forked from TrueCloudLab/lego
Merge remote-tracking branch 'upstream/master' into issue-140-multi-zone-certs
Conflicts solved: README.md cli.go
This commit is contained in:
commit
bc5c3b53e1
4 changed files with 14 additions and 5 deletions
|
@ -97,7 +97,7 @@ GLOBAL OPTIONS:
|
||||||
digitalocean: DO_AUTH_TOKEN
|
digitalocean: DO_AUTH_TOKEN
|
||||||
dnsimple: DNSIMPLE_EMAIL, DNSIMPLE_API_KEY
|
dnsimple: DNSIMPLE_EMAIL, DNSIMPLE_API_KEY
|
||||||
route53: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_REGION
|
route53: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_REGION
|
||||||
rfc2136: RFC2136_TSIG_KEY, RFC2136_TSIG_SECRET, RFC2136_NAMESERVER
|
rfc2136: RFC2136_TSIG_KEY, RFC2136_TSIG_SECRET, RFC2136_TSIG_ALGORITHM, RFC2136_NAMESERVER
|
||||||
manual: none
|
manual: none
|
||||||
--help, -h show help
|
--help, -h show help
|
||||||
--version, -v print the version
|
--version, -v print the version
|
||||||
|
|
|
@ -319,7 +319,6 @@ func (c *Client) RenewCertificate(cert CertificateResource, bundle bool) (Certif
|
||||||
// Success - append the issuer cert to the issued cert.
|
// Success - append the issuer cert to the issued cert.
|
||||||
issuerCert = pemEncode(derCertificateBytes(issuerCert))
|
issuerCert = pemEncode(derCertificateBytes(issuerCert))
|
||||||
issuedCert = append(issuedCert, issuerCert...)
|
issuedCert = append(issuedCert, issuerCert...)
|
||||||
cert.Certificate = issuedCert
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
12
cli.go
12
cli.go
|
@ -50,6 +50,12 @@ func main() {
|
||||||
Name: "run",
|
Name: "run",
|
||||||
Usage: "Register an account, then create and install a certificate",
|
Usage: "Register an account, then create and install a certificate",
|
||||||
Action: run,
|
Action: run,
|
||||||
|
Flags: []cli.Flag{
|
||||||
|
cli.BoolFlag{
|
||||||
|
Name: "no-bundle",
|
||||||
|
Usage: "Do not create a certificate bundle by adding the issuers certificate to the new certificate.",
|
||||||
|
},
|
||||||
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: "revoke",
|
Name: "revoke",
|
||||||
|
@ -70,6 +76,10 @@ func main() {
|
||||||
Name: "reuse-key",
|
Name: "reuse-key",
|
||||||
Usage: "Used to indicate you want to reuse your current private key for the new certificate.",
|
Usage: "Used to indicate you want to reuse your current private key for the new certificate.",
|
||||||
},
|
},
|
||||||
|
cli.BoolFlag{
|
||||||
|
Name: "no-bundle",
|
||||||
|
Usage: "Do not create a certificate bundle by adding the issuers certificate to the new certificate.",
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -124,7 +134,7 @@ func main() {
|
||||||
"\n\tdigitalocean: DO_AUTH_TOKEN" +
|
"\n\tdigitalocean: DO_AUTH_TOKEN" +
|
||||||
"\n\tdnsimple: DNSIMPLE_EMAIL, DNSIMPLE_API_KEY" +
|
"\n\tdnsimple: DNSIMPLE_EMAIL, DNSIMPLE_API_KEY" +
|
||||||
"\n\troute53: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_REGION" +
|
"\n\troute53: AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_REGION" +
|
||||||
"\n\trfc2136: RFC2136_TSIG_KEY, RFC2136_TSIG_SECRET, RFC2136_NAMESERVER" +
|
"\n\trfc2136: RFC2136_TSIG_KEY, RFC2136_TSIG_SECRET, RFC2136_TSIG_ALGORITHM, RFC2136_NAMESERVER" +
|
||||||
"\n\tmanual: none",
|
"\n\tmanual: none",
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
|
@ -202,7 +202,7 @@ func run(c *cli.Context) {
|
||||||
logger().Fatal("Please specify --domains or -d")
|
logger().Fatal("Please specify --domains or -d")
|
||||||
}
|
}
|
||||||
|
|
||||||
cert, failures := client.ObtainCertificate(c.GlobalStringSlice("domains"), true, nil)
|
cert, failures := client.ObtainCertificate(c.GlobalStringSlice("domains"), !c.Bool("no-bundle"), nil)
|
||||||
if len(failures) > 0 {
|
if len(failures) > 0 {
|
||||||
for k, v := range failures {
|
for k, v := range failures {
|
||||||
logger().Printf("[%s] Could not obtain certificates\n\t%s", k, v.Error())
|
logger().Printf("[%s] Could not obtain certificates\n\t%s", k, v.Error())
|
||||||
|
@ -299,7 +299,7 @@ func renew(c *cli.Context) {
|
||||||
|
|
||||||
certRes.Certificate = certBytes
|
certRes.Certificate = certBytes
|
||||||
|
|
||||||
newCert, err := client.RenewCertificate(certRes, true)
|
newCert, err := client.RenewCertificate(certRes, !c.Bool("no-bundle"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger().Fatalf("%s", err.Error())
|
logger().Fatalf("%s", err.Error())
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue