379 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			JavaScript
		
	
	
		
			Executable File
		
	
	
	
	
			
		
		
	
	
			379 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			JavaScript
		
	
	
		
			Executable File
		
	
	
	
	
'use strict';
 | 
						|
 | 
						|
var mkdirp = require('@root/mkdirp');
 | 
						|
var cli = require('./cli.js');
 | 
						|
 | 
						|
cli.parse({
 | 
						|
    'directory-url': [
 | 
						|
        false,
 | 
						|
        ' ACME Directory Resource URL',
 | 
						|
        'string',
 | 
						|
        'https://acme-v02.api.letsencrypt.org/directory',
 | 
						|
        'server,acme-url'
 | 
						|
    ],
 | 
						|
    email: [
 | 
						|
        false,
 | 
						|
        ' Email used for registration and recovery contact. (default: null)',
 | 
						|
        'email'
 | 
						|
    ],
 | 
						|
    'agree-tos': [
 | 
						|
        false,
 | 
						|
        " Agree to the Greenlock and Let's Encrypt Subscriber Agreements",
 | 
						|
        'boolean',
 | 
						|
        false
 | 
						|
    ],
 | 
						|
    'community-member': [
 | 
						|
        false,
 | 
						|
        ' Submit stats to and get updates from Greenlock',
 | 
						|
        'boolean',
 | 
						|
        false
 | 
						|
    ],
 | 
						|
    domains: [
 | 
						|
        false,
 | 
						|
        ' Domain names to apply. For multiple domains you can enter a comma separated list of domains as a parameter. (default: [])',
 | 
						|
        'string'
 | 
						|
    ],
 | 
						|
    'renew-offset': [
 | 
						|
        false,
 | 
						|
        ' Positive (time after issue) or negative (time before expiry) offset, such as 30d or -45d',
 | 
						|
        'string',
 | 
						|
        '45d'
 | 
						|
    ],
 | 
						|
    'renew-within': [
 | 
						|
        false,
 | 
						|
        ' (ignored) use renew-offset instead',
 | 
						|
        'ignore',
 | 
						|
        undefined
 | 
						|
    ],
 | 
						|
    'cert-path': [
 | 
						|
        false,
 | 
						|
        ' Path to where new cert.pem is saved',
 | 
						|
        'string',
 | 
						|
        ':configDir/live/:hostname/cert.pem'
 | 
						|
    ],
 | 
						|
    'fullchain-path': [
 | 
						|
        false,
 | 
						|
        ' Path to where new fullchain.pem (cert + chain) is saved',
 | 
						|
        'string',
 | 
						|
        ':configDir/live/:hostname/fullchain.pem'
 | 
						|
    ],
 | 
						|
    'bundle-path': [
 | 
						|
        false,
 | 
						|
        ' Path to where new bundle.pem (fullchain + privkey) is saved',
 | 
						|
        'string',
 | 
						|
        ':configDir/live/:hostname/bundle.pem'
 | 
						|
    ],
 | 
						|
    'chain-path': [
 | 
						|
        false,
 | 
						|
        ' Path to where new chain.pem is saved',
 | 
						|
        'string',
 | 
						|
        ':configDir/live/:hostname/chain.pem'
 | 
						|
    ],
 | 
						|
    'privkey-path': [
 | 
						|
        false,
 | 
						|
        ' Path to where privkey.pem is saved',
 | 
						|
        'string',
 | 
						|
        ':configDir/live/:hostname/privkey.pem'
 | 
						|
    ],
 | 
						|
    'config-dir': [
 | 
						|
        false,
 | 
						|
        ' Configuration directory.',
 | 
						|
        'string',
 | 
						|
        '~/letsencrypt/etc/'
 | 
						|
    ],
 | 
						|
    store: [
 | 
						|
        false,
 | 
						|
        ' The name of the storage module to use',
 | 
						|
        'string',
 | 
						|
        'greenlock-store-fs'
 | 
						|
    ],
 | 
						|
    'store-xxxx': [
 | 
						|
        false,
 | 
						|
        ' An option for the chosen storage module, such as --store-apikey or --store-bucket',
 | 
						|
        'bag'
 | 
						|
    ],
 | 
						|
    'store-json': [
 | 
						|
        false,
 | 
						|
        ' A JSON string containing all option for the chosen store module (instead of --store-xxxx)',
 | 
						|
        'json',
 | 
						|
        '{}'
 | 
						|
    ],
 | 
						|
    challenge: [
 | 
						|
        false,
 | 
						|
        ' The name of the HTTP-01, DNS-01, or TLS-ALPN-01 challenge module to use',
 | 
						|
        'string',
 | 
						|
        '@greenlock/acme-http-01-fs'
 | 
						|
    ],
 | 
						|
    'challenge-xxxx': [
 | 
						|
        false,
 | 
						|
        ' An option for the chosen challenge module, such as --challenge-apikey or --challenge-bucket',
 | 
						|
        'bag'
 | 
						|
    ],
 | 
						|
    'challenge-json': [
 | 
						|
        false,
 | 
						|
        ' A JSON string containing all option for the chosen challenge module (instead of --challenge-xxxx)',
 | 
						|
        'json',
 | 
						|
        '{}'
 | 
						|
    ],
 | 
						|
    'skip-dry-run': [
 | 
						|
        false,
 | 
						|
        ' Use with caution (and test with the staging url first). Creates an Order on the ACME server without a self-test.',
 | 
						|
        'boolean'
 | 
						|
    ],
 | 
						|
    'skip-challenge-tests': [
 | 
						|
        false,
 | 
						|
        ' Use with caution (and with the staging url first). Presents challenges to the ACME server without first testing locally.',
 | 
						|
        'boolean'
 | 
						|
    ],
 | 
						|
    'http-01-port': [
 | 
						|
        false,
 | 
						|
        ' Required to be 80 for live servers. Do not use. For special test environments only.',
 | 
						|
        'int'
 | 
						|
    ],
 | 
						|
    'dns-01': [false, ' Use DNS-01 challange type', 'boolean', false],
 | 
						|
    standalone: [
 | 
						|
        false,
 | 
						|
        ' Obtain certs using a "standalone" webserver.',
 | 
						|
        'boolean',
 | 
						|
        false
 | 
						|
    ],
 | 
						|
    manual: [
 | 
						|
        false,
 | 
						|
        ' Print the token and key to the screen and wait for you to hit enter, giving you time to copy it somewhere before continuing (uses acme-http-01-cli or acme-dns-01-cli)',
 | 
						|
        'boolean',
 | 
						|
        false
 | 
						|
    ],
 | 
						|
    debug: [false, ' show traces and logs', 'boolean', false],
 | 
						|
    root: [
 | 
						|
        false,
 | 
						|
        ' public_html / webroot path (may use the :hostname template such as /srv/www/:hostname)',
 | 
						|
        'string',
 | 
						|
        undefined,
 | 
						|
        'webroot-path'
 | 
						|
    ],
 | 
						|
 | 
						|
    //
 | 
						|
    // backwards compat
 | 
						|
    //
 | 
						|
    duplicate: [
 | 
						|
        false,
 | 
						|
        ' Allow getting a certificate that duplicates an existing one/is an early renewal',
 | 
						|
        'boolean',
 | 
						|
        false
 | 
						|
    ],
 | 
						|
    'rsa-key-size': [
 | 
						|
        false,
 | 
						|
        ' (ignored) use server-key-type or account-key-type instead',
 | 
						|
        'ignore',
 | 
						|
        2048
 | 
						|
    ],
 | 
						|
    'server-key-path': [
 | 
						|
        false,
 | 
						|
        ' Path to privkey.pem to use for certificate (default: generate new)',
 | 
						|
        'string',
 | 
						|
        undefined,
 | 
						|
        'domain-key-path'
 | 
						|
    ],
 | 
						|
    'server-key-type': [
 | 
						|
        false,
 | 
						|
        " One of 'RSA' (2048), 'RSA-3084', 'RSA-4096', 'ECDSA' (P-256), or 'P-384'. For best compatibility, security, and efficiency use the default (More bits != More security)",
 | 
						|
        'string',
 | 
						|
        'RSA'
 | 
						|
    ],
 | 
						|
    'account-key-path': [
 | 
						|
        false,
 | 
						|
        ' Path to privkey.pem to use for account (default: generate new)',
 | 
						|
        'string'
 | 
						|
    ],
 | 
						|
    'account-key-type': [
 | 
						|
        false,
 | 
						|
        " One of 'ECDSA' (P-256), 'P-384', 'RSA', 'RSA-3084', or 'RSA-4096'. Stick with 'ECDSA' (P-256) unless you need 'RSA' (2048) for legacy compatibility. (More bits != More security)",
 | 
						|
        'string',
 | 
						|
        'P-256'
 | 
						|
    ],
 | 
						|
    webroot: [false, ' (ignored) for certbot compatibility', 'ignore', false],
 | 
						|
    //, 'standalone-supported-challenges': [ false, " Supported challenges, order preferences are randomly chosen. (default: http-01,tls-alpn-01)", 'string', 'http-01']
 | 
						|
    'work-dir': [
 | 
						|
        false,
 | 
						|
        ' for certbot compatibility (ignored)',
 | 
						|
        'string',
 | 
						|
        '~/letsencrypt/var/lib/'
 | 
						|
    ],
 | 
						|
    'logs-dir': [
 | 
						|
        false,
 | 
						|
        ' for certbot compatibility (ignored)',
 | 
						|
        'string',
 | 
						|
        '~/letsencrypt/var/log/'
 | 
						|
    ],
 | 
						|
    'acme-version': [
 | 
						|
        false,
 | 
						|
        ' (ignored) ACME is now RFC 8555 and prior drafts are no longer supported',
 | 
						|
        'ignore',
 | 
						|
        'rfc8555'
 | 
						|
    ]
 | 
						|
});
 | 
						|
 | 
						|
// ignore certonly and extraneous arguments
 | 
						|
cli.main(function(_, options) {
 | 
						|
    console.info('');
 | 
						|
 | 
						|
    [
 | 
						|
        'configDir',
 | 
						|
        'privkeyPath',
 | 
						|
        'certPath',
 | 
						|
        'chainPath',
 | 
						|
        'fullchainPath',
 | 
						|
        'bundlePath'
 | 
						|
    ].forEach(function(k) {
 | 
						|
        if (options[k]) {
 | 
						|
            options.storeOpts[k] = options[k];
 | 
						|
        }
 | 
						|
        delete options[k];
 | 
						|
    });
 | 
						|
 | 
						|
    if (options.workDir) {
 | 
						|
        options.challengeOpts.workDir = options.workDir;
 | 
						|
        delete options.workDir;
 | 
						|
    }
 | 
						|
 | 
						|
    if (options.debug) {
 | 
						|
        console.debug(options);
 | 
						|
    }
 | 
						|
 | 
						|
    var args = {};
 | 
						|
    var homedir = require('os').homedir();
 | 
						|
 | 
						|
    Object.keys(options).forEach(function(key) {
 | 
						|
        var val = options[key];
 | 
						|
 | 
						|
        if ('string' === typeof val) {
 | 
						|
            val = val.replace(/^~/, homedir);
 | 
						|
        }
 | 
						|
 | 
						|
        key = key.replace(/\-([a-z0-9A-Z])/g, function(c) {
 | 
						|
            return c[1].toUpperCase();
 | 
						|
        });
 | 
						|
        args[key] = val;
 | 
						|
    });
 | 
						|
 | 
						|
    Object.keys(args).forEach(function(key) {
 | 
						|
        var val = args[key];
 | 
						|
 | 
						|
        if ('string' === typeof val) {
 | 
						|
            val = val.replace(/(\:configDir)|(\:config)/, args.configDir);
 | 
						|
        }
 | 
						|
 | 
						|
        args[key] = val;
 | 
						|
    });
 | 
						|
 | 
						|
    if (args.domains) {
 | 
						|
        args.domains = args.domains.split(',');
 | 
						|
    }
 | 
						|
 | 
						|
    if (
 | 
						|
        !(Array.isArray(args.domains) && args.domains.length) ||
 | 
						|
        !args.email ||
 | 
						|
        !args.agreeTos ||
 | 
						|
        (!args.server && !args.directoryUrl)
 | 
						|
    ) {
 | 
						|
        console.error('\nUsage:\n\ngreenlock certonly --standalone \\');
 | 
						|
        console.error(
 | 
						|
            '\t--agree-tos --email user@example.com --domains example.com \\'
 | 
						|
        );
 | 
						|
        console.error('\t--config-dir ~/acme/etc \\');
 | 
						|
        console.error('\nSee greenlock --help for more details\n');
 | 
						|
        return;
 | 
						|
    }
 | 
						|
 | 
						|
    if (args.http01Port) {
 | 
						|
        // [@agnat]: Coerce to string. cli returns a number although we request a string.
 | 
						|
        args.http01Port = '' + args.http01Port;
 | 
						|
        args.http01Port = args.http01Port.split(',').map(function(port) {
 | 
						|
            return parseInt(port, 10);
 | 
						|
        });
 | 
						|
    }
 | 
						|
 | 
						|
    function run() {
 | 
						|
        var challenges = {};
 | 
						|
        if (/http.?01/i.test(args.challenge)) {
 | 
						|
            challenges['http-01'] = args.challengeOpts;
 | 
						|
        }
 | 
						|
        if (/dns.?01/i.test(args.challenge)) {
 | 
						|
            challenges['dns-01'] = args.challengeOpts;
 | 
						|
        }
 | 
						|
        if (/alpn.?01/i.test(args.challenge)) {
 | 
						|
            challenges['tls-alpn-01'] = args.challengeOpts;
 | 
						|
        }
 | 
						|
        if (!Object.keys(challenges).length) {
 | 
						|
            throw new Error(
 | 
						|
                "Could not determine the challenge type for '" +
 | 
						|
                    args.challengeOpts.module +
 | 
						|
                    "'. Expected a name like @you/acme-xxxx-01-foo. Please name the module with http-01, dns-01, or tls-alpn-01."
 | 
						|
            );
 | 
						|
        }
 | 
						|
        args.challengeOpts.module = args.challenge;
 | 
						|
        args.storeOpts.module = args.store;
 | 
						|
 | 
						|
        console.log('\ngot to the run step');
 | 
						|
        require(args.challenge);
 | 
						|
        require(args.store);
 | 
						|
 | 
						|
        var greenlock = require('../').create({
 | 
						|
            maintainerEmail: args.maintainerEmail || 'coolaj86@gmail.com',
 | 
						|
            manager: './manager.js',
 | 
						|
            configFile: '~/.config/greenlock/certs.json',
 | 
						|
            challenges: challenges,
 | 
						|
            store: args.storeOpts,
 | 
						|
            renewOffset: args.renewOffset || '30d',
 | 
						|
            renewStagger: '1d'
 | 
						|
        });
 | 
						|
 | 
						|
        // for long-running processes
 | 
						|
        if (args.renewEvery) {
 | 
						|
            setInterval(function() {
 | 
						|
                greenlock.renew({
 | 
						|
                    period: args.renewEvery
 | 
						|
                });
 | 
						|
            }, args.renewEvery);
 | 
						|
        }
 | 
						|
 | 
						|
        // TODO should greenlock.add simply always include greenlock.renew?
 | 
						|
        // the concern is conflating error events
 | 
						|
        return greenlock
 | 
						|
            .add({
 | 
						|
                subject: args.subject,
 | 
						|
                altnames: args.altnames,
 | 
						|
                subscriberEmail: args.subscriberEmail || args.email
 | 
						|
            })
 | 
						|
            .then(function(changes) {
 | 
						|
                console.info(changes);
 | 
						|
                // renew should always
 | 
						|
                return greenlock
 | 
						|
                    .renew({
 | 
						|
                        subject: args.subject,
 | 
						|
                        force: false
 | 
						|
                    })
 | 
						|
                    .then(function() {});
 | 
						|
            });
 | 
						|
    }
 | 
						|
 | 
						|
    if ('greenlock-store-fs' !== args.store) {
 | 
						|
        run();
 | 
						|
        return;
 | 
						|
    }
 | 
						|
 | 
						|
    // TODO remove mkdirp and let greenlock-store-fs do this?
 | 
						|
    mkdirp(args.storeOpts.configDir, function(err) {
 | 
						|
        if (!err) {
 | 
						|
            run();
 | 
						|
        }
 | 
						|
 | 
						|
        console.error(
 | 
						|
            "Could not create --config-dir '" + args.configDir + "':",
 | 
						|
            err.code
 | 
						|
        );
 | 
						|
        console.error("Try setting --config-dir '/tmp'");
 | 
						|
        return;
 | 
						|
    });
 | 
						|
}, process.argv.slice(3));
 |