2019-10-06 11:40:57 +00:00
|
|
|
#!/usr/bin/env sh
|
2019-07-27 03:48:29 +00:00
|
|
|
|
|
|
|
#
|
|
|
|
#VULTR_API_KEY=000011112222333344445555666677778888
|
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
VULTR_Api="https://api.vultr.com/v2"
|
2019-07-27 03:48:29 +00:00
|
|
|
|
|
|
|
######## Public functions #####################
|
2022-07-17 14:15:47 +00:00
|
|
|
#
|
2019-07-27 03:48:29 +00:00
|
|
|
#Usage: add _acme-challenge.www.domain.com "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
|
|
|
|
dns_vultr_add() {
|
|
|
|
fulldomain=$1
|
|
|
|
txtvalue=$2
|
|
|
|
_debug fulldomain "$fulldomain"
|
|
|
|
_debug txtvalue "$txtvalue"
|
|
|
|
|
|
|
|
VULTR_API_KEY="${VULTR_API_KEY:-$(_readaccountconf_mutable VULTR_API_KEY)}"
|
|
|
|
if test -z "$VULTR_API_KEY"; then
|
|
|
|
VULTR_API_KEY=''
|
|
|
|
_err 'VULTR_API_KEY was not exported'
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
_saveaccountconf_mutable VULTR_API_KEY "$VULTR_API_KEY"
|
|
|
|
|
|
|
|
_debug 'First detect the root zone'
|
|
|
|
if ! _get_root "$fulldomain"; then
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
_debug _sub_domain "$_sub_domain"
|
|
|
|
_debug _domain "$_domain"
|
|
|
|
|
|
|
|
_debug 'Getting txt records'
|
2022-07-17 14:15:47 +00:00
|
|
|
_vultr_rest GET "domains/$_domain/records"
|
2019-07-27 03:48:29 +00:00
|
|
|
|
2021-06-06 14:53:39 +00:00
|
|
|
if printf "%s\n" "$response" | grep -- "\"type\":\"TXT\",\"name\":\"$fulldomain\"" >/dev/null; then
|
2019-07-27 03:48:29 +00:00
|
|
|
_err 'Error'
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
if ! _vultr_rest POST "domains/$_domain/records" "{\"name\":\"$_sub_domain\",\"data\":\"$txtvalue\",\"type\":\"TXT\"}"; then
|
2019-07-27 03:48:29 +00:00
|
|
|
_err "$response"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
_debug2 _response "$response"
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
#fulldomain txtvalue
|
|
|
|
dns_vultr_rm() {
|
|
|
|
fulldomain=$1
|
|
|
|
txtvalue=$2
|
|
|
|
_debug fulldomain "$fulldomain"
|
|
|
|
_debug txtvalue "$txtvalue"
|
|
|
|
|
|
|
|
VULTR_API_KEY="${VULTR_API_KEY:-$(_readaccountconf_mutable VULTR_API_KEY)}"
|
|
|
|
if test -z "$VULTR_API_KEY"; then
|
|
|
|
VULTR_API_KEY=""
|
|
|
|
_err 'VULTR_API_KEY was not exported'
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
_saveaccountconf_mutable VULTR_API_KEY "$VULTR_API_KEY"
|
|
|
|
|
|
|
|
_debug 'First detect the root zone'
|
|
|
|
if ! _get_root "$fulldomain"; then
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
_debug _sub_domain "$_sub_domain"
|
|
|
|
_debug _domain "$_domain"
|
|
|
|
|
|
|
|
_debug 'Getting txt records'
|
2022-07-17 14:15:47 +00:00
|
|
|
_vultr_rest GET "domains/$_domain/records"
|
2019-07-27 03:48:29 +00:00
|
|
|
|
2021-06-06 14:53:39 +00:00
|
|
|
if printf "%s\n" "$response" | grep -- "\"type\":\"TXT\",\"name\":\"$fulldomain\"" >/dev/null; then
|
2019-07-27 03:48:29 +00:00
|
|
|
_err 'Error'
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
_record_id="$(echo "$response" | tr '{}' '\n' | grep '"TXT"' | grep -- "$txtvalue" | tr ',' '\n' | grep -i 'id' | cut -d : -f 2)"
|
2019-07-27 03:48:29 +00:00
|
|
|
_debug _record_id "$_record_id"
|
|
|
|
if [ "$_record_id" ]; then
|
|
|
|
_info "Successfully retrieved the record id for ACME challenge."
|
|
|
|
else
|
|
|
|
_info "Empty record id, it seems no such record."
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
if ! _vultr_rest DELETE "domains/$_domain/records/$_record_id"; then
|
2019-07-27 03:48:29 +00:00
|
|
|
_err "$response"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
_debug2 _response "$response"
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
#################### Private functions below ##################################
|
|
|
|
#_acme-challenge.www.domain.com
|
|
|
|
#returns
|
|
|
|
# _sub_domain=_acme-challenge.www
|
|
|
|
# _domain=domain.com
|
|
|
|
# _domain_id=sdjkglgdfewsdfg
|
|
|
|
_get_root() {
|
|
|
|
domain=$1
|
|
|
|
i=1
|
|
|
|
while true; do
|
2019-10-06 11:38:26 +00:00
|
|
|
_domain=$(printf "%s" "$domain" | cut -d . -f $i-100)
|
|
|
|
_debug h "$_domain"
|
|
|
|
if [ -z "$_domain" ]; then
|
2019-07-27 03:48:29 +00:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
if ! _vultr_rest GET "domains"; then
|
2019-07-27 03:48:29 +00:00
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
if printf "%s\n" "$response" | grep '^\{.*\}' >/dev/null; then
|
2019-07-27 03:48:29 +00:00
|
|
|
if _contains "$response" "\"domain\":\"$_domain\""; then
|
|
|
|
_sub_domain="$(echo "$fulldomain" | sed "s/\\.$_domain\$//")"
|
|
|
|
return 0
|
|
|
|
else
|
2019-10-06 11:38:26 +00:00
|
|
|
_debug "Go to next level of $_domain"
|
2019-07-27 03:48:29 +00:00
|
|
|
fi
|
|
|
|
else
|
|
|
|
_err "$response"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
i=$(_math "$i" + 1)
|
|
|
|
done
|
|
|
|
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
|
|
|
|
_vultr_rest() {
|
|
|
|
m=$1
|
|
|
|
ep="$2"
|
|
|
|
data="$3"
|
|
|
|
_debug "$ep"
|
|
|
|
|
2022-11-23 13:28:17 +00:00
|
|
|
api_key_trimmed=$(echo "$VULTR_API_KEY" | tr -d '"')
|
2019-07-27 03:48:29 +00:00
|
|
|
|
2022-07-17 14:15:47 +00:00
|
|
|
export _H1="Authorization: Bearer $api_key_trimmed"
|
|
|
|
export _H2='Content-Type: application/json'
|
2019-07-27 03:48:29 +00:00
|
|
|
|
|
|
|
if [ "$m" != "GET" ]; then
|
|
|
|
_debug data "$data"
|
|
|
|
response="$(_post "$data" "$VULTR_Api/$ep" "" "$m")"
|
|
|
|
else
|
|
|
|
response="$(_get "$VULTR_Api/$ep")"
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "$?" != "0" ]; then
|
|
|
|
_err "Error $ep"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
_debug2 response "$response"
|
|
|
|
return 0
|
|
|
|
}
|