Commit Graph

5034 Commits

Author SHA1 Message Date
31f65b89bb fix: fix freebsd and solaris 2021-02-15 15:19:18 +08:00
86639dbc02 feat: add huaweicloud error handling 2021-02-15 15:18:49 +08:00
bf8c33703c Fix: Unifi deploy hook support Unifi Cloud Key (#3327)
* fix: unifi deploy hook also update Cloud Key nginx certs

When running on a Unifi Cloud Key device, also deploy to
/etc/ssl/private/cloudkey.{crt,key} and reload nginx. This
makes the new cert available for the Cloud Key management
app running via nginx on port 443 (as well as the port 8443
Unifi Controller app the deploy hook already supported).

Fixes #3326

* Improve settings documentation comments

* Improve Cloud Key pre-flight error messaging

* Fix typo

* Add support for UnifiOS (Cloud Key Gen2)

Since UnifiOS does not use the Java keystore (like a Unifi
Controller or Cloud Key Gen1 deploy), this also reworks
the settings validation and error messaging somewhat.

* PR review fixes

* Detect unsupported Cloud Key java keystore location

* Don't try to restart inactive services

(and remove extra spaces from reload command)

* Clean up error messages and internal variables

* Change to _getdeployconf/_savedeployconf

* Switch from cp to cat to preserve file permissions
2021-02-15 15:01:21 +08:00
ffe7ef4764 More than one blank line is an abomination, apparently
I will not try to use whitespace to group code visually
2021-02-14 20:06:07 -08:00
30dae70e2b Implement curl version of smtp notify-hook 2021-02-14 19:56:23 -08:00
557a747d55 Prep for curl or Python; clean up SMTP_* variable usage 2021-02-14 16:42:25 -08:00
fe273b3829 Add instructions for reporting bugs 2021-02-14 13:10:30 -08:00
2439bb30e8 Only save config if send is successful 2021-02-14 13:10:30 -08:00
e48b6bd22d Make shfmt happy
(I'm open to better ways of formatting the heredoc
that embeds the Python script.)
2021-02-14 13:10:30 -08:00
1de9ffacb0 Implement smtp notify hook
Support notifications via direct SMTP server connection.
Uses Python (2.7.x or 3.4+) to communicate with SMTP server.
2021-02-14 13:10:30 -08:00
93fd6170a3 Update truenas.sh 2021-02-13 12:38:57 +01:00
b7c3e6099c duckdns - fix "integer expression expected" errors (#3397)
* fix "integer expression expected" errors

* duckdns fix

* Update dns_duckdns.sh

* Update dns_duckdns.sh
2021-02-13 18:58:44 +08:00
d8163e9835 upgrade freebsd and solaris 2021-02-13 17:27:22 +08:00
12b1916599 Chain (#3408)
* fix https://github.com/acmesh-official/acme.sh/issues/3384
match the issuer to the root CA cert subject

* fix format

* fix https://github.com/acmesh-official/acme.sh/issues/3384

* remove the alt files. https://github.com/acmesh-official/acme.sh/issues/3384
2021-02-13 16:22:31 +08:00
9d8cdb5976 Merge pull request #3401 from gnought/bugfix/preferred_chain_isrg
Updated --preferred-chain to issue ISRG properly
2021-02-12 14:33:02 +08:00
29a7c1938a Merge pull request #3403 from manuelm/dev
dnsapi/pdns: also normalize json response in detecting root zone
2021-02-12 11:03:38 +08:00
8636d3139e dnsapi/pdns: also normalize json response in detecting root zone 2021-02-11 11:24:21 +01:00
987571ce91 Updated --preferred-chain to issue ISRG properly
To support different openssl crl2pkcs7 help cli format
2021-02-11 01:08:08 +08:00
6f4c5fcc87 Update truenas.sh 2021-02-07 21:25:49 +01:00
a7ca010d4e Update truenas.sh 2021-02-07 21:24:06 +01:00
a836842a7e Update truenas.sh 2021-02-07 21:20:56 +01:00
f8c11a324a Update truenas.sh 2021-02-07 19:19:04 +01:00
052c9be111 Update truenas.sh 2021-02-07 19:12:39 +01:00
854e520528 Update truenas.sh 2021-02-07 19:02:03 +01:00
05737b85eb Update truenas.sh 2021-02-07 18:47:04 +01:00
c8a2308739 Update truenas.sh 2021-02-07 18:42:48 +01:00
ed46a078f9 Update truenas.sh 2021-02-07 16:35:51 +01:00
4f7c2bf8c3 Update truenas.sh 2021-02-07 16:12:24 +01:00
0e341726d2 Edits after DoShellcheck 2021-02-06 23:20:52 +01:00
a4f9746d3a Danksagung an danb35 2021-02-06 23:03:07 +01:00
556c546b2e Deploy Scipt for TrueNAs Server
acme .sh deploy Scipt for TrueNAS Server that uses the REST API from TrueNAS.

- Authentification with API Key
- If HTTP redirect is configured, automatik switch to HTTPS
- If WebDAV Certificate is the same as Web UI Certificate, Webdav Certificate get also an updated
- If FTP Certificate is the same as Web UI Certificate, FTP Certificate get also an updated
2021-02-06 22:48:25 +01:00
aa479948f9 Final try, leaving _hmac as before 2021-02-04 19:03:35 +01:00
fa3cee9d58 Update dns_websupport.sh 2021-02-04 18:38:40 +01:00
0021fb8a33 Changing the _hmac auth back
It only works this way, apparently
2021-02-04 17:27:39 +01:00
c8c727e6c6 added hex param to _hmac
but removed "printf "s%" ...
2021-02-04 17:21:33 +01:00
b8494ab3cc Update dns_websupport.sh 2021-02-04 17:15:22 +01:00
2eda03f5de Changing the _hmac call into Neil's suggestion 2021-02-04 15:32:51 +01:00
3a38358946 Trying the original solution
_hmac sha1 "$(printf "%s" "$WS_ApiSecret" | _hex_dump | tr -d " ")" hex)
2021-02-04 15:22:53 +01:00
e7fc697e57 Merge pull request #3338 from fvahid/master
update arvan api script
2021-02-04 22:20:00 +08:00
6c9845b9f3 adding the hex parameter to _hmac call 2021-02-04 15:18:39 +01:00
9e146a8a5a Typo
Forgot a quotation mark on line 161
2021-02-04 15:15:17 +01:00
433d9bfb02 Implementing/testing Neil's suggestions 2021-02-04 15:11:53 +01:00
94917e315e Testing double 2>/dev/null into _utc_date with sed 2021-02-04 11:18:22 +01:00
ced6852735 2>/dev/null/ to 2>/dev/null
Silly mistake with a "/" -.-
2021-02-04 11:15:13 +01:00
8dc55f417d Extra test - adding date -u -d
Adding this to at least partially prevent the virtually nonexistent possibility of timestamp and _utc_date() mismatch. If the normal date -u -d does not get converted (looking at you Solaris!), the poor man's method with manipulating the _utc_date() string output kicks in.
2021-02-04 10:13:36 +01:00
3d338bba3c Fixing the shebang accident 2021-02-04 00:31:46 +01:00
631398f700 sed workaround for "datez" 2021-02-04 00:21:08 +01:00
7984d8cdfb And again 2021-02-01 20:43:22 +01:00
783a6110ef Yet another Solaris test 2021-02-01 20:31:05 +01:00
5d4d53c3a1 Testing datez change for Solaris 2021-02-01 18:37:17 +01:00