@ -9,6 +9,7 @@
AWS_HOST = "route53.amazonaws.com"
AWS_HOST = "route53.amazonaws.com"
AWS_URL = " https:// $AWS_HOST "
AWS_URL = " https:// $AWS_HOST "
AWS_METADATA_URL = "http://169.254.169.254/latest/meta-data"
AWS_WIKI = "https://github.com/Neilpang/acme.sh/wiki/How-to-use-Amazon-Route53-API"
AWS_WIKI = "https://github.com/Neilpang/acme.sh/wiki/How-to-use-Amazon-Route53-API"
@ -19,6 +20,10 @@ dns_aws_add() {
fulldomain = $1
fulldomain = $1
txtvalue = $2
txtvalue = $2
if [ -n " ${ AWS_USE_INSTANCE_ROLE : = $( _readaccountconf_mutable AWS_USE_INSTANCE_ROLE) } " ] ; then
_use_instance_role
fi
AWS_ACCESS_KEY_ID = " ${ AWS_ACCESS_KEY_ID :- $( _readaccountconf_mutable AWS_ACCESS_KEY_ID) } "
AWS_ACCESS_KEY_ID = " ${ AWS_ACCESS_KEY_ID :- $( _readaccountconf_mutable AWS_ACCESS_KEY_ID) } "
AWS_SECRET_ACCESS_KEY = " ${ AWS_SECRET_ACCESS_KEY :- $( _readaccountconf_mutable AWS_SECRET_ACCESS_KEY) } "
AWS_SECRET_ACCESS_KEY = " ${ AWS_SECRET_ACCESS_KEY :- $( _readaccountconf_mutable AWS_SECRET_ACCESS_KEY) } "
if [ -z " $AWS_ACCESS_KEY_ID " ] || [ -z " $AWS_SECRET_ACCESS_KEY " ] ; then
if [ -z " $AWS_ACCESS_KEY_ID " ] || [ -z " $AWS_SECRET_ACCESS_KEY " ] ; then
@ -30,8 +35,12 @@ dns_aws_add() {
fi
fi
#save for future use
#save for future use
_saveaccountconf_mutable AWS_ACCESS_KEY_ID " $AWS_ACCESS_KEY_ID "
_saveaccountconf_mutable AWS_SECRET_ACCESS_KEY " $AWS_SECRET_ACCESS_KEY "
if [ -n " $AWS_USE_INSTANCE_ROLE " ] ; then
_saveaccountconf_mutable AWS_USE_INSTANCE_ROLE " $AWS_USE_INSTANCE_ROLE "
else
_saveaccountconf_mutable AWS_ACCESS_KEY_ID " $AWS_ACCESS_KEY_ID "
_saveaccountconf_mutable AWS_SECRET_ACCESS_KEY " $AWS_SECRET_ACCESS_KEY "
fi
_debug "First detect the root zone"
_debug "First detect the root zone"
if ! _get_root " $fulldomain " ; then
if ! _get_root " $fulldomain " ; then
@ -76,6 +85,10 @@ dns_aws_rm() {
fulldomain = $1
fulldomain = $1
txtvalue = $2
txtvalue = $2
if [ -n " ${ AWS_USE_INSTANCE_ROLE : = $( _readaccountconf_mutable AWS_USE_INSTANCE_ROLE) } " ] ; then
_use_instance_role
fi
AWS_ACCESS_KEY_ID = " ${ AWS_ACCESS_KEY_ID :- $( _readaccountconf_mutable AWS_ACCESS_KEY_ID) } "
AWS_ACCESS_KEY_ID = " ${ AWS_ACCESS_KEY_ID :- $( _readaccountconf_mutable AWS_ACCESS_KEY_ID) } "
AWS_SECRET_ACCESS_KEY = " ${ AWS_SECRET_ACCESS_KEY :- $( _readaccountconf_mutable AWS_SECRET_ACCESS_KEY) } "
AWS_SECRET_ACCESS_KEY = " ${ AWS_SECRET_ACCESS_KEY :- $( _readaccountconf_mutable AWS_SECRET_ACCESS_KEY) } "
_debug "First detect the root zone"
_debug "First detect the root zone"
@ -162,6 +175,34 @@ _get_root() {
return 1
return 1
}
}
_use_instance_role( ) {
if ! _get " $AWS_METADATA_URL /iam/security-credentials/ " true | _head_n 1 | grep -Fq 200; then
_err "Unable to fetch IAM role from AWS instance metadata."
return
fi
_aws_role = $( _get " $AWS_METADATA_URL /iam/security-credentials/ " )
_debug "_aws_role" " $_aws_role "
_aws_creds = " $(
_get " $AWS_METADATA_URL /iam/security-credentials/ $_aws_role " \
| _normalizeJson \
| tr '{,}' '\n' \
| while read -r _line; do
_key = " $( echo " ${ _line %% : * } " | tr -d '"' ) "
_value = " ${ _line #* : } "
_debug3 "_key" " $_key "
_secure_debug3 "_value" " $_value "
case " $_key " in
AccessKeyId) echo " AWS_ACCESS_KEY_ID= $_value " ; ;
SecretAccessKey) echo " AWS_SECRET_ACCESS_KEY= $_value " ; ;
Token) echo " AWS_SESSION_TOKEN= $_value " ; ;
esac
done \
| paste -sd' ' -
) "
_secure_debug "_aws_creds" " $_aws_creds "
eval " $_aws_creds "
}
#method uri qstr data
#method uri qstr data
aws_rest( ) {
aws_rest( ) {
mtd = " $1 "
mtd = " $1 "