acmesmith 0.5.1 → 0.6.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/acmesmith/command.rb +64 -25
- data/lib/acmesmith/config.rb +4 -0
- data/lib/acmesmith/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 63bbb87b41e2ab5fbe44ca6ad4026795e314519f
|
4
|
+
data.tar.gz: c1d0645c4dc6d710e0422afd4caade86ed46c745
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d01c1960e2fa8eae938260f3bb9a2f52f7caedf31d4540c667ab6061f4c8095bb1855e34d1170b409b5d7f396438dc69b38474bf2d25458563e1924a1ddf0c47
|
7
|
+
data.tar.gz: f5ae0c2375fb018564e5c5dbb5fe107613d35dbac0227e8c62e58b4037e6936acd5adef2a46f96eceaa93115af687375e08388973a66389d3037ddb99625b131
|
data/lib/acmesmith/command.rb
CHANGED
@@ -22,42 +22,81 @@ module Acmesmith
|
|
22
22
|
puts "Generated:\n#{key.private_key.public_key.to_pem}"
|
23
23
|
end
|
24
24
|
|
25
|
-
desc "authorize DOMAIN", "Get authz for DOMAIN."
|
26
|
-
def authorize(
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
25
|
+
desc "authorize DOMAIN [DOMAIN ...]", "Get authz for DOMAIN."
|
26
|
+
def authorize(*domains)
|
27
|
+
targets = domains.map do |domain|
|
28
|
+
authz = acme.authorize(domain: domain)
|
29
|
+
challenges = [authz.http01, authz.dns01, authz.tls_sni01].compact
|
30
|
+
challenge = nil
|
31
|
+
responder = config.challenge_responders.find do |x|
|
32
|
+
challenge = challenges.find { |_| x.support?(_.class::CHALLENGE_TYPE) }
|
33
|
+
end
|
34
|
+
{domain: domain, authz: authz, responder: responder, challenge: challenge}
|
34
35
|
end
|
35
36
|
|
36
|
-
responder.respond(domain, challenge)
|
37
|
-
|
38
37
|
begin
|
39
|
-
|
40
|
-
|
41
|
-
loop do
|
42
|
-
status = challenge.verify_status
|
43
|
-
puts " * verify_status: #{status}"
|
44
|
-
break if status == 'valid'
|
45
|
-
if status == "invalid"
|
46
|
-
err = challenge.error
|
47
|
-
puts "#{err["type"]}: #{err["detail"]}"
|
48
|
-
end
|
49
|
-
sleep 3
|
38
|
+
targets.each do |target|
|
39
|
+
target[:responder].respond(target[:domain], target[:challenge])
|
50
40
|
end
|
51
|
-
|
41
|
+
|
42
|
+
targets.each do |target|
|
43
|
+
puts "=> Requesting verifications..."
|
44
|
+
target[:challenge].request_verification
|
45
|
+
end
|
46
|
+
loop do
|
47
|
+
all_valid = true
|
48
|
+
targets.each do |target|
|
49
|
+
next if target[:valid]
|
50
|
+
|
51
|
+
status = target[:challenge].verify_status
|
52
|
+
puts " * [#{target[:domain]}] verify_status: #{status}"
|
53
|
+
|
54
|
+
if status == 'valid'
|
55
|
+
target[:valid] = true
|
56
|
+
next
|
57
|
+
end
|
58
|
+
|
59
|
+
all_valid = false
|
60
|
+
if status == "invalid"
|
61
|
+
err = target[:challenge].error
|
62
|
+
puts " ! [#{target[:domain]}] #{err["type"]}: #{err["detail"]}"
|
63
|
+
end
|
64
|
+
end
|
65
|
+
break if all_valid
|
66
|
+
sleep 3
|
67
|
+
end
|
68
|
+
puts "=> Done"
|
52
69
|
ensure
|
53
|
-
|
70
|
+
targets.each do |target|
|
71
|
+
target[:responder].cleanup(target[:domain], target[:challenge])
|
72
|
+
end
|
54
73
|
end
|
55
74
|
end
|
56
75
|
|
57
76
|
desc "request COMMON_NAME [SAN]", "request certificate for CN +COMMON_NAME+ with SANs +SAN+"
|
58
77
|
def request(common_name, *sans)
|
59
78
|
csr = Acme::Client::CertificateRequest.new(common_name: common_name, names: sans)
|
60
|
-
|
79
|
+
retried = false
|
80
|
+
acme_cert = begin
|
81
|
+
acme.new_certificate(csr)
|
82
|
+
rescue Acme::Client::Error::Unauthorized => e
|
83
|
+
raise unless config.auto_authorize_on_request
|
84
|
+
|
85
|
+
puts "=> Authorizing unauthorized domain names"
|
86
|
+
# https://github.com/letsencrypt/boulder/blob/b9369a481415b3fe31e010b34e2ff570b89e42aa/ra/ra.go#L604
|
87
|
+
m = e.message.match(/authorizations for these names not found or expired: ((?:[a-zA-Z0-9_.\-]+(?:,\s+|$))+)/)
|
88
|
+
if m && m[1]
|
89
|
+
domains = m[1].split(/,\s+/)
|
90
|
+
else
|
91
|
+
warn " ! Error message on certificate request was #{e.message.inspect} and acmesmith couldn't determine which domain names are unauthorized (maybe a bug)"
|
92
|
+
warn " ! Attempting to authorize all domains in this certificate reuqest for now."
|
93
|
+
domains = [common_name, *sans]
|
94
|
+
end
|
95
|
+
puts " * #{domains.join(', ')}"
|
96
|
+
authorize(*domains)
|
97
|
+
retried = true
|
98
|
+
retry unless retried
|
99
|
+
end
|
61
100
|
|
62
101
|
cert = Certificate.from_acme_client_certificate(acme_cert)
|
63
102
|
storage.put_certificate(cert, certificate_key_passphrase)
|
data/lib/acmesmith/config.rb
CHANGED
data/lib/acmesmith/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: acmesmith
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.6.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- sorah (Shota Fukumori)
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2017-
|
11
|
+
date: 2017-05-06 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: acme-client
|
@@ -157,7 +157,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
157
157
|
version: '0'
|
158
158
|
requirements: []
|
159
159
|
rubyforge_project:
|
160
|
-
rubygems_version: 2.6.
|
160
|
+
rubygems_version: 2.6.8
|
161
161
|
signing_key:
|
162
162
|
specification_version: 4
|
163
163
|
summary: ACME client (Let's encrypt client) to manage certificate in multi server
|