@ -71,6 +71,8 @@ DEBUG_LEVEL_3=3
DEBUG_LEVEL_DEFAULT = $DEBUG_LEVEL_1
DEBUG_LEVEL_NONE = 0
HIDDEN_VALUE = "[hidden](please add '--output-insecure' to see this value)"
SYSLOG_ERROR = "user.error"
SYSLOG_INFO = "user.info"
SYSLOG_DEBUG = "user.debug"
@ -212,6 +214,27 @@ _debug() {
fi
}
#output the sensitive messages
_secure_debug( ) {
if [ " ${ LOG_LEVEL :- $DEFAULT_LOG_LEVEL } " -ge " $LOG_LEVEL_1 " ] ; then
if [ " $OUTPUT_INSECURE " = "1" ] ; then
_log " $@ "
else
_log " $1 " " $HIDDEN_VALUE "
fi
fi
if [ " ${ SYS_LOG :- $SYSLOG_LEVEL_NONE } " -ge " $SYSLOG_LEVEL_DEBUG " ] ; then
_syslog " $SYSLOG_DEBUG " " $1 " " $HIDDEN_VALUE "
fi
if [ " ${ DEBUG :- $DEBUG_LEVEL_NONE } " -ge " $DEBUG_LEVEL_1 " ] ; then
if [ " $OUTPUT_INSECURE " = "1" ] ; then
_printargs " $@ " >& 2
else
_printargs " $1 " " $HIDDEN_VALUE " >& 2
fi
fi
}
_debug2( ) {
if [ " ${ LOG_LEVEL :- $DEFAULT_LOG_LEVEL } " -ge " $LOG_LEVEL_2 " ] ; then
_log " $@ "
@ -224,6 +247,26 @@ _debug2() {
fi
}
_secure_debug2( ) {
if [ " ${ LOG_LEVEL :- $DEFAULT_LOG_LEVEL } " -ge " $LOG_LEVEL_2 " ] ; then
if [ " $OUTPUT_INSECURE " = "1" ] ; then
_log " $@ "
else
_log " $1 " " $HIDDEN_VALUE "
fi
fi
if [ " ${ SYS_LOG :- $SYSLOG_LEVEL_NONE } " -ge " $SYSLOG_LEVEL_DEBUG_2 " ] ; then
_syslog " $SYSLOG_DEBUG " " $1 " " $HIDDEN_VALUE "
fi
if [ " ${ DEBUG :- $DEBUG_LEVEL_NONE } " -ge " $DEBUG_LEVEL_2 " ] ; then
if [ " $OUTPUT_INSECURE " = "1" ] ; then
_printargs " $@ " >& 2
else
_printargs " $1 " " $HIDDEN_VALUE " >& 2
fi
fi
}
_debug3( ) {
if [ " ${ LOG_LEVEL :- $DEFAULT_LOG_LEVEL } " -ge " $LOG_LEVEL_3 " ] ; then
_log " $@ "
@ -236,6 +279,26 @@ _debug3() {
fi
}
_secure_debug3( ) {
if [ " ${ LOG_LEVEL :- $DEFAULT_LOG_LEVEL } " -ge " $LOG_LEVEL_3 " ] ; then
if [ " $OUTPUT_INSECURE " = "1" ] ; then
_log " $@ "
else
_log " $1 " " $HIDDEN_VALUE "
fi
fi
if [ " ${ SYS_LOG :- $SYSLOG_LEVEL_NONE } " -ge " $SYSLOG_LEVEL_DEBUG_3 " ] ; then
_syslog " $SYSLOG_DEBUG " " $1 " " $HIDDEN_VALUE "
fi
if [ " ${ DEBUG :- $DEBUG_LEVEL_NONE } " -ge " $DEBUG_LEVEL_3 " ] ; then
if [ " $OUTPUT_INSECURE " = "1" ] ; then
_printargs " $@ " >& 2
else
_printargs " $1 " " $HIDDEN_VALUE " >& 2
fi
fi
}
_startswith( ) {
_str = " $1 "
_sub = " $2 "
@ -1025,7 +1088,7 @@ _readKeyLengthFromCSR() {
echo " $_outcsr " | _egrep_o "^ *ASN1 OID:.*" | cut -d ':' -f 2 | tr -d ' '
else
_debug "RSA CSR"
echo " $_outcsr " | _egrep_o "^ *Public.Key:.*" | cut -d '(' -f 2 | cut -d ' ' -f 1
echo " $_outcsr " | _egrep_o "( ^ *|^RSA ) Public.Key:.*" | cut -d '(' -f 2 | cut -d ' ' -f 1
fi
}
@ -1667,7 +1730,7 @@ _setopt() {
_debug3 APP
echo " $__opt $__sep $__val $__end " >>" $__conf "
fi
_debug2 " $( grep -n " ^ $__opt $__sep " " $__conf " ) "
_debug3 " $( grep -n " ^ $__opt $__sep " " $__conf " ) "
}
#_save_conf file key value
@ -2644,34 +2707,39 @@ _clearupwebbroot() {
}
_on_before_issue( ) {
_chk_web_roots = " $1 "
_chk_main_domain = " $2 "
_chk_alt_domains = " $3 "
_chk_pre_hook = " $4 "
_chk_local_addr = " $5 "
_debug _on_before_issue
#run pre hook
if [ " $Le_PreHook " ] ; then
_info " Run pre hook:' $Le_PreHook ' "
if [ " $_chk_pre_h ook " ] ; then
_info " Run pre hook:' $_chk_pre_h ook ' "
if ! (
cd " $DOMAIN_PATH " && eval " $Le_PreH ook "
cd " $DOMAIN_PATH " && eval " $_chk_pre_h ook "
) ; then
_err "Error when run pre hook."
return 1
fi
fi
if _hasfield " $Le_Webroot " " $NO_VALUE " ; then
if _hasfield " $_chk_web_roots " " $NO_VALUE " ; then
if ! _exists "nc" ; then
_err "Please install netcat(nc) tools first."
return 1
fi
fi
_debug Le_LocalAddress " $Le_LocalAddress "
_debug Le_LocalAddress " $_chk_local_addr "
alldomains = $( echo " $Le_Domain , $Le_Alt " | tr ',' ' ' )
alldomains = $( echo " $_chk_main_domain , $_chk_alt_domains " | tr ',' ' ' )
_index = 1
_currentRoot = ""
_addrIndex = 1
for d in $alldomains ; do
_debug "Check for domain" " $d "
_currentRoot = " $( _getfield " $Le_Webroot " $_index ) "
_currentRoot = " $( _getfield " $_chk_web_roots " $_index ) "
_debug "_currentRoot" " $_currentRoot "
_index = $( _math $_index + 1)
_checkport = ""
@ -2695,7 +2763,7 @@ _on_before_issue() {
if [ " $_checkport " ] ; then
_debug _checkport " $_checkport "
_checkaddr = " $( _getfield " $Le_LocalAddress " $_addrIndex ) "
_checkaddr = " $( _getfield " $_chk_local_addr " $_addrIndex ) "
_debug _checkaddr " $_checkaddr "
_addrIndex = " $( _math $_addrIndex + 1) "
@ -2714,7 +2782,7 @@ _on_before_issue() {
fi
done
if _hasfield " $Le_Webroot " "apache" ; then
if _hasfield " $_chk_web_roots " "apache" ; then
if ! _setApache; then
_err "set up apache error. Report error to me."
return 1
@ -2726,6 +2794,7 @@ _on_before_issue() {
}
_on_issue_err( ) {
_chk_post_hook = " $1 "
_debug _on_issue_err
if [ " $LOG_FILE " ] ; then
_err " Please check log file for more details: $LOG_FILE "
@ -2739,10 +2808,10 @@ _on_issue_err() {
fi
#run the post hook
if [ " $Le_PostH ook " ] ; then
_info " Run post hook:' $Le_PostH ook ' "
if [ " $_chk_post_h ook " ] ; then
_info " Run post hook:' $_chk_post_h ook ' "
if ! (
cd " $DOMAIN_PATH " && eval " $Le_PostH ook "
cd " $DOMAIN_PATH " && eval " $_chk_post_h ook "
) ; then
_err "Error when run post hook."
return 1
@ -2751,12 +2820,14 @@ _on_issue_err() {
}
_on_issue_success( ) {
_chk_post_hook = " $1 "
_chk_renew_hook = " $2 "
_debug _on_issue_success
#run the post hook
if [ " $Le_PostH ook " ] ; then
_info " Run post hook:' $Le_PostH ook ' "
if [ " $_chk_post_h ook " ] ; then
_info " Run post hook:' $_chk_post_h ook ' "
if ! (
cd " $DOMAIN_PATH " && eval " $Le_PostH ook "
cd " $DOMAIN_PATH " && eval " $_chk_post_h ook "
) ; then
_err "Error when run post hook."
return 1
@ -2764,10 +2835,10 @@ _on_issue_success() {
fi
#run renew hook
if [ " $IS_RENEW " ] && [ " $Le_RenewH ook " ] ; then
_info " Run renew hook:' $Le_RenewH ook ' "
if [ " $IS_RENEW " ] && [ " $_chk_renew_h ook " ] ; then
_info " Run renew hook:' $_chk_renew_h ook ' "
if ! (
cd " $DOMAIN_PATH " && eval " $Le_RenewH ook "
cd " $DOMAIN_PATH " && eval " $_chk_renew_h ook "
) ; then
_err "Error when run renew hook."
return 1
@ -2964,38 +3035,38 @@ issue() {
_usage " Usage: $PROJECT_ENTRY --issue -d a.com -w /path/to/webroot/a.com/ "
return 1
fi
Le_Webroot = " $1 "
Le_D omain= " $2 "
Le_Alt = " $3 "
if _contains " $Le_D omain " "," ; then
Le_D omain= $( echo " $2 , $3 " | cut -d , -f 1)
Le_Alt = $( echo " $2 , $3 " | cut -d , -f 2- | sed " s/, ${ NO_VALUE } $// " )
fi
Le_Key length= " $4 "
Le_RealCertPath = " $5 "
Le_RealKeyPath = " $6 "
Le_RealCACertPath = " $7 "
Le_ReloadC md= " $8 "
Le_RealFullChainPath = " $9 "
Le_PreH ook= " ${ 10 } "
Le_PostH ook= " ${ 11 } "
Le_RenewH ook= " ${ 12 } "
Le_LocalAddress = " ${ 13 } "
_web_roots = " $1 "
_main_d omain= " $2 "
_alt_domains = " $3 "
if _contains " $_main_d omain " "," ; then
_main_d omain= $( echo " $2 , $3 " | cut -d , -f 1)
_alt_domains = $( echo " $2 , $3 " | cut -d , -f 2- | sed " s/, ${ NO_VALUE } $// " )
fi
_key_ length= " $4 "
_real_cert = " $5 "
_real_key = " $6 "
_real_ca = " $7 "
_reload_c md= " $8 "
_real_fullchain = " $9 "
_pre_h ook= " ${ 10 } "
_post_h ook= " ${ 11 } "
_renew_h ook= " ${ 12 } "
_local_addr = " ${ 13 } "
#remove these later.
if [ " $Le_Webroot " = "dns-cf" ] ; then
Le_Webroot = "dns_cf"
if [ " $_web_roots " = "dns-cf" ] ; then
_web_roots = "dns_cf"
fi
if [ " $Le_Webroot " = "dns-dp" ] ; then
Le_Webroot = "dns_dp"
if [ " $_web_roots " = "dns-dp" ] ; then
_web_roots = "dns_dp"
fi
if [ " $Le_Webroot " = "dns-cx" ] ; then
Le_Webroot = "dns_cx"
if [ " $_web_roots " = "dns-cx" ] ; then
_web_roots = "dns_cx"
fi
_debug " Using api: $API "
if [ ! " $IS_RENEW " ] ; then
_initpath " $Le_Domain " " $Le_Key length "
_initpath " $_main_domain " " $_key_ length "
mkdir -p " $DOMAIN_PATH "
fi
@ -3007,7 +3078,7 @@ issue() {
_debug _saved_domain " $_saved_domain "
_saved_alt = $( _readdomainconf Le_Alt)
_debug _saved_alt " $_saved_alt "
if [ " $_saved_domain , $_saved_alt " = " $Le_Domain , $Le_Alt " ] ; then
if [ " $_saved_domain , $_saved_alt " = " $_main_domain , $_alt_domains " ] ; then
_info "Domains not changed."
_info " Skip, Next renewal time is: $( __green " $( _readdomainconf Le_NextRenewTimeStr) " ) "
_info " Add ' $( __red '--force' ) ' to force to renew. "
@ -3018,16 +3089,16 @@ issue() {
fi
fi
_savedomainconf "Le_Domain" " $Le_D omain "
_savedomainconf "Le_Alt" " $Le_Alt "
_savedomainconf "Le_Webroot" " $Le_Webroot "
_savedomainconf "Le_Domain" " $_main_d omain "
_savedomainconf "Le_Alt" " $_alt_domains "
_savedomainconf "Le_Webroot" " $_web_roots "
_savedomainconf "Le_PreHook" " $Le_PreH ook "
_savedomainconf "Le_PostHook" " $Le_PostH ook "
_savedomainconf "Le_RenewHook" " $Le_RenewH ook "
_savedomainconf "Le_PreHook" " $_pre_h ook "
_savedomainconf "Le_PostHook" " $_post_h ook "
_savedomainconf "Le_RenewHook" " $_renew_h ook "
if [ " $Le_LocalAddress " ] ; then
_savedomainconf "Le_LocalAddress" " $Le_LocalAddress "
if [ " $_local_addr " ] ; then
_savedomainconf "Le_LocalAddress" " $_local_addr "
else
_cleardomainconf "Le_LocalAddress"
fi
@ -3035,15 +3106,15 @@ issue() {
Le_API = " $API "
_savedomainconf "Le_API" " $Le_API "
if [ " $Le_Alt " = " $NO_VALUE " ] ; then
Le_Alt = ""
if [ " $_alt_domains " = " $NO_VALUE " ] ; then
_alt_domains = ""
fi
if [ " $Le_Key length " = " $NO_VALUE " ] ; then
Le_Key length= ""
if [ " $_key_ length " = " $NO_VALUE " ] ; then
_key_ length= ""
fi
if ! _on_before_issue; then
if ! _on_before_issue " $_web_roots " " $_main_domain " " $_alt_domains " " $_pre_hook " " $_local_addr " ; then
_err "_on_before_issue."
return 1
fi
@ -3053,7 +3124,7 @@ issue() {
if [ -z " $_saved_account_key_hash " ] || [ " $_saved_account_key_hash " != " $( __calcAccountKeyHash) " ] ; then
if ! _regAccount " $_accountkeylength " ; then
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
else
@ -3065,24 +3136,24 @@ issue() {
else
_key = $( _readdomainconf Le_Keylength)
_debug " Read key length: $_key "
if [ ! -f " $CERT_KEY_PATH " ] || [ " $Le_Key length " != " $_key " ] ; then
if ! createDomainKey " $Le_Domain " " $Le_Key length " ; then
if [ ! -f " $CERT_KEY_PATH " ] || [ " $_key_ length " != " $_key " ] ; then
if ! createDomainKey " $_main_domain " " $_key_ length " ; then
_err "Create domain key error."
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
fi
if ! _createcsr " $Le_Domain " " $Le_Alt " " $CERT_KEY_PATH " " $CSR_PATH " " $DOMAIN_SSL_CONF " ; then
if ! _createcsr " $_main_domain " " $_alt_domains " " $CERT_KEY_PATH " " $CSR_PATH " " $DOMAIN_SSL_CONF " ; then
_err "Create CSR error."
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
fi
_savedomainconf "Le_Keylength" " $Le_Key length "
_savedomainconf "Le_Keylength" " $_key_ length "
vlist = " $Le_Vlist "
@ -3090,12 +3161,12 @@ issue() {
sep = '#'
dvsep = ','
if [ -z " $vlist " ] ; then
alldomains = $( echo " $Le_Domain , $Le_Alt " | tr ',' ' ' )
alldomains = $( echo " $_main_domain , $_alt_domains " | tr ',' ' ' )
_index = 1
_currentRoot = ""
for d in $alldomains ; do
_info "Getting webroot for domain" " $d "
_w = " $( echo $Le_Webroot | cut -d , -f $_index ) "
_w = " $( echo $_web_roots | cut -d , -f $_index ) "
_debug _w " $_w "
if [ " $_w " ] ; then
_currentRoot = " $_w "
@ -3114,7 +3185,7 @@ issue() {
if ! __get_domain_new_authz " $d " ; then
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3127,7 +3198,7 @@ issue() {
if [ -z " $entry " ] ; then
_err " Error, can not get domain token $d "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
token = " $( printf "%s\n" " $entry " | _egrep_o '"token":"[^"]*' | cut -d : -f 2 | tr -d '"' ) "
@ -3208,7 +3279,7 @@ issue() {
if [ " $? " != "0" ] ; then
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
dnsadded = '1'
@ -3220,7 +3291,7 @@ issue() {
_debug " Dns record not added yet, so, save to $DOMAIN_CONF and exit. "
_err "Please add the TXT records to the domains, and retry again."
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3266,12 +3337,12 @@ issue() {
if [ " $vtype " = " $VTYPE_HTTP " ] ; then
if [ " $_currentRoot " = " $NO_VALUE " ] ; then
_info "Standalone mode server"
_ncaddr = " $( _getfield " $Le_LocalAddress " " $_ncIndex " ) "
_ncaddr = " $( _getfield " $_local_addr " " $_ncIndex " ) "
_ncIndex = " $( _math $_ncIndex + 1) "
_startserver " $keyauthorization " " $_ncaddr " &
if [ " $? " != "0" ] ; then
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
serverproc = " $! "
@ -3287,7 +3358,7 @@ issue() {
BACKUP_NGINX_CONF = ""
if ! _setNginx " $d " " $_currentRoot " " $thumbprint " ; then
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3322,7 +3393,7 @@ issue() {
_err " $d :Can not write token to file : $wellknown_path / $token "
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3361,13 +3432,13 @@ issue() {
_SAN_B = " $_x . $_y .acme.invalid "
_debug2 _SAN_B " $_SAN_B "
_ncaddr = " $( _getfield " $Le_LocalAddress " " $_ncIndex " ) "
_ncaddr = " $( _getfield " $_local_addr " " $_ncIndex " ) "
_ncIndex = " $( _math " $_ncIndex " + 1) "
if ! _starttlsserver " $_SAN_B " " $_SAN_A " " $Le_TLSPort " " $keyauthorization " " $_ncaddr " ; then
_err "Start tls server error."
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
fi
@ -3376,7 +3447,7 @@ issue() {
_err " $d :Can not get challenge: $response "
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3384,7 +3455,7 @@ issue() {
_err " $d :Challenge error: $response "
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3411,7 +3482,7 @@ issue() {
_err " $d :Verify error: $response "
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
_debug2 original " $response "
@ -3446,7 +3517,7 @@ issue() {
fi
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3456,7 +3527,7 @@ issue() {
_err " $d :Verify error: $response "
_clearupwebbroot " $_currentRoot " " $removelevel " " $token "
_clearup
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3470,7 +3541,7 @@ issue() {
if ! _send_signed_request " $API /acme/new-cert " " {\"resource\": \"new-cert\", \"csr\": \" $der \"} " "needbase64" ; then
_err "Sign failed."
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3512,7 +3583,7 @@ issue() {
if [ -z " $Le_LinkCert " ] ; then
response = " $( echo " $response " | _dbase64 "multiline" | _normalizeJson) "
_err " Sign failed: $( echo " $response " | _egrep_o '"detail":"[^"]*"' ) "
_on_issue_err
_on_issue_err " $_post_hook "
return 1
fi
@ -3574,10 +3645,15 @@ issue() {
Le_NextRenewTime = $( _math " $Le_NextRenewTime " - 86400)
_savedomainconf "Le_NextRenewTime" " $Le_NextRenewTime "
_on_issue_success
_on_issue_success " $_post_hook " " $_renew_hook "
if [ " $Le_RealCertPath $Le_RealKeyPath $Le_RealCACertPath $Le_ReloadCmd $Le_RealFullChainPath " ] ; then
_installcert
if [ " $_real_cert $_real_key $_real_ca $_reload_cmd $_real_fullchain " ] ; then
_savedomainconf "Le_RealCertPath" " $_real_cert "
_savedomainconf "Le_RealCACertPath" " $_real_ca "
_savedomainconf "Le_RealKeyPath" " $_real_key "
_savedomainconf "Le_ReloadCmd" " $_reload_cmd "
_savedomainconf "Le_RealFullChainPath" " $_real_fullchain "
_installcert " $_main_domain " " $_real_cert " " $_real_key " " $_real_ca " " $_reload_cmd " " $_real_fullchain "
fi
}
@ -3630,7 +3706,7 @@ renew() {
fi
if [ " $Le_DeployHook " ] ; then
deploy " $Le_Domain " " $Le_DeployHook " " $Le_Keylength "
_ deploy " $Le_Domain " " $Le_DeployHook "
res = " $? "
fi
@ -3802,45 +3878,32 @@ list() {
}
deploy( ) {
Le_Domain = " $1 "
Le_DeployHook = " $2 "
_isEcc = " $3 "
if [ -z " $Le_DeployHook " ] ; then
_usage " Usage: $PROJECT_ENTRY --deploy -d domain.com --deploy-hook cpanel [--ecc] "
return 1
fi
_initpath " $Le_Domain " " $_isEcc "
if [ ! -d " $DOMAIN_PATH " ] ; then
_err " Domain is not valid:' $Le_Domain ' "
return 1
fi
_deploy( ) {
_d = " $1 "
_hooks = " $2 "
_deployApi = " $( _findHook " $Le_Domain " deploy " $Le_DeployHook " ) "
for _d_api in $( echo " $_hooks " | tr ',' " " ) ; do
_deployApi = " $( _findHook " $_d " deploy " $_d_api " ) "
if [ -z " $_deployApi " ] ; then
_err " The deploy hook $Le_DeployHook is not found. "
_err " The deploy hook $_d_api is not found. "
return 1
fi
_debug _deployApi " $_deployApi "
_savedomainconf Le_DeployHook " $Le_DeployHook "
if ! (
if ! . " $_deployApi " ; then
_err " Load file $_deployApi error. Please check your api file and try again. "
return 1
fi
d_command = " ${ Le_DeployHook } _deploy "
d_command = " ${ _d_api } _deploy "
if ! _exists " $d_command " ; then
_err " It seems that your api file is not correct, it must have a function named: $d_command "
return 1
fi
if ! $d_command " $Le_Domain " " $CERT_KEY_PATH " " $CERT_PATH " " $CA_CERT_PATH " " $CERT_FULLCHAIN_PATH " ; then
_err " Error deploy for domain: $Le_Domain "
_on_issue_err
if ! $d_command " $_d " " $CERT_KEY_PATH " " $CERT_PATH " " $CA_CERT_PATH " " $CERT_FULLCHAIN_PATH " ; then
_err " Error deploy for domain: $_d "
return 1
fi
) ; then
@ -3849,108 +3912,134 @@ deploy() {
else
_info " $( __green Success) "
fi
done
}
#domain hooks
deploy( ) {
_d = " $1 "
_hooks = " $2 "
_isEcc = " $3 "
if [ -z " $_hooks " ] ; then
_usage " Usage: $PROJECT_ENTRY --deploy -d domain.com --deploy-hook cpanel [--ecc] "
return 1
fi
_initpath " $_d " " $_isEcc "
if [ ! -d " $DOMAIN_PATH " ] ; then
_err " Domain is not valid:' $_d ' "
return 1
fi
. " $DOMAIN_CONF "
_savedomainconf Le_DeployHook " $_hooks "
_deploy " $_d " " $_hooks "
}
installcert( ) {
Le_Domain = " $1 "
if [ -z " $Le_Domain " ] ; then
_main_d omain= " $1 "
if [ -z " $_main_d omain " ] ; then
_usage " Usage: $PROJECT_ENTRY --installcert -d domain.com [--ecc] [--certpath cert-file-path] [--keypath key-file-path] [--capath ca-cert-file-path] [ --reloadCmd reloadCmd] [--fullchainpath fullchain-path] "
return 1
fi
Le_RealCertPath = " $2 "
Le_RealKeyPath = " $3 "
Le_RealCACertPath = " $4 "
Le_ReloadCmd = " $5 "
Le_RealFullChainPath = " $6 "
_real_cert = " $2 "
_real_key = " $3 "
_real_ca = " $4 "
_reload_c md= " $5 "
_real_fullchain = " $6 "
_isEcc = " $7 "
_initpath " $Le_Domain " " $_isEcc "
_initpath " $_main_d omain " " $_isEcc "
if [ ! -d " $DOMAIN_PATH " ] ; then
_err " Domain is not valid:' $Le_Domain ' "
_err " Domain is not valid:' $_main_d omain ' "
return 1
fi
_installcert
_savedomainconf "Le_RealCertPath" " $_real_cert "
_savedomainconf "Le_RealCACertPath" " $_real_ca "
_savedomainconf "Le_RealKeyPath" " $_real_key "
_savedomainconf "Le_ReloadCmd" " $_reload_cmd "
_savedomainconf "Le_RealFullChainPath" " $_real_fullchain "
_installcert " $_main_domain " " $_real_cert " " $_real_key " " $_real_ca " " $_reload_cmd " " $_real_fullchain "
}
_installcert( ) {
_savedomainconf "Le_RealCertPath" " $Le_RealCertPath "
_savedomainconf "Le_RealCACertPath" " $Le_RealCACertPath "
_savedomainconf "Le_RealKeyPath" " $Le_RealKeyPath "
_savedomainconf "Le_ReloadCmd" " $Le_ReloadCmd "
_savedomainconf "Le_RealFullChainPath" " $Le_RealFullChainPath "
_main_domain = " $1 "
_real_cert = " $2 "
_real_key = " $3 "
_real_ca = " $4 "
_reload_cmd = " $5 "
_real_fullchain = " $6 "
if [ " $Le_RealCertPath " = " $NO_VALUE " ] ; then
Le_RealCertPath = ""
if [ " $_real_cert " = " $NO_VALUE " ] ; then
_real_cert = ""
fi
if [ " $Le_RealKeyPath " = " $NO_VALUE " ] ; then
Le_RealKeyPath = ""
if [ " $_real_key " = " $NO_VALUE " ] ; then
_real_key = ""
fi
if [ " $Le_RealCACertPath " = " $NO_VALUE " ] ; then
Le_RealCACertPath = ""
if [ " $_real_ca " = " $NO_VALUE " ] ; then
_real_ca = ""
fi
if [ " $Le_ReloadC md " = " $NO_VALUE " ] ; then
Le_ReloadC md= ""
if [ " $_reload_c md " = " $NO_VALUE " ] ; then
_reload_c md= ""
fi
if [ " $Le_RealFullChainPath " = " $NO_VALUE " ] ; then
Le_RealFullChainPath = ""
if [ " $_real_fullchain " = " $NO_VALUE " ] ; then
_real_fullchain = ""
fi
if [ " $Le_RealCertPath " ] ; then
_info " Installing cert to: $Le_RealCertPath "
if [ -f " $Le_RealCertPath " ] && [ ! " $IS_RENEW " ] ; then
if [ " $_real_cert " ] ; then
_info " Installing cert to: $_real_cert "
if [ -f " $_real_cert " ] && [ ! " $IS_RENEW " ] ; then
mkdir -p " $DOMAIN_BACKUP_PATH "
cp " $Le_RealCertPath " " $DOMAIN_BACKUP_PATH /cert.bak "
cp " $_real_cert " " $DOMAIN_BACKUP_PATH /cert.bak "
fi
cat " $CERT_PATH " >" $Le_RealCertPath "
cat " $CERT_PATH " >" $_real_cert "
fi
if [ " $Le_RealCACertPath " ] ; then
_info " Installing CA to: $Le_RealCACertPath "
if [ " $Le_RealCACertPath " = " $Le_RealCertPath " ] ; then
echo "" >>" $Le_RealCACertPath "
cat " $CA_CERT_PATH " >>" $Le_RealCACertPath "
if [ " $_real_ca " ] ; then
_info " Installing CA to: $_real_ca "
if [ " $_real_ca " = " $_real_cert " ] ; then
echo "" >>" $_real_ca "
cat " $CA_CERT_PATH " >>" $_real_ca "
else
if [ -f " $Le_RealCACertPath " ] && [ ! " $IS_RENEW " ] ; then
if [ -f " $_real_ca " ] && [ ! " $IS_RENEW " ] ; then
mkdir -p " $DOMAIN_BACKUP_PATH "
cp " $Le_RealCACertPath " " $DOMAIN_BACKUP_PATH /ca.bak "
cp " $_real_ca " " $DOMAIN_BACKUP_PATH /ca.bak "
fi
cat " $CA_CERT_PATH " >" $Le_RealCACertPath "
cat " $CA_CERT_PATH " >" $_real_ca "
fi
fi
if [ " $Le_RealKeyPath " ] ; then
_info " Installing key to: $Le_RealKeyPath "
if [ -f " $Le_RealKeyPath " ] && [ ! " $IS_RENEW " ] ; then
if [ " $_real_key " ] ; then
_info " Installing key to: $_real_key "
if [ -f " $_real_key " ] && [ ! " $IS_RENEW " ] ; then
mkdir -p " $DOMAIN_BACKUP_PATH "
cp " $Le_RealKeyPath " " $DOMAIN_BACKUP_PATH /key.bak "
cp " $_real_key " " $DOMAIN_BACKUP_PATH /key.bak "
fi
cat " $CERT_KEY_PATH " >" $Le_RealKeyPath "
cat " $CERT_KEY_PATH " >" $_real_key "
fi
if [ " $Le_RealFullChainPath " ] ; then
_info " Installing full chain to: $Le_RealFullChainPath "
if [ -f " $Le_RealFullChainPath " ] && [ ! " $IS_RENEW " ] ; then
if [ " $_real_fullchain " ] ; then
_info " Installing full chain to: $_real_fullchain "
if [ -f " $_real_fullchain " ] && [ ! " $IS_RENEW " ] ; then
mkdir -p " $DOMAIN_BACKUP_PATH "
cp " $Le_RealFullChainPath " " $DOMAIN_BACKUP_PATH /fullchain.bak "
cp " $_real_fullchain " " $DOMAIN_BACKUP_PATH /fullchain.bak "
fi
cat " $CERT_FULLCHAIN_PATH " >" $Le_RealFullChainPath "
cat " $CERT_FULLCHAIN_PATH " >" $_real_fullchain "
fi
if [ " $Le_ReloadC md " ] ; then
_info " Run Le_ReloadCmd: $Le_ReloadC md "
if [ " $_reload_c md " ] ; then
_info " Run reload cmd: $_reload_c md "
if (
export CERT_PATH
export CERT_KEY_PATH
export CA_CERT_PATH
export CERT_FULLCHAIN_PATH
cd " $DOMAIN_PATH " && eval " $Le_ReloadC md "
cd " $DOMAIN_PATH " && eval " $_reload_c md "
) ; then
_info " $( __green "Reload success" ) "
else
@ -4583,7 +4672,7 @@ Parameters:
--force, -f Used to force to install or force to renew a cert immediately.
--staging, --test Use staging server, just for test.
--debug Output debug info.
--output-insecure Output all the sensitive messages. By default all the credentials/sensitive messages are hidden from the output/debug/log for secure.
--webroot, -w /path/to/webroot Specifies the web root folder for web root mode.
--standalone Use standalone mode.
--stateless Use stateless mode, see: $_STATELESS_WIKI
@ -4596,7 +4685,7 @@ Parameters:
--accountkeylength, -ak [ 2048] Specifies the account key length.
--log [ /path/to/logfile] Specifies the log file. The default is: \" $DEFAULT_LOG_FILE \" if you don' t give a file path here.
--log-level 1| 2 Specifies the log level, default is 1.
--syslog [ 1| 0] Enable/Disable syslo g.
--syslog [ 0| 3| 6| 7] Syslog level, 0: disable syslog, 3: error, 6: info, 7: debu g.
These parameters are to install the cert to nginx/apache or anyother server after issue/renew a cert:
@ -4877,6 +4966,9 @@ _process() {
shift
fi
; ;
--output-insecure)
export OUTPUT_INSECURE = 1
; ;
--webroot | -w)
wvalue = " $2 "
if [ -z " $_webroot " ] ; then
@ -5070,7 +5162,11 @@ _process() {
shift
; ;
--deploy-hook)
_deploy_hook = " $2 "
if [ -z " $2 " ] || _startswith " $2 " "-" ; then
_usage "Please specify a value for '--deploy-hook'"
return 1
fi
_deploy_hook = " $_deploy_hook $2 , "
shift
; ;
--ocsp-must-staple | --ocsp)