Commit Graph

283 Commits (44743b5f6fd64799111f5e4825a2528845c182a9)

Author SHA1 Message Date
andrewheberle 01ebb6576d
Use base64 for reload
Ensure that reload command is encoded with base64 so special characters in command do not wreck config on renewals
Tony Gravagno eca57beec1
Issue : grammar corrections for "exists" and "exist".
PM Extra a78a09f594 Support multiple servers for SSH deployment.
neil 341f000b9c
Merge pull request from kref/patch-1
fix octal escapes for printf %b format
kref 0deea53931
fix octal escapes for printf %b format
Stop it from misinterpreting a following digit as part of the escape sequence
Brian Hartvigsen 694194be2f
Shellcheck fix
SYNO_Certificate gets set by _getdeployconf, so this may be an empty string but that's fine
Brian Hartvigsen c7f61f8b80
Allow rotating the default certificate which has no description
This means, by default, we will rotate the default certificate that comes with the DSM
Brian Hartvigsen 3a7c7fe4e8
Fix shellcheck issues
Brian Hartvigsen 668967a719
If SYNO_Create is not set here, print the nice message
Brian Hartvigsen d15c14ab93
Fix support for wget
I'm actually not entirely sure why/how this worked with curl but not wget, but it did.  The short answer is that using a GET does not result in the HTTP_HEADER file being written, instead you must pass in the http_headers param ($2) which will return the HTTP headers as a string.  Luckily, the Token is in both the body and the header.  We need it and the id (and smid if 2fa) cookie to proceed.  So now we parrse the response for that instead of the HTTP_HEADER file.

Interesting side note: wget is fine if the URL contains a \r or \n, but curl will barf on it.  So we need to make sure those are stripped from the token as it will be passed in the URL later.
Brian Hartvigsen 52b81608a1
need to _url_encode anything sent in GET requests
Fixes issue raised by @tatablack
Felix Bünemann cf5952f508
fix haproxy deploy hook ocsp update
fixes ocsp reponse update failing with `Responder Error: unauthorized (6)`
by removing `-no_nonce` switch from `openssl oscp` command .
neil b6fbb012ad
Merge pull request from dkerr64/ssh-deploy
Updates to ssh_deploy hook
ucando 6132af8ecb enable qiniu to deploy more than one domain
Brian Torres-Gil 0453d656d6 fix(deploy/panos): data format improvements
It was discovered in testing that PAN-OS < 9.0 has slightly different
requirements for the multipart/form-data format and requires the `type`
parameter to be passed in the URL. These corrections should work for all
PAN-OS versions.
dkerr64 f38df4df11 Make remote backup directory path user configurable.
dkerr64 554e083f3d For MULTI_CALL default to undefined, deleting entry in config file if set to "no"
Markus Lippert fd64c20807 store device ID
Markus Lippert 80f1034dd6 add OTP support
dkerr64 8ba573d196 Change variable name to MULTI_CALL so default can be "no"
dkerr64 f73a494407 Remove spaces on blank line to fix travis error
dkerr64 46ee74ed16 Remove variable from info/error printout that could potentially expose login credentials.
dkerr64 806b746fc0 Fix bug where backup and batch_mode yes/no values could not be changed.
Once set to "no" then they could never be set back to "yes"
dkerr64 cc820e97c6 Add support for DEPLOY_SSH_BATCH_MODE with default of yes.
Before this update all remote commands were bunched together and
sent to the remote host in a single SSH command.  This could result
in a very long sequence of commands that might be rejected by a
remote host (example is VMware ESXi that uses busybox sh).
With this update you can set DEPLOY_SSH_BATCH_MODE="no" and
each remote command is sent as a separate SSH call so now we
do not have big long sequence of commands.  Defaults to same
behaviour as before this update.
dkerr64 283b04df73 Move cleanup of backup directory to first step in the function.
dkerr64 6420d1239f Move call to remote system into separate function
dkerr64 3d9608faa0 Move -T parameter into default ssh command variable
xpac1985 e184a1b9e6
haproxy deploy script now compatible with OpenSSL v1.1+
haproxy deploy script now compatible with OpenSSL v1.1+

The OpenSSL OCSP request for haproxy deployment breaks from OpenSSL v1.1.0 on.
The format of the `-header` option has been changed and does now contain a `=` instead of a whitespace.
Other projects have hit the same issue:
https://github.com/nghttp2/nghttp2/issues/742

This commit determines the OpenSSL/LibreSSL version and then adjusts the request accordingly.
Also removed the duplicate command line and added some more debug output.
neil 754f7a7891
Merge pull request from PaloAltoNetworks/deploy-panos
Adding abillity to deploy cert to Palo Alto Networks Firewall via API.
Paul Nguyen 21450a08c2 Fixed 6 character requirement.
Paul Nguyen c355b25bb1 Fixed line formatting
Paul Nguyen 1fe3d80838 Updated to use saveconf function and base64encode.
Paul Nguyen 930e16b64a fix gitdiff
Paul Nguyen 2077a70d03 Fixing gitdiff
Paul Nguyen cbdb8bd9b9 Fixing gitdiff
Paul Nguyen 5dcb417676 ShellCheck fixes
Paul Nguyen 71bc993e3d Fixed Shellchecks
Paul Nguyen c2812896f8 Update deployer
Brian Hartvigsen 1b475cf9f3
Remove -q from greps
Brian Hartvigsen d07172a528
Replace disabled linter with variable substituion
Brian Hartvigsen 79637097ba
Use _utc_date
Brian Hartvigsen 1259341095
Use deployconf properly
Brian Hartvigsen 5d3bc95ac5
Fix some debug output
Brian Hartvigsen de25232a73
Allow creating new certificates when certificate is not found
Brian Hartvigsen 95769de464
Fix shfmt/shellcheck issues
Brian Hartvigsen 52a168b961
Stop using jq/curl directly
This is a lot more fragile then the previous code due to treating JSON as just a string
Brian Hartvigsen b3b00b6700
Using domainconf instead of account
Brian Hartvigsen 8e8cda132c
Remove boilerplate from what I used for template
Brian Hartvigsen 6459ccb185
Cleanup shfmt warnings
Brian Hartvigsen 548f83c3ad
Cleanup shellcheck errors