Spade
Mini Shell
| Directory:~$ /proc/self/root/usr/lib/python2.7/site-packages/certbot/_internal/plugins/ |
| [Home] [System Details] [Kill Me] |
"""Manual authenticator plugin"""
import zope.component
import zope.interface
from acme import challenges
from acme.magic_typing import Dict
from certbot import achallenges # pylint: disable=unused-import
from certbot import errors
from certbot import interfaces
from certbot import reverter
from certbot import util
from certbot._internal import hooks
from certbot.compat import misc
from certbot.compat import os
from certbot.plugins import common
@zope.interface.implementer(interfaces.IAuthenticator)
@zope.interface.provider(interfaces.IPluginFactory)
class Authenticator(common.Plugin):
"""Manual authenticator
This plugin allows the user to perform the domain validation
challenge(s) themselves. This either be done manually by the user or
through shell scripts provided to Certbot.
"""
description = 'Manual configuration or run your own shell
scripts'
hidden = True
long_description = (
'Authenticate through manual configuration or custom shell
scripts. '
'When using shell scripts, an authenticator script must be
provided. '
'The environment variables available to this script depend on
the '
'type of challenge. $CERTBOT_DOMAIN will always contain the
domain '
'being authenticated. For HTTP-01 and DNS-01,
$CERTBOT_VALIDATION '
'is the validation string, and $CERTBOT_TOKEN is the filename
of the '
'resource requested when performing an HTTP-01 challenge. An
additional '
'cleanup script can also be provided and can use the
additional variable '
'$CERTBOT_AUTH_OUTPUT which contains the stdout output from
the auth script. '
'For both authenticator and cleanup script, on HTTP-01 and
DNS-01 challenges, '
'$CERTBOT_REMAINING_CHALLENGES will be equal to the number of
challenges that '
'remain after the current one, and $CERTBOT_ALL_DOMAINS
contains a comma-separated '
'list of all domains that are challenged for the current
certificate.')
_DNS_INSTRUCTIONS = """\
Please deploy a DNS TXT record under the name
{domain} with the following value:
{validation}
Before continuing, verify the record is deployed."""
_HTTP_INSTRUCTIONS = """\
Create a file containing just this data:
{validation}
And make it available on your web server at this URL:
{uri}
"""
_SUBSEQUENT_CHALLENGE_INSTRUCTIONS = """
(This must be set up in addition to the previous challenges; do not remove,
replace, or undo the previous challenge tasks yet.)
"""
_SUBSEQUENT_DNS_CHALLENGE_INSTRUCTIONS = """
(This must be set up in addition to the previous challenges; do not remove,
replace, or undo the previous challenge tasks yet. Note that you might be
asked to create multiple distinct TXT records with the same name. This is
permitted by DNS standards.)
"""
def __init__(self, *args, **kwargs):
super(Authenticator, self).__init__(*args, **kwargs)
self.reverter = reverter.Reverter(self.config)
self.reverter.recovery_routine()
self.env = {} \
# type: Dict[achallenges.KeyAuthorizationAnnotatedChallenge,
Dict[str, str]]
self.subsequent_dns_challenge = False
self.subsequent_any_challenge = False
@classmethod
def add_parser_arguments(cls, add):
add('auth-hook',
help='Path or command to execute for the authentication
script')
add('cleanup-hook',
help='Path or command to execute for the cleanup
script')
util.add_deprecated_argument(add, 'public-ip-logging-ok',
0)
def prepare(self): # pylint: disable=missing-function-docstring
if self.config.noninteractive_mode and not
self.conf('auth-hook'):
raise errors.PluginError(
'An authentication script must be provided with --{0}
when '
'using the manual plugin
non-interactively.'.format(
self.option_name('auth-hook')))
self._validate_hooks()
def _validate_hooks(self):
if self.config.validate_hooks:
for name in ('auth-hook', 'cleanup-hook'):
hook = self.conf(name)
if hook is not None:
hook_prefix =
self.option_name(name)[:-len('-hook')]
hooks.validate_hook(hook, hook_prefix)
def more_info(self): # pylint: disable=missing-function-docstring
return (
'This plugin allows the user to customize setup for domain
'
'validation challenges either through shell scripts
provided by '
'the user or by performing the setup manually.')
def get_chall_pref(self, domain):
# pylint: disable=unused-argument,missing-function-docstring
return [challenges.HTTP01, challenges.DNS01]
def perform(self, achalls): # pylint:
disable=missing-function-docstring
responses = []
for achall in achalls:
if self.conf('auth-hook'):
self._perform_achall_with_script(achall, achalls)
else:
self._perform_achall_manually(achall)
responses.append(achall.response(achall.account_key))
return responses
def _perform_achall_with_script(self, achall, achalls):
env = dict(CERTBOT_DOMAIN=achall.domain,
CERTBOT_VALIDATION=achall.validation(achall.account_key),
CERTBOT_ALL_DOMAINS=','.join(one_achall.domain
for one_achall in achalls),
CERTBOT_REMAINING_CHALLENGES=str(len(achalls) -
achalls.index(achall) - 1))
if isinstance(achall.chall, challenges.HTTP01):
env['CERTBOT_TOKEN'] =
achall.chall.encode('token')
else:
os.environ.pop('CERTBOT_TOKEN', None)
os.environ.update(env)
_, out = self._execute_hook('auth-hook')
env['CERTBOT_AUTH_OUTPUT'] = out.strip()
self.env[achall] = env
def _perform_achall_manually(self, achall):
validation = achall.validation(achall.account_key)
if isinstance(achall.chall, challenges.HTTP01):
msg = self._HTTP_INSTRUCTIONS.format(
achall=achall,
encoded_token=achall.chall.encode('token'),
port=self.config.http01_port,
uri=achall.chall.uri(achall.domain), validation=validation)
else:
assert isinstance(achall.chall, challenges.DNS01)
msg = self._DNS_INSTRUCTIONS.format(
domain=achall.validation_domain_name(achall.domain),
validation=validation)
if isinstance(achall.chall, challenges.DNS01):
if self.subsequent_dns_challenge:
# 2nd or later dns-01 challenge
msg += self._SUBSEQUENT_DNS_CHALLENGE_INSTRUCTIONS
self.subsequent_dns_challenge = True
elif self.subsequent_any_challenge:
# 2nd or later challenge of another type
msg += self._SUBSEQUENT_CHALLENGE_INSTRUCTIONS
display = zope.component.getUtility(interfaces.IDisplay)
display.notification(msg, wrap=False, force_interactive=True)
self.subsequent_any_challenge = True
def cleanup(self, achalls): # pylint:
disable=missing-function-docstring
if self.conf('cleanup-hook'):
for achall in achalls:
env = self.env.pop(achall)
if 'CERTBOT_TOKEN' not in env:
os.environ.pop('CERTBOT_TOKEN', None)
os.environ.update(env)
self._execute_hook('cleanup-hook')
self.reverter.recovery_routine()
def _execute_hook(self, hook_name):
return misc.execute_command(self.option_name(hook_name),
self.conf(hook_name),
env=util.env_no_snap_for_external_calls())