mirror of
https://github.com/plantroon/acme.sh.git
synced 2024-12-22 21:21:42 +00:00
1. move email to ca conf
2. get EAB credentials from Zerossl by email automatically
This commit is contained in:
parent
1e967eceef
commit
8d811760a9
@ -86,6 +86,7 @@ https://github.com/acmesh-official/acmetest
|
|||||||
# Supported CA
|
# Supported CA
|
||||||
|
|
||||||
- Letsencrypt.org CA(default)
|
- Letsencrypt.org CA(default)
|
||||||
|
- [ZeroSSL.com CA](https://github.com/acmesh-official/acme.sh/wiki/ZeroSSL.com-CA)
|
||||||
- [BuyPass.com CA](https://github.com/acmesh-official/acme.sh/wiki/BuyPass.com-CA)
|
- [BuyPass.com CA](https://github.com/acmesh-official/acme.sh/wiki/BuyPass.com-CA)
|
||||||
- [Pebble strict Mode](https://github.com/letsencrypt/pebble)
|
- [Pebble strict Mode](https://github.com/letsencrypt/pebble)
|
||||||
|
|
||||||
|
94
acme.sh
94
acme.sh
@ -30,6 +30,8 @@ CA_BUYPASS="https://api.buypass.com/acme/directory"
|
|||||||
CA_BUYPASS_TEST="https://api.test4.buypass.no/acme/directory"
|
CA_BUYPASS_TEST="https://api.test4.buypass.no/acme/directory"
|
||||||
|
|
||||||
CA_ZEROSSL="https://acme.zerossl.com/v2/DV90"
|
CA_ZEROSSL="https://acme.zerossl.com/v2/DV90"
|
||||||
|
_ZERO_EAB_ENDPOINT="http://api.zerossl.com/acme/eab-credentials-email"
|
||||||
|
|
||||||
|
|
||||||
DEFAULT_CA=$CA_LETSENCRYPT_V2
|
DEFAULT_CA=$CA_LETSENCRYPT_V2
|
||||||
DEFAULT_STAGING_CA=$CA_LETSENCRYPT_V2_TEST
|
DEFAULT_STAGING_CA=$CA_LETSENCRYPT_V2_TEST
|
||||||
@ -45,7 +47,6 @@ zerossl
|
|||||||
CA_SERVERS="$CA_LETSENCRYPT_V2,$CA_LETSENCRYPT_V2_TEST,$CA_BUYPASS,$CA_BUYPASS_TEST,$CA_ZEROSSL"
|
CA_SERVERS="$CA_LETSENCRYPT_V2,$CA_LETSENCRYPT_V2_TEST,$CA_BUYPASS,$CA_BUYPASS_TEST,$CA_ZEROSSL"
|
||||||
|
|
||||||
DEFAULT_USER_AGENT="$PROJECT_NAME/$VER ($PROJECT)"
|
DEFAULT_USER_AGENT="$PROJECT_NAME/$VER ($PROJECT)"
|
||||||
DEFAULT_ACCOUNT_EMAIL=""
|
|
||||||
|
|
||||||
DEFAULT_ACCOUNT_KEY_LENGTH=2048
|
DEFAULT_ACCOUNT_KEY_LENGTH=2048
|
||||||
DEFAULT_DOMAIN_KEY_LENGTH=2048
|
DEFAULT_DOMAIN_KEY_LENGTH=2048
|
||||||
@ -3459,6 +3460,21 @@ __calc_account_thumbprint() {
|
|||||||
printf "%s" "$jwk" | tr -d ' ' | _digest "sha256" | _url_replace
|
printf "%s" "$jwk" | tr -d ' ' | _digest "sha256" | _url_replace
|
||||||
}
|
}
|
||||||
|
|
||||||
|
_getAccountEmail() {
|
||||||
|
if [ "$ACCOUNT_EMAIL" ]; then
|
||||||
|
echo "$ACCOUNT_EMAIL"
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
if [ -z "$CA_EMAIL" ]; then
|
||||||
|
CA_EMAIL="$(_readcaconf CA_EMAIL)"
|
||||||
|
fi
|
||||||
|
if [ "$CA_EMAIL" ]; then
|
||||||
|
echo "$CA_EMAIL"
|
||||||
|
return 0
|
||||||
|
fi
|
||||||
|
_readaccountconf "ACCOUNT_EMAIL"
|
||||||
|
}
|
||||||
|
|
||||||
#keylength
|
#keylength
|
||||||
_regAccount() {
|
_regAccount() {
|
||||||
_initpath
|
_initpath
|
||||||
@ -3497,7 +3513,38 @@ _regAccount() {
|
|||||||
_eab_hmac_key=$(_readcaconf "CA_EAB_HMAC_KEY")
|
_eab_hmac_key=$(_readcaconf "CA_EAB_HMAC_KEY")
|
||||||
_secure_debug3 _eab_id "$_eab_id"
|
_secure_debug3 _eab_id "$_eab_id"
|
||||||
_secure_debug3 _eab_hmac_key "$_eab_hmac_key"
|
_secure_debug3 _eab_hmac_key "$_eab_hmac_key"
|
||||||
|
_email="$(_getAccountEmail)"
|
||||||
|
if [ "$_email" ]; then
|
||||||
|
_savecaconf "CA_EMAIL" "$_email"
|
||||||
|
fi
|
||||||
if [ "$ACME_VERSION" = "2" ]; then
|
if [ "$ACME_VERSION" = "2" ]; then
|
||||||
|
if [ "$ACME_DIRECTORY" = "$CA_ZEROSSL" ]; then
|
||||||
|
if [ -z "$_eab_id" ] || [ -z "$_eab_hmac_key" ]; then
|
||||||
|
_info "No EAB credentials found for ZeroSSL, let's get one"
|
||||||
|
if [ -z "$_email" ]; then
|
||||||
|
_err "Please provide a email address for zerossl account."
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_eabresp=$(_post "email=$_email" $_ZERO_EAB_ENDPOINT)
|
||||||
|
if [ "$?" != "0" ]; then
|
||||||
|
_debug2 "$_eabresp"
|
||||||
|
_err "Can not get EAB credentials from zerossl."
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_eab_id="$(echo "$_eabresp" | tr ',}' '\n' | grep '"eab_kid"' | cut -d : -f 2 | tr -d '"')"
|
||||||
|
if [ -z "$_eab_id" ]; then
|
||||||
|
_err "Can not resolve _eab_id";
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_eab_hmac_key="$(echo "$_eabresp" | tr ',}' '\n' | grep '"eab_hmac_key"' | cut -d : -f 2 | tr -d '"')"
|
||||||
|
if [ -z "$_eab_hmac_key" ]; then
|
||||||
|
_err "Can not resolve _eab_hmac_key";
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_savecaconf CA_EAB_KEY_ID "$_eab_id"
|
||||||
|
_savecaconf CA_EAB_HMAC_KEY "$_eab_hmac_key"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
if [ "$_eab_id" ] && [ "$_eab_hmac_key" ]; then
|
if [ "$_eab_id" ] && [ "$_eab_hmac_key" ]; then
|
||||||
eab_protected="{\"alg\":\"HS256\",\"kid\":\"$_eab_id\",\"url\":\"${ACME_NEW_ACCOUNT}\"}"
|
eab_protected="{\"alg\":\"HS256\",\"kid\":\"$_eab_id\",\"url\":\"${ACME_NEW_ACCOUNT}\"}"
|
||||||
_debug3 eab_protected "$eab_protected"
|
_debug3 eab_protected "$eab_protected"
|
||||||
@ -3520,44 +3567,52 @@ _regAccount() {
|
|||||||
externalBinding=",\"externalAccountBinding\":{\"protected\":\"$eab_protected64\", \"payload\":\"$eab_payload64\", \"signature\":\"$eab_signature\"}"
|
externalBinding=",\"externalAccountBinding\":{\"protected\":\"$eab_protected64\", \"payload\":\"$eab_payload64\", \"signature\":\"$eab_signature\"}"
|
||||||
_debug3 externalBinding "$externalBinding"
|
_debug3 externalBinding "$externalBinding"
|
||||||
fi
|
fi
|
||||||
if [ "$ACCOUNT_EMAIL" ]; then
|
if [ "$_email" ]; then
|
||||||
email_sg="\"contact\": [\"mailto:$ACCOUNT_EMAIL\"], "
|
email_sg="\"contact\": [\"mailto:$_email\"], "
|
||||||
fi
|
fi
|
||||||
regjson="{$email_sg\"termsOfServiceAgreed\": true$externalBinding}"
|
regjson="{$email_sg\"termsOfServiceAgreed\": true$externalBinding}"
|
||||||
else
|
else
|
||||||
_reg_res="$ACME_NEW_ACCOUNT_RES"
|
_reg_res="$ACME_NEW_ACCOUNT_RES"
|
||||||
regjson='{"resource": "'$_reg_res'", "terms-of-service-agreed": true, "agreement": "'$ACME_AGREEMENT'"}'
|
regjson='{"resource": "'$_reg_res'", "terms-of-service-agreed": true, "agreement": "'$ACME_AGREEMENT'"}'
|
||||||
if [ "$ACCOUNT_EMAIL" ]; then
|
if [ "$_email" ]; then
|
||||||
regjson='{"resource": "'$_reg_res'", "contact": ["mailto:'$ACCOUNT_EMAIL'"], "terms-of-service-agreed": true, "agreement": "'$ACME_AGREEMENT'"}'
|
regjson='{"resource": "'$_reg_res'", "contact": ["mailto:'$_email'"], "terms-of-service-agreed": true, "agreement": "'$ACME_AGREEMENT'"}'
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
_info "Registering account"
|
_info "Registering account: $ACME_DIRECTORY"
|
||||||
|
|
||||||
if ! _send_signed_request "${ACME_NEW_ACCOUNT}" "$regjson"; then
|
if ! _send_signed_request "${ACME_NEW_ACCOUNT}" "$regjson"; then
|
||||||
_err "Register account Error: $response"
|
_err "Register account Error: $response"
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
_eabAlreadyBound=""
|
||||||
if [ "$code" = "" ] || [ "$code" = '201' ]; then
|
if [ "$code" = "" ] || [ "$code" = '201' ]; then
|
||||||
echo "$response" >"$ACCOUNT_JSON_PATH"
|
echo "$response" >"$ACCOUNT_JSON_PATH"
|
||||||
_info "Registered"
|
_info "Registered"
|
||||||
elif [ "$code" = '409' ] || [ "$code" = '200' ]; then
|
elif [ "$code" = '409' ] || [ "$code" = '200' ]; then
|
||||||
_info "Already registered"
|
_info "Already registered"
|
||||||
|
elif [ "$code" = '400' ] && _contains "$response" 'The account is not awaiting external account binding'; then
|
||||||
|
_info "Already register EAB."
|
||||||
|
_eabAlreadyBound=1
|
||||||
else
|
else
|
||||||
_err "Register account Error: $response"
|
_err "Register account Error: $response"
|
||||||
return 1
|
return 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
_debug2 responseHeaders "$responseHeaders"
|
if [ -z "$_eabAlreadyBound" ]; then
|
||||||
_accUri="$(echo "$responseHeaders" | grep -i "^Location:" | _head_n 1 | cut -d ':' -f 2- | tr -d "\r\n ")"
|
_debug2 responseHeaders "$responseHeaders"
|
||||||
_debug "_accUri" "$_accUri"
|
_accUri="$(echo "$responseHeaders" | grep -i "^Location:" | _head_n 1 | cut -d ':' -f 2- | tr -d "\r\n ")"
|
||||||
if [ -z "$_accUri" ]; then
|
_debug "_accUri" "$_accUri"
|
||||||
_err "Can not find account id url."
|
if [ -z "$_accUri" ]; then
|
||||||
_err "$responseHeaders"
|
_err "Can not find account id url."
|
||||||
return 1
|
_err "$responseHeaders"
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
_savecaconf "ACCOUNT_URL" "$_accUri"
|
||||||
|
else
|
||||||
|
ACCOUNT_URL="$(_readcaconf ACCOUNT_URL)"
|
||||||
fi
|
fi
|
||||||
_savecaconf "ACCOUNT_URL" "$_accUri"
|
|
||||||
export ACCOUNT_URL="$_accUri"
|
export ACCOUNT_URL="$_accUri"
|
||||||
|
|
||||||
CA_KEY_HASH="$(__calcAccountKeyHash)"
|
CA_KEY_HASH="$(__calcAccountKeyHash)"
|
||||||
@ -3606,9 +3661,10 @@ updateaccount() {
|
|||||||
fi
|
fi
|
||||||
_initAPI
|
_initAPI
|
||||||
|
|
||||||
|
_email="$(_getAccountEmail)"
|
||||||
if [ "$ACME_VERSION" = "2" ]; then
|
if [ "$ACME_VERSION" = "2" ]; then
|
||||||
if [ "$ACCOUNT_EMAIL" ]; then
|
if [ "$ACCOUNT_EMAIL" ]; then
|
||||||
updjson='{"contact": ["mailto:'$ACCOUNT_EMAIL'"]}'
|
updjson='{"contact": ["mailto:'$_email'"]}'
|
||||||
else
|
else
|
||||||
updjson='{"contact": []}'
|
updjson='{"contact": []}'
|
||||||
fi
|
fi
|
||||||
@ -4036,7 +4092,7 @@ issue() {
|
|||||||
else
|
else
|
||||||
_cleardomainconf Le_API
|
_cleardomainconf Le_API
|
||||||
fi
|
fi
|
||||||
|
_info "Using CA: $ACME_DIRECTORY"
|
||||||
if [ "$_alt_domains" = "$NO_VALUE" ]; then
|
if [ "$_alt_domains" = "$NO_VALUE" ]; then
|
||||||
_alt_domains=""
|
_alt_domains=""
|
||||||
fi
|
fi
|
||||||
@ -6491,12 +6547,6 @@ _processAccountConf() {
|
|||||||
_saveaccountconf "USER_AGENT" "$USER_AGENT"
|
_saveaccountconf "USER_AGENT" "$USER_AGENT"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if [ "$_accountemail" ]; then
|
|
||||||
_saveaccountconf "ACCOUNT_EMAIL" "$_accountemail"
|
|
||||||
elif [ "$ACCOUNT_EMAIL" ] && [ "$ACCOUNT_EMAIL" != "$DEFAULT_ACCOUNT_EMAIL" ]; then
|
|
||||||
_saveaccountconf "ACCOUNT_EMAIL" "$ACCOUNT_EMAIL"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ "$_openssl_bin" ]; then
|
if [ "$_openssl_bin" ]; then
|
||||||
_saveaccountconf "ACME_OPENSSL_BIN" "$_openssl_bin"
|
_saveaccountconf "ACME_OPENSSL_BIN" "$_openssl_bin"
|
||||||
elif [ "$ACME_OPENSSL_BIN" ] && [ "$ACME_OPENSSL_BIN" != "$DEFAULT_OPENSSL_BIN" ]; then
|
elif [ "$ACME_OPENSSL_BIN" ] && [ "$ACME_OPENSSL_BIN" != "$DEFAULT_OPENSSL_BIN" ]; then
|
||||||
|
Loading…
Reference in New Issue
Block a user