## Public functions ##################### |
|
||||
#Usage: add _acme-challenge.www.domain.com "123456789ABCDEF0000000000000000000000000000000000000" |
|
||||
#fulldomain |
|
||||
#txtvalue |
|
||||
OPNs_DefaultPort=443 |
|
||||
OPNs_DefaultApi_Insecure=0 |
|
||||
|
|
||||
dns_opnsense_add() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
_opns_check_auth || return 1 |
|
||||
|
|
||||
if ! set_record "$fulldomain" "$txtvalue"; then |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
#fulldomain |
|
||||
dns_opnsense_rm() { |
|
||||
fulldomain=$1 |
|
||||
txtvalue=$2 |
|
||||
|
|
||||
_opns_check_auth || return 1 |
|
||||
|
|
||||
if ! rm_record "$fulldomain" "$txtvalue"; then |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
set_record() { |
|
||||
fulldomain=$1 |
|
||||
new_challenge=$2 |
|
||||
_info "Adding record $fulldomain with challenge: $new_challenge" |
|
||||
|
|
||||
_debug "Detect root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_debug _domain "$_domain" |
|
||||
_debug _host "$_host" |
|
||||
_debug _domainid "$_domainid" |
|
||||
_return_str="" |
|
||||
_record_string="" |
|
||||
_build_record_string "$_domainid" "$_host" "$new_challenge" |
|
||||
_uuid="" |
|
||||
if _existingchallenge "$_domain" "$_host" "$new_challenge"; then |
|
||||
# Update |
|
||||
if _opns_rest "POST" "/record/setRecord/${_uuid}" "$_record_string"; then |
|
||||
_return_str="$response" |
|
||||
else |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
else |
|
||||
#create |
|
||||
if _opns_rest "POST" "/record/addRecord" "$_record_string"; then |
|
||||
_return_str="$response" |
|
||||
else |
|
||||
return 1 |
|
||||
fi |
|
||||
fi |
|
||||
|
|
||||
if echo "$_return_str" | _egrep_o "\"result\":\"saved\"" >/dev/null; then |
|
||||
_opns_rest "POST" "/service/reconfigure" "{}" |
|
||||
_debug "Record created" |
|
||||
else |
|
||||
_err "Error creating record $_record_string" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
rm_record() { |
|
||||
fulldomain=$1 |
|
||||
new_challenge="$2" |
|
||||
_info "Remove record $fulldomain with challenge: $new_challenge" |
|
||||
|
|
||||
_debug "Detect root zone" |
|
||||
if ! _get_root "$fulldomain"; then |
|
||||
_err "invalid domain" |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
_debug _domain "$_domain" |
|
||||
_debug _host "$_host" |
|
||||
_debug _domainid "$_domainid" |
|
||||
_uuid="" |
|
||||
if _existingchallenge "$_domain" "$_host" "$new_challenge"; then |
|
||||
# Delete |
|
||||
if _opns_rest "POST" "/record/delRecord/${_uuid}" "\{\}"; then |
|
||||
if echo "$_return_str" | _egrep_o "\"result\":\"deleted\"" >/dev/null; then |
|
||||
_opns_rest "POST" "/service/reconfigure" "{}" |
|
||||
_debug "Record deleted" |
|
||||
else |
|
||||
_err "Error deleting record $_host from domain $fulldomain" |
|
||||
return 1 |
|
||||
fi |
|
||||
else |
|
||||
_err "Error deleting record $_host from domain $fulldomain" |
|
||||
return 1 |
|
||||
fi |
|
||||
else |
|
||||
_info "Record not found, nothing to remove" |
|
||||
fi |
|
||||
|
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
#################### Private functions below ################################## |
|
||||
#_acme-challenge.www.domain.com |
|
||||
#returns |
|
||||
# _domainid=domid |
|
||||
#_domain=domain.com |
|
||||
_get_root() { |
|
||||
domain=$1 |
|
||||
i=2 |
|
||||
p=1 |
|
||||
if _opns_rest "GET" "/domain/get"; then |
|
||||
_domain_response="$response" |
|
||||
else |
|
||||
return 1 |
|
||||
fi |
|
||||
|
|
||||
while true; do |
|
||||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|
||||
if [ -z "$h" ]; then |
|
||||
#not valid |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug h "$h" |
|
||||
id=$(echo "$_domain_response" | _egrep_o "\"[^\"]*\":{\"enabled\":\"1\",\"type\":{\"master\":{\"value\":\"master\",\"selected\":1},\"slave\":{\"value\":\"slave\",\"selected\":0}},\"masterip\":\"[^\"]*\",\"domainname\":\"${h}\"" | cut -d ':' -f 1 | cut -d '"' -f 2) |
|
||||
|
|
||||
if [ -n "$id" ]; then |
|
||||
_debug id "$id" |
|
||||
_host=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|
||||
_domain="${h}" |
|
||||
_domainid="${id}" |
|
||||
return 0 |
|
||||
fi |
|
||||
p=$i |
|
||||
i=$(_math $i + 1) |
|
||||
done |
|
||||
_debug "$domain not found" |
|
||||
|
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
_opns_rest() { |
|
||||
method=$1 |
|
||||
ep=$2 |
|
||||
data=$3 |
|
||||
#Percent encode user and token |
|
||||
key=$(echo "$OPNs_Key" | tr -d "\n\r" | _url_encode) |
|
||||
token=$(echo "$OPNs_Token" | tr -d "\n\r" | _url_encode) |
|
||||
|
|
||||
opnsense_url="https://${key}:${token}@${OPNs_Host}:${OPNs_Port:-$OPNs_DefaultPort}/api/bind${ep}" |
|
||||
export _H1="Content-Type: application/json" |
|
||||
_debug2 "Try to call api: https://${OPNs_Host}:${OPNs_Port:-$OPNs_DefaultPort}/api/bind${ep}" |
|
||||
if [ ! "$method" = "GET" ]; then |
|
||||
_debug data "$data" |
|
||||
export _H1="Content-Type: application/json" |
|
||||
response="$(_post "$data" "$opnsense_url" "" "$method")" |
|
||||
else |
|
||||
export _H1="" |
|
||||
response="$(_get "$opnsense_url")" |
|
||||
fi |
|
||||
|
|
||||
if [ "$?" != "0" ]; then |
|
||||
_err "error $ep" |
|
||||
return 1 |
|
||||
fi |
|
||||
_debug2 response "$response" |
|
||||
|
|
||||
return 0 |
|
||||
} |
|
||||
|
|
||||
_build_record_string() { |
|
||||
_record_string="{\"record\":{\"enabled\":\"1\",\"domain\":\"$1\",\"name\":\"$2\",\"type\":\"TXT\",\"value\":\"$3\"}}" |
|
||||
} |
|
||||
|
|
||||
_existingchallenge() { |
|
||||
if _opns_rest "GET" "/record/searchRecord"; then |
|
||||
_record_response="$response" |
|
||||
else |
|
||||
return 1 |
|
||||
fi |
|
||||
_uuid="" |
|
||||
_uuid=$(echo "$_record_response" | _egrep_o "\"uuid\":\"[^\"]*\",\"enabled\":\"[01]\",\"domain\":\"$1\",\"name\":\"$2\",\"type\":\"TXT\",\"value\":\"$3\"" | cut -d ':' -f 2 | cut -d '"' -f 2) |
|
||||
|
|
||||
if [ -n "$_uuid" ]; then |
|
||||
_debug uuid "$_uuid" |
|
||||
return 0 |
|
||||
fi |
|
||||
_debug "${2}.$1{1} record not found" |
|
||||
|
|
||||
return 1 |
|
||||
} |
|
||||
|
|
||||
_opns_check_auth() { |
|
||||
OPNs_Host="${OPNs_Host:-$(_readaccountconf_mutable OPNs_Host)}" |
|
||||
OPNs_Port="${OPNs_Port:-$(_readaccountconf_mutable OPNs_Port)}" |
|
||||
OPNs_Key="${OPNs_Key:-$(_readaccountconf_mutable OPNs_Key)}" |
|
||||
OPNs_Token="${OPNs_Token:-$(_readaccountconf_mutable OPNs_Token)}" |
|
||||
OPNs_Api_Insecure="${OPNs_Api_Insecure:-$(_readaccountconf_mutable OPNs_Api_Insecure)}" |
|
||||
|
|
||||
if [ -z "$OPNs_Host" ]; then |
|
||||
_err "You don't specify OPNsense address." |
|
||||
return 1 |
|
||||
else |
|
||||
_saveaccountconf_mutable OPNs_Host "$OPNs_Host" |
|
||||
fi |
|
||||
|
|
||||
if ! printf '%s' "$OPNs_Port" | grep '^[0-9]*$' >/dev/null; then |
|
||||
_err 'OPNs_Port specified but not numeric value' |
|
||||
return 1 |
|
||||
elif [ -z "$OPNs_Port" ]; then |
|
||||
_info "OPNSense port not specified. Defaulting to using port $OPNs_DefaultPort" |
|
||||
else |
|
||||
_saveaccountconf_mutable OPNs_Port "$OPNs_Port" |
|
||||
fi |
|
||||
|
|
||||
if ! printf '%s' "$OPNs_Api_Insecure" | grep '^[01]$' >/dev/null; then |
|
||||
_err 'OPNs_Api_Insecure specified but not 0/1 value' |
|
||||
return 1 |
|
||||
elif [ -n "$OPNs_Api_Insecure" ]; then |
|
||||
_saveaccountconf_mutable OPNs_Api_Insecure "$OPNs_Api_Insecure" |
|
||||
fi |
|
||||
export HTTPS_INSECURE="${OPNs_Api_Insecure:-$OPNs_DefaultApi_Insecure}" |
|
||||
|
|
||||
if [ -z "$OPNs_Key" ]; then |
|
||||
_err "you have not specified your OPNsense api key id." |
|
||||
_err "Please set OPNs_Key and try again." |
|
||||
return 1 |
|
||||
else |
|
||||
_saveaccountconf_mutable OPNs_Key "$OPNs_Key" |
|
||||
fi |
|
||||
|
|
||||
if [ -z "$OPNs_Token" ]; then |
|
||||
_err "you have not specified your OPNsense token." |
|
||||
_err "Please create OPNs_Token and try again." |
|
||||
return 1 |
|
||||
else |
|
||||
_saveaccountconf_mutable OPNs_Token "$OPNs_Token" |
|
||||
fi |
|
||||
|
|
||||
if ! _opns_rest "GET" "/general/get"; then |
|
||||
_err "Call to OPNsense API interface failed. Unable to access OPNsense API." |
|
||||
return 1 |
|
||||
fi |
|
||||
return 0 |
|
||||
} |
|
||||
@ -1,64 +0,0 @@ |
|||||
#!/usr/bin/env sh |
|
||||
|
|
||||
#Support for CQHTTP api. Push notification on CoolQ |
|
||||
#CQHTTP_TOKEN="" Recommended to be not empty, QQ application token |
|
||||
#CQHTTP_USER="" Required, QQ receiver ID |
|
||||
#CQHTTP_APIROOT="" Required, CQHTTP Server URL (without slash suffix) |
|
||||
#CQHTTP_CUSTOM_MSGHEAD="" Optional, custom message header |
|
||||
|
|
||||
CQHTTP_APIPATH="/send_private_msg" |
|
||||
|
|
||||
cqhttp_send() { |
|
||||
_subject="$1" |
|
||||
_content="$2" |
|
||||
_statusCode="$3" #0: success, 1: error 2($RENEW_SKIP): skipped |
|
||||
_debug "_statusCode" "$_statusCode" |
|
||||
|
|
||||
CQHTTP_TOKEN="${CQHTTP_TOKEN:-$(_readaccountconf_mutable CQHTTP_TOKEN)}" |
|
||||
if [ -z "$CQHTTP_TOKEN" ]; then |
|
||||
CQHTTP_TOKEN="" |
|
||||
_info "You didn't specify a CQHTTP application token yet, which is unsafe. Assuming it to be empty." |
|
||||
else |
|
||||
_saveaccountconf_mutable CQHTTP_TOKEN "$CQHTTP_TOKEN" |
|
||||
fi |
|
||||
|
|
||||
CQHTTP_USER="${CQHTTP_USER:-$(_readaccountconf_mutable CQHTTP_USER)}" |
|
||||
if [ -z "$CQHTTP_USER" ]; then |
|
||||
CQHTTP_USER="" |
|
||||
_err "You didn't specify a QQ user yet." |
|
||||
return 1 |
|
||||
fi |
|
||||
_saveaccountconf_mutable CQHTTP_USER "$CQHTTP_USER" |
|
||||
|
|
||||
CQHTTP_APIROOT="${CQHTTP_APIROOT:-$(_readaccountconf_mutable CQHTTP_APIROOT)}" |
|
||||
if [ -z "$CQHTTP_APIROOT" ]; then |
|
||||
CQHTTP_APIROOT="" |
|
||||
_err "You didn't specify the API root yet." |
|
||||
return 1 |
|
||||
fi |
|
||||
_saveaccountconf_mutable CQHTTP_APIROOT "$CQHTTP_APIROOT" |
|
||||
|
|
||||
CQHTTP_CUSTOM_MSGHEAD="${CQHTTP_CUSTOM_MSGHEAD:-$(_readaccountconf_mutable CQHTTP_CUSTOM_MSGHEAD)}" |
|
||||
if [ -z "$CQHTTP_CUSTOM_MSGHEAD" ]; then |
|
||||
CQHTTP_CUSTOM_MSGHEAD="A message from acme.sh:" |
|
||||
else |
|
||||
_saveaccountconf_mutable CQHTTP_CUSTOM_MSGHEAD "$CQHTTP_CUSTOM_MSGHEAD" |
|
||||
fi |
|
||||
|
|
||||
_access_token="$(printf "%s" "$CQHTTP_TOKEN" | _url_encode)" |
|
||||
_user_id="$(printf "%s" "$CQHTTP_USER" | _url_encode)" |
|
||||
_message="$(printf "$CQHTTP_CUSTOM_MSGHEAD %s\\n%s" "$_subject" "$_content" | _url_encode)" |
|
||||
|
|
||||
_finalUrl="$CQHTTP_APIROOT$CQHTTP_APIPATH?access_token=$_access_token&user_id=$_user_id&message=$_message" |
|
||||
response="$(_get "$_finalUrl")" |
|
||||
|
|
||||
if [ "$?" = "0" ] && _contains "$response" "\"retcode\":0,\"status\":\"ok\""; then |
|
||||
_info "QQ send success." |
|
||||
return 0 |
|
||||
fi |
|
||||
|
|
||||
_err "QQ send error." |
|
||||
_debug "URL" "$_finalUrl" |
|
||||
_debug "Response" "$response" |
|
||||
return 1 |
|
||||
} |
|
||||
Write
Preview
Loading…
Cancel
Save
Reference in new issue