You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
358 lines
14 KiB
358 lines
14 KiB
#!/bin/bash
|
|
|
|
# vim: tabstop=4 shiftwidth=4 softtabstop=4 expandtab:
|
|
|
|
|
|
# See:
|
|
# https://developer.rackspace.com/docs/cloud-dns/v1/api-reference/
|
|
|
|
# Rackspace API authentication:
|
|
# Create file .rackspace.auth with your Rackspace API user credentials.
|
|
# The API user needs permission: DNS, Creator (View, Create, Edit) for adding to work.
|
|
# For deletion to work: DNS, Admin (View, Create, Edit, Delete) is needed.
|
|
# Example of a .rackspace.auth file:
|
|
# { "user": "my rackspace user", "key": "my rackspace API key" }
|
|
|
|
# Example usage:
|
|
# ./acme.sh --keylength 4096 --issue -d "example.com" --dns dns_rackspace --dnssleep 10
|
|
|
|
|
|
######## Public functions #####################
|
|
|
|
RACKSPACE_DOMAIN=0
|
|
RACKSPACE_DOMAIN_ID=0
|
|
RACKSPACE_RETRY=0
|
|
|
|
#Usage: dns_add _acme-challenge.www.domain.com "XKrxp6q0HG9i01zxXp5CPBs"
|
|
dns_rackspace_add() {
|
|
local fulldomain=$1
|
|
local txtvalue=$2
|
|
_info "Using Rackspace Cloud DNS API to add challenge into $fulldomain"
|
|
_debug fulldomain "$fulldomain"
|
|
_debug txtvalue "$txtvalue"
|
|
|
|
_rackspace_sanity
|
|
_rackspace_authenticate
|
|
|
|
# At this point, there is an authenticated session token that we can use.
|
|
local token_file=/tmp/.acme.rackspace.$EUID.token
|
|
local token=$(jq -r ".access.token.id" "$token_file")
|
|
local api_url=$(jq -r ".access.serviceCatalog[0].endpoints[0].publicURL" "$token_file")
|
|
local json_data
|
|
|
|
# Try to find a domain from Rackspace that will have the new TXT-record.
|
|
# Start by stripping the hard-coded word "_acme-challenge." from the FQDN.
|
|
# Remainin record is a potential domain name in Rackspace.
|
|
if [[ ! "$fulldomain" =~ ^_acme-challenge\.(.+)$ ]]; then
|
|
_err "Failed to extract domain name from $fulldomain. Fatal error, cannot continue."
|
|
exit 1
|
|
fi
|
|
|
|
_rackspace_get_domain "${BASH_REMATCH[1]}" "$api_url"
|
|
if [ $? -gt 0 ]; then
|
|
# If the internal operation fails, an error will be emitted in the _rackspace_get_domain().
|
|
# Ultimately, there is no way this operation can continue.
|
|
exit 1
|
|
fi
|
|
|
|
local text_rr=${fulldomain%.$RACKSPACE_DOMAIN}
|
|
if [ "$fulldomain" == "$text_rr" ]; then
|
|
_err "Found domain $RACKSPACE_DOMAIN for $fulldomain, but failed to create a RR for it. Fatal error, cannot continue."
|
|
exit 1
|
|
fi
|
|
_info "Using domain $RACKSPACE_DOMAIN on Rackspace Cloud DNS. Adding $text_rr."
|
|
|
|
# Add a record
|
|
read -r -d '' json_data <<END_OF_JSON
|
|
{
|
|
"records" : [{
|
|
"name" : "$fulldomain",
|
|
"type" : "TXT",
|
|
"data" : "$txtvalue"
|
|
}]
|
|
}
|
|
END_OF_JSON
|
|
|
|
_debug "Rackspace API URL to use for adding: $api_url/domains/$RACKSPACE_DOMAIN_ID/records"
|
|
|
|
json_data=$(curl --silent -X POST --data "$json_data" -H "X-Auth-Token: $token" -H "Content-Type: application/json" -H "Accept: application/json" "$api_url/domains/$RACKSPACE_DOMAIN_ID/records")
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to add record to Rackspace Cloud DNS. Fatal error, cannot continue."
|
|
exit 1
|
|
fi
|
|
|
|
local status=$(echo "$json_data" | jq -r '.status')
|
|
if [ -z "$status" ] || [ "$status" == "null" ]; then
|
|
local code=$(echo "$json_data" | jq -r '."error-message"')
|
|
if [ -n "$code" ] && [ "$code" != "null" ]; then
|
|
_err "Failed to add record to Rackspace Cloud DNS. No permission to add! Fatal error: $code"
|
|
else
|
|
code=$(echo "$json_data" | jq -r .code)
|
|
_err "Failed to add record to Rackspace Cloud DNS. Status: HTTP/$code"
|
|
fi
|
|
exit 1
|
|
fi
|
|
if [ "$status" == "RUNNING" ]; then
|
|
local callback_url=$(echo "$json_data" | jq -r '.callbackUrl')
|
|
if [ -z "$callback_url" ]; then
|
|
_err "Attempt to add record to Rackspace Cloud DNS most likely failed. There is no callback URL to query the operation status from."
|
|
return 1
|
|
fi
|
|
while [ "$status" == "RUNNING" ]; do
|
|
sleep 2
|
|
json_data=$(curl --silent -H "X-Auth-Token: $token" "$callback_url")
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to query DNS add status from $callback_url"
|
|
return 1
|
|
fi
|
|
status=$(echo "$json_data" | jq -r '.status')
|
|
done
|
|
|
|
if [ "$status" == "ERROR" ]; then
|
|
_err "Failed to add record to Rackspace Cloud DNS, add status is: $status."
|
|
# See, if the add failed because the record already exists.
|
|
json_data=$(curl --silent -H "X-Auth-Token: $token" -H "Accept: application/json" "$api_url/domains/$RACKSPACE_DOMAIN_ID/records?type=TXT&name=$fulldomain")
|
|
if [ $? == 0 ] && [ -n "$json_data" ] && [ $RACKSPACE_RETRY == 0 ] ; then
|
|
# We have something ...
|
|
local record_id=$(echo "$json_data" | jq -r '.records[0].id')
|
|
if [ -n "$record_id" ] || [ "$record_id" != "null" ]; then
|
|
# Attempt to delete the record
|
|
_info "Found existing record! Deleting record $record_id on domain $RACKSPACE_DOMAIN."
|
|
json_data=$(curl --silent -X DELETE -H "X-Auth-Token: $token" -H "Accept: application/json" "$api_url/domains/$RACKSPACE_DOMAIN_ID/records/$record_id")
|
|
local status=$(echo "$json_data" | jq -r '.status')
|
|
if [ "$status" == "RUNNING" ]; then
|
|
_info "Succesfully deleted the record. Retrying ..."
|
|
RACKSPACE_RETRY=1
|
|
sleep 3
|
|
|
|
# Call myself with same arguments.
|
|
dns_rackspace_add "$1" "$2"
|
|
return $?
|
|
else
|
|
_err "Failed to delete the record. Nothing else to try."
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
# end if $status = ERROR
|
|
fi
|
|
fi
|
|
if [ "$status" != "COMPLETED" ]; then
|
|
_err "Failed to add record to Rackspace Cloud DNS, add status is: $status."
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
#Usage: fulldomain txtvalue
|
|
#Remove the txt record after validation.
|
|
dns_rackspace_rm() {
|
|
local fulldomain=$1
|
|
local txtvalue=$2
|
|
_info "Using Rackspace Cloud DNS API to remove challenge $fulldomain"
|
|
_debug fulldomain "$fulldomain"
|
|
_debug txtvalue "$txtvalue"
|
|
|
|
_rackspace_sanity
|
|
_rackspace_authenticate
|
|
|
|
# At this point, there is an authenticated session token that we can use.
|
|
local token_file=/tmp/.acme.rackspace.$EUID.token
|
|
local token=$(jq -r ".access.token.id" "$token_file")
|
|
local api_url=$(jq -r ".access.serviceCatalog[0].endpoints[0].publicURL" "$token_file")
|
|
local json_data
|
|
|
|
# Try to find a domain from Rackspace that will have an existing TXT-record.
|
|
if [[ ! "$fulldomain" =~ ^_acme-challenge\.(.+)$ ]]; then
|
|
_err "Failed to extract domain name from $fulldomain."
|
|
return 1
|
|
fi
|
|
|
|
_rackspace_get_domain "${BASH_REMATCH[1]}" "$api_url"
|
|
if [ $? -gt 0 ]; then
|
|
# If the internal operation fails, an error will be emitted in the _rackspace_get_domain().
|
|
return 1
|
|
fi
|
|
|
|
local text_rr=${fulldomain%.$RACKSPACE_DOMAIN}
|
|
_info "Using domain $RACKSPACE_DOMAIN on Rackspace Cloud DNS. Trying to find and remove $text_rr."
|
|
|
|
_debug "Rackspace API URL to use for searching: $api_url/domains/$RACKSPACE_DOMAIN_ID/records"
|
|
|
|
# Go search for TXT-records
|
|
json_data=$(curl --silent -H "X-Auth-Token: $token" -H "Accept: application/json" "$api_url/domains/$RACKSPACE_DOMAIN_ID/records?type=TXT&name=$fulldomain")
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to search for TXT-record $fulldomain on Rackspace Cloud DNS."
|
|
return 1
|
|
fi
|
|
|
|
local record_id=$(echo "$json_data" | jq -r '.records[0].id')
|
|
if [ -z "$record_id" ] || [ "$record_id" == "null" ]; then
|
|
_err "TXT-record $fulldomain was not found. Nothing to delete."
|
|
return 1
|
|
fi
|
|
|
|
_info "Deleting record $record_id on domain $RACKSPACE_DOMAIN."
|
|
json_data=$(curl --silent -X DELETE -H "X-Auth-Token: $token" -H "Accept: application/json" "$api_url/domains/$RACKSPACE_DOMAIN_ID/records/$record_id")
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to delete record to Rackspace Cloud DNS. API-call failed."
|
|
return 1
|
|
fi
|
|
|
|
local status=$(echo "$json_data" | jq -r '.status')
|
|
if [ -z "$status" ] || [ "$status" == "null" ]; then
|
|
status=$(echo "$json_data" | jq -r '."error-message"')
|
|
if [ -n "$status" ] && [ "$status" != "null" ]; then
|
|
_err "Failed to delete record to Rackspace Cloud DNS. No permission to delete! Error: $status"
|
|
else
|
|
_err "Failed to delete record to Rackspace Cloud DNS. Unknown reason."
|
|
fi
|
|
return 1
|
|
fi
|
|
if [ "$status" != "RUNNING" ]; then
|
|
_err "Failed to delete record to Rackspace Cloud DNS."
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
#################### Private functions below ##################################
|
|
|
|
|
|
_rackspace_sanity() {
|
|
local needed=('curl' 'jq')
|
|
local cmd
|
|
|
|
for cmd in "${needed[@]}"; do
|
|
which "$cmd" >& /dev/null
|
|
if [ $? -gt 0 ]; then
|
|
_err "Rackspace Cloud DNS API needs command: $cmd"
|
|
exit 1
|
|
fi
|
|
done
|
|
}
|
|
|
|
_rackspace_get_domain() {
|
|
local domain_to_use="$1"
|
|
local api_url="$2"
|
|
local domain_to_check
|
|
|
|
# Get list of all domains this API user can manage.
|
|
local json_data=$(curl --silent -H "X-Auth-Token: $token" -H "Accept: application/json" "$api_url/domains")
|
|
if [ $? -gt 0 ] || [ -z "$json_data" ]; then
|
|
_err "Failed to retrieve domain list from Rackspace Cloud DNS API. Fatal error, cannot continue."
|
|
return 1
|
|
fi
|
|
local status=$(echo "$json_data" | jq -r '."error-message"')
|
|
if [ -n "$status" ] && [ "$status" != "null" ]; then
|
|
_err "Configured user has no permission to retrieve domain list from Rackspace Cloud DNS API. Fatal error, cannot continue."
|
|
return 1
|
|
fi
|
|
|
|
# Iterate the domain list reverse-sorted. That will do a longest match comparison if there are
|
|
# subdomain used for the request, but will also match a shorter domain.
|
|
local matching_domain_idx hostmaster_email
|
|
while [ -z "$matching_domain_idx" ] && [[ $domain_to_use =~ \..+$ ]]; do
|
|
local domain_idx=0
|
|
while [ "$domain_to_check" != "null" ]; do
|
|
domain_to_check=$(echo "$json_data" | jq -r '.domains|sort_by(.name)|reverse|.['$domain_idx'].name')
|
|
if [ "$domain_to_use" == "$domain_to_check" ]; then
|
|
matching_domain_idx=$domain_idx
|
|
hostmaster_email=$(echo "$json_data" | jq -r '.domains|sort_by(.name)|reverse|.['$domain_idx'].emailAddress')
|
|
RACKSPACE_DOMAIN="$domain_to_use"
|
|
RACKSPACE_DOMAIN_ID=$(echo "$json_data" | jq -r '.domains|sort_by(.name)|reverse|.['$domain_idx'].id')
|
|
break
|
|
fi
|
|
domain_idx=$(( domain_idx+1 ))
|
|
done
|
|
if [ -z "$matching_domain_idx" ]; then
|
|
# Eat out one level from the domain, if nothing found
|
|
domain_to_use=${domain_to_use#*.}
|
|
domain_to_check=''
|
|
fi
|
|
done
|
|
if [ -z "$matching_domain_idx" ]; then
|
|
_err "Failed to find the domain for $fulldomain to add a record. Fatal error, cannot continue."
|
|
return 1
|
|
fi
|
|
if [ -z "$RACKSPACE_DOMAIN_ID" ] || [ "$RACKSPACE_DOMAIN_ID" == "null" ]; then
|
|
_err "Failed to get domain ID for domain $domain_to_use. Fatal error, cannot add record."
|
|
return 1
|
|
fi
|
|
|
|
return 0
|
|
}
|
|
|
|
_rackspace_authenticate() {
|
|
local token_file=/tmp/.acme.rackspace.$EUID.token
|
|
|
|
if [ ! -e "$token_file" ]; then
|
|
_rackspace_get_token
|
|
fi
|
|
|
|
local token=$(jq -r --exit-status .access.token.id "$token_file")
|
|
if [ $? -gt 0 ]; then
|
|
_rackspace_get_token
|
|
token=$(jq -r --exit-status .access.token.id "$token_file")
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to read access token from $token_file"
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
curl --silent -H "X-Auth-Token: $token" "https://identity.api.rackspacecloud.com/v2.0/tokens/$token" | jq --exit-status .access.token.tenant > /dev/null
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to verify access token from $token_file"
|
|
exit 1
|
|
fi
|
|
}
|
|
|
|
_rackspace_get_token() {
|
|
local token_file=/tmp/.acme.rackspace.$EUID.token
|
|
local creds_file user key
|
|
local auth_json stat umask code
|
|
|
|
creds_file="$_SCRIPT_HOME/.rackspace.auth"
|
|
if [ ! -e "$creds_file" ]; then
|
|
creds_file="$LE_WORKING_DIR/.rackspace.auth"
|
|
if [ ! -e "$creds_file" ]; then
|
|
_err "Rackspace Cloud DNS API needs credentials in .rackspace.auth file in $_SCRIPT_HOME/ or $LE_WORKING_DIR/"
|
|
exit 1
|
|
fi
|
|
fi
|
|
|
|
user=$(jq -r .user "$creds_file")
|
|
key=$(jq -r .key "$creds_file")
|
|
if [ -z "$user" ] || [ -z "$key" ]; then
|
|
_err "Failed to read Rackspace Cloud DNS API credentials from $creds_file"
|
|
exit 1
|
|
fi
|
|
|
|
umask=$(umask)
|
|
umask 0077
|
|
auth_json="{\"auth\":{\"RAX-KSKEY:apiKeyCredentials\":{\"username\":\"$user\",\"apiKey\":\"$key\"}}}"
|
|
curl --silent https://identity.api.rackspacecloud.com/v2.0/tokens -X POST -d "$auth_json" -H "Content-type: application/json" > $token_file
|
|
stat=$?
|
|
umask $umask
|
|
if [ $stat -gt 0 ]; then
|
|
_err "Failed to make an authentication request into Rackspace Cloud DNS API"
|
|
exit 1
|
|
fi
|
|
jq . $token_file > /dev/null
|
|
if [ $? -gt 0 ]; then
|
|
_err "Failed to retrieve authentication JSON from Rackspace Cloud DNS API"
|
|
exit 1
|
|
fi
|
|
|
|
code=$(jq -r --exit-status .access.token.tenant "$token_file")
|
|
stat=$?
|
|
if [ $stat -gt 0 ]; then
|
|
code=$(jq -r .unauthorized.code "$token_file")
|
|
_err "Failed to authenticate into Rackspace Cloud DNS API ($stat). Status: HTTP/$code"
|
|
rm -f "$token_file"
|
|
exit 1
|
|
fi
|
|
}
|
|
|