|
|
@ -833,6 +833,13 @@ _calcjwk() {
|
|
|
|
_usage "Usage: _calcjwk keyfile"
|
|
|
|
_usage "Usage: _calcjwk keyfile"
|
|
|
|
return 1
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if [ "$JWK_HEADER" ] && [ "$__CACHED_JWK_KEY_FILE" = "$keyfile" ] ; then
|
|
|
|
|
|
|
|
_debug2 "Use cached jwk for file: $__CACHED_JWK_KEY_FILE"
|
|
|
|
|
|
|
|
return 0
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
EC_SIGN=""
|
|
|
|
EC_SIGN=""
|
|
|
|
if grep "BEGIN RSA PRIVATE KEY" "$keyfile" > /dev/null 2>&1 ; then
|
|
|
|
if grep "BEGIN RSA PRIVATE KEY" "$keyfile" > /dev/null 2>&1 ; then
|
|
|
|
_debug "RSA key"
|
|
|
|
_debug "RSA key"
|
|
|
@ -851,9 +858,9 @@ _calcjwk() {
|
|
|
|
jwk='{"e": "'$e'", "kty": "RSA", "n": "'$n'"}'
|
|
|
|
jwk='{"e": "'$e'", "kty": "RSA", "n": "'$n'"}'
|
|
|
|
_debug3 jwk "$jwk"
|
|
|
|
_debug3 jwk "$jwk"
|
|
|
|
|
|
|
|
|
|
|
|
HEADER='{"alg": "RS256", "jwk": '$jwk'}'
|
|
|
|
JWK_HEADER='{"alg": "RS256", "jwk": '$jwk'}'
|
|
|
|
HEADERPLACE_PART1='{"nonce": "'
|
|
|
|
JWK_HEADERPLACE_PART1='{"nonce": "'
|
|
|
|
HEADERPLACE_PART2='", "alg": "RS256", "jwk": '$jwk'}'
|
|
|
|
JWK_HEADERPLACE_PART2='", "alg": "RS256", "jwk": '$jwk'}'
|
|
|
|
elif grep "BEGIN EC PRIVATE KEY" "$keyfile" > /dev/null 2>&1 ; then
|
|
|
|
elif grep "BEGIN EC PRIVATE KEY" "$keyfile" > /dev/null 2>&1 ; then
|
|
|
|
_debug "EC key"
|
|
|
|
_debug "EC key"
|
|
|
|
EC_SIGN="1"
|
|
|
|
EC_SIGN="1"
|
|
|
@ -892,15 +899,16 @@ _calcjwk() {
|
|
|
|
jwk='{"kty": "EC", "crv": "'$crv'", "x": "'$x64'", "y": "'$y64'"}'
|
|
|
|
jwk='{"kty": "EC", "crv": "'$crv'", "x": "'$x64'", "y": "'$y64'"}'
|
|
|
|
_debug3 jwk "$jwk"
|
|
|
|
_debug3 jwk "$jwk"
|
|
|
|
|
|
|
|
|
|
|
|
HEADER='{"alg": "ES256", "jwk": '$jwk'}'
|
|
|
|
JWK_HEADER='{"alg": "ES256", "jwk": '$jwk'}'
|
|
|
|
HEADERPLACE_PART1='{"nonce": "'
|
|
|
|
JWK_HEADERPLACE_PART1='{"nonce": "'
|
|
|
|
HEADERPLACE_PART2='", "alg": "ES256", "jwk": '$jwk'}'
|
|
|
|
JWK_HEADERPLACE_PART2='", "alg": "ES256", "jwk": '$jwk'}'
|
|
|
|
else
|
|
|
|
else
|
|
|
|
_err "Only RSA or EC key is supported."
|
|
|
|
_err "Only RSA or EC key is supported."
|
|
|
|
return 1
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
_debug3 HEADER "$HEADER"
|
|
|
|
_debug3 JWK_HEADER "$JWK_HEADER"
|
|
|
|
|
|
|
|
__CACHED_JWK_KEY_FILE="$keyfile"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
_time() {
|
|
|
|
_time() {
|
|
|
@ -929,35 +937,44 @@ _inithttp() {
|
|
|
|
HTTP_HEADER="$(_mktemp)"
|
|
|
|
HTTP_HEADER="$(_mktemp)"
|
|
|
|
_debug2 HTTP_HEADER "$HTTP_HEADER"
|
|
|
|
_debug2 HTTP_HEADER "$HTTP_HEADER"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if [ -z "$CURL" ] ; then
|
|
|
|
if [ "$__HTTP_INITIALIZED" ] ; then
|
|
|
|
CURL="curl -L --silent --dump-header $HTTP_HEADER "
|
|
|
|
if [ "$_ACME_CURL$_ACME_WGET" ] ; then
|
|
|
|
|
|
|
|
_debug2 "Http already initialized."
|
|
|
|
|
|
|
|
return 0
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if [ -z "$_ACME_CURL" ] && _exists "curl" ; then
|
|
|
|
|
|
|
|
_ACME_CURL="curl -L --silent --dump-header $HTTP_HEADER "
|
|
|
|
if [ "$DEBUG" ] && [ "$DEBUG" -ge "2" ] ; then
|
|
|
|
if [ "$DEBUG" ] && [ "$DEBUG" -ge "2" ] ; then
|
|
|
|
_CURL_DUMP="$(_mktemp)"
|
|
|
|
_CURL_DUMP="$(_mktemp)"
|
|
|
|
CURL="$CURL --trace-ascii $_CURL_DUMP "
|
|
|
|
_ACME_CURL="$_ACME_CURL --trace-ascii $_CURL_DUMP "
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if [ "$CA_BUNDLE" ] ; then
|
|
|
|
if [ "$CA_BUNDLE" ] ; then
|
|
|
|
CURL="$CURL --cacert $CA_BUNDLE "
|
|
|
|
_ACME_CURL="$_ACME_CURL --cacert $CA_BUNDLE "
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if [ "$HTTPS_INSECURE" ] ; then
|
|
|
|
if [ "$HTTPS_INSECURE" ] ; then
|
|
|
|
CURL="$CURL --insecure "
|
|
|
|
_ACME_CURL="$_ACME_CURL --insecure "
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if [ -z "$WGET" ] ; then
|
|
|
|
if [ -z "$_ACME_WGET" ] && _exists "wget"; then
|
|
|
|
WGET="wget -q"
|
|
|
|
_ACME_WGET="wget -q"
|
|
|
|
if [ "$DEBUG" ] && [ "$DEBUG" -ge "2" ] ; then
|
|
|
|
if [ "$DEBUG" ] && [ "$DEBUG" -ge "2" ] ; then
|
|
|
|
WGET="$WGET -d "
|
|
|
|
_ACME_WGET="$_ACME_WGET -d "
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if [ "$CA_BUNDLE" ] ; then
|
|
|
|
if [ "$CA_BUNDLE" ] ; then
|
|
|
|
WGET="$WGET --ca-certificate $CA_BUNDLE "
|
|
|
|
_ACME_WGET="$_ACME_WGET --ca-certificate $CA_BUNDLE "
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if [ "$HTTPS_INSECURE" ] ; then
|
|
|
|
if [ "$HTTPS_INSECURE" ] ; then
|
|
|
|
WGET="$WGET --no-check-certificate "
|
|
|
|
_ACME_WGET="$_ACME_WGET --no-check-certificate "
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
__HTTP_INITIALIZED=1
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
@ -978,8 +995,8 @@ _post() {
|
|
|
|
|
|
|
|
|
|
|
|
_inithttp
|
|
|
|
_inithttp
|
|
|
|
|
|
|
|
|
|
|
|
if _exists "curl" ; then
|
|
|
|
if [ "$_ACME_CURL" ] ; then
|
|
|
|
_CURL="$CURL"
|
|
|
|
_CURL="$_ACME_CURL"
|
|
|
|
_debug "_CURL" "$_CURL"
|
|
|
|
_debug "_CURL" "$_CURL"
|
|
|
|
if [ "$needbase64" ] ; then
|
|
|
|
if [ "$needbase64" ] ; then
|
|
|
|
response="$($_CURL --user-agent "$USER_AGENT" -X $httpmethod -H "$_H1" -H "$_H2" -H "$_H3" -H "$_H4" -H "$_H5" --data "$body" "$url" | _base64)"
|
|
|
|
response="$($_CURL --user-agent "$USER_AGENT" -X $httpmethod -H "$_H1" -H "$_H2" -H "$_H3" -H "$_H4" -H "$_H5" --data "$body" "$url" | _base64)"
|
|
|
@ -994,19 +1011,19 @@ _post() {
|
|
|
|
_err "$(cat "$_CURL_DUMP")"
|
|
|
|
_err "$(cat "$_CURL_DUMP")"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
elif _exists "wget" ; then
|
|
|
|
elif [ "$_ACME_WGET" ] ; then
|
|
|
|
_debug "WGET" "$WGET"
|
|
|
|
_debug "_ACME_WGET" "$_ACME_WGET"
|
|
|
|
if [ "$needbase64" ] ; then
|
|
|
|
if [ "$needbase64" ] ; then
|
|
|
|
if [ "$httpmethod" = "POST" ] ; then
|
|
|
|
if [ "$httpmethod" = "POST" ] ; then
|
|
|
|
response="$($WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --post-data="$body" "$url" 2>"$HTTP_HEADER" | _base64)"
|
|
|
|
response="$($_ACME_WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --post-data="$body" "$url" 2>"$HTTP_HEADER" | _base64)"
|
|
|
|
else
|
|
|
|
else
|
|
|
|
response="$($WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --method $httpmethod --body-data="$body" "$url" 2>"$HTTP_HEADER" | _base64)"
|
|
|
|
response="$($_ACME_WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --method $httpmethod --body-data="$body" "$url" 2>"$HTTP_HEADER" | _base64)"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
else
|
|
|
|
if [ "$httpmethod" = "POST" ] ; then
|
|
|
|
if [ "$httpmethod" = "POST" ] ; then
|
|
|
|
response="$($WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --post-data="$body" "$url" 2>"$HTTP_HEADER")"
|
|
|
|
response="$($_ACME_WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --post-data="$body" "$url" 2>"$HTTP_HEADER")"
|
|
|
|
else
|
|
|
|
else
|
|
|
|
response="$($WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --method $httpmethod --body-data="$body" "$url" 2>"$HTTP_HEADER")"
|
|
|
|
response="$($_ACME_WGET -S -O - --user-agent="$USER_AGENT" --header "$_H5" --header "$_H4" --header "$_H3" --header "$_H2" --header "$_H1" --method $httpmethod --body-data="$body" "$url" 2>"$HTTP_HEADER")"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
_ret="$?"
|
|
|
|
_ret="$?"
|
|
|
@ -1039,8 +1056,8 @@ _get() {
|
|
|
|
|
|
|
|
|
|
|
|
_inithttp
|
|
|
|
_inithttp
|
|
|
|
|
|
|
|
|
|
|
|
if _exists "curl" ; then
|
|
|
|
if [ "$_ACME_CURL" ] ; then
|
|
|
|
_CURL="$CURL"
|
|
|
|
_CURL="$_ACME_CURL"
|
|
|
|
if [ "$t" ] ; then
|
|
|
|
if [ "$t" ] ; then
|
|
|
|
_CURL="$_CURL --connect-timeout $t"
|
|
|
|
_CURL="$_CURL --connect-timeout $t"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
@ -1058,8 +1075,8 @@ _get() {
|
|
|
|
_err "$(cat "$_CURL_DUMP")"
|
|
|
|
_err "$(cat "$_CURL_DUMP")"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
elif _exists "wget" ; then
|
|
|
|
elif [ "$_ACME_WGET" ] ; then
|
|
|
|
_WGET="$WGET"
|
|
|
|
_WGET="$_ACME_WGET"
|
|
|
|
if [ "$t" ] ; then
|
|
|
|
if [ "$t" ] ; then
|
|
|
|
_WGET="$_WGET --timeout=$t"
|
|
|
|
_WGET="$_WGET --timeout=$t"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
@ -1115,21 +1132,26 @@ _send_signed_request() {
|
|
|
|
payload64=$(printf "%s" "$payload" | _base64 | _urlencode)
|
|
|
|
payload64=$(printf "%s" "$payload" | _base64 | _urlencode)
|
|
|
|
_debug3 payload64 $payload64
|
|
|
|
_debug3 payload64 $payload64
|
|
|
|
|
|
|
|
|
|
|
|
nonceurl="$API/directory"
|
|
|
|
if [ -z "$_CACHED_NONCE" ] ; then
|
|
|
|
_headers="$(_get $nonceurl "onlyheader")"
|
|
|
|
_debug2 "Get nonce."
|
|
|
|
|
|
|
|
nonceurl="$API/directory"
|
|
|
|
if [ "$?" != "0" ] ; then
|
|
|
|
_headers="$(_get $nonceurl "onlyheader")"
|
|
|
|
_err "Can not connect to $nonceurl to get nonce."
|
|
|
|
|
|
|
|
return 1
|
|
|
|
if [ "$?" != "0" ] ; then
|
|
|
|
|
|
|
|
_err "Can not connect to $nonceurl to get nonce."
|
|
|
|
|
|
|
|
return 1
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_debug3 _headers "$_headers"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_CACHED_NONCE="$( echo "$_headers" | grep "Replay-Nonce:" | _head_n 1 | tr -d "\r\n " | cut -d ':' -f 2)"
|
|
|
|
|
|
|
|
else
|
|
|
|
|
|
|
|
_debug2 "Use _CACHED_NONCE" "$_CACHED_NONCE"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
nonce="$_CACHED_NONCE"
|
|
|
|
_debug3 _headers "$_headers"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
nonce="$( echo "$_headers" | grep "Replay-Nonce:" | _head_n 1 | tr -d "\r\n " | cut -d ':' -f 2)"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_debug3 nonce "$nonce"
|
|
|
|
_debug3 nonce "$nonce"
|
|
|
|
|
|
|
|
|
|
|
|
protected="$HEADERPLACE_PART1$nonce$HEADERPLACE_PART2"
|
|
|
|
protected="$JWK_HEADERPLACE_PART1$nonce$JWK_HEADERPLACE_PART2"
|
|
|
|
_debug3 protected "$protected"
|
|
|
|
_debug3 protected "$protected"
|
|
|
|
|
|
|
|
|
|
|
|
protected64="$(printf "$protected" | _base64 | _urlencode)"
|
|
|
|
protected64="$(printf "$protected" | _base64 | _urlencode)"
|
|
|
@ -1138,11 +1160,12 @@ _send_signed_request() {
|
|
|
|
sig=$(printf "%s" "$protected64.$payload64" | _sign "$keyfile" "sha256" | _urlencode)
|
|
|
|
sig=$(printf "%s" "$protected64.$payload64" | _sign "$keyfile" "sha256" | _urlencode)
|
|
|
|
_debug3 sig "$sig"
|
|
|
|
_debug3 sig "$sig"
|
|
|
|
|
|
|
|
|
|
|
|
body="{\"header\": $HEADER, \"protected\": \"$protected64\", \"payload\": \"$payload64\", \"signature\": \"$sig\"}"
|
|
|
|
body="{\"header\": $JWK_HEADER, \"protected\": \"$protected64\", \"payload\": \"$payload64\", \"signature\": \"$sig\"}"
|
|
|
|
_debug3 body "$body"
|
|
|
|
_debug3 body "$body"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
response="$(_post "$body" $url "$needbase64")"
|
|
|
|
response="$(_post "$body" $url "$needbase64")"
|
|
|
|
|
|
|
|
_CACHED_NONCE=""
|
|
|
|
if [ "$?" != "0" ] ; then
|
|
|
|
if [ "$?" != "0" ] ; then
|
|
|
|
_err "Can not post to $url"
|
|
|
|
_err "Can not post to $url"
|
|
|
|
return 1
|
|
|
|
return 1
|
|
|
@ -1151,12 +1174,14 @@ _send_signed_request() {
|
|
|
|
|
|
|
|
|
|
|
|
response="$( echo "$response" | _normalizeJson )"
|
|
|
|
response="$( echo "$response" | _normalizeJson )"
|
|
|
|
|
|
|
|
|
|
|
|
responseHeaders="$(cat $HTTP_HEADER)"
|
|
|
|
responseHeaders="$(cat "$HTTP_HEADER")"
|
|
|
|
|
|
|
|
|
|
|
|
_debug2 responseHeaders "$responseHeaders"
|
|
|
|
_debug2 responseHeaders "$responseHeaders"
|
|
|
|
_debug2 response "$response"
|
|
|
|
_debug2 response "$response"
|
|
|
|
code="$(grep "^HTTP" $HTTP_HEADER | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n" )"
|
|
|
|
code="$(grep "^HTTP" $HTTP_HEADER | _tail_n 1 | cut -d " " -f 2 | tr -d "\r\n" )"
|
|
|
|
_debug code $code
|
|
|
|
_debug code $code
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
_CACHED_NONCE="$(echo "$responseHeaders" | grep "Replay-Nonce:" | _head_n 1 | tr -d "\r\n " | cut -d ':' -f 2)"
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
@ -1198,60 +1223,85 @@ _setopt() {
|
|
|
|
_debug2 "$(grep -n "^$__opt$__sep" $__conf)"
|
|
|
|
_debug2 "$(grep -n "^$__opt$__sep" $__conf)"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#_savedomainconf key value
|
|
|
|
|
|
|
|
#save to domain.conf
|
|
|
|
#_save_conf file key value
|
|
|
|
_savedomainconf() {
|
|
|
|
#save to conf
|
|
|
|
_sdkey="$1"
|
|
|
|
_save_conf() {
|
|
|
|
_sdvalue="$2"
|
|
|
|
_s_c_f="$1"
|
|
|
|
if [ "$DOMAIN_CONF" ] ; then
|
|
|
|
_sdkey="$2"
|
|
|
|
_setopt "$DOMAIN_CONF" "$_sdkey" "=" "\"$_sdvalue\""
|
|
|
|
_sdvalue="$3"
|
|
|
|
|
|
|
|
if [ "$_s_c_f" ] ; then
|
|
|
|
|
|
|
|
_setopt "$_s_c_f" "$_sdkey" "=" "'$_sdvalue'"
|
|
|
|
else
|
|
|
|
else
|
|
|
|
_err "DOMAIN_CONF is empty, can not save $_sdkey=$_sdvalue"
|
|
|
|
_err "config file is empty, can not save $_sdkey=$_sdvalue"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#_cleardomainconf key
|
|
|
|
#_clear_conf file key
|
|
|
|
_cleardomainconf() {
|
|
|
|
_clear_conf() {
|
|
|
|
_sdkey="$1"
|
|
|
|
_c_c_f="$1"
|
|
|
|
if [ "$DOMAIN_CONF" ] ; then
|
|
|
|
_sdkey="$2"
|
|
|
|
_sed_i "s/^$_sdkey.*$//" "$DOMAIN_CONF"
|
|
|
|
if [ "$_c_c_f" ] ; then
|
|
|
|
|
|
|
|
_sed_i "s/^$_sdkey.*$//" "$_c_c_f"
|
|
|
|
else
|
|
|
|
else
|
|
|
|
_err "DOMAIN_CONF is empty, can not save $_sdkey=$value"
|
|
|
|
_err "config file is empty, can not clear"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#_readdomainconf key
|
|
|
|
#_read_conf file key
|
|
|
|
_readdomainconf() {
|
|
|
|
_read_conf() {
|
|
|
|
_sdkey="$1"
|
|
|
|
_r_c_f="$1"
|
|
|
|
if [ "$DOMAIN_CONF" ] ; then
|
|
|
|
_sdkey="$2"
|
|
|
|
|
|
|
|
if [ -f "$_r_c_f" ] ; then
|
|
|
|
(
|
|
|
|
(
|
|
|
|
eval $(grep "^$_sdkey *=" "$DOMAIN_CONF")
|
|
|
|
eval $(grep "^$_sdkey *=" "$_r_c_f")
|
|
|
|
eval "printf \"%s\" \"\$$_sdkey\""
|
|
|
|
eval "printf \"%s\" \"\$$_sdkey\""
|
|
|
|
)
|
|
|
|
)
|
|
|
|
else
|
|
|
|
else
|
|
|
|
_err "DOMAIN_CONF is empty, can not read $_sdkey"
|
|
|
|
_err "config file is empty, can not read $_sdkey"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#_savedomainconf key value
|
|
|
|
|
|
|
|
#save to domain.conf
|
|
|
|
|
|
|
|
_savedomainconf() {
|
|
|
|
|
|
|
|
_save_conf "$DOMAIN_CONF" "$1" "$2"
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#_cleardomainconf key
|
|
|
|
|
|
|
|
_cleardomainconf() {
|
|
|
|
|
|
|
|
_clear_conf "$DOMAIN_CONF" "$1"
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#_readdomainconf key
|
|
|
|
|
|
|
|
_readdomainconf() {
|
|
|
|
|
|
|
|
_read_conf "$DOMAIN_CONF" "$1"
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#_saveaccountconf key value
|
|
|
|
#_saveaccountconf key value
|
|
|
|
_saveaccountconf() {
|
|
|
|
_saveaccountconf() {
|
|
|
|
_sckey="$1"
|
|
|
|
_save_conf "$ACCOUNT_CONF_PATH" "$1" "$2"
|
|
|
|
_scvalue="$2"
|
|
|
|
|
|
|
|
if [ "$ACCOUNT_CONF_PATH" ] ; then
|
|
|
|
|
|
|
|
_setopt "$ACCOUNT_CONF_PATH" "$_sckey" "=" "'$_scvalue'"
|
|
|
|
|
|
|
|
else
|
|
|
|
|
|
|
|
_err "ACCOUNT_CONF_PATH is empty, can not save $_sckey=$_scvalue"
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#_clearaccountconf key
|
|
|
|
#_clearaccountconf key
|
|
|
|
_clearaccountconf() {
|
|
|
|
_clearaccountconf() {
|
|
|
|
_scvalue="$1"
|
|
|
|
_clear_conf "$ACCOUNT_CONF_PATH" "$1"
|
|
|
|
if [ "$ACCOUNT_CONF_PATH" ] ; then
|
|
|
|
}
|
|
|
|
_sed_i "s/^$_scvalue.*$//" "$ACCOUNT_CONF_PATH"
|
|
|
|
|
|
|
|
else
|
|
|
|
#_savecaconf key value
|
|
|
|
_err "ACCOUNT_CONF_PATH is empty, can not clear $_scvalue"
|
|
|
|
_savecaconf() {
|
|
|
|
fi
|
|
|
|
_save_conf "$CA_CONF" "$1" "$2"
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#_readcaconf key
|
|
|
|
|
|
|
|
_readcaconf() {
|
|
|
|
|
|
|
|
_read_conf "$CA_CONF" "$1"
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#_clearaccountconf key
|
|
|
|
|
|
|
|
_clearcaconf() {
|
|
|
|
|
|
|
|
_clear_conf "$CA_CONF" "$1"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# content localaddress
|
|
|
|
# content localaddress
|
|
|
@ -2022,6 +2072,10 @@ registeraccount() {
|
|
|
|
_regAccount
|
|
|
|
_regAccount
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
__calcAccountKeyHash() {
|
|
|
|
|
|
|
|
cat "$ACCOUNT_KEY_PATH" | _digest sha256
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
_regAccount() {
|
|
|
|
_regAccount() {
|
|
|
|
_initpath
|
|
|
|
_initpath
|
|
|
|
|
|
|
|
|
|
|
@ -2055,8 +2109,6 @@ _regAccount() {
|
|
|
|
while true ;
|
|
|
|
while true ;
|
|
|
|
do
|
|
|
|
do
|
|
|
|
_debug AGREEMENT "$AGREEMENT"
|
|
|
|
_debug AGREEMENT "$AGREEMENT"
|
|
|
|
accountkey_json=$(printf "%s" "$jwk" | tr -d ' ' )
|
|
|
|
|
|
|
|
thumbprint=$(printf "%s" "$accountkey_json" | _digest "sha256" | _urlencode)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
regjson='{"resource": "'$_reg_res'", "agreement": "'$AGREEMENT'"}'
|
|
|
|
regjson='{"resource": "'$_reg_res'", "agreement": "'$AGREEMENT'"}'
|
|
|
|
|
|
|
|
|
|
|
@ -2106,6 +2158,10 @@ _regAccount() {
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if [ "$code" = '202' ] ; then
|
|
|
|
if [ "$code" = '202' ] ; then
|
|
|
|
_info "Update success."
|
|
|
|
_info "Update success."
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CA_KEY_HASH="$(__calcAccountKeyHash)"
|
|
|
|
|
|
|
|
_debug "Calc CA_KEY_HASH" "$CA_KEY_HASH"
|
|
|
|
|
|
|
|
_savecaconf CA_KEY_HASH "$CA_KEY_HASH"
|
|
|
|
else
|
|
|
|
else
|
|
|
|
_err "Update account error."
|
|
|
|
_err "Update account error."
|
|
|
|
return 1
|
|
|
|
return 1
|
|
|
@ -2255,11 +2311,15 @@ issue() {
|
|
|
|
return 1
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if ! _regAccount ; then
|
|
|
|
_saved_account_key_hash="$(_readcaconf "CA_KEY_HASH")"
|
|
|
|
_on_issue_err
|
|
|
|
_debug2 _saved_account_key_hash "$_saved_account_key_hash"
|
|
|
|
return 1
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if [ -z "$_saved_account_key_hash" ] || [ "$_saved_account_key_hash" != "$(__calcAccountKeyHash)" ] ; then
|
|
|
|
|
|
|
|
if ! _regAccount ; then
|
|
|
|
|
|
|
|
_on_issue_err
|
|
|
|
|
|
|
|
return 1
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
if [ -f "$CSR_PATH" ] && [ ! -f "$CERT_KEY_PATH" ] ; then
|
|
|
|
if [ -f "$CSR_PATH" ] && [ ! -f "$CERT_KEY_PATH" ] ; then
|
|
|
|
_info "Signing from existing CSR."
|
|
|
|
_info "Signing from existing CSR."
|
|
|
@ -2286,8 +2346,8 @@ issue() {
|
|
|
|
_savedomainconf "Le_Keylength" "$Le_Keylength"
|
|
|
|
_savedomainconf "Le_Keylength" "$Le_Keylength"
|
|
|
|
|
|
|
|
|
|
|
|
vlist="$Le_Vlist"
|
|
|
|
vlist="$Le_Vlist"
|
|
|
|
# verify each domain
|
|
|
|
|
|
|
|
_info "Verify each domain"
|
|
|
|
_info "Getting domain auth token for each domain"
|
|
|
|
sep='#'
|
|
|
|
sep='#'
|
|
|
|
if [ -z "$vlist" ] ; then
|
|
|
|
if [ -z "$vlist" ] ; then
|
|
|
|
alldomains=$(echo "$Le_Domain,$Le_Alt" | tr ',' ' ' )
|
|
|
|
alldomains=$(echo "$Le_Domain,$Le_Alt" | tr ',' ' ' )
|
|
|
@ -2318,7 +2378,12 @@ issue() {
|
|
|
|
_on_issue_err
|
|
|
|
_on_issue_err
|
|
|
|
return 1
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if [ -z "$thumbprint" ] ; then
|
|
|
|
|
|
|
|
accountkey_json=$(printf "%s" "$jwk" | tr -d ' ' )
|
|
|
|
|
|
|
|
thumbprint=$(printf "%s" "$accountkey_json" | _digest "sha256" | _urlencode)
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
entry="$(printf "%s\n" "$response" | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')"
|
|
|
|
entry="$(printf "%s\n" "$response" | _egrep_o '[^\{]*"type":"'$vtype'"[^\}]*')"
|
|
|
|
_debug entry "$entry"
|
|
|
|
_debug entry "$entry"
|
|
|
|
if [ -z "$entry" ] ; then
|
|
|
|
if [ -z "$entry" ] ; then
|
|
|
@ -2332,7 +2397,7 @@ issue() {
|
|
|
|
|
|
|
|
|
|
|
|
uri="$(printf "%s\n" "$entry" | _egrep_o '"uri":"[^"]*'| cut -d : -f 2,3 | tr -d '"' )"
|
|
|
|
uri="$(printf "%s\n" "$entry" | _egrep_o '"uri":"[^"]*'| cut -d : -f 2,3 | tr -d '"' )"
|
|
|
|
_debug uri $uri
|
|
|
|
_debug uri $uri
|
|
|
|
|
|
|
|
|
|
|
|
keyauthorization="$token.$thumbprint"
|
|
|
|
keyauthorization="$token.$thumbprint"
|
|
|
|
_debug keyauthorization "$keyauthorization"
|
|
|
|
_debug keyauthorization "$keyauthorization"
|
|
|
|
|
|
|
|
|
|
|
@ -3194,19 +3259,23 @@ revoke() {
|
|
|
|
data="{\"resource\": \"revoke-cert\", \"certificate\": \"$cert\"}"
|
|
|
|
data="{\"resource\": \"revoke-cert\", \"certificate\": \"$cert\"}"
|
|
|
|
uri="$API/acme/revoke-cert"
|
|
|
|
uri="$API/acme/revoke-cert"
|
|
|
|
|
|
|
|
|
|
|
|
_info "Try domain key first."
|
|
|
|
if [ -f "$CERT_KEY_PATH" ] ; then
|
|
|
|
if _send_signed_request $uri "$data" "" "$CERT_KEY_PATH"; then
|
|
|
|
_info "Try domain key first."
|
|
|
|
if [ -z "$response" ] ; then
|
|
|
|
if _send_signed_request $uri "$data" "" "$CERT_KEY_PATH"; then
|
|
|
|
_info "Revoke success."
|
|
|
|
if [ -z "$response" ] ; then
|
|
|
|
rm -f $CERT_PATH
|
|
|
|
_info "Revoke success."
|
|
|
|
return 0
|
|
|
|
rm -f $CERT_PATH
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
_err "Revoke error by domain key."
|
|
|
|
else
|
|
|
|
_err "$response"
|
|
|
|
_err "Revoke error by domain key."
|
|
|
|
|
|
|
|
_err "$response"
|
|
|
|
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
else
|
|
|
|
|
|
|
|
_info "Domain key file doesn't exists."
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
_info "Then try account key."
|
|
|
|
_info "Try account key."
|
|
|
|
|
|
|
|
|
|
|
|
if _send_signed_request $uri "$data" "" "$ACCOUNT_KEY_PATH" ; then
|
|
|
|
if _send_signed_request $uri "$data" "" "$ACCOUNT_KEY_PATH" ; then
|
|
|
|
if [ -z "$response" ] ; then
|
|
|
|
if [ -z "$response" ] ; then
|
|
|
|