| @ -0,0 +1,68 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Create wildcard certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| } | |||
| @test "Check CHECK_REMOTE works for wildcard certificates" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Using staging server, skipping internal test" | |||
| fi | |||
| run ${CODE_DIR}/getssl "*.$GETSSL_HOST" | |||
| assert_success | |||
| assert_line --partial "certificate is valid for more than" | |||
| check_output_for_errors | |||
| } | |||
| @test "Force renewal of wildcard certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Using staging server, skipping internal test" | |||
| fi | |||
| run ${CODE_DIR}/getssl -f "*.$GETSSL_HOST" | |||
| assert_success | |||
| refute_line --partial "certificate is valid for more than" | |||
| check_output_for_errors | |||
| } | |||
| @test "Check renewal of near-expiration wildcard certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Using staging server, skipping internal test" | |||
| fi | |||
| echo "RENEW_ALLOW=2000" >> "${INSTALL_DIR}/.getssl/*.${GETSSL_HOST}/getssl.cfg" | |||
| run ${CODE_DIR}/getssl "*.$GETSSL_HOST" | |||
| assert_success | |||
| refute_line --partial "certificate is valid for more than" | |||
| check_output_for_errors | |||
| cleanup_environment | |||
| } | |||
| @ -0,0 +1,82 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Create secp384r1 wildcard certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| cat <<- EOF > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| ACCOUNT_KEY_TYPE="secp384r1" | |||
| PRIVATE_KEY_ALG="secp384r1" | |||
| EOF | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||
| assert_line --partial "Public Key Algorithm: id-ecPublicKey" | |||
| cleanup_environment | |||
| } | |||
| @test "Create dual certificates using DNS-01 verification" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| cat <<- EOF > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| DUAL_RSA_ECDSA="true" | |||
| ACCOUNT_KEY_TYPE="prime256v1" | |||
| PRIVATE_KEY_ALG="prime256v1" | |||
| EOF | |||
| check_nginx | |||
| if [ "$OLD_NGINX" = "false" ]; then | |||
| echo 'RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-dual-certs ${NGINX_CONFIG} && /getssl/test/restart-nginx"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| else | |||
| echo 'CHECK_REMOTE="false"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| fi | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| check_certificates | |||
| assert [ -e "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/chain.ec.crt" ] | |||
| assert [ -e "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/fullchain.ec.crt" ] | |||
| assert [ -e "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.ec.crt" ] | |||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||
| assert_line --partial "Public Key Algorithm: rsaEncryption" | |||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.ec.crt" | |||
| assert_line --partial "Public Key Algorithm: id-ecPublicKey" | |||
| cleanup_environment | |||
| } | |||
| @ -0,0 +1,65 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # These are run for every test, not once per file | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Create dual certificates (one wildcard) and copy RSA and ECDSA chain and key to two locations" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| cat <<- 'EOF' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| DUAL_RSA_ECDSA="true" | |||
| ACCOUNT_KEY_TYPE="prime256v1" | |||
| PRIVATE_KEY_ALG="prime256v1" | |||
| DOMAIN_KEY_LOCATION="/etc/nginx/pki/private/server.key;/root/a.${GETSSL_HOST}/server.key" | |||
| DOMAIN_CHAIN_LOCATION="/etc/nginx/pki/domain-chain.crt;/root/a.${GETSSL_HOST}/domain-chain.crt" # this is the domain cert and CA cert | |||
| EOF | |||
| check_nginx | |||
| if [ "$OLD_NGINX" = "false" ]; then | |||
| echo 'RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-dual-certs ${NGINX_CONFIG} && /getssl/test/restart-nginx"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| else | |||
| echo 'CHECK_REMOTE="false"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| fi | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| if [ "$OLD_NGINX" = "false" ]; then | |||
| assert_line --partial "rsa certificate installed OK on server" | |||
| assert_line --partial "prime256v1 certificate installed OK on server" | |||
| fi | |||
| # Check that the RSA chain and key have been copied to both locations | |||
| assert [ -e "/etc/nginx/pki/domain-chain.crt" ] | |||
| assert [ -e "/root/a.${GETSSL_HOST}/domain-chain.crt" ] | |||
| assert [ -e "/etc/nginx/pki/private/server.key" ] | |||
| assert [ -e "/root/a.${GETSSL_HOST}/server.key" ] | |||
| # Check that the ECDSA chain and key have been copied to both locations | |||
| assert [ -e "/etc/nginx/pki/domain-chain.ec.crt" ] | |||
| assert [ -e "/root/a.${GETSSL_HOST}/domain-chain.ec.crt" ] | |||
| assert [ -e "/etc/nginx/pki/private/server.ec.key" ] | |||
| assert [ -e "/root/a.${GETSSL_HOST}/server.ec.key" ] | |||
| cleanup_environment | |||
| } | |||
| @ -0,0 +1,46 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Check for globbing for wildcard domains" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Using staging server, skipping internal test" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| # Create a directory in /root which looks like a domain so that if glob expansion is performed a certificate for the wrong domain will be created | |||
| mkdir -p "${INSTALL_DIR}/a.${GETSSL_HOST}" | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| } | |||
| @test "Force renewal of wildcard certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Not trying on staging server yet" | |||
| fi | |||
| run ${CODE_DIR}/getssl -f "*.$GETSSL_HOST" | |||
| assert_success | |||
| refute_line --partial "certificate is valid for more than" | |||
| check_output_for_errors | |||
| } | |||
| @ -0,0 +1,69 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| curl --silent -X POST -d '{"host":"wild-'$GETSSL_HOST'", "addresses":["'$GETSSL_IP'"]}' http://10.30.50.3:8055/add-a | |||
| fi | |||
| } | |||
| teardown() { | |||
| if [ -z "$STAGING" ]; then | |||
| curl --silent -X POST -d '{"host":"wild-'$GETSSL_HOST'", "addresses":["'$GETSSL_IP'"]}' http://10.30.50.3:8055/clear-a | |||
| fi | |||
| } | |||
| @test "Check can create certificate for wildcard domain as arg and non-wildcard in SANS" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| # Staging server generates an error if try to create a certificate for *.domain and a.domain | |||
| # so create for *.wild-domain and a.domain instead | |||
| GETSSL_CMD_HOST="*.wild-${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| echo 'SANS="${GETSSL_HOST}"' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||
| # verify certificate is for wildcard domain with non-wildcard domain in the Subject Alternative Name list | |||
| assert_output --regexp "Subject: CN[ ]?=[ ]?\*.wild-${GETSSL_HOST}" | |||
| assert_output --partial "DNS:${GETSSL_HOST}" | |||
| } | |||
| @test "Check can create certificate for non-wildcard domain as arg and wildcard in SANS" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| echo 'SANS="*.wild-${GETSSL_HOST}"' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||
| # verify certificate is for non-wildcard domain with wildcard domain in the Subject Alternative Name list | |||
| assert_output --regexp "Subject: CN[ ]?=[ ]?${GETSSL_HOST}" | |||
| assert_output --partial "DNS:*.wild-${GETSSL_HOST}" | |||
| } | |||
| @ -0,0 +1,42 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Check can create certificate for wildcard domain using --all" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Using staging server, skipping internal test" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| # Create .getssl directory and .getssl/*.{host} directory | |||
| init_getssl | |||
| cp "${CODE_DIR}/test/test-config/${CONFIG_FILE}" "${INSTALL_DIR}/.getssl/*.${GETSSL_HOST}/getssl.cfg" | |||
| # create another domain in the .getssl directory | |||
| run ${CODE_DIR}/getssl -c "a.${GETSSL_HOST}" | |||
| cp "${CODE_DIR}/test/test-config/${CONFIG_FILE}" "${INSTALL_DIR}/.getssl/a.${GETSSL_HOST}/getssl.cfg" | |||
| # Create a directory in /root which looks like a domain so that if glob expansion is performed the wildcard certificate won't be created | |||
| mkdir -p "${INSTALL_DIR}/a.${GETSSL_HOST}" | |||
| run ${CODE_DIR}/getssl --all | |||
| assert_success | |||
| assert_line --partial "Certificate saved in /root/.getssl/*.${GETSSL_HOST}/*.${GETSSL_HOST}" | |||
| assert_line --partial "Certificate saved in /root/.getssl/a.${GETSSL_HOST}/a.${GETSSL_HOST}" | |||
| check_output_for_errors | |||
| } | |||
| @ -0,0 +1,49 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Create certificate to check wildcard revoke" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| } | |||
| @test "Check we can revoke a wildcard certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| . "${CODE_DIR}/test/test-config/${CONFIG_FILE}" | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| CERT=${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt | |||
| KEY=${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.key | |||
| run ${CODE_DIR}/getssl -d --revoke $CERT $KEY $CA | |||
| assert_line "certificate revoked" | |||
| assert_success | |||
| check_output_for_errors "debug" | |||
| } | |||
| @ -0,0 +1,45 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Check that new creating a new configuration files uses details from existing certificate" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Using staging server, skipping internal test" | |||
| else | |||
| CONFIG_FILE="getssl-dns01.cfg" | |||
| fi | |||
| # Create and install certificate for wildcard + another domain | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| echo 'SANS="a.${GETSSL_HOST}"' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||
| create_certificate | |||
| assert_success | |||
| check_output_for_errors | |||
| # Delete configuration | |||
| rm -r ${INSTALL_DIR}/.getssl | |||
| # Create configuration | |||
| run ${CODE_DIR}/getssl -c "${GETSSL_CMD_HOST}" | |||
| # Assert that the newly created configuration contains the additional domain in SANS | |||
| # if this fails then error in tests will be "grep failed" - this means SANS did not hold the expected value | |||
| # eg SANS="a.centos7.getssl.test" | |||
| grep -q "SANS=\"a.${GETSSL_HOST}\"" ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl.cfg | |||
| assert_success | |||
| } | |||
| @ -0,0 +1,31 @@ | |||
| #! /usr/bin/env bats | |||
| load '/bats-support/load.bash' | |||
| load '/bats-assert/load.bash' | |||
| load '/getssl/test/test_helper.bash' | |||
| # This is run for every test | |||
| setup() { | |||
| if [ -z "$STAGING" ]; then | |||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||
| fi | |||
| } | |||
| @test "Check that trying to create a wildcard certificate using http-01 validation shows an error message" { | |||
| if [ -n "$STAGING" ]; then | |||
| skip "Internal test, no need to test on staging server" | |||
| else | |||
| CONFIG_FILE="getssl-http01.cfg" | |||
| fi | |||
| # Try and create a wildcard certificate using http-01 validation | |||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||
| setup_environment | |||
| init_getssl | |||
| create_certificate | |||
| assert_failure | |||
| assert_line --partial "cannot use http-01 validation for wildcard domains" | |||
| } | |||
| @ -0,0 +1,37 @@ | |||
| # Test that more than one location can be specified for CERT and KEY locations and that the | |||
| # files are copied to both locations when both RSA and ECDSA certificates are created | |||
| # | |||
| CA="https://pebble:14000/dir" | |||
| VALIDATE_VIA_DNS=true | |||
| DNS_ADD_COMMAND="/getssl/dns_scripts/dns_add_challtestsrv" | |||
| DNS_DEL_COMMAND="/getssl/dns_scripts/dns_del_challtestsrv" | |||
| AUTH_DNS_SERVER=10.30.50.3 | |||
| # Speed up the test by reducing the number or retries and the wait between retries. | |||
| DNS_WAIT=2 | |||
| DNS_WAIT_COUNT=11 | |||
| DNS_EXTRA_WAIT=0 | |||
| DUAL_RSA_ECDSA="true" | |||
| ACCOUNT_KEY_TYPE="prime256v1" | |||
| PRIVATE_KEY_ALG="prime256v1" | |||
| # Additional domains - this could be multiple domains / subdomains in a comma separated list | |||
| SANS="" | |||
| # SANS="a.${GETSSL_HOST}" | |||
| # Location for all your certs, these can either be on the server (full path name) | |||
| # or using ssh /sftp as for the ACL | |||
| DOMAIN_CERT_LOCATION="/etc/nginx/pki/server.crt" | |||
| DOMAIN_KEY_LOCATION="/etc/nginx/pki/private/server.key;/root/a.${GETSSL_HOST}/server.key" | |||
| CA_CERT_LOCATION="/etc/nginx/pki/chain.crt" | |||
| DOMAIN_CHAIN_LOCATION="/etc/nginx/pki/domain-chain.crt;/root/a.${GETSSL_HOST}/domain-chain.crt" # this is the domain cert and CA cert | |||
| DOMAIN_PEM_LOCATION="" # this is the domain_key, domain cert and CA cert | |||
| # The command needed to reload apache / nginx or whatever you use | |||
| RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-dual-certs ${NGINX_CONFIG} && /getssl/test/restart-nginx" | |||
| # Define the server type and confirm correct certificate is installed | |||
| SERVER_TYPE="https" | |||
| CHECK_REMOTE="true" | |||
| @ -0,0 +1,36 @@ | |||
| # Uncomment and modify any variables you need | |||
| # see https://github.com/srvrco/getssl/wiki/Config-variables for details | |||
| # see https://github.com/srvrco/getssl/wiki/Example-config-files for example configs | |||
| # | |||
| CA="https://pebble:14000/dir" | |||
| VALIDATE_VIA_DNS=true | |||
| DNS_ADD_COMMAND="/getssl/dns_scripts/dns_add_challtestsrv" | |||
| DNS_DEL_COMMAND="/getssl/dns_scripts/dns_del_challtestsrv" | |||
| AUTH_DNS_SERVER=10.30.50.3 | |||
| # Speed up the test by reducing the number or retries and the wait between retries. | |||
| DNS_WAIT=2 | |||
| DNS_WAIT_COUNT=11 | |||
| DNS_EXTRA_WAIT=0 | |||
| ACCOUNT_KEY_TYPE="secp384r1" | |||
| PRIVATE_KEY_ALG="secp384r1" | |||
| # Additional domains - this could be multiple domains / subdomains in a comma separated list | |||
| SANS="" | |||
| # Location for all your certs, these can either be on the server (full path name) | |||
| # or using ssh /sftp as for the ACL | |||
| DOMAIN_CERT_LOCATION="/etc/nginx/pki/server.crt" | |||
| DOMAIN_KEY_LOCATION="/etc/nginx/pki/private/server.key" | |||
| CA_CERT_LOCATION="/etc/nginx/pki/chain.crt" | |||
| DOMAIN_CHAIN_LOCATION="" # this is the domain cert and CA cert | |||
| DOMAIN_PEM_LOCATION="" # this is the domain_key, domain cert and CA cert | |||
| # The command needed to reload apache / nginx or whatever you use | |||
| RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-ssl ${NGINX_CONFIG} && /getssl/test/restart-nginx" | |||
| # Define the server type and confirm correct certificate is installed | |||
| SERVER_TYPE="https" | |||
| CHECK_REMOTE="true" | |||