|
|
@ -4684,19 +4684,18 @@ $_authorizations_map" |
|
|
|
thumbprint="$(__calc_account_thumbprint)" |
|
|
|
fi |
|
|
|
|
|
|
|
entry="$(echo "$response" | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')" |
|
|
|
_debug entry "$entry" |
|
|
|
keyauthorization="" |
|
|
|
if [ -z "$entry" ]; then |
|
|
|
if ! _startswith "$d" '*.'; then |
|
|
|
_debug "Not a wildcard domain, lets check whether the validation is already valid." |
|
|
|
|
|
|
|
if echo "$response" | grep '"status":"valid"' >/dev/null 2>&1; then |
|
|
|
_debug "$d is already valid." |
|
|
|
keyauthorization="$STATE_VERIFIED" |
|
|
|
_debug keyauthorization "$keyauthorization" |
|
|
|
fi |
|
|
|
fi |
|
|
|
if [ -z "$keyauthorization" ]; then |
|
|
|
|
|
|
|
entry="$(echo "$response" | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')" |
|
|
|
_debug entry "$entry" |
|
|
|
|
|
|
|
if [ -z "$keyauthorization" -a -z "$entry" ]; then |
|
|
|
_err "Error, can not get domain token entry $d for $vtype" |
|
|
|
_supported_vtypes="$(echo "$response" | _egrep_o "\"challenges\":\[[^]]*]" | tr '{' "\n" | grep type | cut -d '"' -f 4 | tr "\n" ' ')" |
|
|
|
if [ "$_supported_vtypes" ]; then |
|
|
@ -4706,7 +4705,6 @@ $_authorizations_map" |
|
|
|
_on_issue_err "$_post_hook" |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -z "$keyauthorization" ]; then |
|
|
|
token="$(echo "$entry" | _egrep_o '"token":"[^"]*' | cut -d : -f 2 | tr -d '"')" |
|
|
@ -4731,12 +4729,6 @@ $_authorizations_map" |
|
|
|
fi |
|
|
|
keyauthorization="$token.$thumbprint" |
|
|
|
_debug keyauthorization "$keyauthorization" |
|
|
|
|
|
|
|
if printf "%s" "$response" | grep '"status":"valid"' >/dev/null 2>&1; then |
|
|
|
_debug "$d is already verified." |
|
|
|
keyauthorization="$STATE_VERIFIED" |
|
|
|
_debug keyauthorization "$keyauthorization" |
|
|
|
fi |
|
|
|
fi |
|
|
|
|
|
|
|
dvlist="$d$sep$keyauthorization$sep$uri$sep$vtype$sep$_currentRoot" |
|
|
|