|
|
@ -26,307 +26,307 @@ USER_CLEANUP= |
|
|
|
|
|
|
|
check_cron() |
|
|
|
{ |
|
|
|
[ -f "/etc/crontabs/root" ] && grep -q '/etc/init.d/acme' /etc/crontabs/root && return |
|
|
|
echo "0 0 * * * /etc/init.d/acme start" >> /etc/crontabs/root |
|
|
|
/etc/init.d/cron start |
|
|
|
[ -f "/etc/crontabs/root" ] && grep -q '/etc/init.d/acme' /etc/crontabs/root && return |
|
|
|
echo "0 0 * * * /etc/init.d/acme start" >> /etc/crontabs/root |
|
|
|
/etc/init.d/cron start |
|
|
|
} |
|
|
|
|
|
|
|
log() |
|
|
|
{ |
|
|
|
logger -t acme -s -p daemon.info -- "$@" |
|
|
|
logger -t acme -s -p daemon.info -- "$@" |
|
|
|
} |
|
|
|
|
|
|
|
err() |
|
|
|
{ |
|
|
|
logger -t acme -s -p daemon.err -- "$@" |
|
|
|
logger -t acme -s -p daemon.err -- "$@" |
|
|
|
} |
|
|
|
|
|
|
|
debug() |
|
|
|
{ |
|
|
|
[ "$DEBUG" -eq "1" ] && logger -t acme -s -p daemon.debug -- "$@" |
|
|
|
[ "$DEBUG" -eq "1" ] && logger -t acme -s -p daemon.debug -- "$@" |
|
|
|
} |
|
|
|
|
|
|
|
get_listeners() { |
|
|
|
local proto rq sq listen remote state program |
|
|
|
netstat -nptl 2>/dev/null | while read proto rq sq listen remote state program; do |
|
|
|
case "$proto#$listen#$program" in |
|
|
|
tcp#*:80#[0-9]*/*) echo -n "${program%% *} " ;; |
|
|
|
esac |
|
|
|
done |
|
|
|
local proto rq sq listen remote state program |
|
|
|
netstat -nptl 2>/dev/null | while read proto rq sq listen remote state program; do |
|
|
|
case "$proto#$listen#$program" in |
|
|
|
tcp#*:80#[0-9]*/*) echo -n "${program%% *} " ;; |
|
|
|
esac |
|
|
|
done |
|
|
|
} |
|
|
|
|
|
|
|
run_acme() |
|
|
|
{ |
|
|
|
debug "Running acme.sh as '$ACME $@'" |
|
|
|
$ACME "$@" |
|
|
|
debug "Running acme.sh as '$ACME $@'" |
|
|
|
$ACME "$@" |
|
|
|
} |
|
|
|
|
|
|
|
pre_checks() |
|
|
|
{ |
|
|
|
main_domain="$1" |
|
|
|
|
|
|
|
log "Running pre checks for $main_domain." |
|
|
|
|
|
|
|
listeners="$(get_listeners)" |
|
|
|
|
|
|
|
debug "port80 listens: $listeners" |
|
|
|
|
|
|
|
for listener in $(get_listeners); do |
|
|
|
pid="${listener%/*}" |
|
|
|
cmd="${listener#*/}" |
|
|
|
|
|
|
|
case "$cmd" in |
|
|
|
uhttpd) |
|
|
|
debug "Found uhttpd listening on port 80; trying to disable." |
|
|
|
|
|
|
|
UHTTPD_LISTEN_HTTP=$(uci get uhttpd.main.listen_http) |
|
|
|
|
|
|
|
if [ -z "$UHTTPD_LISTEN_HTTP" ]; then |
|
|
|
err "$main_domain: Unable to find uhttpd listen config." |
|
|
|
err "Manually disable uhttpd or set webroot to continue." |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
|
|
|
|
uci set uhttpd.main.listen_http='' |
|
|
|
uci commit uhttpd || return 1 |
|
|
|
if ! /etc/init.d/uhttpd reload ; then |
|
|
|
uci set uhttpd.main.listen_http="$UHTTPD_LISTEN_HTTP" |
|
|
|
uci commit uhttpd |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
;; |
|
|
|
nginx*) |
|
|
|
debug "Found nginx listening on port 80; trying to disable." |
|
|
|
NGINX_WEBSERVER=1 |
|
|
|
local tries=0 |
|
|
|
while grep -sq "$cmd" "/proc/$pid/cmdline" && kill -0 "$pid"; do |
|
|
|
/etc/init.d/nginx stop |
|
|
|
if [ $tries -gt 10 ]; then |
|
|
|
debug "Can't stop nginx. Terminating script." |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
debug "Waiting for nginx to stop..." |
|
|
|
tries=$((tries + 1)) |
|
|
|
sleep 1 |
|
|
|
done |
|
|
|
;; |
|
|
|
"") |
|
|
|
debug "Nothing listening on port 80." |
|
|
|
;; |
|
|
|
*) |
|
|
|
err "$main_domain: Cannot run in standalone mode; another daemon is listening on port 80." |
|
|
|
err "Disable other daemon or set webroot to continue." |
|
|
|
return 1 |
|
|
|
;; |
|
|
|
esac |
|
|
|
done |
|
|
|
|
|
|
|
iptables -I input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" || return 1 |
|
|
|
ip6tables -I input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" || return 1 |
|
|
|
debug "v4 input_rule: $(iptables -nvL input_rule)" |
|
|
|
debug "v6 input_rule: $(ip6tables -nvL input_rule)" |
|
|
|
return 0 |
|
|
|
main_domain="$1" |
|
|
|
|
|
|
|
log "Running pre checks for $main_domain." |
|
|
|
|
|
|
|
listeners="$(get_listeners)" |
|
|
|
|
|
|
|
debug "port80 listens: $listeners" |
|
|
|
|
|
|
|
for listener in $(get_listeners); do |
|
|
|
pid="${listener%/*}" |
|
|
|
cmd="${listener#*/}" |
|
|
|
|
|
|
|
case "$cmd" in |
|
|
|
uhttpd) |
|
|
|
debug "Found uhttpd listening on port 80; trying to disable." |
|
|
|
|
|
|
|
UHTTPD_LISTEN_HTTP=$(uci get uhttpd.main.listen_http) |
|
|
|
|
|
|
|
if [ -z "$UHTTPD_LISTEN_HTTP" ]; then |
|
|
|
err "$main_domain: Unable to find uhttpd listen config." |
|
|
|
err "Manually disable uhttpd or set webroot to continue." |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
|
|
|
|
uci set uhttpd.main.listen_http='' |
|
|
|
uci commit uhttpd || return 1 |
|
|
|
if ! /etc/init.d/uhttpd reload ; then |
|
|
|
uci set uhttpd.main.listen_http="$UHTTPD_LISTEN_HTTP" |
|
|
|
uci commit uhttpd |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
;; |
|
|
|
nginx*) |
|
|
|
debug "Found nginx listening on port 80; trying to disable." |
|
|
|
NGINX_WEBSERVER=1 |
|
|
|
local tries=0 |
|
|
|
while grep -sq "$cmd" "/proc/$pid/cmdline" && kill -0 "$pid"; do |
|
|
|
/etc/init.d/nginx stop |
|
|
|
if [ $tries -gt 10 ]; then |
|
|
|
debug "Can't stop nginx. Terminating script." |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
debug "Waiting for nginx to stop..." |
|
|
|
tries=$((tries + 1)) |
|
|
|
sleep 1 |
|
|
|
done |
|
|
|
;; |
|
|
|
"") |
|
|
|
debug "Nothing listening on port 80." |
|
|
|
;; |
|
|
|
*) |
|
|
|
err "$main_domain: Cannot run in standalone mode; another daemon is listening on port 80." |
|
|
|
err "Disable other daemon or set webroot to continue." |
|
|
|
return 1 |
|
|
|
;; |
|
|
|
esac |
|
|
|
done |
|
|
|
|
|
|
|
iptables -I input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" || return 1 |
|
|
|
ip6tables -I input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" || return 1 |
|
|
|
debug "v4 input_rule: $(iptables -nvL input_rule)" |
|
|
|
debug "v6 input_rule: $(ip6tables -nvL input_rule)" |
|
|
|
return 0 |
|
|
|
} |
|
|
|
|
|
|
|
post_checks() |
|
|
|
{ |
|
|
|
log "Running post checks (cleanup)." |
|
|
|
# The comment ensures we only touch our own rules. If no rules exist, that |
|
|
|
# is fine, so hide any errors |
|
|
|
iptables -D input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" 2>/dev/null |
|
|
|
ip6tables -D input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" 2>/dev/null |
|
|
|
|
|
|
|
if [ -e /etc/init.d/uhttpd ] && ( [ -n "$UHTTPD_LISTEN_HTTP" ] || [ "$UPDATE_UHTTPD" -eq 1 ] ); then |
|
|
|
if [ -n "$UHTTPD_LISTEN_HTTP" ]; then |
|
|
|
uci set uhttpd.main.listen_http="$UHTTPD_LISTEN_HTTP" |
|
|
|
UHTTPD_LISTEN_HTTP= |
|
|
|
fi |
|
|
|
uci commit uhttpd |
|
|
|
/etc/init.d/uhttpd reload |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -e /etc/init.d/nginx ] && ( [ "$NGINX_WEBSERVER" -eq 1 ] || [ "$UPDATE_NGINX" -eq 1 ] ); then |
|
|
|
NGINX_WEBSERVER=0 |
|
|
|
/etc/init.d/nginx restart |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -n "$USER_CLEANUP" ] && [ -f "$USER_CLEANUP" ]; then |
|
|
|
log "Running user-provided cleanup script from $USER_CLEANUP." |
|
|
|
"$USER_CLEANUP" || return 1 |
|
|
|
fi |
|
|
|
log "Running post checks (cleanup)." |
|
|
|
# The comment ensures we only touch our own rules. If no rules exist, that |
|
|
|
# is fine, so hide any errors |
|
|
|
iptables -D input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" 2>/dev/null |
|
|
|
ip6tables -D input_rule -p tcp --dport 80 -j ACCEPT -m comment --comment "ACME" 2>/dev/null |
|
|
|
|
|
|
|
if [ -e /etc/init.d/uhttpd ] && ( [ -n "$UHTTPD_LISTEN_HTTP" ] || [ "$UPDATE_UHTTPD" -eq 1 ] ); then |
|
|
|
if [ -n "$UHTTPD_LISTEN_HTTP" ]; then |
|
|
|
uci set uhttpd.main.listen_http="$UHTTPD_LISTEN_HTTP" |
|
|
|
UHTTPD_LISTEN_HTTP= |
|
|
|
fi |
|
|
|
uci commit uhttpd |
|
|
|
/etc/init.d/uhttpd reload |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -e /etc/init.d/nginx ] && ( [ "$NGINX_WEBSERVER" -eq 1 ] || [ "$UPDATE_NGINX" -eq 1 ] ); then |
|
|
|
NGINX_WEBSERVER=0 |
|
|
|
/etc/init.d/nginx restart |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -n "$USER_CLEANUP" ] && [ -f "$USER_CLEANUP" ]; then |
|
|
|
log "Running user-provided cleanup script from $USER_CLEANUP." |
|
|
|
"$USER_CLEANUP" || return 1 |
|
|
|
fi |
|
|
|
} |
|
|
|
|
|
|
|
err_out() |
|
|
|
{ |
|
|
|
post_checks |
|
|
|
exit 1 |
|
|
|
post_checks |
|
|
|
exit 1 |
|
|
|
} |
|
|
|
|
|
|
|
int_out() |
|
|
|
{ |
|
|
|
post_checks |
|
|
|
trap - INT |
|
|
|
kill -INT $$ |
|
|
|
post_checks |
|
|
|
trap - INT |
|
|
|
kill -INT $$ |
|
|
|
} |
|
|
|
|
|
|
|
is_staging() |
|
|
|
{ |
|
|
|
local main_domain |
|
|
|
local domain_dir |
|
|
|
main_domain="$1" |
|
|
|
domain_dir="$2" |
|
|
|
local main_domain |
|
|
|
local domain_dir |
|
|
|
main_domain="$1" |
|
|
|
domain_dir="$2" |
|
|
|
|
|
|
|
grep -q "acme-staging" "${domain_dir}/${main_domain}.conf" |
|
|
|
return $? |
|
|
|
grep -q "acme-staging" "${domain_dir}/${main_domain}.conf" |
|
|
|
return $? |
|
|
|
} |
|
|
|
|
|
|
|
issue_cert() |
|
|
|
{ |
|
|
|
local section="$1" |
|
|
|
local acme_args= |
|
|
|
local enabled |
|
|
|
local use_staging |
|
|
|
local update_uhttpd |
|
|
|
local update_nginx |
|
|
|
local keylength |
|
|
|
local keylength_ecc=0 |
|
|
|
local domains |
|
|
|
local main_domain |
|
|
|
local moved_staging=0 |
|
|
|
local failed_dir |
|
|
|
local webroot |
|
|
|
local dns |
|
|
|
local user_setup |
|
|
|
local user_cleanup |
|
|
|
local ret |
|
|
|
local domain_dir |
|
|
|
|
|
|
|
config_get_bool enabled "$section" enabled 0 |
|
|
|
config_get_bool use_staging "$section" use_staging |
|
|
|
config_get_bool update_uhttpd "$section" update_uhttpd |
|
|
|
config_get_bool update_nginx "$section" update_nginx |
|
|
|
config_get calias "$section" calias |
|
|
|
config_get dalias "$section" dalias |
|
|
|
config_get domains "$section" domains |
|
|
|
config_get keylength "$section" keylength |
|
|
|
config_get webroot "$section" webroot |
|
|
|
config_get dns "$section" dns |
|
|
|
config_get user_setup "$section" user_setup |
|
|
|
config_get user_cleanup "$section" user_cleanup |
|
|
|
|
|
|
|
UPDATE_NGINX=$update_nginx |
|
|
|
UPDATE_UHTTPD=$update_uhttpd |
|
|
|
USER_CLEANUP=$user_cleanup |
|
|
|
|
|
|
|
[ "$enabled" -eq "1" ] || return |
|
|
|
|
|
|
|
[ "$DEBUG" -eq "1" ] && acme_args="$acme_args --debug" |
|
|
|
|
|
|
|
set -- $domains |
|
|
|
main_domain=$1 |
|
|
|
|
|
|
|
if [ -n "$user_setup" ] && [ -f "$user_setup" ]; then |
|
|
|
log "Running user-provided setup script from $user_setup." |
|
|
|
"$user_setup" "$main_domain" || return 1 |
|
|
|
else |
|
|
|
[ -n "$webroot" ] || [ -n "$dns" ] || pre_checks "$main_domain" || return 1 |
|
|
|
fi |
|
|
|
|
|
|
|
if echo $keylength | grep -q "^ec-"; then |
|
|
|
domain_dir="$STATE_DIR/${main_domain}_ecc" |
|
|
|
keylength_ecc=1 |
|
|
|
else |
|
|
|
domain_dir="$STATE_DIR/${main_domain}" |
|
|
|
fi |
|
|
|
|
|
|
|
log "Running ACME for $main_domain" |
|
|
|
|
|
|
|
handle_credentials() { |
|
|
|
local credential="$1" |
|
|
|
eval export $credential |
|
|
|
} |
|
|
|
config_list_foreach "$section" credentials handle_credentials |
|
|
|
|
|
|
|
if [ -e "$domain_dir" ]; then |
|
|
|
if [ "$use_staging" -eq "0" ] && is_staging "$main_domain" "$domain_dir"; then |
|
|
|
log "Found previous cert issued using staging server. Moving it out of the way." |
|
|
|
mv "$domain_dir" "${domain_dir}.staging" |
|
|
|
moved_staging=1 |
|
|
|
else |
|
|
|
log "Found previous cert config. Issuing renew." |
|
|
|
[ "$keylength_ecc" -eq "1" ] && acme_args="$acme_args --ecc" |
|
|
|
run_acme --home "$STATE_DIR" --renew -d "$main_domain" $acme_args && ret=0 || ret=1 |
|
|
|
post_checks |
|
|
|
return $ret |
|
|
|
fi |
|
|
|
fi |
|
|
|
|
|
|
|
|
|
|
|
acme_args="$acme_args $(for d in $domains; do echo -n "-d $d "; done)" |
|
|
|
acme_args="$acme_args --keylength $keylength" |
|
|
|
[ -n "$ACCOUNT_EMAIL" ] && acme_args="$acme_args --accountemail $ACCOUNT_EMAIL" |
|
|
|
[ "$use_staging" -eq "1" ] && acme_args="$acme_args --staging" |
|
|
|
|
|
|
|
if [ -n "$dns" ]; then |
|
|
|
log "Using dns mode" |
|
|
|
acme_args="$acme_args --dns $dns" |
|
|
|
if [ -n "$dalias" ]; then |
|
|
|
log "Using domain alias for dns mode" |
|
|
|
acme_args="$acme_args --domain-alias $dalias" |
|
|
|
if [ -n "$calias" ]; then |
|
|
|
err "Both domain and challenge aliases are defined. Ignoring the challenge alias." |
|
|
|
fi |
|
|
|
elif [ -n "$calias" ]; then |
|
|
|
log "Using challenge alias for dns mode" |
|
|
|
acme_args="$acme_args --challenge-alias $calias" |
|
|
|
fi |
|
|
|
elif [ -z "$webroot" ]; then |
|
|
|
log "Using standalone mode" |
|
|
|
acme_args="$acme_args --standalone --listen-v6" |
|
|
|
else |
|
|
|
if [ ! -d "$webroot" ]; then |
|
|
|
err "$main_domain: Webroot dir '$webroot' does not exist!" |
|
|
|
post_checks |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
log "Using webroot dir: $webroot" |
|
|
|
acme_args="$acme_args --webroot $webroot" |
|
|
|
fi |
|
|
|
|
|
|
|
if ! run_acme --home "$STATE_DIR" --issue $acme_args; then |
|
|
|
failed_dir="${domain_dir}.failed-$(date +%s)" |
|
|
|
err "Issuing cert for $main_domain failed. Moving state to $failed_dir" |
|
|
|
[ -d "$domain_dir" ] && mv "$domain_dir" "$failed_dir" |
|
|
|
if [ "$moved_staging" -eq "1" ]; then |
|
|
|
err "Restoring staging certificate" |
|
|
|
mv "${domain_dir}.staging" "${domain_dir}" |
|
|
|
fi |
|
|
|
post_checks |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -e /etc/init.d/uhttpd ] && [ "$update_uhttpd" -eq "1" ]; then |
|
|
|
uci set uhttpd.main.key="${domain_dir}/${main_domain}.key" |
|
|
|
uci set uhttpd.main.cert="${domain_dir}/fullchain.cer" |
|
|
|
# commit and reload is in post_checks |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -e /etc/init.d/nginx ] && [ "$update_nginx" -eq "1" ]; then |
|
|
|
sed -i "s#ssl_certificate\ .*#ssl_certificate ${domain_dir}/fullchain.cer;#g" /etc/nginx/nginx.conf |
|
|
|
sed -i "s#ssl_certificate_key\ .*#ssl_certificate_key ${domain_dir}/${main_domain}.key;#g" /etc/nginx/nginx.conf |
|
|
|
# commit and reload is in post_checks |
|
|
|
fi |
|
|
|
|
|
|
|
post_checks |
|
|
|
local section="$1" |
|
|
|
local acme_args= |
|
|
|
local enabled |
|
|
|
local use_staging |
|
|
|
local update_uhttpd |
|
|
|
local update_nginx |
|
|
|
local keylength |
|
|
|
local keylength_ecc=0 |
|
|
|
local domains |
|
|
|
local main_domain |
|
|
|
local moved_staging=0 |
|
|
|
local failed_dir |
|
|
|
local webroot |
|
|
|
local dns |
|
|
|
local user_setup |
|
|
|
local user_cleanup |
|
|
|
local ret |
|
|
|
local domain_dir |
|
|
|
|
|
|
|
config_get_bool enabled "$section" enabled 0 |
|
|
|
config_get_bool use_staging "$section" use_staging |
|
|
|
config_get_bool update_uhttpd "$section" update_uhttpd |
|
|
|
config_get_bool update_nginx "$section" update_nginx |
|
|
|
config_get calias "$section" calias |
|
|
|
config_get dalias "$section" dalias |
|
|
|
config_get domains "$section" domains |
|
|
|
config_get keylength "$section" keylength |
|
|
|
config_get webroot "$section" webroot |
|
|
|
config_get dns "$section" dns |
|
|
|
config_get user_setup "$section" user_setup |
|
|
|
config_get user_cleanup "$section" user_cleanup |
|
|
|
|
|
|
|
UPDATE_NGINX=$update_nginx |
|
|
|
UPDATE_UHTTPD=$update_uhttpd |
|
|
|
USER_CLEANUP=$user_cleanup |
|
|
|
|
|
|
|
[ "$enabled" -eq "1" ] || return |
|
|
|
|
|
|
|
[ "$DEBUG" -eq "1" ] && acme_args="$acme_args --debug" |
|
|
|
|
|
|
|
set -- $domains |
|
|
|
main_domain=$1 |
|
|
|
|
|
|
|
if [ -n "$user_setup" ] && [ -f "$user_setup" ]; then |
|
|
|
log "Running user-provided setup script from $user_setup." |
|
|
|
"$user_setup" "$main_domain" || return 1 |
|
|
|
else |
|
|
|
[ -n "$webroot" ] || [ -n "$dns" ] || pre_checks "$main_domain" || return 1 |
|
|
|
fi |
|
|
|
|
|
|
|
if echo $keylength | grep -q "^ec-"; then |
|
|
|
domain_dir="$STATE_DIR/${main_domain}_ecc" |
|
|
|
keylength_ecc=1 |
|
|
|
else |
|
|
|
domain_dir="$STATE_DIR/${main_domain}" |
|
|
|
fi |
|
|
|
|
|
|
|
log "Running ACME for $main_domain" |
|
|
|
|
|
|
|
handle_credentials() { |
|
|
|
local credential="$1" |
|
|
|
eval export $credential |
|
|
|
} |
|
|
|
config_list_foreach "$section" credentials handle_credentials |
|
|
|
|
|
|
|
if [ -e "$domain_dir" ]; then |
|
|
|
if [ "$use_staging" -eq "0" ] && is_staging "$main_domain" "$domain_dir"; then |
|
|
|
log "Found previous cert issued using staging server. Moving it out of the way." |
|
|
|
mv "$domain_dir" "${domain_dir}.staging" |
|
|
|
moved_staging=1 |
|
|
|
else |
|
|
|
log "Found previous cert config. Issuing renew." |
|
|
|
[ "$keylength_ecc" -eq "1" ] && acme_args="$acme_args --ecc" |
|
|
|
run_acme --home "$STATE_DIR" --renew -d "$main_domain" $acme_args && ret=0 || ret=1 |
|
|
|
post_checks |
|
|
|
return $ret |
|
|
|
fi |
|
|
|
fi |
|
|
|
|
|
|
|
|
|
|
|
acme_args="$acme_args $(for d in $domains; do echo -n "-d $d "; done)" |
|
|
|
acme_args="$acme_args --keylength $keylength" |
|
|
|
[ -n "$ACCOUNT_EMAIL" ] && acme_args="$acme_args --accountemail $ACCOUNT_EMAIL" |
|
|
|
[ "$use_staging" -eq "1" ] && acme_args="$acme_args --staging" |
|
|
|
|
|
|
|
if [ -n "$dns" ]; then |
|
|
|
log "Using dns mode" |
|
|
|
acme_args="$acme_args --dns $dns" |
|
|
|
if [ -n "$dalias" ]; then |
|
|
|
log "Using domain alias for dns mode" |
|
|
|
acme_args="$acme_args --domain-alias $dalias" |
|
|
|
if [ -n "$calias" ]; then |
|
|
|
err "Both domain and challenge aliases are defined. Ignoring the challenge alias." |
|
|
|
fi |
|
|
|
elif [ -n "$calias" ]; then |
|
|
|
log "Using challenge alias for dns mode" |
|
|
|
acme_args="$acme_args --challenge-alias $calias" |
|
|
|
fi |
|
|
|
elif [ -z "$webroot" ]; then |
|
|
|
log "Using standalone mode" |
|
|
|
acme_args="$acme_args --standalone --listen-v6" |
|
|
|
else |
|
|
|
if [ ! -d "$webroot" ]; then |
|
|
|
err "$main_domain: Webroot dir '$webroot' does not exist!" |
|
|
|
post_checks |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
log "Using webroot dir: $webroot" |
|
|
|
acme_args="$acme_args --webroot $webroot" |
|
|
|
fi |
|
|
|
|
|
|
|
if ! run_acme --home "$STATE_DIR" --issue $acme_args; then |
|
|
|
failed_dir="${domain_dir}.failed-$(date +%s)" |
|
|
|
err "Issuing cert for $main_domain failed. Moving state to $failed_dir" |
|
|
|
[ -d "$domain_dir" ] && mv "$domain_dir" "$failed_dir" |
|
|
|
if [ "$moved_staging" -eq "1" ]; then |
|
|
|
err "Restoring staging certificate" |
|
|
|
mv "${domain_dir}.staging" "${domain_dir}" |
|
|
|
fi |
|
|
|
post_checks |
|
|
|
return 1 |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -e /etc/init.d/uhttpd ] && [ "$update_uhttpd" -eq "1" ]; then |
|
|
|
uci set uhttpd.main.key="${domain_dir}/${main_domain}.key" |
|
|
|
uci set uhttpd.main.cert="${domain_dir}/fullchain.cer" |
|
|
|
# commit and reload is in post_checks |
|
|
|
fi |
|
|
|
|
|
|
|
if [ -e /etc/init.d/nginx ] && [ "$update_nginx" -eq "1" ]; then |
|
|
|
sed -i "s#ssl_certificate\ .*#ssl_certificate ${domain_dir}/fullchain.cer;#g" /etc/nginx/nginx.conf |
|
|
|
sed -i "s#ssl_certificate_key\ .*#ssl_certificate_key ${domain_dir}/${main_domain}.key;#g" /etc/nginx/nginx.conf |
|
|
|
# commit and reload is in post_checks |
|
|
|
fi |
|
|
|
|
|
|
|
post_checks |
|
|
|
} |
|
|
|
|
|
|
|
load_vars() |
|
|
|
{ |
|
|
|
local section="$1" |
|
|
|
local section="$1" |
|
|
|
|
|
|
|
STATE_DIR=$(config_get "$section" state_dir) |
|
|
|
ACCOUNT_EMAIL=$(config_get "$section" account_email) |
|
|
|
DEBUG=$(config_get "$section" debug) |
|
|
|
STATE_DIR=$(config_get "$section" state_dir) |
|
|
|
ACCOUNT_EMAIL=$(config_get "$section" account_email) |
|
|
|
DEBUG=$(config_get "$section" debug) |
|
|
|
} |
|
|
|
|
|
|
|
check_cron |
|
|
@ -337,8 +337,8 @@ config_load acme |
|
|
|
config_foreach load_vars acme |
|
|
|
|
|
|
|
if [ -z "$STATE_DIR" ] || [ -z "$ACCOUNT_EMAIL" ]; then |
|
|
|
err "state_dir and account_email must be set" |
|
|
|
exit 1 |
|
|
|
err "state_dir and account_email must be set" |
|
|
|
exit 1 |
|
|
|
fi |
|
|
|
|
|
|
|
[ -d "$STATE_DIR" ] || mkdir -p "$STATE_DIR" |
|
|
|