v-sign-letsencrypt-csr 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. #!/bin/bash
  2. # info: sing letsencrypt csr
  3. # options: USER DOMAIN CSR_DIR [FORMAT]
  4. #
  5. # The function signs certificate request using LetsEncript API
  6. #----------------------------------------------------------#
  7. # Variable&Function #
  8. #----------------------------------------------------------#
  9. # Argument definition
  10. user=$1
  11. domain=$(idn -t --quiet -u "$2" )
  12. domain=$(echo $domain | tr '[:upper:]' '[:lower:]')
  13. csr="$3/$domain.csr"
  14. format=$4
  15. # Includes
  16. source $VESTA/func/main.sh
  17. source $VESTA/conf/vesta.conf
  18. # encode base64
  19. encode_base64() {
  20. cat |base64 |tr '+/' '-_' |tr -d '\r\n='
  21. }
  22. #----------------------------------------------------------#
  23. # Verifications #
  24. #----------------------------------------------------------#
  25. check_args '3' "$#" 'USER DOMAIN CSR'
  26. is_format_valid 'user' 'domain'
  27. is_system_enabled "$WEB_SYSTEM" 'WEB_SYSTEM'
  28. is_object_valid 'user' 'USER' "$user"
  29. is_object_unsuspended 'user' 'USER' "$user"
  30. if [ ! -e "$USER_DATA/ssl/le.conf" ]; then
  31. check_result $E_NOTEXIST "LetsEncrypt key doesn't exist"
  32. fi
  33. check_domain=$(grep -w "$domain'" $USER_DATA/web.conf)
  34. if [ -z "$check_domain" ]; then
  35. check_result $E_NOTEXIST "domain $domain doesn't exist"
  36. fi
  37. if [ ! -e "$csr" ]; then
  38. check_result $E_NOTEXIST "$csr doesn't exist"
  39. fi
  40. #----------------------------------------------------------#
  41. # Action #
  42. #----------------------------------------------------------#
  43. source $USER_DATA/ssl/le.conf
  44. api='https://acme-v01.api.letsencrypt.org'
  45. r_domain=$(echo "$check_domain" |cut -f 2 -d \')
  46. key="$USER_DATA/ssl/user.key"
  47. exponent="$EXPONENT"
  48. modulus="$MODULUS"
  49. thumb="$THUMB"
  50. # Defining JWK header
  51. header='{"e":"'$exponent'","kty":"RSA","n":"'"$modulus"'"}'
  52. header='{"alg":"RS256","jwk":'"$header"'}'
  53. # Requesting nonce
  54. nonce=$(curl -s -I "$api/directory" |grep Nonce |cut -f2 -d \ |tr -d '\r\n')
  55. protected=$(echo -n '{"nonce":"'"$nonce"'"}' |encode_base64)
  56. # Defining ACME query (request challenge)
  57. csr=$(openssl req -in $csr -outform DER |encode_base64)
  58. query='{"resource":"new-cert","csr":"'$csr'"}'
  59. payload=$(echo -n "$query" |encode_base64)
  60. signature=$(printf "%s" "$protected.$payload" |\
  61. openssl dgst -sha256 -binary -sign "$key" |encode_base64)
  62. data='{"header":'"$header"',"protected":"'"$protected"'",'
  63. data=$data'"payload":"'"$payload"'","signature":"'"$signature"'"}'
  64. # Sending request to LetsEncrypt API
  65. answer=$(mktemp)
  66. curl -s -d "$data" "$api/acme/new-cert" -o $answer
  67. if [ ! -z "$(grep Error $answer)" ]; then
  68. detail="$(cat $answer |tr ',' '\n' |grep detail |cut -f 4 -d \")"
  69. detail=$(echo "$detail" |awk -F "::" '{print $2}')
  70. rm $answer
  71. check_result $E_LIMIT "$detail"
  72. fi
  73. # Printing certificate
  74. crt=$(cat "$answer" |openssl base64 -e)
  75. rm $answer
  76. if [ "$format" != 'json' ]; then
  77. echo "-----BEGIN CERTIFICATE-----"
  78. echo "$crt"
  79. echo "-----END CERTIFICATE-----"
  80. else
  81. echo -e "{\n\t\"$domain\": {\n\t\t\"CRT\":\""
  82. echo -n '-----BEGIN CERTIFICATE-----\n'
  83. echo -n "$crt" |sed ':a;N;$!ba;s/\n/\\n/g'
  84. echo -n '-----END CERTIFICATE-----'
  85. echo -e "\"\n\t\t}\n\t}"
  86. fi
  87. #----------------------------------------------------------#
  88. # Vesta #
  89. #----------------------------------------------------------#
  90. # Logging
  91. log_event "$OK" "$ARGUMENTS"
  92. exit