committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
30 changed files with 2569 additions and 169 deletions
-
4.github/workflows/DNS.yml
-
2.github/workflows/PebbleStrict.yml
-
4.github/workflows/Solaris.yml
-
5.github/workflows/wiki-monitor.yml
-
10Dockerfile
-
55README.md
-
89acme.sh
-
2deploy/ali_cdn.sh
-
2deploy/ali_dcdn.sh
-
86deploy/keyhelp_api.sh
-
23deploy/panos.sh
-
2deploy/truenas_ws.sh
-
6deploy/unifi.sh
-
17dnsapi/dns_ali.sh
-
2dnsapi/dns_aws.sh
-
4dnsapi/dns_cf.sh
-
4dnsapi/dns_curanet.sh
-
139dnsapi/dns_efficientip.sh
-
226dnsapi/dns_exoscale.sh
-
10dnsapi/dns_gandi_livedns.sh
-
593dnsapi/dns_hetznercloud.sh
-
501dnsapi/dns_hostup.sh
-
244dnsapi/dns_infoblox_uddi.sh
-
15dnsapi/dns_inwx.sh
-
109dnsapi/dns_mgwm.sh
-
62dnsapi/dns_nanelo.sh
-
45dnsapi/dns_omglol.sh
-
319dnsapi/dns_sotoon.sh
-
28notify/ntfy.sh
-
130notify/opsgenie.sh
@ -0,0 +1,86 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
keyhelp_api_deploy() { |
|||
_cdomain="$1" |
|||
_ckey="$2" |
|||
_ccert="$3" |
|||
_cca="$4" |
|||
|
|||
_debug _cdomain "$_cdomain" |
|||
_debug _ckey "$_ckey" |
|||
_debug _ccert "$_ccert" |
|||
_debug _cca "$_cca" |
|||
|
|||
# Read config from saved values or env |
|||
_getdeployconf DEPLOY_KEYHELP_HOST |
|||
_getdeployconf DEPLOY_KEYHELP_API_KEY |
|||
|
|||
_debug DEPLOY_KEYHELP_HOST "$DEPLOY_KEYHELP_HOST" |
|||
_secure_debug DEPLOY_KEYHELP_API_KEY "$DEPLOY_KEYHELP_API_KEY" |
|||
|
|||
if [ -z "$DEPLOY_KEYHELP_HOST" ]; then |
|||
_err "KeyHelp host not found, please define DEPLOY_KEYHELP_HOST." |
|||
return 1 |
|||
fi |
|||
if [ -z "$DEPLOY_KEYHELP_API_KEY" ]; then |
|||
_err "KeyHelp api key not found, please define DEPLOY_KEYHELP_API_KEY." |
|||
return 1 |
|||
fi |
|||
|
|||
# Save current values |
|||
_savedeployconf DEPLOY_KEYHELP_HOST "$DEPLOY_KEYHELP_HOST" |
|||
_savedeployconf DEPLOY_KEYHELP_API_KEY "$DEPLOY_KEYHELP_API_KEY" |
|||
|
|||
_request_key="$(tr '\n' ':' <"$_ckey" | sed 's/:/\\n/g')" |
|||
_request_cert="$(tr '\n' ':' <"$_ccert" | sed 's/:/\\n/g')" |
|||
_request_ca="$(tr '\n' ':' <"$_cca" | sed 's/:/\\n/g')" |
|||
|
|||
_request_body="{ |
|||
\"name\": \"$_cdomain\", |
|||
\"components\": { |
|||
\"private_key\": \"$_request_key\", |
|||
\"certificate\": \"$_request_cert\", |
|||
\"ca_certificate\": \"$_request_ca\" |
|||
} |
|||
}" |
|||
|
|||
_hosts="$(echo "$DEPLOY_KEYHELP_HOST" | tr "," " ")" |
|||
_keys="$(echo "$DEPLOY_KEYHELP_API_KEY" | tr "," " ")" |
|||
_i=1 |
|||
|
|||
for _host in $_hosts; do |
|||
_key="$(_getfield "$_keys" "$_i" " ")" |
|||
_i="$(_math "$_i" + 1)" |
|||
|
|||
export _H1="X-API-Key: $_key" |
|||
|
|||
_put_url="$_host/api/v2/certificates/name/$_cdomain" |
|||
if _post "$_request_body" "$_put_url" "" "PUT" "application/json" >/dev/null; then |
|||
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n")" |
|||
else |
|||
_err "Cannot make PUT request to $_put_url" |
|||
return 1 |
|||
fi |
|||
|
|||
if [ "$_code" = "404" ]; then |
|||
_info "$_cdomain not found, creating new entry at $_host" |
|||
|
|||
_post_url="$_host/api/v2/certificates" |
|||
if _post "$_request_body" "$_post_url" "" "POST" "application/json" >/dev/null; then |
|||
_code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n")" |
|||
else |
|||
_err "Cannot make POST request to $_post_url" |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
if _startswith "$_code" "2"; then |
|||
_info "$_cdomain set at $_host" |
|||
else |
|||
_err "HTTP status code is $_code" |
|||
return 1 |
|||
fi |
|||
done |
|||
|
|||
return 0 |
|||
} |
|||
@ -0,0 +1,139 @@ |
|||
#!/usr/bin/env sh |
|||
# shellcheck disable=SC2034 |
|||
dns_efficientip_info='efficientip.com |
|||
Site: https://efficientip.com/ |
|||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_efficientip |
|||
Options: |
|||
EfficientIP_Creds HTTP Basic Authentication credentials. E.g. "username:password" |
|||
EfficientIP_Server EfficientIP SOLIDserver Management IP address or FQDN. |
|||
EfficientIP_DNS_Name Name of the DNS smart or server hosting the zone. Optional. |
|||
EfficientIP_View Name of the DNS view hosting the zone. Optional. |
|||
OptionsAlt: |
|||
EfficientIP_Token_Key Alternative API token key, prefered over basic authentication. |
|||
EfficientIP_Token_Secret Alternative API token secret, required when using a token key. |
|||
EfficientIP_Server EfficientIP SOLIDserver Management IP address or FQDN. |
|||
EfficientIP_DNS_Name Name of the DNS smart or server hosting the zone. Optional. |
|||
EfficientIP_View Name of the DNS view hosting the zone. Optional. |
|||
Issues: github.com/acmesh-official/acme.sh/issues/6325 |
|||
Author: EfficientIP-Labs <contact@efficientip.com> |
|||
' |
|||
|
|||
dns_efficientip_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
_info "Using EfficientIP API" |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
if { [ -z "${EfficientIP_Creds}" ] && { [ -z "${EfficientIP_Token_Key}" ] || [ -z "${EfficientIP_Token_Secret}" ]; }; } || [ -z "${EfficientIP_Server}" ]; then |
|||
EfficientIP_Creds="" |
|||
EfficientIP_Token_Key="" |
|||
EfficientIP_Token_Secret="" |
|||
EfficientIP_Server="" |
|||
_err "You didn't specify any EfficientIP credentials or token or server (EfficientIP_Creds; EfficientIP_Token_Key; EfficientIP_Token_Secret; EfficientIP_Server)." |
|||
_err "Please set them via EXPORT EfficientIP_Creds=username:password or EXPORT EfficientIP_server=ip/hostname" |
|||
_err "or if you want to use Token instead EXPORT EfficientIP_Token_Key=yourkey" |
|||
_err "and EXPORT EfficientIP_Token_Secret=yoursecret" |
|||
_err "then try again." |
|||
return 1 |
|||
fi |
|||
|
|||
if [ -z "${EfficientIP_DNS_Name}" ]; then |
|||
EfficientIP_DNS_Name="" |
|||
fi |
|||
|
|||
EfficientIP_DNSNameEncoded=$(printf "%b" "${EfficientIP_DNS_Name}" | _url_encode) |
|||
|
|||
if [ -z "${EfficientIP_View}" ]; then |
|||
EfficientIP_View="" |
|||
fi |
|||
|
|||
EfficientIP_ViewEncoded=$(printf "%b" "${EfficientIP_View}" | _url_encode) |
|||
|
|||
_saveaccountconf EfficientIP_Creds "${EfficientIP_Creds}" |
|||
_saveaccountconf EfficientIP_Token_Key "${EfficientIP_Token_Key}" |
|||
_saveaccountconf EfficientIP_Token_Secret "${EfficientIP_Token_Secret}" |
|||
_saveaccountconf EfficientIP_Server "${EfficientIP_Server}" |
|||
_saveaccountconf EfficientIP_DNS_Name "${EfficientIP_DNS_Name}" |
|||
_saveaccountconf EfficientIP_View "${EfficientIP_View}" |
|||
|
|||
export _H1="Accept-Language:en-US" |
|||
baseurlnObject="https://${EfficientIP_Server}/rest/dns_rr_add?rr_type=TXT&rr_ttl=300&rr_name=${fulldomain}&rr_value1=${txtvalue}" |
|||
|
|||
if [ "${EfficientIP_DNSNameEncoded}" != "" ]; then |
|||
baseurlnObject="${baseurlnObject}&dns_name=${EfficientIP_DNSNameEncoded}" |
|||
fi |
|||
|
|||
if [ "${EfficientIP_ViewEncoded}" != "" ]; then |
|||
baseurlnObject="${baseurlnObject}&dnsview_name=${EfficientIP_ViewEncoded}" |
|||
fi |
|||
|
|||
if [ -z "${EfficientIP_Token_Secret}" ] || [ -z "${EfficientIP_Token_Key}" ]; then |
|||
EfficientIP_CredsEncoded=$(printf "%b" "${EfficientIP_Creds}" | _base64) |
|||
export _H2="Authorization: Basic ${EfficientIP_CredsEncoded}" |
|||
else |
|||
TS=$(date +%s) |
|||
Sig=$(printf "%b\n$TS\nPOST\n$baseurlnObject" "${EfficientIP_Token_Secret}" | _digest sha3-256 hex) |
|||
EfficientIP_CredsEncoded=$(printf "%b:%b" "${EfficientIP_Token_Key}" "$Sig") |
|||
export _H2="Authorization: SDS ${EfficientIP_CredsEncoded}" |
|||
export _H3="X-SDS-TS: ${TS}" |
|||
fi |
|||
|
|||
result="$(_post "" "${baseurlnObject}" "" "POST")" |
|||
|
|||
if [ "$(echo "${result}" | _egrep_o "ret_oid")" ]; then |
|||
_info "DNS record successfully created" |
|||
return 0 |
|||
else |
|||
_err "Error creating DNS record" |
|||
_err "${result}" |
|||
return 1 |
|||
fi |
|||
} |
|||
|
|||
dns_efficientip_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
_info "Using EfficientIP API" |
|||
_debug fulldomain "${fulldomain}" |
|||
_debug txtvalue "${txtvalue}" |
|||
|
|||
EfficientIP_ViewEncoded=$(printf "%b" "${EfficientIP_View}" | _url_encode) |
|||
EfficientIP_DNSNameEncoded=$(printf "%b" "${EfficientIP_DNS_Name}" | _url_encode) |
|||
EfficientIP_CredsEncoded=$(printf "%b" "${EfficientIP_Creds}" | _base64) |
|||
|
|||
export _H1="Accept-Language:en-US" |
|||
|
|||
baseurlnObject="https://${EfficientIP_Server}/rest/dns_rr_delete?rr_type=TXT&rr_name=$fulldomain&rr_value1=$txtvalue" |
|||
if [ "${EfficientIP_DNSNameEncoded}" != "" ]; then |
|||
baseurlnObject="${baseurlnObject}&dns_name=${EfficientIP_DNSNameEncoded}" |
|||
fi |
|||
|
|||
if [ "${EfficientIP_ViewEncoded}" != "" ]; then |
|||
baseurlnObject="${baseurlnObject}&dnsview_name=${EfficientIP_ViewEncoded}" |
|||
fi |
|||
|
|||
if [ -z "$EfficientIP_Token_Secret" ] || [ -z "$EfficientIP_Token_Key" ]; then |
|||
EfficientIP_CredsEncoded=$(printf "%b" "${EfficientIP_Creds}" | _base64) |
|||
export _H2="Authorization: Basic $EfficientIP_CredsEncoded" |
|||
else |
|||
TS=$(date +%s) |
|||
Sig=$(printf "%b\n$TS\nDELETE\n${baseurlnObject}" "${EfficientIP_Token_Secret}" | _digest sha3-256 hex) |
|||
EfficientIP_CredsEncoded=$(printf "%b:%b" "${EfficientIP_Token_Key}" "$Sig") |
|||
export _H2="Authorization: SDS ${EfficientIP_CredsEncoded}" |
|||
export _H3="X-SDS-TS: $TS" |
|||
fi |
|||
|
|||
result="$(_post "" "${baseurlnObject}" "" "DELETE")" |
|||
|
|||
if [ "$(echo "${result}" | _egrep_o "ret_oid")" ]; then |
|||
_info "DNS Record successfully deleted" |
|||
return 0 |
|||
else |
|||
_err "Error deleting DNS record" |
|||
_err "${result}" |
|||
return 1 |
|||
fi |
|||
} |
|||
@ -0,0 +1,593 @@ |
|||
#!/usr/bin/env sh |
|||
# shellcheck disable=SC2034 |
|||
dns_hetznercloud_info='Hetzner Cloud DNS |
|||
Site: Hetzner.com |
|||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_hetznercloud |
|||
Options: |
|||
HETZNER_TOKEN API token for the Hetzner Cloud DNS API |
|||
Optional: |
|||
HETZNER_TTL Custom TTL for new TXT rrsets (default 120) |
|||
HETZNER_API Override API endpoint (default https://api.hetzner.cloud/v1) |
|||
HETZNER_MAX_ATTEMPTS Number of 1s polls to wait for async actions (default 120) |
|||
Issues: github.com/acmesh-official/acme.sh/issues |
|||
' |
|||
|
|||
HETZNERCLOUD_API_DEFAULT="https://api.hetzner.cloud/v1" |
|||
HETZNERCLOUD_TTL_DEFAULT=120 |
|||
HETZNER_MAX_ATTEMPTS_DEFAULT=120 |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
dns_hetznercloud_add() { |
|||
fulldomain="$(_idn "${1}")" |
|||
txtvalue="${2}" |
|||
|
|||
_info "Using Hetzner Cloud DNS API to add record" |
|||
|
|||
if ! _hetznercloud_init; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hetznercloud_prepare_zone "${fulldomain}"; then |
|||
_err "Unable to determine Hetzner Cloud zone for ${fulldomain}" |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hetznercloud_get_rrset; then |
|||
return 1 |
|||
fi |
|||
|
|||
if [ "${_hetznercloud_last_http_code}" = "200" ]; then |
|||
if _hetznercloud_rrset_contains_value "${txtvalue}"; then |
|||
_info "TXT record already present; nothing to do." |
|||
return 0 |
|||
fi |
|||
elif [ "${_hetznercloud_last_http_code}" != "404" ]; then |
|||
_hetznercloud_log_http_error "Failed to query existing TXT rrset" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
fi |
|||
|
|||
add_payload="$(_hetznercloud_build_add_payload "${txtvalue}")" |
|||
if [ -z "${add_payload}" ]; then |
|||
_err "Failed to build request payload." |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hetznercloud_api POST "${_hetznercloud_rrset_action_add}" "${add_payload}"; then |
|||
return 1 |
|||
fi |
|||
|
|||
case "${_hetznercloud_last_http_code}" in |
|||
200 | 201 | 202 | 204) |
|||
if ! _hetznercloud_handle_action_response "TXT record add"; then |
|||
return 1 |
|||
fi |
|||
_info "Hetzner Cloud TXT record added." |
|||
return 0 |
|||
;; |
|||
401 | 403) |
|||
_err "Hetzner Cloud DNS API authentication failed (HTTP ${_hetznercloud_last_http_code}). Check HETZNER_TOKEN for the new API." |
|||
_hetznercloud_log_http_error "" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
;; |
|||
409 | 422) |
|||
_hetznercloud_log_http_error "Hetzner Cloud DNS rejected the add_records request" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
;; |
|||
*) |
|||
_hetznercloud_log_http_error "Hetzner Cloud DNS add_records request failed" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
;; |
|||
esac |
|||
} |
|||
|
|||
dns_hetznercloud_rm() { |
|||
fulldomain="$(_idn "${1}")" |
|||
txtvalue="${2}" |
|||
|
|||
_info "Using Hetzner Cloud DNS API to remove record" |
|||
|
|||
if ! _hetznercloud_init; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hetznercloud_prepare_zone "${fulldomain}"; then |
|||
_err "Unable to determine Hetzner Cloud zone for ${fulldomain}" |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hetznercloud_get_rrset; then |
|||
return 1 |
|||
fi |
|||
|
|||
if [ "${_hetznercloud_last_http_code}" = "404" ]; then |
|||
_info "TXT rrset does not exist; nothing to remove." |
|||
return 0 |
|||
fi |
|||
|
|||
if [ "${_hetznercloud_last_http_code}" != "200" ]; then |
|||
_hetznercloud_log_http_error "Failed to query existing TXT rrset" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
fi |
|||
|
|||
if _hetznercloud_rrset_contains_value "${txtvalue}"; then |
|||
remove_payload="$(_hetznercloud_build_remove_payload "${txtvalue}")" |
|||
if [ -z "${remove_payload}" ]; then |
|||
_err "Failed to build remove_records payload." |
|||
return 1 |
|||
fi |
|||
if ! _hetznercloud_api POST "${_hetznercloud_rrset_action_remove}" "${remove_payload}"; then |
|||
return 1 |
|||
fi |
|||
case "${_hetznercloud_last_http_code}" in |
|||
200 | 201 | 202 | 204) |
|||
if ! _hetznercloud_handle_action_response "TXT record remove"; then |
|||
return 1 |
|||
fi |
|||
_info "Hetzner Cloud TXT record removed." |
|||
return 0 |
|||
;; |
|||
401 | 403) |
|||
_err "Hetzner Cloud DNS API authentication failed (HTTP ${_hetznercloud_last_http_code}). Check HETZNER_TOKEN for the new API." |
|||
_hetznercloud_log_http_error "" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
;; |
|||
404) |
|||
_info "TXT rrset already absent after remove action." |
|||
return 0 |
|||
;; |
|||
409 | 422) |
|||
_hetznercloud_log_http_error "Hetzner Cloud DNS rejected the remove_records request" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
;; |
|||
*) |
|||
_hetznercloud_log_http_error "Hetzner Cloud DNS remove_records request failed" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
;; |
|||
esac |
|||
else |
|||
_info "TXT value not present; nothing to remove." |
|||
return 0 |
|||
fi |
|||
} |
|||
|
|||
#################### Private functions ################################## |
|||
|
|||
_hetznercloud_init() { |
|||
HETZNER_TOKEN="${HETZNER_TOKEN:-$(_readaccountconf_mutable HETZNER_TOKEN)}" |
|||
if [ -z "${HETZNER_TOKEN}" ]; then |
|||
_err "The environment variable HETZNER_TOKEN must be set for the Hetzner Cloud DNS API." |
|||
return 1 |
|||
fi |
|||
HETZNER_TOKEN=$(echo "${HETZNER_TOKEN}" | tr -d '"') |
|||
_saveaccountconf_mutable HETZNER_TOKEN "${HETZNER_TOKEN}" |
|||
|
|||
HETZNER_API="${HETZNER_API:-$(_readaccountconf_mutable HETZNER_API)}" |
|||
if [ -z "${HETZNER_API}" ]; then |
|||
HETZNER_API="${HETZNERCLOUD_API_DEFAULT}" |
|||
fi |
|||
_saveaccountconf_mutable HETZNER_API "${HETZNER_API}" |
|||
|
|||
HETZNER_TTL="${HETZNER_TTL:-$(_readaccountconf_mutable HETZNER_TTL)}" |
|||
if [ -z "${HETZNER_TTL}" ]; then |
|||
HETZNER_TTL="${HETZNERCLOUD_TTL_DEFAULT}" |
|||
fi |
|||
ttl_check=$(printf "%s" "${HETZNER_TTL}" | tr -d '0-9') |
|||
if [ -n "${ttl_check}" ]; then |
|||
_err "HETZNER_TTL must be an integer value." |
|||
return 1 |
|||
fi |
|||
_saveaccountconf_mutable HETZNER_TTL "${HETZNER_TTL}" |
|||
|
|||
HETZNER_MAX_ATTEMPTS="${HETZNER_MAX_ATTEMPTS:-$(_readaccountconf_mutable HETZNER_MAX_ATTEMPTS)}" |
|||
if [ -z "${HETZNER_MAX_ATTEMPTS}" ]; then |
|||
HETZNER_MAX_ATTEMPTS="${HETZNER_MAX_ATTEMPTS_DEFAULT}" |
|||
fi |
|||
attempts_check=$(printf "%s" "${HETZNER_MAX_ATTEMPTS}" | tr -d '0-9') |
|||
if [ -n "${attempts_check}" ]; then |
|||
_err "HETZNER_MAX_ATTEMPTS must be an integer value." |
|||
return 1 |
|||
fi |
|||
_saveaccountconf_mutable HETZNER_MAX_ATTEMPTS "${HETZNER_MAX_ATTEMPTS}" |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_prepare_zone() { |
|||
_hetznercloud_zone_id="" |
|||
_hetznercloud_zone_name="" |
|||
_hetznercloud_zone_name_lc="" |
|||
_hetznercloud_rr_name="" |
|||
_hetznercloud_rrset_path="" |
|||
_hetznercloud_rrset_action_add="" |
|||
_hetznercloud_rrset_action_remove="" |
|||
fulldomain_lc=$(printf "%s" "${1}" | sed 's/\.$//' | _lower_case) |
|||
|
|||
i=2 |
|||
p=1 |
|||
while true; do |
|||
candidate=$(printf "%s" "${fulldomain_lc}" | cut -d . -f "${i}"-100) |
|||
if [ -z "${candidate}" ]; then |
|||
return 1 |
|||
fi |
|||
|
|||
if _hetznercloud_get_zone_by_candidate "${candidate}"; then |
|||
zone_name_lc="${_hetznercloud_zone_name_lc}" |
|||
if [ "${fulldomain_lc}" = "${zone_name_lc}" ]; then |
|||
_hetznercloud_rr_name="@" |
|||
else |
|||
suffix=".${zone_name_lc}" |
|||
if _endswith "${fulldomain_lc}" "${suffix}"; then |
|||
_hetznercloud_rr_name="${fulldomain_lc%"${suffix}"}" |
|||
else |
|||
_hetznercloud_rr_name="${fulldomain_lc}" |
|||
fi |
|||
fi |
|||
_hetznercloud_rrset_path=$(printf "%s" "${_hetznercloud_rr_name}" | _url_encode) |
|||
_hetznercloud_rrset_action_add="/zones/${_hetznercloud_zone_id}/rrsets/${_hetznercloud_rrset_path}/TXT/actions/add_records" |
|||
_hetznercloud_rrset_action_remove="/zones/${_hetznercloud_zone_id}/rrsets/${_hetznercloud_rrset_path}/TXT/actions/remove_records" |
|||
return 0 |
|||
fi |
|||
p=${i} |
|||
i=$(_math "${i}" + 1) |
|||
done |
|||
} |
|||
|
|||
_hetznercloud_get_zone_by_candidate() { |
|||
candidate="${1}" |
|||
zone_key=$(printf "%s" "${candidate}" | sed 's/[^A-Za-z0-9]/_/g') |
|||
zone_conf_key="HETZNERCLOUD_ZONE_ID_for_${zone_key}" |
|||
|
|||
cached_zone_id=$(_readdomainconf "${zone_conf_key}") |
|||
if [ -n "${cached_zone_id}" ]; then |
|||
if _hetznercloud_api GET "/zones/${cached_zone_id}"; then |
|||
if [ "${_hetznercloud_last_http_code}" = "200" ]; then |
|||
zone_data=$(printf "%s" "${response}" | _normalizeJson | sed 's/^{"zone"://' | sed 's/}$//') |
|||
if _hetznercloud_parse_zone_fields "${zone_data}"; then |
|||
zone_name_lc=$(printf "%s" "${_hetznercloud_zone_name}" | _lower_case) |
|||
if [ "${zone_name_lc}" = "${candidate}" ]; then |
|||
return 0 |
|||
fi |
|||
fi |
|||
elif [ "${_hetznercloud_last_http_code}" = "404" ]; then |
|||
_cleardomainconf "${zone_conf_key}" |
|||
fi |
|||
else |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
if _hetznercloud_api GET "/zones/${candidate}"; then |
|||
if [ "${_hetznercloud_last_http_code}" = "200" ]; then |
|||
zone_data=$(printf "%s" "${response}" | _normalizeJson | sed 's/^{"zone"://' | sed 's/}$//') |
|||
if _hetznercloud_parse_zone_fields "${zone_data}"; then |
|||
zone_name_lc=$(printf "%s" "${_hetznercloud_zone_name}" | _lower_case) |
|||
if [ "${zone_name_lc}" = "${candidate}" ]; then |
|||
_savedomainconf "${zone_conf_key}" "${_hetznercloud_zone_id}" |
|||
return 0 |
|||
fi |
|||
fi |
|||
elif [ "${_hetznercloud_last_http_code}" != "404" ]; then |
|||
_hetznercloud_log_http_error "Hetzner Cloud zone lookup failed" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
fi |
|||
else |
|||
return 1 |
|||
fi |
|||
|
|||
encoded_candidate=$(printf "%s" "${candidate}" | _url_encode) |
|||
if ! _hetznercloud_api GET "/zones?name=${encoded_candidate}"; then |
|||
return 1 |
|||
fi |
|||
if [ "${_hetznercloud_last_http_code}" != "200" ]; then |
|||
if [ "${_hetznercloud_last_http_code}" = "404" ]; then |
|||
return 1 |
|||
fi |
|||
_hetznercloud_log_http_error "Hetzner Cloud zone search failed" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
fi |
|||
|
|||
zone_data=$(_hetznercloud_extract_zone_from_list "${response}" "${candidate}") |
|||
if [ -z "${zone_data}" ]; then |
|||
return 1 |
|||
fi |
|||
if ! _hetznercloud_parse_zone_fields "${zone_data}"; then |
|||
return 1 |
|||
fi |
|||
_savedomainconf "${zone_conf_key}" "${_hetznercloud_zone_id}" |
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_parse_zone_fields() { |
|||
zone_json="${1}" |
|||
if [ -z "${zone_json}" ]; then |
|||
return 1 |
|||
fi |
|||
normalized=$(printf "%s" "${zone_json}" | _normalizeJson) |
|||
zone_id=$(printf "%s" "${normalized}" | _egrep_o '"id":[^,}]*' | _head_n 1 | cut -d : -f 2 | tr -d ' "') |
|||
zone_name=$(printf "%s" "${normalized}" | _egrep_o '"name":"[^"]*"' | _head_n 1 | cut -d : -f 2 | tr -d '"') |
|||
if [ -z "${zone_id}" ] || [ -z "${zone_name}" ]; then |
|||
return 1 |
|||
fi |
|||
zone_name_trimmed=$(printf "%s" "${zone_name}" | sed 's/\.$//') |
|||
if zone_name_ascii=$(_idn "${zone_name_trimmed}"); then |
|||
zone_name="${zone_name_ascii}" |
|||
else |
|||
zone_name="${zone_name_trimmed}" |
|||
fi |
|||
_hetznercloud_zone_id="${zone_id}" |
|||
_hetznercloud_zone_name="${zone_name}" |
|||
_hetznercloud_zone_name_lc=$(printf "%s" "${zone_name}" | _lower_case) |
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_extract_zone_from_list() { |
|||
list_response=$(printf "%s" "${1}" | _normalizeJson) |
|||
candidate="${2}" |
|||
escaped_candidate=$(_hetznercloud_escape_regex "${candidate}") |
|||
printf "%s" "${list_response}" | _egrep_o "{[^{}]*\"name\":\"${escaped_candidate}\"[^{}]*}" | _head_n 1 |
|||
} |
|||
|
|||
_hetznercloud_escape_regex() { |
|||
printf "%s" "${1}" | sed 's/\\/\\\\/g' | sed 's/\./\\./g' | sed 's/-/\\-/g' |
|||
} |
|||
|
|||
_hetznercloud_get_rrset() { |
|||
if [ -z "${_hetznercloud_zone_id}" ] || [ -z "${_hetznercloud_rrset_path}" ]; then |
|||
return 1 |
|||
fi |
|||
if ! _hetznercloud_api GET "/zones/${_hetznercloud_zone_id}/rrsets/${_hetznercloud_rrset_path}/TXT"; then |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_rrset_contains_value() { |
|||
wanted_value="${1}" |
|||
normalized=$(printf "%s" "${response}" | _normalizeJson) |
|||
escaped_value=$(_hetznercloud_escape_value "${wanted_value}") |
|||
search_pattern="\"value\":\"\\\\\"${escaped_value}\\\\\"\"" |
|||
if _contains "${normalized}" "${search_pattern}"; then |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
} |
|||
|
|||
_hetznercloud_build_add_payload() { |
|||
value="${1}" |
|||
escaped_value=$(_hetznercloud_escape_value "${value}") |
|||
printf '{"ttl":%s,"records":[{"value":"\\"%s\\""}]}' "${HETZNER_TTL}" "${escaped_value}" |
|||
} |
|||
|
|||
_hetznercloud_build_remove_payload() { |
|||
value="${1}" |
|||
escaped_value=$(_hetznercloud_escape_value "${value}") |
|||
printf '{"records":[{"value":"\\"%s\\""}]}' "${escaped_value}" |
|||
} |
|||
|
|||
_hetznercloud_escape_value() { |
|||
printf "%s" "${1}" | sed 's/\\/\\\\/g' | sed 's/"/\\"/g' |
|||
} |
|||
|
|||
_hetznercloud_error_message() { |
|||
if [ -z "${response}" ]; then |
|||
return 1 |
|||
fi |
|||
message=$(printf "%s" "${response}" | _normalizeJson | _egrep_o '"message":"[^"]*"' | _head_n 1 | cut -d : -f 2 | tr -d '"') |
|||
if [ -n "${message}" ]; then |
|||
printf "%s" "${message}" |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
} |
|||
|
|||
_hetznercloud_log_http_error() { |
|||
context="${1}" |
|||
code="${2}" |
|||
message="$(_hetznercloud_error_message)" |
|||
if [ -n "${context}" ]; then |
|||
if [ -n "${message}" ]; then |
|||
_err "${context} (HTTP ${code}): ${message}" |
|||
else |
|||
_err "${context} (HTTP ${code})" |
|||
fi |
|||
else |
|||
if [ -n "${message}" ]; then |
|||
_err "Hetzner Cloud DNS API error (HTTP ${code}): ${message}" |
|||
else |
|||
_err "Hetzner Cloud DNS API error (HTTP ${code})" |
|||
fi |
|||
fi |
|||
} |
|||
|
|||
_hetznercloud_api() { |
|||
method="${1}" |
|||
ep="${2}" |
|||
data="${3}" |
|||
retried="${4}" |
|||
|
|||
if [ -z "${method}" ]; then |
|||
method="GET" |
|||
fi |
|||
|
|||
if ! _startswith "${ep}" "/"; then |
|||
ep="/${ep}" |
|||
fi |
|||
url="${HETZNER_API}${ep}" |
|||
|
|||
export _H1="Authorization: Bearer ${HETZNER_TOKEN}" |
|||
export _H2="Accept: application/json" |
|||
export _H3="" |
|||
export _H4="" |
|||
export _H5="" |
|||
|
|||
: >"${HTTP_HEADER}" |
|||
|
|||
if [ "${method}" = "GET" ]; then |
|||
response="$(_get "${url}")" |
|||
else |
|||
if [ -z "${data}" ]; then |
|||
data="{}" |
|||
fi |
|||
response="$(_post "${data}" "${url}" "" "${method}" "application/json")" |
|||
fi |
|||
ret="${?}" |
|||
|
|||
_hetznercloud_last_http_code=$(grep "^HTTP" "${HTTP_HEADER}" | _tail_n 1 | cut -d " " -f 2 | tr -d '\r\n') |
|||
|
|||
if [ "${ret}" != "0" ]; then |
|||
return 1 |
|||
fi |
|||
|
|||
if [ "${_hetznercloud_last_http_code}" = "429" ] && [ "${retried}" != "retried" ]; then |
|||
retry_after=$(grep -i "^Retry-After" "${HTTP_HEADER}" | _tail_n 1 | cut -d : -f 2 | tr -d ' \r') |
|||
if [ -z "${retry_after}" ]; then |
|||
retry_after=1 |
|||
fi |
|||
_info "Hetzner Cloud DNS API rate limit hit; retrying in ${retry_after} seconds." |
|||
_sleep "${retry_after}" |
|||
if ! _hetznercloud_api "${method}" "${ep}" "${data}" "retried"; then |
|||
return 1 |
|||
fi |
|||
return 0 |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_handle_action_response() { |
|||
context="${1}" |
|||
if [ -z "${response}" ]; then |
|||
return 0 |
|||
fi |
|||
|
|||
normalized=$(printf "%s" "${response}" | _normalizeJson) |
|||
|
|||
failed_message="" |
|||
if failed_message=$(_hetznercloud_extract_failed_action_message "${normalized}"); then |
|||
if [ -n "${failed_message}" ]; then |
|||
_err "Hetzner Cloud DNS ${context} failed: ${failed_message}" |
|||
else |
|||
_err "Hetzner Cloud DNS ${context} failed." |
|||
fi |
|||
return 1 |
|||
fi |
|||
|
|||
action_ids="" |
|||
if action_ids=$(_hetznercloud_extract_action_ids "${normalized}"); then |
|||
for action_id in ${action_ids}; do |
|||
if [ -z "${action_id}" ]; then |
|||
continue |
|||
fi |
|||
if ! _hetznercloud_wait_for_action "${action_id}" "${context}"; then |
|||
return 1 |
|||
fi |
|||
done |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_extract_failed_action_message() { |
|||
normalized="${1}" |
|||
failed_section=$(printf "%s" "${normalized}" | _egrep_o '"failed_actions":\[[^]]*\]') |
|||
if [ -z "${failed_section}" ]; then |
|||
return 1 |
|||
fi |
|||
if _contains "${failed_section}" '"failed_actions":[]'; then |
|||
return 1 |
|||
fi |
|||
message=$(printf "%s" "${failed_section}" | _egrep_o '"message":"[^"]*"' | _head_n 1 | cut -d : -f 2 | tr -d '"') |
|||
if [ -n "${message}" ]; then |
|||
printf "%s" "${message}" |
|||
else |
|||
printf "%s" "${failed_section}" |
|||
fi |
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_extract_action_ids() { |
|||
normalized="${1}" |
|||
actions_section=$(printf "%s" "${normalized}" | _egrep_o '"actions":\[[^]]*\]') |
|||
if [ -z "${actions_section}" ]; then |
|||
return 1 |
|||
fi |
|||
action_ids=$(printf "%s" "${actions_section}" | _egrep_o '"id":[0-9]*' | cut -d : -f 2 | tr -d '"' | tr '\n' ' ') |
|||
action_ids=$(printf "%s" "${action_ids}" | tr -s ' ') |
|||
action_ids=$(printf "%s" "${action_ids}" | sed 's/^ //;s/ $//') |
|||
if [ -z "${action_ids}" ]; then |
|||
return 1 |
|||
fi |
|||
printf "%s" "${action_ids}" |
|||
return 0 |
|||
} |
|||
|
|||
_hetznercloud_wait_for_action() { |
|||
action_id="${1}" |
|||
context="${2}" |
|||
attempts="0" |
|||
|
|||
while true; do |
|||
if ! _hetznercloud_api GET "/actions/${action_id}"; then |
|||
return 1 |
|||
fi |
|||
if [ "${_hetznercloud_last_http_code}" != "200" ]; then |
|||
_hetznercloud_log_http_error "Hetzner Cloud DNS action ${action_id} query failed" "${_hetznercloud_last_http_code}" |
|||
return 1 |
|||
fi |
|||
|
|||
normalized=$(printf "%s" "${response}" | _normalizeJson) |
|||
action_status=$(_hetznercloud_action_status_from_normalized "${normalized}") |
|||
|
|||
if [ -z "${action_status}" ]; then |
|||
_err "Hetzner Cloud DNS ${context} action ${action_id} returned no status." |
|||
return 1 |
|||
fi |
|||
|
|||
if [ "${action_status}" = "success" ]; then |
|||
return 0 |
|||
fi |
|||
|
|||
if [ "${action_status}" = "error" ]; then |
|||
if action_error=$(_hetznercloud_action_error_from_normalized "${normalized}"); then |
|||
_err "Hetzner Cloud DNS ${context} action ${action_id} failed: ${action_error}" |
|||
else |
|||
_err "Hetzner Cloud DNS ${context} action ${action_id} failed." |
|||
fi |
|||
return 1 |
|||
fi |
|||
|
|||
attempts=$(_math "${attempts}" + 1) |
|||
if [ "${attempts}" -ge "${HETZNER_MAX_ATTEMPTS}" ]; then |
|||
_err "Hetzner Cloud DNS ${context} action ${action_id} did not complete after ${HETZNER_MAX_ATTEMPTS} attempts." |
|||
return 1 |
|||
fi |
|||
|
|||
_sleep 1 |
|||
done |
|||
} |
|||
|
|||
_hetznercloud_action_status_from_normalized() { |
|||
normalized="${1}" |
|||
status=$(printf "%s" "${normalized}" | _egrep_o '"status":"[^"]*"' | _head_n 1 | cut -d : -f 2 | tr -d '"') |
|||
printf "%s" "${status}" |
|||
} |
|||
|
|||
_hetznercloud_action_error_from_normalized() { |
|||
normalized="${1}" |
|||
error_section=$(printf "%s" "${normalized}" | _egrep_o '"error":{[^}]*}') |
|||
if [ -z "${error_section}" ]; then |
|||
return 1 |
|||
fi |
|||
message=$(printf "%s" "${error_section}" | _egrep_o '"message":"[^"]*"' | _head_n 1 | cut -d : -f 2 | tr -d '"') |
|||
if [ -n "${message}" ]; then |
|||
printf "%s" "${message}" |
|||
return 0 |
|||
fi |
|||
code=$(printf "%s" "${error_section}" | _egrep_o '"code":"[^"]*"' | _head_n 1 | cut -d : -f 2 | tr -d '"') |
|||
if [ -n "${code}" ]; then |
|||
printf "%s" "${code}" |
|||
return 0 |
|||
fi |
|||
return 1 |
|||
} |
|||
@ -0,0 +1,501 @@ |
|||
#!/usr/bin/env sh |
|||
# shellcheck disable=SC2034,SC2154 |
|||
|
|||
dns_hostup_info='HostUp DNS |
|||
Site: hostup.se |
|||
Docs: https://developer.hostup.se/ |
|||
Options: |
|||
HOSTUP_API_KEY Required. HostUp API key with read:dns + write:dns + read:domains scopes. |
|||
HOSTUP_API_BASE Optional. Override API base URL (default: https://cloud.hostup.se/api). |
|||
HOSTUP_TTL Optional. TTL for TXT records (default: 60 seconds). |
|||
HOSTUP_ZONE_ID Optional. Force a specific zone ID (skip auto-detection). |
|||
Author: HostUp (https://cloud.hostup.se/contact/en) |
|||
' |
|||
|
|||
HOSTUP_API_BASE_DEFAULT="https://cloud.hostup.se/api" |
|||
HOSTUP_DEFAULT_TTL=60 |
|||
|
|||
# Public: add TXT record |
|||
# Usage: dns_hostup_add _acme-challenge.example.com "txt-value" |
|||
dns_hostup_add() { |
|||
fulldomain="$1" |
|||
txtvalue="$2" |
|||
|
|||
_info "Using HostUp DNS API" |
|||
|
|||
if ! _hostup_init; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hostup_detect_zone "$fulldomain"; then |
|||
_err "Unable to determine HostUp zone for $fulldomain" |
|||
return 1 |
|||
fi |
|||
|
|||
record_name="$(_hostup_record_name "$fulldomain" "$HOSTUP_ZONE_DOMAIN")" |
|||
record_name="$(_hostup_sanitize_name "$record_name")" |
|||
record_value="$(_hostup_json_escape "$txtvalue")" |
|||
|
|||
ttl="${HOSTUP_TTL:-$HOSTUP_DEFAULT_TTL}" |
|||
|
|||
_debug "zone_id" "$HOSTUP_ZONE_ID" |
|||
_debug "zone_domain" "$HOSTUP_ZONE_DOMAIN" |
|||
_debug "record_name" "$record_name" |
|||
_debug "ttl" "$ttl" |
|||
|
|||
request_body="{\"name\":\"$record_name\",\"type\":\"TXT\",\"value\":\"$record_value\",\"ttl\":$ttl}" |
|||
|
|||
if ! _hostup_rest "POST" "/dns/zones/$HOSTUP_ZONE_ID/records" "$request_body"; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _contains "$_hostup_response" '"success":true'; then |
|||
_err "HostUp DNS API: failed to create TXT record for $fulldomain" |
|||
_debug2 "_hostup_response" "$_hostup_response" |
|||
return 1 |
|||
fi |
|||
|
|||
record_id="$(_hostup_extract_record_id "$_hostup_response")" |
|||
if [ -n "$record_id" ]; then |
|||
_hostup_save_record_id "$HOSTUP_ZONE_ID" "$fulldomain" "$record_id" |
|||
_debug "hostup_saved_record_id" "$record_id" |
|||
fi |
|||
|
|||
_info "Added TXT record for $fulldomain" |
|||
return 0 |
|||
} |
|||
|
|||
# Public: remove TXT record |
|||
# Usage: dns_hostup_rm _acme-challenge.example.com "txt-value" |
|||
dns_hostup_rm() { |
|||
fulldomain="$1" |
|||
txtvalue="$2" |
|||
|
|||
_info "Using HostUp DNS API" |
|||
|
|||
if ! _hostup_init; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _hostup_detect_zone "$fulldomain"; then |
|||
_err "Unable to determine HostUp zone for $fulldomain" |
|||
return 1 |
|||
fi |
|||
|
|||
record_name_fqdn="$(_hostup_fqdn "$fulldomain")" |
|||
record_value="$txtvalue" |
|||
|
|||
record_id_cached="$(_hostup_get_saved_record_id "$HOSTUP_ZONE_ID" "$fulldomain")" |
|||
if [ -n "$record_id_cached" ]; then |
|||
_debug "hostup_record_id_cached" "$record_id_cached" |
|||
if _hostup_delete_record_by_id "$HOSTUP_ZONE_ID" "$record_id_cached"; then |
|||
_info "Deleted TXT record $record_id_cached" |
|||
_hostup_clear_record_id "$HOSTUP_ZONE_ID" "$fulldomain" |
|||
HOSTUP_ZONE_ID="" |
|||
return 0 |
|||
fi |
|||
fi |
|||
|
|||
if ! _hostup_find_record "$HOSTUP_ZONE_ID" "$record_name_fqdn" "$record_value"; then |
|||
_info "TXT record not found for $record_name_fqdn. Skipping removal." |
|||
_hostup_clear_record_id "$HOSTUP_ZONE_ID" "$fulldomain" |
|||
return 0 |
|||
fi |
|||
|
|||
_debug "Deleting record" "$HOSTUP_RECORD_ID" |
|||
|
|||
if ! _hostup_delete_record_by_id "$HOSTUP_ZONE_ID" "$HOSTUP_RECORD_ID"; then |
|||
return 1 |
|||
fi |
|||
|
|||
_info "Deleted TXT record $HOSTUP_RECORD_ID" |
|||
_hostup_clear_record_id "$HOSTUP_ZONE_ID" "$fulldomain" |
|||
HOSTUP_ZONE_ID="" |
|||
return 0 |
|||
} |
|||
|
|||
########################## |
|||
# Private helper methods # |
|||
########################## |
|||
|
|||
_hostup_init() { |
|||
HOSTUP_API_KEY="${HOSTUP_API_KEY:-$(_readaccountconf_mutable HOSTUP_API_KEY)}" |
|||
HOSTUP_API_BASE="${HOSTUP_API_BASE:-$(_readaccountconf_mutable HOSTUP_API_BASE)}" |
|||
HOSTUP_TTL="${HOSTUP_TTL:-$(_readaccountconf_mutable HOSTUP_TTL)}" |
|||
HOSTUP_ZONE_ID="${HOSTUP_ZONE_ID:-$(_readaccountconf_mutable HOSTUP_ZONE_ID)}" |
|||
|
|||
if [ -z "$HOSTUP_API_BASE" ]; then |
|||
HOSTUP_API_BASE="$HOSTUP_API_BASE_DEFAULT" |
|||
fi |
|||
|
|||
if [ -z "$HOSTUP_API_KEY" ]; then |
|||
HOSTUP_API_KEY="" |
|||
_err "HOSTUP_API_KEY is not set." |
|||
_err "Please export your HostUp API key with read:dns and write:dns scopes." |
|||
return 1 |
|||
fi |
|||
|
|||
_saveaccountconf_mutable HOSTUP_API_KEY "$HOSTUP_API_KEY" |
|||
_saveaccountconf_mutable HOSTUP_API_BASE "$HOSTUP_API_BASE" |
|||
|
|||
if [ -n "$HOSTUP_TTL" ]; then |
|||
_saveaccountconf_mutable HOSTUP_TTL "$HOSTUP_TTL" |
|||
fi |
|||
|
|||
if [ -n "$HOSTUP_ZONE_ID" ]; then |
|||
_saveaccountconf_mutable HOSTUP_ZONE_ID "$HOSTUP_ZONE_ID" |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
_hostup_detect_zone() { |
|||
fulldomain="$1" |
|||
|
|||
if [ -n "$HOSTUP_ZONE_ID" ] && [ -n "$HOSTUP_ZONE_DOMAIN" ]; then |
|||
return 0 |
|||
fi |
|||
|
|||
HOSTUP_ZONE_DOMAIN="" |
|||
_debug "hostup_full_domain" "$fulldomain" |
|||
|
|||
if [ -n "$HOSTUP_ZONE_ID" ] && [ -z "$HOSTUP_ZONE_DOMAIN" ]; then |
|||
# Attempt to fetch domain name for provided zone ID |
|||
if _hostup_fetch_zone_details "$HOSTUP_ZONE_ID"; then |
|||
return 0 |
|||
fi |
|||
HOSTUP_ZONE_ID="" |
|||
fi |
|||
|
|||
if ! _hostup_load_zones; then |
|||
return 1 |
|||
fi |
|||
|
|||
_domain_candidate="$(printf "%s" "$fulldomain" | _lower_case)" |
|||
_debug "hostup_initial_candidate" "$_domain_candidate" |
|||
|
|||
while [ -n "$_domain_candidate" ]; do |
|||
_debug "hostup_zone_candidate" "$_domain_candidate" |
|||
if _hostup_lookup_zone "$_domain_candidate"; then |
|||
HOSTUP_ZONE_DOMAIN="$_lookup_zone_domain" |
|||
HOSTUP_ZONE_ID="$_lookup_zone_id" |
|||
return 0 |
|||
fi |
|||
|
|||
case "$_domain_candidate" in |
|||
*.*) ;; |
|||
*) break ;; |
|||
esac |
|||
|
|||
_domain_candidate="${_domain_candidate#*.}" |
|||
done |
|||
|
|||
HOSTUP_ZONE_ID="" |
|||
return 1 |
|||
} |
|||
|
|||
_hostup_record_name() { |
|||
fulldomain="$1" |
|||
zonedomain="$2" |
|||
|
|||
# Remove trailing dot, if any |
|||
fulldomain="${fulldomain%.}" |
|||
zonedomain="${zonedomain%.}" |
|||
|
|||
if [ "$fulldomain" = "$zonedomain" ]; then |
|||
printf "%s" "@" |
|||
return 0 |
|||
fi |
|||
|
|||
suffix=".$zonedomain" |
|||
case "$fulldomain" in |
|||
*"$suffix") |
|||
printf "%s" "${fulldomain%"$suffix"}" |
|||
;; |
|||
*) |
|||
# Domain not within zone, fall back to full host |
|||
printf "%s" "$fulldomain" |
|||
;; |
|||
esac |
|||
} |
|||
|
|||
_hostup_sanitize_name() { |
|||
name="$1" |
|||
|
|||
if [ -z "$name" ] || [ "$name" = "." ]; then |
|||
printf "%s" "@" |
|||
return 0 |
|||
fi |
|||
|
|||
# Remove any trailing dot |
|||
name="${name%.}" |
|||
printf "%s" "$name" |
|||
} |
|||
|
|||
_hostup_fqdn() { |
|||
domain="$1" |
|||
printf "%s" "${domain%.}" |
|||
} |
|||
|
|||
_hostup_fetch_zone_details() { |
|||
zone_id="$1" |
|||
|
|||
if ! _hostup_rest "GET" "/dns/zones/$zone_id/records" ""; then |
|||
return 1 |
|||
fi |
|||
|
|||
zonedomain="$(printf "%s" "$_hostup_response" | _egrep_o '"domain":"[^"]*"' | sed -n '1p' | cut -d ':' -f 2 | tr -d '"')" |
|||
if [ -n "$zonedomain" ]; then |
|||
HOSTUP_ZONE_DOMAIN="$zonedomain" |
|||
return 0 |
|||
fi |
|||
|
|||
return 1 |
|||
} |
|||
|
|||
_hostup_load_zones() { |
|||
if ! _hostup_rest "GET" "/dns/zones" ""; then |
|||
return 1 |
|||
fi |
|||
|
|||
HOSTUP_ZONES_CACHE="" |
|||
data="$(printf "%s" "$_hostup_response" | tr '{' '\n')" |
|||
|
|||
while IFS= read -r line; do |
|||
case "$line" in |
|||
*'"domain_id"'*'"domain"'*) |
|||
zone_id="$(printf "%s" "$line" | _hostup_json_extract "domain_id")" |
|||
zone_domain="$(printf "%s" "$line" | _hostup_json_extract "domain")" |
|||
if [ -n "$zone_id" ] && [ -n "$zone_domain" ]; then |
|||
HOSTUP_ZONES_CACHE="${HOSTUP_ZONES_CACHE}${zone_domain}|${zone_id} |
|||
" |
|||
_debug "hostup_zone_loaded" "$zone_domain|$zone_id" |
|||
fi |
|||
;; |
|||
esac |
|||
done <<EOF |
|||
$data |
|||
EOF |
|||
|
|||
if [ -z "$HOSTUP_ZONES_CACHE" ]; then |
|||
_err "HostUp DNS API: no zones returned for the current API key." |
|||
return 1 |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
_hostup_lookup_zone() { |
|||
lookup_domain="$1" |
|||
_lookup_zone_id="" |
|||
_lookup_zone_domain="" |
|||
|
|||
while IFS='|' read -r domain zone_id; do |
|||
[ -z "$domain" ] && continue |
|||
if [ "$domain" = "$lookup_domain" ]; then |
|||
_lookup_zone_domain="$domain" |
|||
_lookup_zone_id="$zone_id" |
|||
HOSTUP_ZONE_DOMAIN="$domain" |
|||
HOSTUP_ZONE_ID="$zone_id" |
|||
return 0 |
|||
fi |
|||
done <<EOF |
|||
$HOSTUP_ZONES_CACHE |
|||
EOF |
|||
|
|||
return 1 |
|||
} |
|||
|
|||
_hostup_find_record() { |
|||
zone_id="$1" |
|||
fqdn="$2" |
|||
txtvalue="$3" |
|||
|
|||
if ! _hostup_rest "GET" "/dns/zones/$zone_id/records" ""; then |
|||
return 1 |
|||
fi |
|||
|
|||
HOSTUP_RECORD_ID="" |
|||
records="$(printf "%s" "$_hostup_response" | tr '{' '\n')" |
|||
|
|||
while IFS= read -r line; do |
|||
# Normalize line to make TXT value matching reliable |
|||
line_clean="$(printf "%s" "$line" | tr -d '\r\n')" |
|||
line_value_clean="$(printf "%s" "$line_clean" | sed 's/\\"//g')" |
|||
|
|||
case "$line_clean" in |
|||
*'"type":"TXT"'*'"name"'*'"value"'*) |
|||
name_value="$(_hostup_json_extract "name" "$line_clean")" |
|||
record_value="$(_hostup_json_extract "value" "$line_value_clean")" |
|||
|
|||
_debug "hostup_record_raw" "$record_value" |
|||
if [ "${record_value#\"}" != "$record_value" ] && [ "${record_value%\"}" != "$record_value" ]; then |
|||
record_value="${record_value#\"}" |
|||
record_value="${record_value%\"}" |
|||
fi |
|||
if [ "${record_value#\'}" != "$record_value" ] && [ "${record_value%\'}" != "$record_value" ]; then |
|||
record_value="${record_value#\'}" |
|||
record_value="${record_value%\'}" |
|||
fi |
|||
record_value="$(printf "%s" "$record_value" | tr -d '\r\n')" |
|||
_debug "hostup_record_value" "$record_value" |
|||
|
|||
if [ "$name_value" = "$fqdn" ] && [ "$record_value" = "$txtvalue" ]; then |
|||
record_id="$(_hostup_json_extract "id" "$line_clean")" |
|||
if [ -n "$record_id" ]; then |
|||
HOSTUP_RECORD_ID="$record_id" |
|||
return 0 |
|||
fi |
|||
fi |
|||
;; |
|||
esac |
|||
done <<EOF |
|||
$records |
|||
EOF |
|||
|
|||
return 1 |
|||
} |
|||
|
|||
_hostup_json_extract() { |
|||
key="$1" |
|||
input="${2:-$line}" |
|||
|
|||
# First try to extract quoted values (strings) |
|||
quoted_match="$(printf "%s" "$input" | _egrep_o "\"$key\":\"[^\"]*\"" | _head_n 1)" |
|||
if [ -n "$quoted_match" ]; then |
|||
printf "%s" "$quoted_match" | |
|||
cut -d : -f2- | |
|||
sed 's/^"//' | |
|||
sed 's/"$//' | |
|||
sed 's/\\"/"/g' |
|||
return 0 |
|||
fi |
|||
|
|||
# Fallback for unquoted values (e.g., numeric IDs) |
|||
unquoted_match="$(printf "%s" "$input" | _egrep_o "\"$key\":[^,}]*" | _head_n 1)" |
|||
if [ -n "$unquoted_match" ]; then |
|||
printf "%s" "$unquoted_match" | |
|||
cut -d : -f2- | |
|||
tr -d '", ' | |
|||
tr -d '\r\n' |
|||
return 0 |
|||
fi |
|||
|
|||
return 1 |
|||
} |
|||
|
|||
_hostup_json_escape() { |
|||
printf "%s" "$1" | sed 's/\\/\\\\/g; s/"/\\"/g' |
|||
} |
|||
|
|||
_hostup_record_key() { |
|||
zone_id="$1" |
|||
domain="$2" |
|||
safe_zone="$(printf "%s" "$zone_id" | sed 's/[^A-Za-z0-9]/_/g')" |
|||
safe_domain="$(printf "%s" "$domain" | _lower_case | sed 's/[^a-z0-9]/_/g')" |
|||
printf "%s_%s" "$safe_zone" "$safe_domain" |
|||
} |
|||
|
|||
_hostup_save_record_id() { |
|||
zone_id="$1" |
|||
domain="$2" |
|||
record_id="$3" |
|||
key="$(_hostup_record_key "$zone_id" "$domain")" |
|||
_saveaccountconf_mutable "HOSTUP_RECORD_$key" "$record_id" |
|||
} |
|||
|
|||
_hostup_get_saved_record_id() { |
|||
zone_id="$1" |
|||
domain="$2" |
|||
key="$(_hostup_record_key "$zone_id" "$domain")" |
|||
_readaccountconf_mutable "HOSTUP_RECORD_$key" |
|||
} |
|||
|
|||
_hostup_clear_record_id() { |
|||
zone_id="$1" |
|||
domain="$2" |
|||
key="$(_hostup_record_key "$zone_id" "$domain")" |
|||
_clearaccountconf_mutable "HOSTUP_RECORD_$key" |
|||
} |
|||
|
|||
_hostup_extract_record_id() { |
|||
record_id="$(_hostup_json_extract "id" "$1")" |
|||
if [ -n "$record_id" ]; then |
|||
printf "%s" "$record_id" |
|||
return 0 |
|||
fi |
|||
|
|||
printf "%s" "$1" | _egrep_o '"id":[0-9]+' | _head_n 1 | cut -d: -f2 |
|||
} |
|||
|
|||
_hostup_delete_record_by_id() { |
|||
zone_id="$1" |
|||
record_id="$2" |
|||
|
|||
if ! _hostup_rest "DELETE" "/dns/zones/$zone_id/records/$record_id" ""; then |
|||
return 1 |
|||
fi |
|||
|
|||
if ! _contains "$_hostup_response" '"success":true'; then |
|||
return 1 |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
_hostup_rest() { |
|||
method="$1" |
|||
route="$2" |
|||
data="$3" |
|||
|
|||
_hostup_response="" |
|||
|
|||
export _H1="Authorization: Bearer $HOSTUP_API_KEY" |
|||
export _H2="Content-Type: application/json" |
|||
export _H3="Accept: application/json" |
|||
|
|||
if [ "$method" = "GET" ]; then |
|||
_hostup_response="$(_get "$HOSTUP_API_BASE$route")" |
|||
else |
|||
_hostup_response="$(_post "$data" "$HOSTUP_API_BASE$route" "" "$method" "application/json")" |
|||
fi |
|||
|
|||
ret="$?" |
|||
|
|||
unset _H1 |
|||
unset _H2 |
|||
unset _H3 |
|||
|
|||
if [ "$ret" != "0" ]; then |
|||
_err "HTTP request failed for $route" |
|||
return 1 |
|||
fi |
|||
|
|||
http_status="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n")" |
|||
_debug2 "HTTP status" "$http_status" |
|||
_debug2 "_hostup_response" "$_hostup_response" |
|||
|
|||
case "$http_status" in |
|||
200 | 201 | 204) return 0 ;; |
|||
401) |
|||
_err "HostUp API returned 401 Unauthorized. Check HOSTUP_API_KEY scopes and IP restrictions." |
|||
return 1 |
|||
;; |
|||
403) |
|||
_err "HostUp API returned 403 Forbidden. The API key lacks required DNS scopes." |
|||
return 1 |
|||
;; |
|||
404) |
|||
_err "HostUp API returned 404 Not Found for $route" |
|||
return 1 |
|||
;; |
|||
429) |
|||
_err "HostUp API rate limit exceeded. Please retry later." |
|||
return 1 |
|||
;; |
|||
*) |
|||
_err "HostUp API request failed with status $http_status" |
|||
return 1 |
|||
;; |
|||
esac |
|||
} |
|||
@ -0,0 +1,244 @@ |
|||
#!/usr/bin/env sh |
|||
# shellcheck disable=SC2034 |
|||
dns_infoblox_uddi_info='Infoblox UDDI |
|||
Site: Infoblox.com |
|||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_infoblox_uddi |
|||
Options: |
|||
Infoblox_UDDI_Key API Key for Infoblox UDDI |
|||
Infoblox_Portal URL, e.g. "csp.infoblox.com" or "csp.eu.infoblox.com" |
|||
Issues: github.com/acmesh-official/acme.sh/issues |
|||
Author: Stefan Riegel |
|||
' |
|||
|
|||
Infoblox_UDDI_Api="https://" |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
#Usage: dns_infoblox_uddi_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_infoblox_uddi_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
Infoblox_UDDI_Key="${Infoblox_UDDI_Key:-$(_readaccountconf_mutable Infoblox_UDDI_Key)}" |
|||
Infoblox_Portal="${Infoblox_Portal:-$(_readaccountconf_mutable Infoblox_Portal)}" |
|||
|
|||
_info "Using Infoblox UDDI API" |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
if [ -z "$Infoblox_UDDI_Key" ] || [ -z "$Infoblox_Portal" ]; then |
|||
Infoblox_UDDI_Key="" |
|||
Infoblox_Portal="" |
|||
_err "You didn't specify the Infoblox UDDI key or server (Infoblox_UDDI_Key; Infoblox_Portal)." |
|||
_err "Please set them via EXPORT Infoblox_UDDI_Key=your_key, EXPORT Infoblox_Portal=csp.infoblox.com and try again." |
|||
return 1 |
|||
fi |
|||
|
|||
_saveaccountconf_mutable Infoblox_UDDI_Key "$Infoblox_UDDI_Key" |
|||
_saveaccountconf_mutable Infoblox_Portal "$Infoblox_Portal" |
|||
|
|||
export _H1="Authorization: Token $Infoblox_UDDI_Key" |
|||
export _H2="Content-Type: application/json" |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_debug "Getting existing txt records" |
|||
_infoblox_rest GET "dns/record?_filter=type%20eq%20'TXT'%20and%20name_in_zone%20eq%20'$_sub_domain'%20and%20zone%20eq%20'$_domain_id'" |
|||
|
|||
_info "Adding record" |
|||
body="{\"type\":\"TXT\",\"name_in_zone\":\"$_sub_domain\",\"zone\":\"$_domain_id\",\"ttl\":120,\"inheritance_sources\":{\"ttl\":{\"action\":\"override\"}},\"rdata\":{\"text\":\"$txtvalue\"}}" |
|||
|
|||
if _infoblox_rest POST "dns/record" "$body"; then |
|||
if _contains "$response" "$txtvalue"; then |
|||
_info "Added, OK" |
|||
return 0 |
|||
elif _contains "$response" '"error"'; then |
|||
# Check if record already exists |
|||
if _contains "$response" "already exists" || _contains "$response" "duplicate"; then |
|||
_info "Already exists, OK" |
|||
return 0 |
|||
else |
|||
_err "Add txt record error." |
|||
_err "Response: $response" |
|||
return 1 |
|||
fi |
|||
else |
|||
_info "Added, OK" |
|||
return 0 |
|||
fi |
|||
fi |
|||
_err "Add txt record error." |
|||
return 1 |
|||
} |
|||
|
|||
#Usage: dns_infoblox_uddi_rm _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_infoblox_uddi_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
|
|||
Infoblox_UDDI_Key="${Infoblox_UDDI_Key:-$(_readaccountconf_mutable Infoblox_UDDI_Key)}" |
|||
Infoblox_Portal="${Infoblox_Portal:-$(_readaccountconf_mutable Infoblox_Portal)}" |
|||
|
|||
if [ -z "$Infoblox_UDDI_Key" ] || [ -z "$Infoblox_Portal" ]; then |
|||
_err "Credentials not found" |
|||
return 1 |
|||
fi |
|||
|
|||
_info "Using Infoblox UDDI API" |
|||
_debug fulldomain "$fulldomain" |
|||
_debug txtvalue "$txtvalue" |
|||
|
|||
export _H1="Authorization: Token $Infoblox_UDDI_Key" |
|||
export _H2="Content-Type: application/json" |
|||
|
|||
_debug "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug _domain_id "$_domain_id" |
|||
_debug _sub_domain "$_sub_domain" |
|||
_debug _domain "$_domain" |
|||
|
|||
_debug "Getting txt records to delete" |
|||
# Filter by txtvalue to support wildcard certs (multiple TXT records) |
|||
filter="type%20eq%20'TXT'%20and%20name_in_zone%20eq%20'$_sub_domain'%20and%20zone%20eq%20'$_domain_id'%20and%20rdata.text%20eq%20'$txtvalue'" |
|||
_infoblox_rest GET "dns/record?_filter=$filter" |
|||
|
|||
if ! _contains "$response" '"results"'; then |
|||
_info "Don't need to remove, record not found." |
|||
return 0 |
|||
fi |
|||
|
|||
record_id=$(echo "$response" | _egrep_o '"id":[[:space:]]*"[^"]*"' | _head_n 1 | cut -d '"' -f 4) |
|||
_debug "record_id" "$record_id" |
|||
|
|||
if [ -z "$record_id" ]; then |
|||
_info "Don't need to remove, record not found." |
|||
return 0 |
|||
fi |
|||
|
|||
# Extract UUID from the full record ID (format: dns/record/uuid) |
|||
record_uuid=$(echo "$record_id" | sed 's|.*/||') |
|||
_debug "record_uuid" "$record_uuid" |
|||
|
|||
if ! _infoblox_rest DELETE "dns/record/$record_uuid"; then |
|||
_err "Delete record error." |
|||
return 1 |
|||
fi |
|||
|
|||
_info "Removed record successfully" |
|||
return 0 |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
|
|||
#_acme-challenge.www.domain.com |
|||
#returns |
|||
# _sub_domain=_acme-challenge.www |
|||
# _domain=domain.com |
|||
# _domain_id=dns/auth_zone/xxxx-xxxx |
|||
_get_root() { |
|||
domain=$1 |
|||
i=1 |
|||
p=1 |
|||
|
|||
# Remove _acme-challenge prefix if present |
|||
domain_no_acme=$(echo "$domain" | sed 's/^_acme-challenge\.//') |
|||
|
|||
while true; do |
|||
h=$(printf "%s" "$domain_no_acme" | cut -d . -f "$i"-100) |
|||
_debug h "$h" |
|||
if [ -z "$h" ]; then |
|||
# not valid |
|||
return 1 |
|||
fi |
|||
|
|||
# Query for the zone with both trailing dot and without |
|||
filter="fqdn%20eq%20'$h.'%20or%20fqdn%20eq%20'$h'" |
|||
if ! _infoblox_rest GET "dns/auth_zone?_filter=$filter"; then |
|||
# API error - don't continue if we get auth errors |
|||
if _contains "$response" "401" || _contains "$response" "Authorization"; then |
|||
_err "Authentication failed. Please check your Infoblox_UDDI_Key." |
|||
return 1 |
|||
fi |
|||
# For other errors, continue to parent domain |
|||
p=$i |
|||
i=$((i + 1)) |
|||
continue |
|||
fi |
|||
|
|||
# Check if response contains results (even if empty) |
|||
if _contains "$response" '"results"'; then |
|||
# Extract zone ID - must match the pattern dns/auth_zone/... |
|||
zone_id=$(echo "$response" | _egrep_o '"id":[[:space:]]*"dns/auth_zone/[^"]*"' | _head_n 1 | cut -d '"' -f 4) |
|||
if [ -n "$zone_id" ]; then |
|||
# Found the zone |
|||
_domain="$h" |
|||
_domain_id="$zone_id" |
|||
|
|||
# Calculate subdomain |
|||
if [ "$_domain" = "$domain" ]; then |
|||
_sub_domain="" |
|||
else |
|||
_cutlength=$((${#domain} - ${#_domain} - 1)) |
|||
_sub_domain=$(printf "%s" "$domain" | cut -c "1-$_cutlength") |
|||
fi |
|||
|
|||
return 0 |
|||
fi |
|||
fi |
|||
|
|||
p=$i |
|||
i=$((i + 1)) |
|||
done |
|||
|
|||
return 1 |
|||
} |
|||
|
|||
# _infoblox_rest GET "dns/record?_filter=..." |
|||
# _infoblox_rest POST "dns/record" "{json body}" |
|||
# _infoblox_rest DELETE "dns/record/uuid" |
|||
_infoblox_rest() { |
|||
method=$1 |
|||
ep="$2" |
|||
data="$3" |
|||
|
|||
_debug "$ep" |
|||
|
|||
# Ensure credentials are available (when called from _get_root) |
|||
Infoblox_UDDI_Key="${Infoblox_UDDI_Key:-$(_readaccountconf_mutable Infoblox_UDDI_Key)}" |
|||
Infoblox_Portal="${Infoblox_Portal:-$(_readaccountconf_mutable Infoblox_Portal)}" |
|||
|
|||
Infoblox_UDDI_Api="https://$Infoblox_Portal/api/ddi/v1" |
|||
export _H1="Authorization: Token $Infoblox_UDDI_Key" |
|||
export _H2="Content-Type: application/json" |
|||
|
|||
# Debug (masked) |
|||
_tok_len=$(printf "%s" "$Infoblox_UDDI_Key" | wc -c | tr -d ' \n') |
|||
_debug2 "Auth header set" "Token len=${_tok_len} on $Infoblox_Portal" |
|||
|
|||
if [ "$method" != "GET" ]; then |
|||
_debug data "$data" |
|||
response="$(_post "$data" "$Infoblox_UDDI_Api/$ep" "" "$method")" |
|||
else |
|||
response="$(_get "$Infoblox_UDDI_Api/$ep")" |
|||
fi |
|||
|
|||
_ret="$?" |
|||
_debug2 response "$response" |
|||
|
|||
if [ "$_ret" != "0" ]; then |
|||
_err "Error: $ep" |
|||
return 1 |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
@ -0,0 +1,109 @@ |
|||
#!/usr/bin/env sh |
|||
# shellcheck disable=SC2034 |
|||
dns_mgwm_info='mgw-media.de |
|||
Site: mgw-media.de |
|||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_mgwm |
|||
Options: |
|||
MGWM_CUSTOMER Your customer number |
|||
MGWM_API_HASH Your API Hash |
|||
Issues: github.com/acmesh-official/acme.sh/issues/6669 |
|||
' |
|||
# Base URL for the mgw-media.de API |
|||
MGWM_API_BASE="https://api.mgw-media.de/record" |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
# This function is called by acme.sh to add a TXT record. |
|||
dns_mgwm_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_info "Using mgw-media.de DNS API for domain $fulldomain (add record)" |
|||
_debug "fulldomain: $fulldomain" |
|||
_debug "txtvalue: $txtvalue" |
|||
|
|||
# Call the new private function to handle the API request. |
|||
# The 'add' action, fulldomain, type 'txt' and txtvalue are passed. |
|||
if _mgwm_request "add" "$fulldomain" "txt" "$txtvalue"; then |
|||
_info "TXT record for $fulldomain successfully added via mgw-media.de API." |
|||
_sleep 10 # Wait briefly for DNS propagation, a common practice in DNS-01 hooks. |
|||
return 0 |
|||
else |
|||
# Error message already logged by _mgwm_request, but a specific one here helps. |
|||
_err "mgwm_add: Failed to add TXT record for $fulldomain." |
|||
return 1 |
|||
fi |
|||
} |
|||
# This function is called by acme.sh to remove a TXT record after validation. |
|||
dns_mgwm_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 # This txtvalue is now used to identify the specific record to be removed. |
|||
_info "Removing TXT record for $fulldomain using mgw-media.de DNS API (remove record)" |
|||
_debug "fulldomain: $fulldomain" |
|||
_debug "txtvalue: $txtvalue" |
|||
|
|||
# Call the new private function to handle the API request. |
|||
# The 'rm' action, fulldomain, type 'txt' and txtvalue are passed. |
|||
if _mgwm_request "rm" "$fulldomain" "txt" "$txtvalue"; then |
|||
_info "TXT record for $fulldomain successfully removed via mgw-media.de API." |
|||
return 0 |
|||
else |
|||
# Error message already logged by _mgwm_request, but a specific one here helps. |
|||
_err "mgwm_rm: Failed to remove TXT record for $fulldomain." |
|||
return 1 |
|||
fi |
|||
} |
|||
#################### Private functions below ################################## |
|||
|
|||
# _mgwm_request() encapsulates the API call logic, including |
|||
# loading credentials, setting the Authorization header, and executing the request. |
|||
# Arguments: |
|||
# $1: action (e.g., "add", "rm") |
|||
# $2: fulldomain |
|||
# $3: type (e.g., "txt") |
|||
# $4: content (the txtvalue) |
|||
_mgwm_request() { |
|||
_action="$1" |
|||
_fulldomain="$2" |
|||
_type="$3" |
|||
_content="$4" |
|||
|
|||
_debug "Calling _mgwm_request for action: $_action, domain: $_fulldomain, type: $_type, content: $_content" |
|||
|
|||
# Load credentials from environment or acme.sh config |
|||
MGWM_CUSTOMER="${MGWM_CUSTOMER:-$(_readaccountconf_mutable MGWM_CUSTOMER)}" |
|||
MGWM_API_HASH="${MGWM_API_HASH:-$(_readaccountconf_mutable MGWM_API_HASH)}" |
|||
|
|||
# Check if credentials are set |
|||
if [ -z "$MGWM_CUSTOMER" ] || [ -z "$MGWM_API_HASH" ]; then |
|||
_err "You didn't specify one or more of MGWM_CUSTOMER or MGWM_API_HASH." |
|||
_err "Please check these environment variables and try again." |
|||
return 1 |
|||
fi |
|||
|
|||
# Save credentials for automatic renewal and future calls |
|||
_saveaccountconf_mutable MGWM_CUSTOMER "$MGWM_CUSTOMER" |
|||
_saveaccountconf_mutable MGWM_API_HASH "$MGWM_API_HASH" |
|||
|
|||
# Create the Basic Auth Header. acme.sh's _base64 function is used for encoding. |
|||
_credentials="$(printf "%s:%s" "$MGWM_CUSTOMER" "$MGWM_API_HASH" | _base64)" |
|||
export _H1="Authorization: Basic $_credentials" |
|||
_debug "Set Authorization Header: Basic <credentials_encoded>" # Log debug message without sensitive credentials |
|||
|
|||
# Construct the API URL based on the action and provided parameters. |
|||
_request_url="${MGWM_API_BASE}/${_action}/${_fulldomain}/${_type}/${_content}" |
|||
_debug "Constructed mgw-media.de API URL for action '$_action': ${_request_url}" |
|||
|
|||
# Execute the HTTP GET request with the Authorization Header. |
|||
# The 5th parameter of _get is where acme.sh expects custom HTTP headers like Authorization. |
|||
response="$(_get "$_request_url")" |
|||
_debug "mgw-media.de API response for action '$_action': $response" |
|||
|
|||
# Check the API response for success. The API returns "OK" on success. |
|||
if [ "$response" = "OK" ]; then |
|||
_info "mgw-media.de API action '$_action' for record '$_fulldomain' successful." |
|||
return 0 |
|||
else |
|||
_err "Failed mgw-media.de API action '$_action' for record '$_fulldomain'. Unexpected API Response: '$response'" |
|||
return 1 |
|||
fi |
|||
} |
|||
@ -0,0 +1,319 @@ |
|||
#!/usr/bin/env sh |
|||
# shellcheck disable=SC2034 |
|||
dns_sotoon_info='Sotoon.ir |
|||
Site: Sotoon.ir |
|||
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_sotoon |
|||
Options: |
|||
Sotoon_Token API Token |
|||
Sotoon_WorkspaceUUID Workspace UUID |
|||
Sotoon_WorkspaceName Workspace Name |
|||
Issues: github.com/acmesh-official/acme.sh/issues/6656 |
|||
Author: Erfan Gholizade |
|||
' |
|||
|
|||
SOTOON_API_URL="https://api.sotoon.ir/delivery/v2/global" |
|||
|
|||
######## Public functions ##################### |
|||
|
|||
#Adding the txt record for validation. |
|||
#Usage: dns_sotoon_add fulldomain TXT_record |
|||
#Usage: dns_sotoon_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_sotoon_add() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_info_sotoon "Using Sotoon" |
|||
|
|||
Sotoon_Token="${Sotoon_Token:-$(_readaccountconf_mutable Sotoon_Token)}" |
|||
Sotoon_WorkspaceUUID="${Sotoon_WorkspaceUUID:-$(_readaccountconf_mutable Sotoon_WorkspaceUUID)}" |
|||
Sotoon_WorkspaceName="${Sotoon_WorkspaceName:-$(_readaccountconf_mutable Sotoon_WorkspaceName)}" |
|||
|
|||
if [ -z "$Sotoon_Token" ]; then |
|||
_err_sotoon "You didn't specify \"Sotoon_Token\" token yet." |
|||
_err_sotoon "You can get yours from here https://ocean.sotoon.ir/profile/tokens" |
|||
return 1 |
|||
fi |
|||
if [ -z "$Sotoon_WorkspaceUUID" ]; then |
|||
_err_sotoon "You didn't specify \"Sotoon_WorkspaceUUID\" Workspace UUID yet." |
|||
_err_sotoon "You can get yours from here https://ocean.sotoon.ir/profile/workspaces" |
|||
return 1 |
|||
fi |
|||
if [ -z "$Sotoon_WorkspaceName" ]; then |
|||
_err_sotoon "You didn't specify \"Sotoon_WorkspaceName\" Workspace Name yet." |
|||
_err_sotoon "You can get yours from here https://ocean.sotoon.ir/profile/workspaces" |
|||
return 1 |
|||
fi |
|||
|
|||
#save the info to the account conf file. |
|||
_saveaccountconf_mutable Sotoon_Token "$Sotoon_Token" |
|||
_saveaccountconf_mutable Sotoon_WorkspaceUUID "$Sotoon_WorkspaceUUID" |
|||
_saveaccountconf_mutable Sotoon_WorkspaceName "$Sotoon_WorkspaceName" |
|||
|
|||
_debug_sotoon "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err_sotoon "invalid domain" |
|||
return 1 |
|||
fi |
|||
|
|||
_info_sotoon "Adding record" |
|||
|
|||
_debug_sotoon _domain_id "$_domain_id" |
|||
_debug_sotoon _sub_domain "$_sub_domain" |
|||
_debug_sotoon _domain "$_domain" |
|||
|
|||
# First, GET the current domain zone to check for existing TXT records |
|||
# This is needed for wildcard certs which require multiple TXT values |
|||
_info_sotoon "Checking for existing TXT records" |
|||
if ! _sotoon_rest GET "$_domain_id"; then |
|||
_err_sotoon "Failed to get domain zone" |
|||
return 1 |
|||
fi |
|||
|
|||
# Check if there are existing TXT records for this subdomain |
|||
_existing_txt="" |
|||
if _contains "$response" "\"$_sub_domain\""; then |
|||
_debug_sotoon "Found existing records for $_sub_domain" |
|||
# Extract existing TXT values from the response |
|||
# The format is: "_acme-challenge":[{"TXT":"value1","type":"TXT","ttl":10},{"TXT":"value2",...}] |
|||
_existing_txt=$(echo "$response" | _egrep_o "\"$_sub_domain\":\[[^]]*\]" | sed "s/\"$_sub_domain\"://") |
|||
_debug_sotoon "Existing TXT records: $_existing_txt" |
|||
fi |
|||
|
|||
# Build the new record entry |
|||
_new_record="{\"TXT\":\"$txtvalue\",\"type\":\"TXT\",\"ttl\":120}" |
|||
|
|||
# If there are existing records, append to them; otherwise create new array |
|||
if [ -n "$_existing_txt" ] && [ "$_existing_txt" != "[]" ] && [ "$_existing_txt" != "null" ]; then |
|||
# Check if this exact TXT value already exists (avoid duplicates) |
|||
if _contains "$_existing_txt" "\"$txtvalue\""; then |
|||
_info_sotoon "TXT record already exists, skipping" |
|||
return 0 |
|||
fi |
|||
# Remove the closing bracket and append new record |
|||
_combined_records="$(echo "$_existing_txt" | sed 's/]$//'),$_new_record]" |
|||
_debug_sotoon "Combined records: $_combined_records" |
|||
else |
|||
# No existing records, create new array |
|||
_combined_records="[$_new_record]" |
|||
fi |
|||
|
|||
# Prepare the DNS record data in Kubernetes CRD format |
|||
_dns_record="{\"spec\":{\"records\":{\"$_sub_domain\":$_combined_records}}}" |
|||
|
|||
_debug_sotoon "DNS record payload: $_dns_record" |
|||
|
|||
# Use PATCH to update/add the record to the domain zone |
|||
_info_sotoon "Updating domain zone $_domain_id with TXT record" |
|||
if _sotoon_rest PATCH "$_domain_id" "$_dns_record"; then |
|||
if _contains "$response" "$txtvalue" || _contains "$response" "\"$_sub_domain\""; then |
|||
_info_sotoon "Added, OK" |
|||
return 0 |
|||
else |
|||
_debug_sotoon "Response: $response" |
|||
_err_sotoon "Add txt record error." |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
_err_sotoon "Add txt record error." |
|||
return 1 |
|||
} |
|||
|
|||
#Remove the txt record after validation. |
|||
#Usage: dns_sotoon_rm fulldomain TXT_record |
|||
#Usage: dns_sotoon_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs" |
|||
dns_sotoon_rm() { |
|||
fulldomain=$1 |
|||
txtvalue=$2 |
|||
_info_sotoon "Using Sotoon" |
|||
_debug_sotoon fulldomain "$fulldomain" |
|||
_debug_sotoon txtvalue "$txtvalue" |
|||
|
|||
Sotoon_Token="${Sotoon_Token:-$(_readaccountconf_mutable Sotoon_Token)}" |
|||
Sotoon_WorkspaceUUID="${Sotoon_WorkspaceUUID:-$(_readaccountconf_mutable Sotoon_WorkspaceUUID)}" |
|||
Sotoon_WorkspaceName="${Sotoon_WorkspaceName:-$(_readaccountconf_mutable Sotoon_WorkspaceName)}" |
|||
|
|||
_debug_sotoon "First detect the root zone" |
|||
if ! _get_root "$fulldomain"; then |
|||
_err_sotoon "invalid domain" |
|||
return 1 |
|||
fi |
|||
_debug_sotoon _domain_id "$_domain_id" |
|||
_debug_sotoon _sub_domain "$_sub_domain" |
|||
_debug_sotoon _domain "$_domain" |
|||
|
|||
_info_sotoon "Removing TXT record" |
|||
|
|||
# First, GET the current domain zone to check for existing TXT records |
|||
if ! _sotoon_rest GET "$_domain_id"; then |
|||
_err_sotoon "Failed to get domain zone" |
|||
return 1 |
|||
fi |
|||
|
|||
# Check if there are existing TXT records for this subdomain |
|||
_existing_txt="" |
|||
if _contains "$response" "\"$_sub_domain\""; then |
|||
_debug_sotoon "Found existing records for $_sub_domain" |
|||
_existing_txt=$(echo "$response" | _egrep_o "\"$_sub_domain\":\[[^]]*\]" | sed "s/\"$_sub_domain\"://") |
|||
_debug_sotoon "Existing TXT records: $_existing_txt" |
|||
fi |
|||
|
|||
# If no existing records, nothing to remove |
|||
if [ -z "$_existing_txt" ] || [ "$_existing_txt" = "[]" ] || [ "$_existing_txt" = "null" ]; then |
|||
_info_sotoon "No TXT records found, nothing to remove" |
|||
return 0 |
|||
fi |
|||
|
|||
# Remove the specific TXT value from the array |
|||
# This handles the case where there are multiple TXT values (wildcard certs) |
|||
_remaining_records=$(echo "$_existing_txt" | sed "s/{\"TXT\":\"$txtvalue\"[^}]*},*//g" | sed 's/,]/]/g' | sed 's/\[,/[/g') |
|||
_debug_sotoon "Remaining records after removal: $_remaining_records" |
|||
|
|||
# If no records remain, set to null to remove the subdomain entirely |
|||
if [ "$_remaining_records" = "[]" ] || [ -z "$_remaining_records" ]; then |
|||
_dns_record="{\"spec\":{\"records\":{\"$_sub_domain\":null}}}" |
|||
else |
|||
_dns_record="{\"spec\":{\"records\":{\"$_sub_domain\":$_remaining_records}}}" |
|||
fi |
|||
|
|||
_debug_sotoon "Remove record payload: $_dns_record" |
|||
|
|||
# Use PATCH to remove the record from the domain zone |
|||
if _sotoon_rest PATCH "$_domain_id" "$_dns_record"; then |
|||
_info_sotoon "Record removed, OK" |
|||
return 0 |
|||
else |
|||
_debug_sotoon "Response: $response" |
|||
_err_sotoon "Error removing record" |
|||
return 1 |
|||
fi |
|||
} |
|||
|
|||
#################### Private functions below ################################## |
|||
|
|||
_get_root() { |
|||
domain=$1 |
|||
i=1 |
|||
p=1 |
|||
|
|||
_debug_sotoon "Getting root domain for: $domain" |
|||
_debug_sotoon "Sotoon WorkspaceUUID: $Sotoon_WorkspaceUUID" |
|||
_debug_sotoon "Sotoon WorkspaceName: $Sotoon_WorkspaceName" |
|||
|
|||
while true; do |
|||
h=$(printf "%s" "$domain" | cut -d . -f "$i"-100) |
|||
_debug_sotoon "Checking domain part: $h" |
|||
|
|||
if [ -z "$h" ]; then |
|||
#not valid |
|||
_err_sotoon "Could not find valid domain" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug_sotoon "Fetching domain zones from Sotoon API" |
|||
if ! _sotoon_rest GET ""; then |
|||
_err_sotoon "Failed to get domain zones from Sotoon API" |
|||
_err_sotoon "Please check your Sotoon_Token, Sotoon_WorkspaceUUID, and Sotoon_WorkspaceName" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug2_sotoon "API Response: $response" |
|||
|
|||
# Check if the response contains our domain |
|||
# Sotoon API uses Kubernetes CRD format with spec.origin for domain matching |
|||
if _contains "$response" "\"origin\":\"$h\""; then |
|||
_debug_sotoon "Found domain by origin: $h" |
|||
|
|||
# In Kubernetes CRD format, the metadata.name is the resource identifier |
|||
# The name can be either: |
|||
# 1. Same as origin |
|||
# 2. Origin with dots replaced by hyphens |
|||
# We check both patterns in the response to determine which one exists |
|||
|
|||
# Convert origin to hyphenated version for checking |
|||
_h_hyphenated=$(echo "$h" | tr '.' '-') |
|||
|
|||
# Check if the hyphenated name exists in the response |
|||
if _contains "$response" "\"name\":\"$_h_hyphenated\""; then |
|||
_domain_id="$_h_hyphenated" |
|||
_debug_sotoon "Found domain ID (hyphenated): $_domain_id" |
|||
# Check if the origin itself is used as name |
|||
elif _contains "$response" "\"name\":\"$h\""; then |
|||
_domain_id="$h" |
|||
_debug_sotoon "Found domain ID (same as origin): $_domain_id" |
|||
else |
|||
# Fallback: use the hyphenated version (more common) |
|||
_domain_id="$_h_hyphenated" |
|||
_debug_sotoon "Using hyphenated domain ID as fallback: $_domain_id" |
|||
fi |
|||
|
|||
if [ -n "$_domain_id" ]; then |
|||
_sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-"$p") |
|||
_domain=$h |
|||
_debug_sotoon "Domain ID (metadata.name): $_domain_id" |
|||
_debug_sotoon "Sub domain: $_sub_domain" |
|||
_debug_sotoon "Domain (origin): $_domain" |
|||
return 0 |
|||
fi |
|||
_err_sotoon "Found domain $h but could not extract domain ID" |
|||
return 1 |
|||
fi |
|||
p=$i |
|||
i=$(_math "$i" + 1) |
|||
done |
|||
return 1 |
|||
} |
|||
|
|||
_sotoon_rest() { |
|||
mtd="$1" |
|||
resource_id="$2" |
|||
data="$3" |
|||
|
|||
token_trimmed=$(echo "$Sotoon_Token" | tr -d '"') |
|||
|
|||
# Construct the API endpoint |
|||
_api_path="$SOTOON_API_URL/workspaces/$Sotoon_WorkspaceUUID/namespaces/$Sotoon_WorkspaceName/domainzones" |
|||
|
|||
if [ -n "$resource_id" ]; then |
|||
_api_path="$_api_path/$resource_id" |
|||
fi |
|||
|
|||
_debug_sotoon "API Path: $_api_path" |
|||
_debug_sotoon "Method: $mtd" |
|||
|
|||
# Set authorization header - Sotoon API uses Bearer token |
|||
export _H1="Authorization: Bearer $token_trimmed" |
|||
|
|||
if [ "$mtd" = "GET" ]; then |
|||
# GET request |
|||
_debug_sotoon "GET" "$_api_path" |
|||
response="$(_get "$_api_path")" |
|||
elif [ "$mtd" = "PATCH" ]; then |
|||
# PATCH Request |
|||
export _H2="Content-Type: application/merge-patch+json" |
|||
_debug_sotoon data "$data" |
|||
response="$(_post "$data" "$_api_path" "" "$mtd")" |
|||
else |
|||
_err_sotoon "Unknown method: $mtd" |
|||
return 1 |
|||
fi |
|||
|
|||
_debug2_sotoon response "$response" |
|||
return 0 |
|||
} |
|||
|
|||
#Wrappers for logging |
|||
_info_sotoon() { |
|||
_info "[Sotoon]" "$@" |
|||
} |
|||
|
|||
_err_sotoon() { |
|||
_err "[Sotoon]" "$@" |
|||
} |
|||
|
|||
_debug_sotoon() { |
|||
_debug "[Sotoon]" "$@" |
|||
} |
|||
|
|||
_debug2_sotoon() { |
|||
_debug2 "[Sotoon]" "$@" |
|||
} |
|||
@ -0,0 +1,130 @@ |
|||
#!/usr/bin/env sh |
|||
|
|||
#Support OpsGenie API integration |
|||
|
|||
#OPSGENIE_API_KEY="" Required, opsgenie api key |
|||
#OPSGENIE_REGION="" Optional, opsgenie region, can be EU or US (default: US) |
|||
#OPSGENIE_PRIORITY_SUCCESS="" Optional, opsgenie priority for success (default: P5) |
|||
#OPSGENIE_PRIORITY_ERROR="" Optional, opsgenie priority for error (default: P2) |
|||
#OPSGENIE_PRIORITY_SKIP="" Optional, opsgenie priority for renew skipped (default: P5) |
|||
|
|||
_OPSGENIE_AVAIL_REGION="US,EU" |
|||
_OPSGENIE_AVAIL_PRIORITIES="P1,P2,P3,P4,P5" |
|||
|
|||
opsgenie_send() { |
|||
_subject="$1" |
|||
_content="$2" |
|||
_status_code="$3" #0: success, 1: error, 2($RENEW_SKIP): skipped |
|||
|
|||
OPSGENIE_API_KEY="${OPSGENIE_API_KEY:-$(_readaccountconf_mutable OPSGENIE_API_KEY)}" |
|||
if [ -z "$OPSGENIE_API_KEY" ]; then |
|||
OPSGENIE_API_KEY="" |
|||
_err "You didn't specify an OpsGenie API key OPSGENIE_API_KEY yet." |
|||
return 1 |
|||
fi |
|||
_saveaccountconf_mutable OPSGENIE_API_KEY "$OPSGENIE_API_KEY" |
|||
export _H1="Authorization: GenieKey $OPSGENIE_API_KEY" |
|||
|
|||
OPSGENIE_REGION="${OPSGENIE_REGION:-$(_readaccountconf_mutable OPSGENIE_REGION)}" |
|||
if [ -z "$OPSGENIE_REGION" ]; then |
|||
OPSGENIE_REGION="US" |
|||
_info "The OPSGENIE_REGION is not set, so use the default US as regeion." |
|||
elif ! _hasfield "$_OPSGENIE_AVAIL_REGION" "$OPSGENIE_REGION"; then |
|||
_err "The OPSGENIE_REGION \"$OPSGENIE_REGION\" is not available, should be one of $_OPSGENIE_AVAIL_REGION" |
|||
OPSGENIE_REGION="" |
|||
return 1 |
|||
else |
|||
_saveaccountconf_mutable OPSGENIE_REGION "$OPSGENIE_REGION" |
|||
fi |
|||
|
|||
OPSGENIE_PRIORITY_SUCCESS="${OPSGENIE_PRIORITY_SUCCESS:-$(_readaccountconf_mutable OPSGENIE_PRIORITY_SUCCESS)}" |
|||
if [ -z "$OPSGENIE_PRIORITY_SUCCESS" ]; then |
|||
OPSGENIE_PRIORITY_SUCCESS="P5" |
|||
_info "The OPSGENIE_PRIORITY_SUCCESS is not set, so use the default P5 as priority." |
|||
elif ! _hasfield "$_OPSGENIE_AVAIL_PRIORITIES" "$OPSGENIE_PRIORITY_SUCCESS"; then |
|||
_err "The OPSGENIE_PRIORITY_SUCCESS \"$OPSGENIE_PRIORITY_SUCCESS\" is not available, should be one of $_OPSGENIE_AVAIL_PRIORITIES" |
|||
OPSGENIE_PRIORITY_SUCCESS="" |
|||
return 1 |
|||
else |
|||
_saveaccountconf_mutable OPSGENIE_PRIORITY_SUCCESS "$OPSGENIE_PRIORITY_SUCCESS" |
|||
fi |
|||
|
|||
OPSGENIE_PRIORITY_ERROR="${OPSGENIE_PRIORITY_ERROR:-$(_readaccountconf_mutable OPSGENIE_PRIORITY_ERROR)}" |
|||
if [ -z "$OPSGENIE_PRIORITY_ERROR" ]; then |
|||
OPSGENIE_PRIORITY_ERROR="P2" |
|||
_info "The OPSGENIE_PRIORITY_ERROR is not set, so use the default P2 as priority." |
|||
elif ! _hasfield "$_OPSGENIE_AVAIL_PRIORITIES" "$OPSGENIE_PRIORITY_ERROR"; then |
|||
_err "The OPSGENIE_PRIORITY_ERROR \"$OPSGENIE_PRIORITY_ERROR\" is not available, should be one of $_OPSGENIE_AVAIL_PRIORITIES" |
|||
OPSGENIE_PRIORITY_ERROR="" |
|||
return 1 |
|||
else |
|||
_saveaccountconf_mutable OPSGENIE_PRIORITY_ERROR "$OPSGENIE_PRIORITY_ERROR" |
|||
fi |
|||
|
|||
OPSGENIE_PRIORITY_SKIP="${OPSGENIE_PRIORITY_SKIP:-$(_readaccountconf_mutable OPSGENIE_PRIORITY_SKIP)}" |
|||
if [ -z "$OPSGENIE_PRIORITY_SKIP" ]; then |
|||
OPSGENIE_PRIORITY_SKIP="P5" |
|||
_info "The OPSGENIE_PRIORITY_SKIP is not set, so use the default P5 as priority." |
|||
elif ! _hasfield "$_OPSGENIE_AVAIL_PRIORITIES" "$OPSGENIE_PRIORITY_SKIP"; then |
|||
_err "The OPSGENIE_PRIORITY_SKIP \"$OPSGENIE_PRIORITY_SKIP\" is not available, should be one of $_OPSGENIE_AVAIL_PRIORITIES" |
|||
OPSGENIE_PRIORITY_SKIP="" |
|||
return 1 |
|||
else |
|||
_saveaccountconf_mutable OPSGENIE_PRIORITY_SKIP "$OPSGENIE_PRIORITY_SKIP" |
|||
fi |
|||
|
|||
case "$OPSGENIE_REGION" in |
|||
"US") |
|||
_opsgenie_url="https://api.opsgenie.com/v2/alerts" |
|||
;; |
|||
"EU") |
|||
_opsgenie_url="https://api.eu.opsgenie.com/v2/alerts" |
|||
;; |
|||
*) |
|||
_err "opsgenie region error." |
|||
return 1 |
|||
;; |
|||
esac |
|||
|
|||
case $_status_code in |
|||
0) |
|||
_priority=$OPSGENIE_PRIORITY_SUCCESS |
|||
;; |
|||
1) |
|||
_priority=$OPSGENIE_PRIORITY_ERROR |
|||
;; |
|||
2) |
|||
_priority=$OPSGENIE_PRIORITY_SKIP |
|||
;; |
|||
*) |
|||
_priority=$OPSGENIE_PRIORITY_ERROR |
|||
;; |
|||
esac |
|||
|
|||
_subject_json=$(echo "$_subject" | _json_encode) |
|||
_content_json=$(echo "$_content" | _json_encode) |
|||
_subject_underscore=$(echo "$_subject" | sed 's/ /_/g') |
|||
_alias_json=$(echo "acme.sh-$(hostname)-$_subject_underscore-$(date +%Y%m%d)" | base64 --wrap=0 | _json_encode) |
|||
|
|||
_data="{ |
|||
\"message\": \"$_subject_json\", |
|||
\"alias\": \"$_alias_json\", |
|||
\"description\": \"$_content_json\", |
|||
\"tags\": [ |
|||
\"acme.sh\", |
|||
\"host:$(hostname)\" |
|||
], |
|||
\"entity\": \"$(hostname -f)\", |
|||
\"priority\": \"$_priority\" |
|||
}" |
|||
|
|||
if response=$(_post "$_data" "$_opsgenie_url" "" "" "application/json"); then |
|||
if ! _contains "$response" error; then |
|||
_info "opsgenie send success." |
|||
return 0 |
|||
fi |
|||
fi |
|||
_err "opsgenie send error." |
|||
_err "$response" |
|||
return 1 |
|||
} |
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue