Commit Graph

5096 Commits

Author SHA1 Message Date
Mike Beattie
fb079f9e50
Update telegram.sh
(fix shellcheck failure)
2021-04-08 16:44:22 +12:00
Mike Beattie
39b09f8f87 Dump _post() call output to /dev/null
Signed-off-by: Mike Beattie <mike@ethernal.org>
2021-04-08 16:38:00 +12:00
Mike Beattie
53d26e5c5c Add debug output of $_data variable to aid diagnosis
Signed-off-by: Mike Beattie <mike@ethernal.org>
2021-04-08 16:37:27 +12:00
Mike Beattie
e21f3e6c73 Escape asterisks in notification content
This messes with markdown parsing

Signed-off-by: Mike Beattie <mike@ethernal.org>
2021-04-08 16:36:42 +12:00
neil
edd46eb3d1
Merge pull request #3478 from acmesh-official/dev
sync
2021-04-07 22:04:08 +08:00
neil
e71238571a
Merge pull request #3464 from jpbede/cleverreach-deploy-sublient
CleverReach Deploy Hook: Allow deploy to agency subaccounts
2021-04-04 19:03:33 +08:00
Jan-Philipp Benecke
2867ec509e
Make CI happy 2021-03-30 09:18:33 +02:00
Jan-Philipp Benecke
d853a9ebbe
Make uploading cert to subaccount possible 2021-03-30 09:13:32 +02:00
neil
e0d2fa98f3
Merge pull request #3463 from c35sys/patch-1
Use 'vault kv put' instead of 'vault write'
2021-03-29 22:27:07 +08:00
Christophe Le Guern
cc90f83463
Use 'vault kv put' instead of 'vault write'
When using vault_cli with a kv2 path, it isn't working. I have the following error:
```
WARNING! The following warnings were returned from Vault:                                                                                                                                                                                     
                                                                                                                                                                                                                                              
  * Invalid path for a versioned K/V secrets engine. See the API docs for the                                                                                                                                                                 
  appropriate API endpoints to use. If using the Vault CLI, use 'vault kv put'                                                                                                                                                                
  for this operation.                                                                                                                                                                                                                         
```
The new way to write data  is to use `vault kv put`, it is compatible with kv1 and kv2.
Ref: https://www.vaultproject.io/docs/commands#reading-and-writing-data
```
The original version of K/V used the common read and write operations. A more advanced K/V Version 2 engine was released in Vault 0.10 and introduced the kv get and kv put commands.
```
2021-03-29 15:10:14 +02:00
neil
9ea1238e1b
Merge pull request #3445 from woutd/constellix-wildcard-support
Add wildcard certificate support for dns_constellix
2021-03-27 08:10:59 +08:00
Jan-Philipp Benecke
1530abbd1a
Make uploading cert to subaccount possible 2021-03-26 15:37:12 +01:00
wout
3bfcd18a03 Workaround for Solaris, as it does not support non-greedy regex 2021-03-24 13:56:14 +01:00
wout
6b7db22981 Catch the situation when the TXT record is updated with the same value 2021-03-24 09:01:54 +01:00
wout
8adb8a6986 While [0-9]+ is a bit more correct than [0-9]*, the former does not seem to work on Solaris. 2021-03-23 21:20:27 +01:00
emueller
37e3e2f9c2 fixed formating 2021-03-22 15:32:02 +01:00
emueller
3c7be32ef5 fix _exists error message when MAIL_BIN env variable is not set 2021-03-22 15:12:27 +01:00
Alexander Kulumbeg
051775b9b4
String update
Hopefully the last one
2021-03-21 16:25:04 +01:00
neilpang
e0d5b91388 fix freebsd 2021-03-21 16:20:32 +01:00
qkdreyer
4dd2027428 fix: prevent rate limit 2021-03-21 16:20:32 +01:00
Quentin Dreyer
42ab98b830 feat: add dns_porkbun 2021-03-21 16:20:32 +01:00
neil
2b2bce6457 fix format 2021-03-21 16:20:32 +01:00
neil
69ee816541 fix https://github.com/acmesh-official/acme.sh/issues/3312 2021-03-21 16:20:32 +01:00
anom-human
2cbf3f7e15 Update dns_servercow.sh to support wildcard certs
Updated dns_servercow.sh to support txt records with multiple entries. This supports wildcard certificates that require txt records with the same name and different contents.
2021-03-21 16:20:32 +01:00
anom-human
923eece3f5 Update dns_servercow.sh to support wildcard certs
Updated dns_servercow.sh to support txt records with multiple entries. This supports wildcard certificates that require txt records with the same name and different contents.
2021-03-21 16:20:32 +01:00
neilpang
d4fb313ff0 fix format 2021-03-21 16:20:32 +01:00
neilpang
7dce465c06 fix https://github.com/acmesh-official/acme.sh/issues/3019 2021-03-21 16:20:32 +01:00
neilpang
5a30f5c00e fix https://github.com/acmesh-official/acme.sh/issues/3433 2021-03-21 16:20:32 +01:00
Lukas Brocke
fd406af962 dnsapi/ionos: Use POST instead of PATCH for adding TXT record
The API now supports a POST route for adding records. Therefore
checking for already existing records and including them in a PATCH
request is no longer necessary.
2021-03-21 16:20:32 +01:00
neilpang
9e5ae30372 fix https://github.com/acmesh-official/acme.sh/issues/3402 2021-03-21 16:20:32 +01:00
Kristian Johansson
0fe3538331 Adds comment 2021-03-21 16:20:32 +01:00
Kristian Johansson
b0f5ad75ae Fixes response handling and thereby allow issuing of subdomain certs 2021-03-21 16:20:32 +01:00
Geert Hendrickx
a290f63a15 No need to include EC parameters explicitly with the private key.
(they are embedded)
2021-03-21 16:20:32 +01:00
czeming
d078ce794e Update dns_dp.sh
没有encode中文字符会导致提交失败
2021-03-21 16:20:32 +01:00
medmunds
06f51a5c34 Change default SMTP_SECURE to "tls"
Secure by default. Also try to minimize configuration errors.
(Many ESPs/ISPs require STARTTLS, and most support it.)
2021-03-21 16:20:32 +01:00
medmunds
db96778064 Prefer Python to curl when both available 2021-03-21 16:20:32 +01:00
medmunds
d8918ea156 Use email.policy.default in Python 3 implementation
Improves standards compatibility and utf-8 handling
in Python 3.3-3.8. (email.policy.default becomes the
default in Python 3.9.)
2021-03-21 16:20:32 +01:00
medmunds
3503474bb8 Add Date email header in Python implementation 2021-03-21 16:20:32 +01:00
medmunds
eb1606b086 Clarify _readaccountconf_mutable_default 2021-03-21 16:20:32 +01:00
medmunds
1330a092fa Clean email headers and warn on unsupported address format
Just in case, make sure CR or NL don't end up in
an email header.
2021-03-21 16:20:32 +01:00
medmunds
d3c74cfb45 Implement _rfc2822_date helper 2021-03-21 16:20:32 +01:00
medmunds
d044545520 Rework read/save config to not save default values
Add and use _readaccountconf_mutable_default and
_saveaccountconf_mutable_default helpers to capture
common default value handling.

New approach also eliminates need for separate
underscore-prefixed version of each conf var.
2021-03-21 16:20:32 +01:00
medmunds
d1cdc1c6a0 Add _clearaccountconf_mutable() 2021-03-21 16:20:32 +01:00
medmunds
dc8d91ea39 Use PROJECT_NAME and VER for X-Mailer header
Also add X-Mailer header to Python version
2021-03-21 16:20:32 +01:00
neilpang
ae5a6d330d make the fix for rsa key only 2021-03-21 16:20:32 +01:00
neilpang
fe0bee21b0 support openssl 3.0
fix https://github.com/acmesh-official/acme.sh/issues/3399
2021-03-21 16:20:32 +01:00
Easton Man
c090c19bfe fix: fix freebsd and solaris 2021-03-21 16:20:32 +01:00
Easton Man
8fbec785e8 feat: add huaweicloud error handling 2021-03-21 16:20:32 +01:00
Mike Edmunds
06fb3d9476 Fix: Unifi deploy hook support Unifi Cloud Key (#3327)
* fix: unifi deploy hook also update Cloud Key nginx certs

When running on a Unifi Cloud Key device, also deploy to
/etc/ssl/private/cloudkey.{crt,key} and reload nginx. This
makes the new cert available for the Cloud Key management
app running via nginx on port 443 (as well as the port 8443
Unifi Controller app the deploy hook already supported).

Fixes #3326

* Improve settings documentation comments

* Improve Cloud Key pre-flight error messaging

* Fix typo

* Add support for UnifiOS (Cloud Key Gen2)

Since UnifiOS does not use the Java keystore (like a Unifi
Controller or Cloud Key Gen1 deploy), this also reworks
the settings validation and error messaging somewhat.

* PR review fixes

* Detect unsupported Cloud Key java keystore location

* Don't try to restart inactive services

(and remove extra spaces from reload command)

* Clean up error messages and internal variables

* Change to _getdeployconf/_savedeployconf

* Switch from cp to cat to preserve file permissions
2021-03-21 16:20:32 +01:00
medmunds
fe3e8a7bb6 More than one blank line is an abomination, apparently
I will not try to use whitespace to group code visually
2021-03-21 16:20:32 +01:00