]> git.proxmox.com Git - mirror_acme.sh.git/blob - dnsapi/dns_1984hosting.sh
Merge pull request #3669 from youuy/master
[mirror_acme.sh.git] / dnsapi / dns_1984hosting.sh
1 #!/usr/bin/env sh
2 #This file name is "dns_1984hosting.sh"
3 #So, here must be a method dns_1984hosting_add()
4 #Which will be called by acme.sh to add the txt record to your api system.
5 #returns 0 means success, otherwise error.
6
7 #Author: Adrian Fedoreanu
8 #Report Bugs here: https://github.com/acmesh-official/acme.sh
9 # or here... https://github.com/acmesh-official/acme.sh/issues/2851
10 #
11 ######## Public functions #####################
12
13 # Export 1984HOSTING username and password in following variables
14 #
15 # One984HOSTING_Username=username
16 # One984HOSTING_Password=password
17 #
18 # sessionid cookie is saved in ~/.acme.sh/account.conf
19 # username/password need to be set only when changed.
20
21 #Usage: dns_1984hosting_add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
22 dns_1984hosting_add() {
23 fulldomain=$1
24 txtvalue=$2
25
26 _info "Add TXT record using 1984Hosting"
27 _debug fulldomain "$fulldomain"
28 _debug txtvalue "$txtvalue"
29
30 if ! _1984hosting_login; then
31 _err "1984Hosting login failed for user $One984HOSTING_Username. Check $HTTP_HEADER file"
32 return 1
33 fi
34
35 _debug "First detect the root zone"
36 if ! _get_root "$fulldomain"; then
37 _err "invalid domain" "$fulldomain"
38 return 1
39 fi
40 _debug _sub_domain "$_sub_domain"
41 _debug _domain "$_domain"
42
43 _debug "Add TXT record $fulldomain with value '$txtvalue'"
44 value="$(printf '%s' "$txtvalue" | _url_encode)"
45 url="https://management.1984hosting.com/domains/entry/"
46
47 postdata="entry=new"
48 postdata="$postdata&type=TXT"
49 postdata="$postdata&ttl=900"
50 postdata="$postdata&zone=$_domain"
51 postdata="$postdata&host=$_sub_domain"
52 postdata="$postdata&rdata=%22$value%22"
53 _debug2 postdata "$postdata"
54
55 _authpost "$postdata" "$url"
56 response="$(echo "$_response" | _normalizeJson)"
57 _debug2 response "$response"
58
59 if _contains "$response" '"haserrors": true'; then
60 _err "1984Hosting failed to add TXT record for $_sub_domain bad RC from _post"
61 return 1
62 elif _contains "$response" "html>"; then
63 _err "1984Hosting failed to add TXT record for $_sub_domain. Check $HTTP_HEADER file"
64 return 1
65 elif _contains "$response" '"auth": false'; then
66 _err "1984Hosting failed to add TXT record for $_sub_domain. Invalid or expired cookie"
67 return 1
68 fi
69
70 _info "Added acme challenge TXT record for $fulldomain at 1984Hosting"
71 return 0
72 }
73
74 #Usage: fulldomain txtvalue
75 #Remove the txt record after validation.
76 dns_1984hosting_rm() {
77 fulldomain=$1
78 txtvalue=$2
79
80 _info "Delete TXT record using 1984Hosting"
81 _debug fulldomain "$fulldomain"
82 _debug txtvalue "$txtvalue"
83
84 if ! _1984hosting_login; then
85 _err "1984Hosting login failed for user $One984HOSTING_Username. Check $HTTP_HEADER file"
86 return 1
87 fi
88
89 _debug "First detect the root zone"
90 if ! _get_root "$fulldomain"; then
91 _err "invalid domain" "$fulldomain"
92 return 1
93 fi
94 _debug _sub_domain "$_sub_domain"
95 _debug _domain "$_domain"
96 _debug "Delete $fulldomain TXT record"
97
98 url="https://management.1984hosting.com/domains"
99 if ! _get_zone_id "$url" "$_domain"; then
100 _err "invalid zone" "$_domain"
101 return 1
102 fi
103
104 _htmlget "$url/$_zone_id" "$txtvalue"
105 _debug2 _response "$_response"
106 entry_id="$(echo "$_response" | _egrep_o 'entry_[0-9]+' | sed 's/entry_//')"
107 _debug2 entry_id "$entry_id"
108 if [ -z "$entry_id" ]; then
109 _err "Error getting TXT entry_id for $1"
110 return 1
111 fi
112
113 _authpost "entry=$entry_id" "$url/delentry/"
114 response="$(echo "$_response" | _normalizeJson)"
115 _debug2 response "$response"
116
117 if ! _contains "$response" '"ok": true'; then
118 _err "1984Hosting failed to delete TXT record for $entry_id bad RC from _post"
119 return 1
120 fi
121
122 _info "Deleted acme challenge TXT record for $fulldomain at 1984Hosting"
123 return 0
124 }
125
126 #################### Private functions below ##################################
127
128 # usage: _1984hosting_login username password
129 # returns 0 success
130 _1984hosting_login() {
131 if ! _check_credentials; then return 1; fi
132
133 if _check_cookies; then
134 _debug "Already logged in"
135 return 0
136 fi
137
138 _debug "Login to 1984Hosting as user $One984HOSTING_Username"
139 username=$(printf '%s' "$One984HOSTING_Username" | _url_encode)
140 password=$(printf '%s' "$One984HOSTING_Password" | _url_encode)
141 url="https://management.1984hosting.com/accounts/checkuserauth/"
142
143 response="$(_post "username=$username&password=$password&otpkey=" $url)"
144 response="$(echo "$response" | _normalizeJson)"
145 _debug2 response "$response"
146
147 if _contains "$response" '"loggedin": true'; then
148 One984HOSTING_SESSIONID_COOKIE="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'sessionid=[^;]*;' | tr -d ';')"
149 One984HOSTING_CSRFTOKEN_COOKIE="$(grep -i '^set-cookie:' "$HTTP_HEADER" | _egrep_o 'csrftoken=[^;]*;' | tr -d ';')"
150 export One984HOSTING_SESSIONID_COOKIE
151 export One984HOSTING_CSRFTOKEN_COOKIE
152 _saveaccountconf_mutable One984HOSTING_SESSIONID_COOKIE "$One984HOSTING_SESSIONID_COOKIE"
153 _saveaccountconf_mutable One984HOSTING_CSRFTOKEN_COOKIE "$One984HOSTING_CSRFTOKEN_COOKIE"
154 return 0
155 fi
156 return 1
157 }
158
159 _check_credentials() {
160 if [ -z "$One984HOSTING_Username" ] || [ -z "$One984HOSTING_Password" ]; then
161 One984HOSTING_Username=""
162 One984HOSTING_Password=""
163 _err "You haven't specified 1984Hosting username or password yet."
164 _err "Please export as One984HOSTING_Username / One984HOSTING_Password and try again."
165 return 1
166 fi
167 return 0
168 }
169
170 _check_cookies() {
171 One984HOSTING_SESSIONID_COOKIE="${One984HOSTING_SESSIONID_COOKIE:-$(_readaccountconf_mutable One984HOSTING_SESSIONID_COOKIE)}"
172 One984HOSTING_CSRFTOKEN_COOKIE="${One984HOSTING_CSRFTOKEN_COOKIE:-$(_readaccountconf_mutable One984HOSTING_CSRFTOKEN_COOKIE)}"
173 if [ -z "$One984HOSTING_SESSIONID_COOKIE" ] || [ -z "$One984HOSTING_CSRFTOKEN_COOKIE" ]; then
174 _debug "No cached cookie(s) found"
175 return 1
176 fi
177
178 _authget "https://management.1984hosting.com/accounts/loginstatus/"
179 if _contains "$response" '"ok": true'; then
180 _debug "Cached cookies still valid"
181 return 0
182 fi
183 _debug "Cached cookies no longer valid"
184 One984HOSTING_SESSIONID_COOKIE=""
185 One984HOSTING_CSRFTOKEN_COOKIE=""
186 _saveaccountconf_mutable One984HOSTING_SESSIONID_COOKIE "$One984HOSTING_SESSIONID_COOKIE"
187 _saveaccountconf_mutable One984HOSTING_CSRFTOKEN_COOKIE "$One984HOSTING_CSRFTOKEN_COOKIE"
188 return 1
189 }
190
191 #_acme-challenge.www.domain.com
192 #returns
193 # _sub_domain=_acme-challenge.www
194 # _domain=domain.com
195 _get_root() {
196 domain="$1"
197 i=1
198 p=1
199 while true; do
200 h=$(printf "%s" "$domain" | cut -d . -f $i-100)
201
202 if [ -z "$h" ]; then
203 #not valid
204 return 1
205 fi
206
207 _authget "https://management.1984hosting.com/domains/soacheck/?zone=$h&nameserver=ns0.1984.is."
208 if _contains "$_response" "serial" && ! _contains "$_response" "null"; then
209 _sub_domain=$(printf "%s" "$domain" | cut -d . -f 1-$p)
210 _domain="$h"
211 return 0
212 fi
213 p=$i
214 i=$(_math "$i" + 1)
215 done
216 return 1
217 }
218
219 #usage: _get_zone_id url domain.com
220 #returns zone id for domain.com
221 _get_zone_id() {
222 url=$1
223 domain=$2
224 _htmlget "$url" "$domain"
225 _debug2 _response "$_response"
226 _zone_id="$(echo "$_response" | _egrep_o 'zone\/[0-9]+' | _head_n 1)"
227 _debug2 _zone_id "$_zone_id"
228 if [ -z "$_zone_id" ]; then
229 _err "Error getting _zone_id for $2"
230 return 1
231 fi
232 return 0
233 }
234
235 # add extra headers to request
236 _authget() {
237 export _H1="Cookie: $One984HOSTING_CSRFTOKEN_COOKIE;$One984HOSTING_SESSIONID_COOKIE"
238 _response=$(_get "$1" | _normalizeJson)
239 _debug2 _response "$_response"
240 }
241
242 # truncate huge HTML response
243 # echo: Argument list too long
244 _htmlget() {
245 export _H1="Cookie: $One984HOSTING_CSRFTOKEN_COOKIE;$One984HOSTING_SESSIONID_COOKIE"
246 _response=$(_get "$1" | grep "$2")
247 if _contains "$_response" "@$2"; then
248 _response=$(echo "$_response" | grep -v "[@]" | _head_n 1)
249 fi
250 }
251
252 # add extra headers to request
253 _authpost() {
254 url="https://management.1984hosting.com/domains"
255 _get_zone_id "$url" "$_domain"
256 csrf_header="$(echo "$One984HOSTING_CSRFTOKEN_COOKIE" | _egrep_o "=[^=][0-9a-zA-Z]*" | tr -d "=")"
257 export _H1="Cookie: $One984HOSTING_CSRFTOKEN_COOKIE;$One984HOSTING_SESSIONID_COOKIE"
258 export _H2="Referer: https://management.1984hosting.com/domains/$_zone_id"
259 export _H3="X-CSRFToken: $csrf_header"
260 _response=$(_post "$1" "$2")
261 }