diff options
Diffstat (limited to 'sign_csr.py')
-rw-r--r-- | sign_csr.py | 57 |
1 files changed, 40 insertions, 17 deletions
diff --git a/sign_csr.py b/sign_csr.py index 815c4ea..ff9332b 100644 --- a/sign_csr.py +++ b/sign_csr.py @@ -2,7 +2,43 @@ import argparse, subprocess, json, os, urllib2, sys, base64, binascii, time, \ hashlib, tempfile, re, copy, textwrap -def sign_csr(pubkey, csr, email=None): + +def host_token(domain, token, response_payload, user_step_number, file_based): + if file_based: + response_url = 'http://{}.well-known/acme-challenge/{}'.format(domain, token) + + # tell the user where to put a file + sys.stderr.write("""\ +STEP {}: You need to place a file on your webserver so that the URL {} will +resolve to a file with the contents: + +-------------- +{} +-------------- + +""".format(user_step_number, response_url, response_payload)) + else: + sys.stderr.write("""\ +STEP {}: You need to run this command on {} (don't stop the python command until the next step). + +openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes +sudo python -c "import BaseHTTPServer; \\ + import ssl; \\ + h = BaseHTTPServer.BaseHTTPRequestHandler; \\ + h.do_GET = lambda r: r.send_response(200) or r.end_headers() or r.wfile.write('{}'); \\ + s = BaseHTTPServer.HTTPServer(('0.0.0.0', 443), h); \\ + s.socket = ssl.wrap_socket(s.socket, certfile='server.pem', server_side=True); \\ + s.serve_forever()" + +""".format(user_step_number, domain, response_payload.replace('"', '\\"'))) + + stdout = sys.stdout + sys.stdout = sys.stderr + raw_input("Press Enter when you've got the python command running on your server...") + sys.stdout = stdout + + +def sign_csr(pubkey, csr, email=None, file_based=False): """Use the ACME protocol to get an ssl certificate signed by a certificate authority. @@ -287,21 +323,7 @@ STEP 3: You need to sign some more files (replace 'user.key' with your user priv # Step 11: Ask the user to host the token on their server for n, i in enumerate(ids): - sys.stderr.write("""\ -STEP {}: You need to run this command on {} (don't stop the python command until the next step). - -sudo python -c "import BaseHTTPServer; \\ - h = BaseHTTPServer.BaseHTTPRequestHandler; \\ - h.do_GET = lambda r: r.send_response(200) or r.end_headers() or r.wfile.write('{}'); \\ - s = BaseHTTPServer.HTTPServer(('0.0.0.0', 80), h); \\ - s.serve_forever()" - -""".format(n+4, i['domain'], responses[n]['data'])) - - stdout = sys.stdout - sys.stdout = sys.stderr - raw_input("Press Enter when you've got the python command running on your server...") - sys.stdout = stdout + host_token(i['domain'], challenge['token'], responses[n]['data'], n + 4, file_based) # Step 12: Let the CA know you're ready for the challenge sys.stderr.write("Requesting verification for {}...\n".format(i['domain'])) @@ -409,9 +431,10 @@ $ python sign_csr.py --public-key user.pub domain.csr > signed.crt """) parser.add_argument("-p", "--public-key", required=True, help="path to your account public key") parser.add_argument("-e", "--email", default=None, help="contact email, default is webmaster@<shortest_domain>") + parser.add_argument("-f", "--file-based", action='store_true', help="if set, a file-based response is used") parser.add_argument("csr_path", help="path to your certificate signing request") args = parser.parse_args() - signed_crt = sign_csr(args.public_key, args.csr_path, email=args.email) + signed_crt = sign_csr(args.public_key, args.csr_path, email=args.email, file_based=args.file_based) sys.stdout.write(signed_crt) |