Browse Source
Merge branch 'master' of https://github.com/acmesh-official/acme.sh into master
pull/2919/head
Merge branch 'master' of https://github.com/acmesh-official/acme.sh into master
pull/2919/head
No known key found for this signature in database
GPG Key ID: 3C0D84EA2D933E47
50 changed files with 2702 additions and 305 deletions
-
18.github/auto-comment.yml
-
16.github/workflows/dockerhub.yml
-
3.travis.yml
-
2Dockerfile
-
52README.md
-
411acme.sh
-
2deploy/docker.sh
-
1deploy/haproxy.sh
-
4deploy/kong.sh
-
262deploy/openstack.sh
-
139deploy/ssh.sh
-
33deploy/synology_dsm.sh
-
10dnsapi/dns_1984hosting.sh
-
1dnsapi/dns_ali.sh
-
163dnsapi/dns_arvan.sh
-
2dnsapi/dns_azure.sh
-
16dnsapi/dns_cf.sh
-
6dnsapi/dns_cloudns.sh
-
4dnsapi/dns_cyon.sh
-
2dnsapi/dns_ddnss.sh
-
65dnsapi/dns_df.sh
-
10dnsapi/dns_dgon.sh
-
7dnsapi/dns_duckdns.sh
-
4dnsapi/dns_dynu.sh
-
6dnsapi/dns_dynv6.sh
-
5dnsapi/dns_easydns.sh
-
2dnsapi/dns_gd.sh
-
11dnsapi/dns_gdnsdk.sh
-
2dnsapi/dns_he.sh
-
252dnsapi/dns_hetzner.sh
-
8dnsapi/dns_hexonet.sh
-
81dnsapi/dns_inwx.sh
-
150dnsapi/dns_kappernet.sh
-
2dnsapi/dns_kinghost.sh
-
4dnsapi/dns_lexicon.sh
-
2dnsapi/dns_loopia.sh
-
162dnsapi/dns_netlify.sh
-
168dnsapi/dns_njalla.sh
-
170dnsapi/dns_one.sh
-
19dnsapi/dns_openprovider.sh
-
348dnsapi/dns_openstack.sh
-
2dnsapi/dns_opnsense.sh
-
2dnsapi/dns_rackspace.sh
-
67dnsapi/dns_regru.sh
-
162dnsapi/dns_transip.sh
-
8dnsapi/dns_unoeuro.sh
-
2dnsapi/dns_variomedia.sh
-
2dnsapi/dns_yandex.sh
-
51notify/mail.sh
-
86notify/teams.sh
@ -0,0 +1,16 @@ |
|||
|
|||
name: Build DockerHub |
|||
on: |
|||
push: |
|||
branches: [ master, dev ] |
|||
|
|||
jobs: |
|||
build: |
|||
runs-on: ubuntu-latest |
|||
steps: |
|||
- name: trigger |
|||
run: curl -X POST https://hub.docker.com/api/build/v1/source/1813a660-2ee5-4583-a238-dd54e9a6ebac/trigger/c8cd9f1f-f269-45bc-9750-a08327257f62/call/ |
|||
|
|||
|
|||
|
|||
|
|||
@ -0,0 +1,262 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
# OpenStack Barbican deploy hook |
|||
# |
|||
# This requires you to have OpenStackClient and python-barbicanclient |
|||
# installed. |
|||
# |
|||
# You will require Keystone V3 credentials loaded into your environment, which |
|||
# could be either password or v3applicationcredential type. |
|||
# |
|||
# Author: Andy Botting <andy@andybotting.com> |
|||
|
|||
openstack_deploy() { |
|||
_cdomain="$1" |
|||
_ckey="$2" |
|||
_ccert="$3" |
|||
_cca="$4" |
|||
_cfullchain="$5" |
|||
|
|||
_debug _cdomain "$_cdomain" |
|||
_debug _ckey "$_ckey" |
|||
_debug _ccert "$_ccert" |
|||
_debug _cca "$_cca" |
|||
_debug _cfullchain "$_cfullchain" |
|||
|
|||
if ! _exists openstack; then |
|||
_err "OpenStack client not found" |
|||
return 1 |
|||
fi |
|||
|
|||
_openstack_credentials || return $? |
|||
|
|||
_info "Generate import pkcs12" |
|||
_import_pkcs12="$(_mktemp)" |
|||
if ! _openstack_to_pkcs "$_import_pkcs12" "$_ckey" "$_ccert" "$_cca"; then |
|||
_err "Error creating pkcs12 certificate" |
|||
return 1 |
|||
fi |
|||
_debug _import_pkcs12 "$_import_pkcs12" |
|||
_base64_pkcs12=$(_base64 "multiline" <"$_import_pkcs12") |
|||
|
|||
secretHrefs=$(_openstack_get_secrets) |
|||
_debug secretHrefs "$secretHrefs" |
|||
_openstack_store_secret || return $? |
|||
|
|||
if [ -n "$secretHrefs" ]; then |
|||
_info "Cleaning up existing secret" |
|||
_openstack_delete_secrets || return $? |
|||
fi |
|||
|
|||
_info "Certificate successfully deployed" |
|||
return 0 |
|||
} |
|||
|
|||
_openstack_store_secret() { |
|||
if ! openstack secret store --name "$_cdomain." -t 'application/octet-stream' -e base64 --payload "$_base64_pkcs12"; then |
|||
_err "Failed to create OpenStack secret" |
|||
return 1 |
|||
fi |
|||
return |
|||
} |
|||
|
|||
_openstack_delete_secrets() { |
|||
echo "$secretHrefs" | while read -r secretHref; do |
|||
_info "Deleting old secret $secretHref" |
|||
if ! openstack secret delete "$secretHref"; then |
|||
_err "Failed to delete OpenStack secret" |
|||
return 1 |
|||
fi |
|||
done |
|||
return |
|||
} |
|||
|
|||
_openstack_get_secrets() { |
|||
if ! secretHrefs=$(openstack secret list -f value --name "$_cdomain." | cut -d' ' -f1); then |
|||
_err "Failed to list secrets" |
|||
return 1 |
|||
fi |
|||
echo "$secretHrefs" |
|||
} |
|||
|
|||
_openstack_to_pkcs() { |
|||
# The existing _toPkcs command can't allow an empty password, due to sh |
|||
# -z test, so copied here and forcing the empty password. |
|||
_cpfx="$1" |
|||
_ckey="$2" |
|||
_ccert="$3" |
|||
_cca="$4" |
|||
|
|||
${ACME_OPENSSL_BIN:-openssl} pkcs12 -export -out "$_cpfx" -inkey "$_ckey" -in "$_ccert" -certfile "$_cca" -password "pass:" |
|||
} |
|||
|
|||
_openstack_credentials() { |
|||
_debug "Check OpenStack credentials" |
|||
|
|||
# If we have OS_AUTH_URL already set in the environment, then assume we want |
|||
# to use those, otherwise use stored credentials |
|||
if [ -n "$OS_AUTH_URL" ]; then |
|||
_debug "OS_AUTH_URL env var found, using environment" |
|||
else |
|||
_debug "OS_AUTH_URL not found, loading stored credentials" |
|||
OS_AUTH_URL="${OS_AUTH_URL:-$(_readaccountconf_mutable OS_AUTH_URL)}" |
|||
OS_IDENTITY_API_VERSION="${OS_IDENTITY_API_VERSION:-$(_readaccountconf_mutable OS_IDENTITY_API_VERSION)}" |
|||
OS_AUTH_TYPE="${OS_AUTH_TYPE:-$(_readaccountconf_mutable OS_AUTH_TYPE)}" |
|||
OS_APPLICATION_CREDENTIAL_ID="${OS_APPLICATION_CREDENTIAL_ID:-$(_readaccountconf_mutable OS_APPLICATION_CREDENTIAL_ID)}" |
|||
OS_APPLICATION_CREDENTIAL_SECRET="${OS_APPLICATION_CREDENTIAL_SECRET:-$(_readaccountconf_mutable OS_APPLICATION_CREDENTIAL_SECRET)}" |
|||
OS_USERNAME="${OS_USERNAME:-$(_readaccountconf_mutable OS_USERNAME)}" |
|||
OS_PASSWORD="${OS_PASSWORD:-$(_readaccountconf_mutable OS_PASSWORD)}" |
|||
OS_PROJECT_NAME="${OS_PROJECT_NAME:-$(_readaccountconf_mutable OS_PROJECT_NAME)}" |
|||
OS_PROJECT_ID="${OS_PROJECT_ID:-$(_readaccountconf_mutable OS_PROJECT_ID)}" |
|||
OS_USER_DOMAIN_NAME="${OS_USER_DOMAIN_NAME:-$(_readaccountconf_mutable OS_USER_DOMAIN_NAME)}" |
|||
OS_USER_DOMAIN_ID="${OS_USER_DOMAIN_ID:-$(_readaccountconf_mutable OS_USER_DOMAIN_ID)}" |
|||
OS_PROJECT_DOMAIN_NAME="${OS_PROJECT_DOMAIN_NAME:-$(_readaccountconf_mutable OS_PROJECT_DOMAIN_NAME)}" |
|||
OS_PROJECT_DOMAIN_ID="${OS_PROJECT_DOMAIN_ID:-$(_readaccountconf_mutable OS_PROJECT_DOMAIN_ID)}" |
|||
fi |
|||
|
|||
# Check each var and either save or clear it depending on whether its set. |
|||
# The helps us clear out old vars in the case where a user may want |
|||
# to switch between password and app creds |
|||
_debug "OS_AUTH_URL" "$OS_AUTH_URL" |
|||
if [ -n "$OS_AUTH_URL" ]; then |
|||
export OS_AUTH_URL |
|||
_saveaccountconf_mutable OS_AUTH_URL "$OS_AUTH_URL" |
|||
else |
|||
unset OS_AUTH_URL |
|||
_clearaccountconf SAVED_OS_AUTH_URL |
|||
fi |
|||
|
|||
_debug "OS_IDENTITY_API_VERSION" "$OS_IDENTITY_API_VERSION" |
|||
if [ -n "$OS_IDENTITY_API_VERSION" ]; then |
|||
export OS_IDENTITY_API_VERSION |
|||
_saveaccountconf_mutable OS_IDENTITY_API_VERSION "$OS_IDENTITY_API_VERSION" |
|||
else |
|||
unset OS_IDENTITY_API_VERSION |
|||
_clearaccountconf SAVED_OS_IDENTITY_API_VERSION |
|||
fi |
|||
|
|||
_debug "OS_AUTH_TYPE" "$OS_AUTH_TYPE" |
|||
if [ -n "$OS_AUTH_TYPE" ]; then |
|||
export OS_AUTH_TYPE |
|||
_saveaccountconf_mutable OS_AUTH_TYPE "$OS_AUTH_TYPE" |
|||
else |
|||
unset OS_AUTH_TYPE |
|||
_clearaccountconf SAVED_OS_AUTH_TYPE |
|||
fi |
|||
|
|||
_debug "OS_APPLICATION_CREDENTIAL_ID" "$OS_APPLICATION_CREDENTIAL_ID" |
|||
if [ -n "$OS_APPLICATION_CREDENTIAL_ID" ]; then |
|||
export OS_APPLICATION_CREDENTIAL_ID |
|||
_saveaccountconf_mutable OS_APPLICATION_CREDENTIAL_ID "$OS_APPLICATION_CREDENTIAL_ID" |
|||
else |
|||
unset OS_APPLICATION_CREDENTIAL_ID |
|||
_clearaccountconf SAVED_OS_APPLICATION_CREDENTIAL_ID |
|||
fi |
|||
|
|||
_secure_debug "OS_APPLICATION_CREDENTIAL_SECRET" "$OS_APPLICATION_CREDENTIAL_SECRET" |
|||
if [ -n "$OS_APPLICATION_CREDENTIAL_SECRET" ]; then |
|||
export OS_APPLICATION_CREDENTIAL_SECRET |
|||
_saveaccountconf_mutable OS_APPLICATION_CREDENTIAL_SECRET "$OS_APPLICATION_CREDENTIAL_SECRET" |
|||
else |
|||
unset OS_APPLICATION_CREDENTIAL_SECRET |
|||
_clearaccountconf SAVED_OS_APPLICATION_CREDENTIAL_SECRET |
|||
fi |
|||
|
|||
_debug "OS_USERNAME" "$OS_USERNAME" |
|||
if [ -n "$OS_USERNAME" ]; then |
|||
export OS_USERNAME |
|||
_saveaccountconf_mutable OS_USERNAME "$OS_USERNAME" |
|||
else |
|||
unset OS_USERNAME |
|||
_clearaccountconf SAVED_OS_USERNAME |
|||
fi |
|||
|
|||
_secure_debug "OS_PASSWORD" "$OS_PASSWORD" |
|||
if [ -n "$OS_PASSWORD" ]; then |
|||
export OS_PASSWORD |
|||
_saveaccountconf_mutable OS_PASSWORD "$OS_PASSWORD" |
|||
else |
|||
unset OS_PASSWORD |
|||
_clearaccountconf SAVED_OS_PASSWORD |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_NAME" "$OS_PROJECT_NAME" |
|||
if [ -n "$OS_PROJECT_NAME" ]; then |
|||
export OS_PROJECT_NAME |
|||
_saveaccountconf_mutable OS_PROJECT_NAME "$OS_PROJECT_NAME" |
|||
else |
|||
unset OS_PROJECT_NAME |
|||
_clearaccountconf SAVED_OS_PROJECT_NAME |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_ID" "$OS_PROJECT_ID" |
|||
if [ -n "$OS_PROJECT_ID" ]; then |
|||
export OS_PROJECT_ID |
|||
_saveaccountconf_mutable OS_PROJECT_ID "$OS_PROJECT_ID" |
|||
else |
|||
unset OS_PROJECT_ID |
|||
_clearaccountconf SAVED_OS_PROJECT_ID |
|||
fi |
|||
|
|||
_debug "OS_USER_DOMAIN_NAME" "$OS_USER_DOMAIN_NAME" |
|||
if [ -n "$OS_USER_DOMAIN_NAME" ]; then |
|||
export OS_USER_DOMAIN_NAME |
|||
_saveaccountconf_mutable OS_USER_DOMAIN_NAME "$OS_USER_DOMAIN_NAME" |
|||
else |
|||
unset OS_USER_DOMAIN_NAME |
|||
_clearaccountconf SAVED_OS_USER_DOMAIN_NAME |
|||
fi |
|||
|
|||
_debug "OS_USER_DOMAIN_ID" "$OS_USER_DOMAIN_ID" |
|||
if [ -n "$OS_USER_DOMAIN_ID" ]; then |
|||
export OS_USER_DOMAIN_ID |
|||
_saveaccountconf_mutable OS_USER_DOMAIN_ID "$OS_USER_DOMAIN_ID" |
|||
else |
|||
unset OS_USER_DOMAIN_ID |
|||
_clearaccountconf SAVED_OS_USER_DOMAIN_ID |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_DOMAIN_NAME" "$OS_PROJECT_DOMAIN_NAME" |
|||
if [ -n "$OS_PROJECT_DOMAIN_NAME" ]; then |
|||
export OS_PROJECT_DOMAIN_NAME |
|||
_saveaccountconf_mutable OS_PROJECT_DOMAIN_NAME "$OS_PROJECT_DOMAIN_NAME" |
|||
else |
|||
unset OS_PROJECT_DOMAIN_NAME |
|||
_clearaccountconf SAVED_OS_PROJECT_DOMAIN_NAME |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_DOMAIN_ID" "$OS_PROJECT_DOMAIN_ID" |
|||
if [ -n "$OS_PROJECT_DOMAIN_ID" ]; then |
|||
export OS_PROJECT_DOMAIN_ID |
|||
_saveaccountconf_mutable OS_PROJECT_DOMAIN_ID "$OS_PROJECT_DOMAIN_ID" |
|||
else |
|||
unset OS_PROJECT_DOMAIN_ID |
|||
_clearaccountconf SAVED_OS_PROJECT_DOMAIN_ID |
|||
fi |
|||
|
|||
if [ "$OS_AUTH_TYPE" = "v3applicationcredential" ]; then |
|||
# Application Credential auth |
|||
if [ -z "$OS_APPLICATION_CREDENTIAL_ID" ] || [ -z "$OS_APPLICATION_CREDENTIAL_SECRET" ]; then |
|||
_err "When using OpenStack application credentials, OS_APPLICATION_CREDENTIAL_ID" |
|||
_err "and OS_APPLICATION_CREDENTIAL_SECRET must be set." |
|||
_err "Please check your credentials and try again." |
|||
return 1 |
|||
fi |
|||
else |
|||
# Password auth |
|||
if [ -z "$OS_USERNAME" ] || [ -z "$OS_PASSWORD" ]; then |
|||
_err "OpenStack username or password not found." |
|||
_err "Please check your credentials and try again." |
|||
return 1 |
|||
fi |
|||
|
|||
if [ -z "$OS_PROJECT_NAME" ] && [ -z "$OS_PROJECT_ID" ]; then |
|||
_err "When using password authentication, OS_PROJECT_NAME or" |
|||
_err "OS_PROJECT_ID must be set." |
|||
_err "Please check your credentials and try again." |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
@ -0,0 +1,163 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
#Arvan_Token="xxxx" |
|||
|
|||
ARVAN_API_URL="https://napi.arvancloud.com/cdn/4.0/domains" |
|||
|
|||
#Author: Ehsan Aliakbar |
|||
#Report Bugs here: https://github.com/Neilpang/acme.sh |
|||
# |
|||
######## Public functions ##################### |
|||
|
|||
#Usage: dns_arvan_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_arvan_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_info "Using Arvan" |
|||
|
|||
Arvan_Token="${Arvan_Token:-$(_readaccountconf_mutable Arvan_Token)}" |
|||
|
|||
if [ -z "$Arvan_Token" ]; then |
|||
_err "You didn't specify \"Arvan_Token\" token yet." |
|||
_err "You can get yours from here https://npanel.arvancloud.com/profile/api-keys" |
|||
return 1 |
|||
fi |
|||
#save the api token to the account conf file. |
|||
_saveaccountconf_mutable Arvan_Token "$Arvan_Token" |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_info "Adding record" |
|||
if _arvan_rest POST "$_domain/dns-records" "{\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"value\":{\"text\":\"$txtvalue\"},\"ttl\":120}"; then |
|||
if _contains "$response" "$txtvalue"; then |
|||
_info "Added, OK" |
|||
return 0 |
|||
elif _contains "$response" "Record Data is Duplicated"; then |
|||
_info "Already exists, OK" |
|||
return 0 |
|||
else |
|||
_err "Add txt record error." |
|||
return 1 |
|||
fi |
|||
fi |
|||
_err "Add txt record error." |
|||
return 1 |
|||
} |
|||
|
|||
#Usage: fulldomain txtvalue |
|||
#Remove the txt record after validation. |
|||
dns_arvan_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_info "Using Arvan" |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
Arvan_Token="${Arvan_Token:-$(_readaccountconf_mutable Arvan_Token)}" |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_debug "Getting txt records" |
|||
shorted_txtvalue=$(printf "%s" "$txtvalue" | cut -d "-" -d "_" -f1) |
|||
_arvan_rest GET "${_domain}/dns-records?search=$shorted_txtvalue" |
|||
|
|||
if ! printf "%s" "$response" | grep \"current_page\":1 >/dev/null; then |
|||
_err "Error on Arvan Api" |
|||
_err "Please create a github issue with debbug log" |
|||
return 1 |
|||
fi |
|||
|
|||
count=$(printf "%s\n" "$response" | _egrep_o "\"total\":[^,]*" | cut -d : -f 2) |
|||
_debug count "$count" |
|||
if [ "$count" = "0" ]; then |
|||
_info "Don't need to remove." |
|||
else |
|||
record_id=$(printf "%s\n" "$response" | _egrep_o "\"id\":\"[^\"]*\"" | cut -d : -f 2 | tr -d \" | head -n 1) |
|||
_debug "record_id" "$record_id" |
|||
if [ -z "$record_id" ]; then |
|||
_err "Can not get record id to remove." |
|||
return 1 |
|||
fi |
|||
if ! _arvan_rest "DELETE" "${_domain}/dns-records/$record_id"; then |
|||
_err "Delete record error." |
|||
return 1 |
|||
fi |
|||
_debug "$response" |
|||
_contains "$response" 'dns record deleted' |
|||
fi |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
|
|||
#_acme-challenge.www.domain.com |
|||
#returns |
|||
# _sub_domain=_acme-challenge.www |
|||
# _domain=domain.com |
|||
# _domain_id=sdjkglgdfewsdfg |
|||
_get_root() { |
|||
domain=$1 |
|||
i=1 |
|||
p=1 |
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|||
_debug h "$h" |
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _arvan_rest GET "?search=$h"; then |
|||
return 1 |
|||
fi |
|||
|
|||
if _contains "$response" "\"domain\":\"$h\"" || _contains "$response" '"total":1'; then |
|||
_domain_id=$(echo "$response" | _egrep_o "\[.\"id\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \") |
|||
if [ "$_domain_id" ]; then |
|||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|||
_domain=$h |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
fi |
|||
p=$i |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
return 1 |
|||
} |
|||
|
|||
_arvan_rest() { |
|||
mtd="$1" |
|||
ep="$2" |
|||
data="$3" |
|||
|
|||
token_trimmed=$(echo "$Arvan_Token" | tr -d '"') |
|||
|
|||
export _H1="Authorization: $token_trimmed" |
|||
|
|||
if [ "$mtd" = "DELETE" ]; then |
|||
#DELETE Request shouldn't have Content-Type |
|||
_debug data "$data" |
|||
response="$(_post "$data" "$ARVAN_API_URL/$ep" "" "$mtd")" |
|||
elif [ "$mtd" = "POST" ]; then |
|||
export _H2="Content-Type: application/json" |
|||
_debug data "$data" |
|||
response="$(_post "$data" "$ARVAN_API_URL/$ep" "" "$mtd")" |
|||
else |
|||
response="$(_get "$ARVAN_API_URL/$ep$data")" |
|||
fi |
|||
} |
|||
@ -0,0 +1,65 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
######################################################################## |
|||
# https://dyndnsfree.de hook script for acme.sh |
|||
# |
|||
# Environment variables: |
|||
# |
|||
# - $DF_user (your dyndnsfree.de username) |
|||
# - $DF_password (your dyndnsfree.de password) |
|||
# |
|||
# Author: Thilo Gass <thilo.gass@gmail.com> |
|||
# Git repo: https://github.com/ThiloGa/acme.sh |
|||
|
|||
#-- dns_df_add() - Add TXT record -------------------------------------- |
|||
# Usage: dns_df_add _acme-challenge.subdomain.domain.com "XyZ123..." |
|||
|
|||
dyndnsfree_api="https://dynup.de/acme.php" |
|||
|
|||
dns_df_add() { |
|||
fulldomain=$1 |
|||
txt_value=$2 |
|||
_info "Using DNS-01 dyndnsfree.de hook" |
|||
|
|||
DF_user="${DF_user:-$(_readaccountconf_mutable DF_user)}" |
|||
DF_password="${DF_password:-$(_readaccountconf_mutable DF_password)}" |
|||
if [ -z "$DF_user" ] || [ -z "$DF_password" ]; then |
|||
DF_user="" |
|||
DF_password="" |
|||
_err "No auth details provided. Please set user credentials using the \$DF_user and \$DF_password environment variables." |
|||
return 1 |
|||
fi |
|||
#save the api user and password to the account conf file. |
|||
_debug "Save user and password" |
|||
_saveaccountconf_mutable DF_user "$DF_user" |
|||
_saveaccountconf_mutable DF_password "$DF_password" |
|||
|
|||
domain="$(printf "%s" "$fulldomain" | cut -d"." -f2-)" |
|||
|
|||
get="$dyndnsfree_api?username=$DF_user&password=$DF_password&hostname=$domain&add_hostname=$fulldomain&txt=$txt_value" |
|||
|
|||
if ! erg="$(_get "$get")"; then |
|||
_err "error Adding $fulldomain TXT: $txt_value" |
|||
return 1 |
|||
fi |
|||
|
|||
if _contains "$erg" "success"; then |
|||
_info "Success, TXT Added, OK" |
|||
else |
|||
_err "error Adding $fulldomain TXT: $txt_value erg: $erg" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug "ok Auto $fulldomain TXT: $txt_value erg: $erg" |
|||
return 0 |
|||
} |
|||
|
|||
dns_df_rm() { |
|||
|
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_info "TXT enrty in $fulldomain is deleted automatically" |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
} |
|||
@ -0,0 +1,252 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
# |
|||
#HETZNER_Token="sdfsdfsdfljlbjkljlkjsdfoiwje" |
|||
# |
|||
|
|||
HETZNER_Api="https://dns.hetzner.com/api/v1" |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
# Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
# Used to add txt record |
|||
# Ref: https://dns.hetzner.com/api-docs/ |
|||
dns_hetzner_add() { |
|||
full_domain=$1 |
|||
txt_value=$2 |
|||
|
|||
HETZNER_Token="${HETZNER_Token:-$(_readaccountconf_mutable HETZNER_Token)}" |
|||
|
|||
if [ -z "$HETZNER_Token" ]; then |
|||
HETZNER_Token="" |
|||
_err "You didn't specify a Hetzner api token." |
|||
_err "You can get yours from here https://dns.hetzner.com/settings/api-token." |
|||
return 1 |
|||
fi |
|||
|
|||
#save the api key and email to the account conf file. |
|||
_saveaccountconf_mutable HETZNER_Token "$HETZNER_Token" |
|||
|
|||
_debug "First detect the root zone" |
|||
|
|||
if ! _get_root "$full_domain"; then |
|||
_err "Invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_debug "Getting TXT records" |
|||
if ! _find_record "$_sub_domain" "$txt_value"; then |
|||
return 1 |
|||
fi |
|||
|
|||
if [ -z "$_record_id" ]; then |
|||
_info "Adding record" |
|||
if _hetzner_rest POST "records" "{\"zone_id\":\"${HETZNER_Zone_ID}\",\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"value\":\"$txt_value\",\"ttl\":120}"; then |
|||
if _contains "$response" "$txt_value"; then |
|||
_info "Record added, OK" |
|||
_sleep 2 |
|||
return 0 |
|||
fi |
|||
fi |
|||
_err "Add txt record error${_response_error}" |
|||
return 1 |
|||
else |
|||
_info "Found record id: $_record_id." |
|||
_info "Record found, do nothing." |
|||
return 0 |
|||
# we could modify a record, if the names for txt records for *.example.com and example.com would be not the same |
|||
#if _hetzner_rest PUT "records/${_record_id}" "{\"zone_id\":\"${HETZNER_Zone_ID}\",\"type\":\"TXT\",\"name\":\"$full_domain\",\"value\":\"$txt_value\",\"ttl\":120}"; then |
|||
# if _contains "$response" "$txt_value"; then |
|||
# _info "Modified, OK" |
|||
# return 0 |
|||
# fi |
|||
#fi |
|||
#_err "Add txt record error (modify)." |
|||
#return 1 |
|||
fi |
|||
} |
|||
|
|||
# Usage: full_domain txt_value |
|||
# Used to remove the txt record after validation |
|||
dns_hetzner_rm() { |
|||
full_domain=$1 |
|||
txt_value=$2 |
|||
|
|||
HETZNER_Token="${HETZNER_Token:-$(_readaccountconf_mutable HETZNER_Token)}" |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$full_domain"; then |
|||
_err "Invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_debug "Getting TXT records" |
|||
if ! _find_record "$_sub_domain" "$txt_value"; then |
|||
return 1 |
|||
fi |
|||
|
|||
if [ -z "$_record_id" ]; then |
|||
_info "Remove not needed. Record not found." |
|||
else |
|||
if ! _hetzner_rest DELETE "records/$_record_id"; then |
|||
_err "Delete record error${_response_error}" |
|||
return 1 |
|||
fi |
|||
_sleep 2 |
|||
_info "Record deleted" |
|||
fi |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
#returns |
|||
# _record_id=a8d58f22d6931bf830eaa0ec6464bf81 if found; or 1 if error |
|||
_find_record() { |
|||
unset _record_id |
|||
_record_name=$1 |
|||
_record_value=$2 |
|||
|
|||
if [ -z "$_record_value" ]; then |
|||
_record_value='[^"]*' |
|||
fi |
|||
|
|||
_debug "Getting all records" |
|||
_hetzner_rest GET "records?zone_id=${_domain_id}" |
|||
|
|||
if _response_has_error; then |
|||
_err "Error${_response_error}" |
|||
return 1 |
|||
else |
|||
_record_id=$( |
|||
echo "$response" \ |
|||
| grep -o "{[^\{\}]*\"name\":\"$_record_name\"[^\}]*}" \ |
|||
| grep "\"value\":\"$_record_value\"" \ |
|||
| while read -r record; do |
|||
# test for type and |
|||
if [ -n "$(echo "$record" | _egrep_o '"type":"TXT"')" ]; then |
|||
echo "$record" | _egrep_o '"id":"[^"]*"' | cut -d : -f 2 | tr -d \" |
|||
break |
|||
fi |
|||
done |
|||
) |
|||
fi |
|||
} |
|||
|
|||
#_acme-challenge.www.domain.com |
|||
#returns |
|||
# _sub_domain=_acme-challenge.www |
|||
# _domain=domain.com |
|||
# _domain_id=sdjkglgdfewsdfg |
|||
_get_root() { |
|||
domain=$1 |
|||
i=1 |
|||
p=1 |
|||
|
|||
domain_without_acme=$(echo "$domain" | cut -d . -f 2-) |
|||
domain_param_name=$(echo "HETZNER_Zone_ID_for_${domain_without_acme}" | sed 's/[\.\-]/_/g') |
|||
|
|||
_debug "Reading zone_id for '$domain_without_acme' from config..." |
|||
HETZNER_Zone_ID=$(_readdomainconf "$domain_param_name") |
|||
if [ "$HETZNER_Zone_ID" ]; then |
|||
_debug "Found, using: $HETZNER_Zone_ID" |
|||
if ! _hetzner_rest GET "zones/${HETZNER_Zone_ID}"; then |
|||
_debug "Zone with id '$HETZNER_Zone_ID' does not exist." |
|||
_cleardomainconf "$domain_param_name" |
|||
unset HETZNER_Zone_ID |
|||
else |
|||
if _contains "$response" "\"id\":\"$HETZNER_Zone_ID\""; then |
|||
_domain=$(printf "%s\n" "$response" | _egrep_o '"name":"[^"]*"' | cut -d : -f 2 | tr -d \" | head -n 1) |
|||
if [ "$_domain" ]; then |
|||
_cut_length=$((${#domain} - ${#_domain} - 1)) |
|||
_sub_domain=$(printf "%s" "$domain" | cut -c "1-$_cut_length") |
|||
_domain_id="$HETZNER_Zone_ID" |
|||
return 0 |
|||
else |
|||
return 1 |
|||
fi |
|||
else |
|||
return 1 |
|||
fi |
|||
fi |
|||
fi |
|||
|
|||
_debug "Trying to get zone id by domain name for '$domain_without_acme'." |
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
return 1 |
|||
fi |
|||
_debug h "$h" |
|||
|
|||
_hetzner_rest GET "zones?name=$h" |
|||
|
|||
if _contains "$response" "\"name\":\"$h\"" || _contains "$response" '"total_entries":1'; then |
|||
_domain_id=$(echo "$response" | _egrep_o "\[.\"id\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \") |
|||
if [ "$_domain_id" ]; then |
|||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|||
_domain=$h |
|||
HETZNER_Zone_ID=$_domain_id |
|||
_savedomainconf "$domain_param_name" "$HETZNER_Zone_ID" |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
fi |
|||
p=$i |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
return 1 |
|||
} |
|||
|
|||
#returns |
|||
# _response_error |
|||
_response_has_error() { |
|||
unset _response_error |
|||
|
|||
err_part="$(echo "$response" | _egrep_o '"error":{[^}]*}')" |
|||
|
|||
if [ -n "$err_part" ]; then |
|||
err_code=$(echo "$err_part" | _egrep_o '"code":[0-9]+' | cut -d : -f 2) |
|||
err_message=$(echo "$err_part" | _egrep_o '"message":"[^"]+"' | cut -d : -f 2 | tr -d \") |
|||
|
|||
if [ -n "$err_code" ] && [ -n "$err_message" ]; then |
|||
_response_error=" - message: ${err_message}, code: ${err_code}" |
|||
return 0 |
|||
fi |
|||
fi |
|||
|
|||
return 1 |
|||
} |
|||
|
|||
#returns |
|||
# response |
|||
_hetzner_rest() { |
|||
m=$1 |
|||
ep="$2" |
|||
data="$3" |
|||
_debug "$ep" |
|||
|
|||
key_trimmed=$(echo "$HETZNER_Token" | tr -d \") |
|||
|
|||
export _H1="Content-TType: application/json" |
|||
export _H2="Auth-API-Token: $key_trimmed" |
|||
|
|||
if [ "$m" != "GET" ]; then |
|||
_debug data "$data" |
|||
response="$(_post "$data" "$HETZNER_Api/$ep" "" "$m")" |
|||
else |
|||
response="$(_get "$HETZNER_Api/$ep")" |
|||
fi |
|||
|
|||
if [ "$?" != "0" ] || _response_has_error; then |
|||
_debug "Error$_response_error" |
|||
return 1 |
|||
fi |
|||
_debug2 response "$response" |
|||
return 0 |
|||
} |
|||
@ -0,0 +1,150 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
# kapper.net domain api |
|||
# for further questions please contact: support@kapper.net |
|||
# please report issues here: https://github.com/acmesh-official/acme.sh/issues/2977 |
|||
|
|||
#KAPPERNETDNS_Key="yourKAPPERNETapikey" |
|||
#KAPPERNETDNS_Secret="yourKAPPERNETapisecret" |
|||
|
|||
KAPPERNETDNS_Api="https://dnspanel.kapper.net/API/1.2?APIKey=$KAPPERNETDNS_Key&APISecret=$KAPPERNETDNS_Secret" |
|||
|
|||
############################################################################### |
|||
# called with |
|||
# fullhostname: something.example.com |
|||
# txtvalue: someacmegenerated string |
|||
dns_kappernet_add() { |
|||
fullhostname=$1 |
|||
txtvalue=$2 |
|||
|
|||
KAPPERNETDNS_Key="${KAPPERNETDNS_Key:-$(_readaccountconf_mutable KAPPERNETDNS_Key)}" |
|||
KAPPERNETDNS_Secret="${KAPPERNETDNS_Secret:-$(_readaccountconf_mutable KAPPERNETDNS_Secret)}" |
|||
|
|||
if [ -z "$KAPPERNETDNS_Key" ] || [ -z "$KAPPERNETDNS_Secret" ]; then |
|||
KAPPERNETDNS_Key="" |
|||
KAPPERNETDNS_Secret="" |
|||
_err "Please specify your kapper.net api key and secret." |
|||
_err "If you have not received yours - send your mail to" |
|||
_err "support@kapper.net to get your key and secret." |
|||
return 1 |
|||
fi |
|||
|
|||
#store the api key and email to the account conf file. |
|||
_saveaccountconf_mutable KAPPERNETDNS_Key "$KAPPERNETDNS_Key" |
|||
_saveaccountconf_mutable KAPPERNETDNS_Secret "$KAPPERNETDNS_Secret" |
|||
_debug "Checking Domain ..." |
|||
if ! _get_root "$fullhostname"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _sub_domain "SUBDOMAIN: $_sub_domain" |
|||
_debug _domain "DOMAIN: $_domain" |
|||
|
|||
_info "Trying to add TXT DNS Record" |
|||
data="%7B%22name%22%3A%22$fullhostname%22%2C%22type%22%3A%22TXT%22%2C%22content%22%3A%22$txtvalue%22%2C%22ttl%22%3A%223600%22%2C%22prio%22%3A%22%22%7D" |
|||
if _kappernet_api GET "action=new&subject=$_domain&data=$data"; then |
|||
|
|||
if _contains "$response" "{\"OK\":true"; then |
|||
_info "Waiting 120 seconds for DNS to spread the new record" |
|||
_sleep 120 |
|||
return 0 |
|||
else |
|||
_err "Error creating a TXT DNS Record: $fullhostname TXT $txtvalue" |
|||
_err "Error Message: $response" |
|||
return 1 |
|||
fi |
|||
fi |
|||
_err "Failed creating TXT Record" |
|||
} |
|||
|
|||
############################################################################### |
|||
# called with |
|||
# fullhostname: something.example.com |
|||
dns_kappernet_rm() { |
|||
fullhostname=$1 |
|||
txtvalue=$2 |
|||
|
|||
KAPPERNETDNS_Key="${KAPPERNETDNS_Key:-$(_readaccountconf_mutable KAPPERNETDNS_Key)}" |
|||
KAPPERNETDNS_Secret="${KAPPERNETDNS_Secret:-$(_readaccountconf_mutable KAPPERNETDNS_Secret)}" |
|||
|
|||
if [ -z "$KAPPERNETDNS_Key" ] || [ -z "$KAPPERNETDNS_Secret" ]; then |
|||
KAPPERNETDNS_Key="" |
|||
KAPPERNETDNS_Secret="" |
|||
_err "Please specify your kapper.net api key and secret." |
|||
_err "If you have not received yours - send your mail to" |
|||
_err "support@kapper.net to get your key and secret." |
|||
return 1 |
|||
fi |
|||
|
|||
#store the api key and email to the account conf file. |
|||
_saveaccountconf_mutable KAPPERNETDNS_Key "$KAPPERNETDNS_Key" |
|||
_saveaccountconf_mutable KAPPERNETDNS_Secret "$KAPPERNETDNS_Secret" |
|||
|
|||
_info "Trying to remove the TXT Record: $fullhostname containing $txtvalue" |
|||
data="%7B%22name%22%3A%22$fullhostname%22%2C%22type%22%3A%22TXT%22%2C%22content%22%3A%22$txtvalue%22%2C%22ttl%22%3A%223600%22%2C%22prio%22%3A%22%22%7D" |
|||
if _kappernet_api GET "action=del&subject=$fullhostname&data=$data"; then |
|||
if _contains "$response" "{\"OK\":true"; then |
|||
return 0 |
|||
else |
|||
_err "Error deleting DNS Record: $fullhostname containing $txtvalue" |
|||
_err "Problem: $response" |
|||
return 1 |
|||
fi |
|||
fi |
|||
_err "Problem deleting TXT DNS record" |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
# called with hostname |
|||
# e.g._acme-challenge.www.domain.com returns |
|||
# _sub_domain=_acme-challenge.www |
|||
# _domain=domain.com |
|||
_get_root() { |
|||
domain=$1 |
|||
i=2 |
|||
p=1 |
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
return 1 |
|||
fi |
|||
if ! _kappernet_api GET "action=list&subject=$h"; then |
|||
return 1 |
|||
fi |
|||
if _contains "$response" '"OK":false'; then |
|||
_debug "$h not found" |
|||
else |
|||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|||
_domain="$h" |
|||
return 0 |
|||
fi |
|||
p="$i" |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
return 1 |
|||
} |
|||
|
|||
################################################################################ |
|||
# calls the kapper.net DNS Panel API |
|||
# with |
|||
# method |
|||
# param |
|||
_kappernet_api() { |
|||
method=$1 |
|||
param="$2" |
|||
|
|||
_debug param "PARAMETER=$param" |
|||
url="$KAPPERNETDNS_Api&$param" |
|||
_debug url "URL=$url" |
|||
|
|||
if [ "$method" = "GET" ]; then |
|||
response="$(_get "$url")" |
|||
else |
|||
_err "Unsupported method" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug2 response "$response" |
|||
return 0 |
|||
} |
|||
@ -0,0 +1,162 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
#NETLIFY_ACCESS_TOKEN="xxxx" |
|||
|
|||
NETLIFY_HOST="api.netlify.com/api/v1/" |
|||
NETLIFY_URL="https://$NETLIFY_HOST" |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
#Usage: dns_myapi_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_netlify_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
NETLIFY_ACCESS_TOKEN="${NETLIFY_ACCESS_TOKEN:-$(_readaccountconf_mutable NETLIFY_ACCESS_TOKEN)}" |
|||
|
|||
if [ -z "$NETLIFY_ACCESS_TOKEN" ]; then |
|||
NETLIFY_ACCESS_TOKEN="" |
|||
_err "Please specify your Netlify Access Token and try again." |
|||
return 1 |
|||
fi |
|||
|
|||
_info "Using Netlify" |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
_saveaccountconf_mutable NETLIFY_ACCESS_TOKEN "$NETLIFY_ACCESS_TOKEN" |
|||
|
|||
if ! _get_root "$fulldomain" "$accesstoken"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
dnsRecordURI="dns_zones/$_domain_id/dns_records" |
|||
|
|||
body="{\"type\":\"TXT\", \"hostname\":\"$_sub_domain\", \"value\":\"$txtvalue\", \"ttl\":\"10\"}" |
|||
|
|||
_netlify_rest POST "$dnsRecordURI" "$body" "$NETLIFY_ACCESS_TOKEN" |
|||
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\\r\\n")" |
|||
if [ "$_code" = "200" ] || [ "$_code" = '201' ]; then |
|||
_info "validation value added" |
|||
return 0 |
|||
else |
|||
_err "error adding validation value ($_code)" |
|||
return 1 |
|||
fi |
|||
|
|||
_err "Not fully implemented!" |
|||
return 1 |
|||
} |
|||
|
|||
#Usage: dns_myapi_rm _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
#Remove the txt record after validation. |
|||
dns_netlify_rm() { |
|||
_info "Using Netlify" |
|||
txtdomain="$1" |
|||
txt="$2" |
|||
_debug txtdomain "$txtdomain" |
|||
_debug txt "$txt" |
|||
|
|||
_saveaccountconf_mutable NETLIFY_ACCESS_TOKEN "$NETLIFY_ACCESS_TOKEN" |
|||
|
|||
if ! _get_root "$txtdomain" "$accesstoken"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
dnsRecordURI="dns_zones/$_domain_id/dns_records" |
|||
|
|||
_netlify_rest GET "$dnsRecordURI" "" "$NETLIFY_ACCESS_TOKEN" |
|||
|
|||
_record_id=$(echo "$response" | _egrep_o "\"type\":\"TXT\",[^\}]*\"value\":\"$txt\"" | head -n 1 | _egrep_o "\"id\":\"[^\"\}]*\"" | cut -d : -f 2 | tr -d \") |
|||
_debug _record_id "$_record_id" |
|||
if [ "$_record_id" ]; then |
|||
_netlify_rest DELETE "$dnsRecordURI/$_record_id" "" "$NETLIFY_ACCESS_TOKEN" |
|||
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\\r\\n")" |
|||
if [ "$_code" = "200" ] || [ "$_code" = '204' ]; then |
|||
_info "validation value removed" |
|||
return 0 |
|||
else |
|||
_err "error removing validation value ($_code)" |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
|
|||
_get_root() { |
|||
domain=$1 |
|||
accesstoken=$2 |
|||
i=1 |
|||
p=1 |
|||
|
|||
_netlify_rest GET "dns_zones" "" "$accesstoken" |
|||
|
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|||
_debug2 "Checking domain: $h" |
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
_err "Invalid domain" |
|||
return 1 |
|||
fi |
|||
|
|||
if _contains "$response" "\"name\":\"$h\"" >/dev/null; then |
|||
_domain_id=$(echo "$response" | _egrep_o "\"[^\"]*\",\"name\":\"$h" | cut -d , -f 1 | tr -d \") |
|||
if [ "$_domain_id" ]; then |
|||
if [ "$i" = 1 ]; then |
|||
#create the record at the domain apex (@) if only the domain name was provided as --domain-alias |
|||
_sub_domain="@" |
|||
else |
|||
_sub_domain=$(echo "$domain" | cut -d . -f 1-$p) |
|||
fi |
|||
_domain=$h |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
fi |
|||
p=$i |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
return 1 |
|||
} |
|||
|
|||
_netlify_rest() { |
|||
m=$1 |
|||
ep="$2" |
|||
data="$3" |
|||
_debug "$ep" |
|||
|
|||
token_trimmed=$(echo "$NETLIFY_ACCESS_TOKEN" | tr -d '"') |
|||
|
|||
export _H1="Content-Type: application/json" |
|||
export _H2="Authorization: Bearer $token_trimmed" |
|||
|
|||
:>"$HTTP_HEADER" |
|||
|
|||
if [ "$m" != "GET" ]; then |
|||
_debug data "$data" |
|||
response="$(_post "$data" "$NETLIFY_URL$ep" "" "$m")" |
|||
else |
|||
response="$(_get "$NETLIFY_URL$ep")" |
|||
fi |
|||
|
|||
if [ "$?" != "0" ]; then |
|||
_err "error $ep" |
|||
return 1 |
|||
fi |
|||
_debug2 response "$response" |
|||
return 0 |
|||
} |
|||
@ -0,0 +1,168 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
# |
|||
#NJALLA_Token="sdfsdfsdfljlbjkljlkjsdfoiwje" |
|||
|
|||
NJALLA_Api="https://njal.la/api/1/" |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
#Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_njalla_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
NJALLA_Token="${NJALLA_Token:-$(_readaccountconf_mutable NJALLA_Token)}" |
|||
|
|||
if [ "$NJALLA_Token" ]; then |
|||
_saveaccountconf_mutable NJALLA_Token "$NJALLA_Token" |
|||
else |
|||
NJALLA_Token="" |
|||
_err "You didn't specify a Njalla api token yet." |
|||
return 1 |
|||
fi |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
# For wildcard cert, the main root domain and the wildcard domain have the same txt subdomain name, so |
|||
# we can not use updating anymore. |
|||
# count=$(printf "%s\n" "$response" | _egrep_o "\"count\":[^,]*" | cut -d : -f 2) |
|||
# _debug count "$count" |
|||
# if [ "$count" = "0" ]; then |
|||
_info "Adding record" |
|||
if _njalla_rest "{\"method\":\"add-record\",\"params\":{\"domain\":\"$_domain\",\"type\":\"TXT\",\"name\":\"$_sub_domain\",\"content\":\"$txtvalue\",\"ttl\":120}}"; then |
|||
if _contains "$response" "$txtvalue"; then |
|||
_info "Added, OK" |
|||
return 0 |
|||
else |
|||
_err "Add txt record error." |
|||
return 1 |
|||
fi |
|||
fi |
|||
_err "Add txt record error." |
|||
return 1 |
|||
|
|||
} |
|||
|
|||
#fulldomain txtvalue |
|||
dns_njalla_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
NJALLA_Token="${NJALLA_Token:-$(_readaccountconf_mutable NJALLA_Token)}" |
|||
|
|||
if [ "$NJALLA_Token" ]; then |
|||
_saveaccountconf_mutable NJALLA_Token "$NJALLA_Token" |
|||
else |
|||
NJALLA_Token="" |
|||
_err "You didn't specify a Njalla api token yet." |
|||
return 1 |
|||
fi |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_debug "Getting records for domain" |
|||
if ! _njalla_rest "{\"method\":\"list-records\",\"params\":{\"domain\":\"${_domain}\"}}"; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! echo "$response" | tr -d " " | grep "\"id\":" >/dev/null; then |
|||
_err "Error: $response" |
|||
return 1 |
|||
fi |
|||
|
|||
records=$(echo "$response" | _egrep_o "\"records\":\s?\[(.*)\]\}" | _egrep_o "\[.*\]" | _egrep_o "\{[^\{\}]*\"id\":[^\{\}]*\}") |
|||
count=$(echo "$records" | wc -l) |
|||
_debug count "$count" |
|||
|
|||
if [ "$count" = "0" ]; then |
|||
_info "Don't need to remove." |
|||
else |
|||
echo "$records" | while read -r record; do |
|||
record_name=$(echo "$record" | _egrep_o "\"name\":\s?\"[^\"]*\"" | cut -d : -f 2 | tr -d " " | tr -d \") |
|||
record_content=$(echo "$record" | _egrep_o "\"content\":\s?\"[^\"]*\"" | cut -d : -f 2 | tr -d " " | tr -d \") |
|||
record_id=$(echo "$record" | _egrep_o "\"id\":\s?[0-9]+" | cut -d : -f 2 | tr -d " " | tr -d \") |
|||
if [ "$_sub_domain" = "$record_name" ]; then |
|||
if [ "$txtvalue" = "$record_content" ]; then |
|||
_debug "record_id" "$record_id" |
|||
if ! _njalla_rest "{\"method\":\"remove-record\",\"params\":{\"domain\":\"${_domain}\",\"id\":${record_id}}}"; then |
|||
_err "Delete record error." |
|||
return 1 |
|||
fi |
|||
echo "$response" | tr -d " " | grep "\"result\"" >/dev/null |
|||
fi |
|||
fi |
|||
done |
|||
fi |
|||
|
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
#_acme-challenge.www.domain.com |
|||
#returns |
|||
# _sub_domain=_acme-challenge.www |
|||
# _domain=domain.com |
|||
# _domain_id=sdjkglgdfewsdfg |
|||
_get_root() { |
|||
domain=$1 |
|||
i=1 |
|||
p=1 |
|||
|
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|||
_debug h "$h" |
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _njalla_rest "{\"method\":\"get-domain\",\"params\":{\"domain\":\"${h}\"}}"; then |
|||
return 1 |
|||
fi |
|||
|
|||
if _contains "$response" "\"$h\""; then |
|||
_domain_returned=$(echo "$response" | _egrep_o "\{\"name\": *\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \" | tr -d " ") |
|||
if [ "$_domain_returned" ]; then |
|||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|||
_domain=$h |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
fi |
|||
p=$i |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
return 1 |
|||
} |
|||
|
|||
_njalla_rest() { |
|||
data="$1" |
|||
|
|||
token_trimmed=$(echo "$NJALLA_Token" | tr -d '"') |
|||
|
|||
export _H1="Content-Type: application/json" |
|||
export _H2="Accept: application/json" |
|||
export _H3="Authorization: Njalla $token_trimmed" |
|||
|
|||
_debug data "$data" |
|||
response="$(_post "$data" "$NJALLA_Api" "" "POST")" |
|||
|
|||
if [ "$?" != "0" ]; then |
|||
_err "error $data" |
|||
return 1 |
|||
fi |
|||
_debug2 response "$response" |
|||
return 0 |
|||
} |
|||
@ -0,0 +1,348 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
# OpenStack Designate API plugin |
|||
# |
|||
# This requires you to have OpenStackClient and python-desginateclient |
|||
# installed. |
|||
# |
|||
# You will require Keystone V3 credentials loaded into your environment, which |
|||
# could be either password or v3applicationcredential type. |
|||
# |
|||
# Author: Andy Botting <andy@andybotting.com> |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
# Usage: dns_openstack_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_openstack_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
_dns_openstack_credentials || return $? |
|||
_dns_openstack_check_setup || return $? |
|||
_dns_openstack_find_zone || return $? |
|||
_dns_openstack_get_recordset || return $? |
|||
_debug _recordset_id "$_recordset_id" |
|||
if [ -n "$_recordset_id" ]; then |
|||
_dns_openstack_get_records || return $? |
|||
_debug _records "$_records" |
|||
fi |
|||
_dns_openstack_create_recordset || return $? |
|||
} |
|||
|
|||
# Usage: dns_openstack_rm _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
# Remove the txt record after validation. |
|||
dns_openstack_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
_dns_openstack_credentials || return $? |
|||
_dns_openstack_check_setup || return $? |
|||
_dns_openstack_find_zone || return $? |
|||
_dns_openstack_get_recordset || return $? |
|||
_debug _recordset_id "$_recordset_id" |
|||
if [ -n "$_recordset_id" ]; then |
|||
_dns_openstack_get_records || return $? |
|||
_debug _records "$_records" |
|||
fi |
|||
_dns_openstack_delete_recordset || return $? |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
|
|||
_dns_openstack_create_recordset() { |
|||
|
|||
if [ -z "$_recordset_id" ]; then |
|||
_info "Creating a new recordset" |
|||
if ! _recordset_id=$(openstack recordset create -c id -f value --type TXT --record "$txtvalue" "$_zone_id" "$fulldomain."); then |
|||
_err "No recordset ID found after create" |
|||
return 1 |
|||
fi |
|||
else |
|||
_info "Updating existing recordset" |
|||
# Build new list of --record <rec> args for update |
|||
_record_args="--record $txtvalue" |
|||
for _rec in $_records; do |
|||
_record_args="$_record_args --record $_rec" |
|||
done |
|||
# shellcheck disable=SC2086 |
|||
if ! _recordset_id=$(openstack recordset set -c id -f value $_record_args "$_zone_id" "$fulldomain."); then |
|||
_err "Recordset update failed" |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
_max_retries=60 |
|||
_sleep_sec=5 |
|||
_retry_times=0 |
|||
while [ "$_retry_times" -lt "$_max_retries" ]; do |
|||
_retry_times=$(_math "$_retry_times" + 1) |
|||
_debug3 _retry_times "$_retry_times" |
|||
|
|||
_record_status=$(openstack recordset show -c status -f value "$_zone_id" "$_recordset_id") |
|||
_info "Recordset status is $_record_status" |
|||
if [ "$_record_status" = "ACTIVE" ]; then |
|||
return 0 |
|||
elif [ "$_record_status" = "ERROR" ]; then |
|||
return 1 |
|||
else |
|||
_sleep $_sleep_sec |
|||
fi |
|||
done |
|||
|
|||
_err "Recordset failed to become ACTIVE" |
|||
return 1 |
|||
} |
|||
|
|||
_dns_openstack_delete_recordset() { |
|||
|
|||
if [ "$_records" = "$txtvalue" ]; then |
|||
_info "Only one record found, deleting recordset" |
|||
if ! openstack recordset delete "$_zone_id" "$fulldomain." >/dev/null; then |
|||
_err "Failed to delete recordset" |
|||
return 1 |
|||
fi |
|||
else |
|||
_info "Found existing records, updating recordset" |
|||
# Build new list of --record <rec> args for update |
|||
_record_args="" |
|||
for _rec in $_records; do |
|||
if [ "$_rec" = "$txtvalue" ]; then |
|||
continue |
|||
fi |
|||
_record_args="$_record_args --record $_rec" |
|||
done |
|||
# shellcheck disable=SC2086 |
|||
if ! openstack recordset set -c id -f value $_record_args "$_zone_id" "$fulldomain." >/dev/null; then |
|||
_err "Recordset update failed" |
|||
return 1 |
|||
fi |
|||
fi |
|||
} |
|||
|
|||
_dns_openstack_get_root() { |
|||
# Take the full fqdn and strip away pieces until we get an exact zone name |
|||
# match. For example, _acme-challenge.something.domain.com might need to go |
|||
# into something.domain.com or domain.com |
|||
_zone_name=$1 |
|||
_zone_list=$2 |
|||
while [ "$_zone_name" != "" ]; do |
|||
_zone_name="$(echo "$_zone_name" | sed 's/[^.]*\.*//')" |
|||
echo "$_zone_list" | while read -r id name; do |
|||
if _startswith "$_zone_name." "$name"; then |
|||
echo "$id" |
|||
fi |
|||
done |
|||
done | _head_n 1 |
|||
} |
|||
|
|||
_dns_openstack_find_zone() { |
|||
if ! _zone_list="$(openstack zone list -c id -c name -f value)"; then |
|||
_err "Can't list zones. Check your OpenStack credentials" |
|||
return 1 |
|||
fi |
|||
_debug _zone_list "$_zone_list" |
|||
|
|||
if ! _zone_id="$(_dns_openstack_get_root "$fulldomain" "$_zone_list")"; then |
|||
_err "Can't find a matching zone. Check your OpenStack credentials" |
|||
return 1 |
|||
fi |
|||
_debug _zone_id "$_zone_id" |
|||
} |
|||
|
|||
_dns_openstack_get_records() { |
|||
if ! _records=$(openstack recordset show -c records -f value "$_zone_id" "$fulldomain."); then |
|||
_err "Failed to get records" |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
} |
|||
|
|||
_dns_openstack_get_recordset() { |
|||
if ! _recordset_id=$(openstack recordset list -c id -f value --name "$fulldomain." "$_zone_id"); then |
|||
_err "Failed to get recordset" |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
} |
|||
|
|||
_dns_openstack_check_setup() { |
|||
if ! _exists openstack; then |
|||
_err "OpenStack client not found" |
|||
return 1 |
|||
fi |
|||
} |
|||
|
|||
_dns_openstack_credentials() { |
|||
_debug "Check OpenStack credentials" |
|||
|
|||
# If we have OS_AUTH_URL already set in the environment, then assume we want |
|||
# to use those, otherwise use stored credentials |
|||
if [ -n "$OS_AUTH_URL" ]; then |
|||
_debug "OS_AUTH_URL env var found, using environment" |
|||
else |
|||
_debug "OS_AUTH_URL not found, loading stored credentials" |
|||
OS_AUTH_URL="${OS_AUTH_URL:-$(_readaccountconf_mutable OS_AUTH_URL)}" |
|||
OS_IDENTITY_API_VERSION="${OS_IDENTITY_API_VERSION:-$(_readaccountconf_mutable OS_IDENTITY_API_VERSION)}" |
|||
OS_AUTH_TYPE="${OS_AUTH_TYPE:-$(_readaccountconf_mutable OS_AUTH_TYPE)}" |
|||
OS_APPLICATION_CREDENTIAL_ID="${OS_APPLICATION_CREDENTIAL_ID:-$(_readaccountconf_mutable OS_APPLICATION_CREDENTIAL_ID)}" |
|||
OS_APPLICATION_CREDENTIAL_SECRET="${OS_APPLICATION_CREDENTIAL_SECRET:-$(_readaccountconf_mutable OS_APPLICATION_CREDENTIAL_SECRET)}" |
|||
OS_USERNAME="${OS_USERNAME:-$(_readaccountconf_mutable OS_USERNAME)}" |
|||
OS_PASSWORD="${OS_PASSWORD:-$(_readaccountconf_mutable OS_PASSWORD)}" |
|||
OS_PROJECT_NAME="${OS_PROJECT_NAME:-$(_readaccountconf_mutable OS_PROJECT_NAME)}" |
|||
OS_PROJECT_ID="${OS_PROJECT_ID:-$(_readaccountconf_mutable OS_PROJECT_ID)}" |
|||
OS_USER_DOMAIN_NAME="${OS_USER_DOMAIN_NAME:-$(_readaccountconf_mutable OS_USER_DOMAIN_NAME)}" |
|||
OS_USER_DOMAIN_ID="${OS_USER_DOMAIN_ID:-$(_readaccountconf_mutable OS_USER_DOMAIN_ID)}" |
|||
OS_PROJECT_DOMAIN_NAME="${OS_PROJECT_DOMAIN_NAME:-$(_readaccountconf_mutable OS_PROJECT_DOMAIN_NAME)}" |
|||
OS_PROJECT_DOMAIN_ID="${OS_PROJECT_DOMAIN_ID:-$(_readaccountconf_mutable OS_PROJECT_DOMAIN_ID)}" |
|||
fi |
|||
|
|||
# Check each var and either save or clear it depending on whether its set. |
|||
# The helps us clear out old vars in the case where a user may want |
|||
# to switch between password and app creds |
|||
_debug "OS_AUTH_URL" "$OS_AUTH_URL" |
|||
if [ -n "$OS_AUTH_URL" ]; then |
|||
export OS_AUTH_URL |
|||
_saveaccountconf_mutable OS_AUTH_URL "$OS_AUTH_URL" |
|||
else |
|||
unset OS_AUTH_URL |
|||
_clearaccountconf SAVED_OS_AUTH_URL |
|||
fi |
|||
|
|||
_debug "OS_IDENTITY_API_VERSION" "$OS_IDENTITY_API_VERSION" |
|||
if [ -n "$OS_IDENTITY_API_VERSION" ]; then |
|||
export OS_IDENTITY_API_VERSION |
|||
_saveaccountconf_mutable OS_IDENTITY_API_VERSION "$OS_IDENTITY_API_VERSION" |
|||
else |
|||
unset OS_IDENTITY_API_VERSION |
|||
_clearaccountconf SAVED_OS_IDENTITY_API_VERSION |
|||
fi |
|||
|
|||
_debug "OS_AUTH_TYPE" "$OS_AUTH_TYPE" |
|||
if [ -n "$OS_AUTH_TYPE" ]; then |
|||
export OS_AUTH_TYPE |
|||
_saveaccountconf_mutable OS_AUTH_TYPE "$OS_AUTH_TYPE" |
|||
else |
|||
unset OS_AUTH_TYPE |
|||
_clearaccountconf SAVED_OS_AUTH_TYPE |
|||
fi |
|||
|
|||
_debug "OS_APPLICATION_CREDENTIAL_ID" "$OS_APPLICATION_CREDENTIAL_ID" |
|||
if [ -n "$OS_APPLICATION_CREDENTIAL_ID" ]; then |
|||
export OS_APPLICATION_CREDENTIAL_ID |
|||
_saveaccountconf_mutable OS_APPLICATION_CREDENTIAL_ID "$OS_APPLICATION_CREDENTIAL_ID" |
|||
else |
|||
unset OS_APPLICATION_CREDENTIAL_ID |
|||
_clearaccountconf SAVED_OS_APPLICATION_CREDENTIAL_ID |
|||
fi |
|||
|
|||
_secure_debug "OS_APPLICATION_CREDENTIAL_SECRET" "$OS_APPLICATION_CREDENTIAL_SECRET" |
|||
if [ -n "$OS_APPLICATION_CREDENTIAL_SECRET" ]; then |
|||
export OS_APPLICATION_CREDENTIAL_SECRET |
|||
_saveaccountconf_mutable OS_APPLICATION_CREDENTIAL_SECRET "$OS_APPLICATION_CREDENTIAL_SECRET" |
|||
else |
|||
unset OS_APPLICATION_CREDENTIAL_SECRET |
|||
_clearaccountconf SAVED_OS_APPLICATION_CREDENTIAL_SECRET |
|||
fi |
|||
|
|||
_debug "OS_USERNAME" "$OS_USERNAME" |
|||
if [ -n "$OS_USERNAME" ]; then |
|||
export OS_USERNAME |
|||
_saveaccountconf_mutable OS_USERNAME "$OS_USERNAME" |
|||
else |
|||
unset OS_USERNAME |
|||
_clearaccountconf SAVED_OS_USERNAME |
|||
fi |
|||
|
|||
_secure_debug "OS_PASSWORD" "$OS_PASSWORD" |
|||
if [ -n "$OS_PASSWORD" ]; then |
|||
export OS_PASSWORD |
|||
_saveaccountconf_mutable OS_PASSWORD "$OS_PASSWORD" |
|||
else |
|||
unset OS_PASSWORD |
|||
_clearaccountconf SAVED_OS_PASSWORD |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_NAME" "$OS_PROJECT_NAME" |
|||
if [ -n "$OS_PROJECT_NAME" ]; then |
|||
export OS_PROJECT_NAME |
|||
_saveaccountconf_mutable OS_PROJECT_NAME "$OS_PROJECT_NAME" |
|||
else |
|||
unset OS_PROJECT_NAME |
|||
_clearaccountconf SAVED_OS_PROJECT_NAME |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_ID" "$OS_PROJECT_ID" |
|||
if [ -n "$OS_PROJECT_ID" ]; then |
|||
export OS_PROJECT_ID |
|||
_saveaccountconf_mutable OS_PROJECT_ID "$OS_PROJECT_ID" |
|||
else |
|||
unset OS_PROJECT_ID |
|||
_clearaccountconf SAVED_OS_PROJECT_ID |
|||
fi |
|||
|
|||
_debug "OS_USER_DOMAIN_NAME" "$OS_USER_DOMAIN_NAME" |
|||
if [ -n "$OS_USER_DOMAIN_NAME" ]; then |
|||
export OS_USER_DOMAIN_NAME |
|||
_saveaccountconf_mutable OS_USER_DOMAIN_NAME "$OS_USER_DOMAIN_NAME" |
|||
else |
|||
unset OS_USER_DOMAIN_NAME |
|||
_clearaccountconf SAVED_OS_USER_DOMAIN_NAME |
|||
fi |
|||
|
|||
_debug "OS_USER_DOMAIN_ID" "$OS_USER_DOMAIN_ID" |
|||
if [ -n "$OS_USER_DOMAIN_ID" ]; then |
|||
export OS_USER_DOMAIN_ID |
|||
_saveaccountconf_mutable OS_USER_DOMAIN_ID "$OS_USER_DOMAIN_ID" |
|||
else |
|||
unset OS_USER_DOMAIN_ID |
|||
_clearaccountconf SAVED_OS_USER_DOMAIN_ID |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_DOMAIN_NAME" "$OS_PROJECT_DOMAIN_NAME" |
|||
if [ -n "$OS_PROJECT_DOMAIN_NAME" ]; then |
|||
export OS_PROJECT_DOMAIN_NAME |
|||
_saveaccountconf_mutable OS_PROJECT_DOMAIN_NAME "$OS_PROJECT_DOMAIN_NAME" |
|||
else |
|||
unset OS_PROJECT_DOMAIN_NAME |
|||
_clearaccountconf SAVED_OS_PROJECT_DOMAIN_NAME |
|||
fi |
|||
|
|||
_debug "OS_PROJECT_DOMAIN_ID" "$OS_PROJECT_DOMAIN_ID" |
|||
if [ -n "$OS_PROJECT_DOMAIN_ID" ]; then |
|||
export OS_PROJECT_DOMAIN_ID |
|||
_saveaccountconf_mutable OS_PROJECT_DOMAIN_ID "$OS_PROJECT_DOMAIN_ID" |
|||
else |
|||
unset OS_PROJECT_DOMAIN_ID |
|||
_clearaccountconf SAVED_OS_PROJECT_DOMAIN_ID |
|||
fi |
|||
|
|||
if [ "$OS_AUTH_TYPE" = "v3applicationcredential" ]; then |
|||
# Application Credential auth |
|||
if [ -z "$OS_APPLICATION_CREDENTIAL_ID" ] || [ -z "$OS_APPLICATION_CREDENTIAL_SECRET" ]; then |
|||
_err "When using OpenStack application credentials, OS_APPLICATION_CREDENTIAL_ID" |
|||
_err "and OS_APPLICATION_CREDENTIAL_SECRET must be set." |
|||
_err "Please check your credentials and try again." |
|||
return 1 |
|||
fi |
|||
else |
|||
# Password auth |
|||
if [ -z "$OS_USERNAME" ] || [ -z "$OS_PASSWORD" ]; then |
|||
_err "OpenStack username or password not found." |
|||
_err "Please check your credentials and try again." |
|||
return 1 |
|||
fi |
|||
|
|||
if [ -z "$OS_PROJECT_NAME" ] && [ -z "$OS_PROJECT_ID" ]; then |
|||
_err "When using password authentication, OS_PROJECT_NAME or" |
|||
_err "OS_PROJECT_ID must be set." |
|||
_err "Please check your credentials and try again." |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
@ -0,0 +1,162 @@ |
|||
#!/usr/bin/env sh |
|||
TRANSIP_Api_Url="https://api.transip.nl/v6" |
|||
TRANSIP_Token_Read_Only="false" |
|||
TRANSIP_Token_Global_Key="false" |
|||
TRANSIP_Token_Expiration="30 minutes" |
|||
# You can't reuse a label token, so we leave this empty normally |
|||
TRANSIP_Token_Label="" |
|||
|
|||
######## Public functions ##################### |
|||
#Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_transip_add() { |
|||
fulldomain="$1" |
|||
_debug fulldomain="$fulldomain" |
|||
txtvalue="$2" |
|||
_debug txtvalue="$txtvalue" |
|||
_transip_setup "$fulldomain" || return 1 |
|||
_info "Creating TXT record." |
|||
if ! _transip_rest POST "domains/$_domain/dns" "{\"dnsEntry\":{\"name\":\"$_sub_domain\",\"type\":\"TXT\",\"content\":\"$txtvalue\",\"expire\":300}}"; then |
|||
_err "Could not add TXT record." |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
} |
|||
|
|||
dns_transip_rm() { |
|||
fulldomain=$1 |
|||
_debug fulldomain="$fulldomain" |
|||
txtvalue=$2 |
|||
_debug txtvalue="$txtvalue" |
|||
_transip_setup "$fulldomain" || return 1 |
|||
_info "Removing TXT record." |
|||
if ! _transip_rest DELETE "domains/$_domain/dns" "{\"dnsEntry\":{\"name\":\"$_sub_domain\",\"type\":\"TXT\",\"content\":\"$txtvalue\",\"expire\":300}}"; then |
|||
_err "Could not remove TXT record $_sub_domain for $domain" |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
#_acme-challenge.www.domain.com |
|||
#returns |
|||
# _sub_domain=_acme-challenge.www |
|||
# _domain=domain.com |
|||
_get_root() { |
|||
domain="$1" |
|||
i=2 |
|||
p=1 |
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f $i-100) |
|||
|
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
return 1 |
|||
fi |
|||
|
|||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p) |
|||
_domain="$h" |
|||
|
|||
if _transip_rest GET "domains/$h/dns" && _contains "$response" "dnsEntries"; then |
|||
return 0 |
|||
fi |
|||
|
|||
p=$i |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
_err "Unable to parse this domain" |
|||
return 1 |
|||
} |
|||
|
|||
_transip_rest() { |
|||
m="$1" |
|||
ep="$2" |
|||
data="$3" |
|||
_debug ep "$ep" |
|||
export _H1="Accept: application/json" |
|||
export _H2="Authorization: Bearer $_token" |
|||
export _H4="Content-Type: application/json" |
|||
if [ "$m" != "GET" ]; then |
|||
_debug data "$data" |
|||
response="$(_post "$data" "$TRANSIP_Api_Url/$ep" "" "$m")" |
|||
retcode=$? |
|||
else |
|||
response="$(_get "$TRANSIP_Api_Url/$ep")" |
|||
retcode=$? |
|||
fi |
|||
|
|||
if [ "$retcode" != "0" ]; then |
|||
_err "error $ep" |
|||
return 1 |
|||
fi |
|||
_debug2 response "$response" |
|||
return 0 |
|||
} |
|||
|
|||
_transip_get_token() { |
|||
nonce=$(echo "TRANSIP$(_time)" | _digest sha1 hex | cut -c 1-32) |
|||
_debug nonce "$nonce" |
|||
|
|||
data="{\"login\":\"${TRANSIP_Username}\",\"nonce\":\"${nonce}\",\"read_only\":\"${TRANSIP_Token_Read_Only}\",\"expiration_time\":\"${TRANSIP_Token_Expiration}\",\"label\":\"${TRANSIP_Token_Label}\",\"global_key\":\"${TRANSIP_Token_Global_Key}\"}" |
|||
_debug data "$data" |
|||
|
|||
#_signature=$(printf "%s" "$data" | openssl dgst -sha512 -sign "$TRANSIP_Key_File" | _base64) |
|||
_signature=$(printf "%s" "$data" | _sign "$TRANSIP_Key_File" "sha512") |
|||
_debug2 _signature "$_signature" |
|||
|
|||
export _H1="Signature: $_signature" |
|||
export _H2="Content-Type: application/json" |
|||
|
|||
response="$(_post "$data" "$TRANSIP_Api_Url/auth" "" "POST")" |
|||
retcode=$? |
|||
_debug2 response "$response" |
|||
if [ "$retcode" != "0" ]; then |
|||
_err "Authentication failed." |
|||
return 1 |
|||
fi |
|||
if _contains "$response" "token"; then |
|||
_token="$(echo "$response" | _normalizeJson | sed -n 's/^{"token":"\(.*\)"}/\1/p')" |
|||
_debug _token "$_token" |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
} |
|||
|
|||
_transip_setup() { |
|||
fulldomain=$1 |
|||
|
|||
# retrieve the transip creds |
|||
TRANSIP_Username="${TRANSIP_Username:-$(_readaccountconf_mutable TRANSIP_Username)}" |
|||
TRANSIP_Key_File="${TRANSIP_Key_File:-$(_readaccountconf_mutable TRANSIP_Key_File)}" |
|||
# check their vals for null |
|||
if [ -z "$TRANSIP_Username" ] || [ -z "$TRANSIP_Key_File" ]; then |
|||
TRANSIP_Username="" |
|||
TRANSIP_Key_File="" |
|||
_err "You didn't specify a TransIP username and api key file location" |
|||
_err "Please set those values and try again." |
|||
return 1 |
|||
fi |
|||
# save the username and api key to the account conf file. |
|||
_saveaccountconf_mutable TRANSIP_Username "$TRANSIP_Username" |
|||
_saveaccountconf_mutable TRANSIP_Key_File "$TRANSIP_Key_File" |
|||
|
|||
if [ -f "$TRANSIP_Key_File" ]; then |
|||
if ! grep "BEGIN PRIVATE KEY" "$TRANSIP_Key_File" >/dev/null 2>&1; then |
|||
_err "Key file doesn't seem to be a valid key: ${TRANSIP_Key_File}" |
|||
return 1 |
|||
fi |
|||
else |
|||
_err "Can't read private key file: ${TRANSIP_Key_File}" |
|||
return 1 |
|||
fi |
|||
|
|||
if [ -z "$_token" ]; then |
|||
if ! _transip_get_token; then |
|||
_err "Can not get token." |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
_get_root "$fulldomain" || return 1 |
|||
|
|||
return 0 |
|||
} |
|||
@ -0,0 +1,86 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
#Support Microsoft Teams webhooks |
|||
|
|||
#TEAMS_WEBHOOK_URL="" |
|||
#TEAMS_THEME_COLOR="" |
|||
#TEAMS_SUCCESS_COLOR="" |
|||
#TEAMS_ERROR_COLOR="" |
|||
#TEAMS_SKIP_COLOR="" |
|||
|
|||
teams_send() { |
|||
_subject="$1" |
|||
_content="$2" |
|||
_statusCode="$3" #0: success, 1: error 2($RENEW_SKIP): skipped |
|||
_debug "_statusCode" "$_statusCode" |
|||
|
|||
_color_success="2cbe4e" # green |
|||
_color_danger="cb2431" # red |
|||
_color_muted="586069" # gray |
|||
|
|||
TEAMS_WEBHOOK_URL="${TEAMS_WEBHOOK_URL:-$(_readaccountconf_mutable TEAMS_WEBHOOK_URL)}" |
|||
if [ -z "$TEAMS_WEBHOOK_URL" ]; then |
|||
TEAMS_WEBHOOK_URL="" |
|||
_err "You didn't specify a Microsoft Teams webhook url TEAMS_WEBHOOK_URL yet." |
|||
return 1 |
|||
fi |
|||
_saveaccountconf_mutable TEAMS_WEBHOOK_URL "$TEAMS_WEBHOOK_URL" |
|||
|
|||
TEAMS_THEME_COLOR="${TEAMS_THEME_COLOR:-$(_readaccountconf_mutable TEAMS_THEME_COLOR)}" |
|||
if [ -n "$TEAMS_THEME_COLOR" ]; then |
|||
_saveaccountconf_mutable TEAMS_THEME_COLOR "$TEAMS_THEME_COLOR" |
|||
fi |
|||
|
|||
TEAMS_SUCCESS_COLOR="${TEAMS_SUCCESS_COLOR:-$(_readaccountconf_mutable TEAMS_SUCCESS_COLOR)}" |
|||
if [ -n "$TEAMS_SUCCESS_COLOR" ]; then |
|||
_saveaccountconf_mutable TEAMS_SUCCESS_COLOR "$TEAMS_SUCCESS_COLOR" |
|||
fi |
|||
|
|||
TEAMS_ERROR_COLOR="${TEAMS_ERROR_COLOR:-$(_readaccountconf_mutable TEAMS_ERROR_COLOR)}" |
|||
if [ -n "$TEAMS_ERROR_COLOR" ]; then |
|||
_saveaccountconf_mutable TEAMS_ERROR_COLOR "$TEAMS_ERROR_COLOR" |
|||
fi |
|||
|
|||
TEAMS_SKIP_COLOR="${TEAMS_SKIP_COLOR:-$(_readaccountconf_mutable TEAMS_SKIP_COLOR)}" |
|||
if [ -n "$TEAMS_SKIP_COLOR" ]; then |
|||
_saveaccountconf_mutable TEAMS_SKIP_COLOR "$TEAMS_SKIP_COLOR" |
|||
fi |
|||
|
|||
export _H1="Content-Type: application/json" |
|||
|
|||
_subject=$(echo "$_subject" | _json_encode) |
|||
_content=$(echo "$_content" | _json_encode) |
|||
|
|||
case "$_statusCode" in |
|||
0) |
|||
_color="${TEAMS_SUCCESS_COLOR:-$_color_success}" |
|||
;; |
|||
1) |
|||
_color="${TEAMS_ERROR_COLOR:-$_color_danger}" |
|||
;; |
|||
2) |
|||
_color="${TEAMS_SKIP_COLOR:-$_color_muted}" |
|||
;; |
|||
esac |
|||
|
|||
_color=$(echo "$_color" | tr -cd 'a-fA-F0-9') |
|||
if [ -z "$_color" ]; then |
|||
_color=$(echo "${TEAMS_THEME_COLOR:-$_color_muted}" | tr -cd 'a-fA-F0-9') |
|||
fi |
|||
|
|||
_data="{\"title\": \"$_subject\"," |
|||
if [ -n "$_color" ]; then |
|||
_data="$_data\"themeColor\": \"$_color\", " |
|||
fi |
|||
_data="$_data\"text\": \"$_content\"}" |
|||
|
|||
if response=$(_post "$_data" "$TEAMS_WEBHOOK_URL"); then |
|||
if ! _contains "$response" error; then |
|||
_info "teams send success." |
|||
return 0 |
|||
fi |
|||
fi |
|||
_err "teams send error." |
|||
_err "$response" |
|||
return 1 |
|||
} |
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue