| @ -0,0 +1,68 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Create wildcard certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| } | |||||
| @test "Check CHECK_REMOTE works for wildcard certificates" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Using staging server, skipping internal test" | |||||
| fi | |||||
| run ${CODE_DIR}/getssl "*.$GETSSL_HOST" | |||||
| assert_success | |||||
| assert_line --partial "certificate is valid for more than" | |||||
| check_output_for_errors | |||||
| } | |||||
| @test "Force renewal of wildcard certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Using staging server, skipping internal test" | |||||
| fi | |||||
| run ${CODE_DIR}/getssl -f "*.$GETSSL_HOST" | |||||
| assert_success | |||||
| refute_line --partial "certificate is valid for more than" | |||||
| check_output_for_errors | |||||
| } | |||||
| @test "Check renewal of near-expiration wildcard certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Using staging server, skipping internal test" | |||||
| fi | |||||
| echo "RENEW_ALLOW=2000" >> "${INSTALL_DIR}/.getssl/*.${GETSSL_HOST}/getssl.cfg" | |||||
| run ${CODE_DIR}/getssl "*.$GETSSL_HOST" | |||||
| assert_success | |||||
| refute_line --partial "certificate is valid for more than" | |||||
| check_output_for_errors | |||||
| cleanup_environment | |||||
| } | |||||
| @ -0,0 +1,82 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Create secp384r1 wildcard certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| cat <<- EOF > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| ACCOUNT_KEY_TYPE="secp384r1" | |||||
| PRIVATE_KEY_ALG="secp384r1" | |||||
| EOF | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||||
| assert_line --partial "Public Key Algorithm: id-ecPublicKey" | |||||
| cleanup_environment | |||||
| } | |||||
| @test "Create dual certificates using DNS-01 verification" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| cat <<- EOF > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| DUAL_RSA_ECDSA="true" | |||||
| ACCOUNT_KEY_TYPE="prime256v1" | |||||
| PRIVATE_KEY_ALG="prime256v1" | |||||
| EOF | |||||
| check_nginx | |||||
| if [ "$OLD_NGINX" = "false" ]; then | |||||
| echo 'RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-dual-certs ${NGINX_CONFIG} && /getssl/test/restart-nginx"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| else | |||||
| echo 'CHECK_REMOTE="false"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| fi | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| check_certificates | |||||
| assert [ -e "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/chain.ec.crt" ] | |||||
| assert [ -e "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/fullchain.ec.crt" ] | |||||
| assert [ -e "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.ec.crt" ] | |||||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||||
| assert_line --partial "Public Key Algorithm: rsaEncryption" | |||||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.ec.crt" | |||||
| assert_line --partial "Public Key Algorithm: id-ecPublicKey" | |||||
| cleanup_environment | |||||
| } | |||||
| @ -0,0 +1,65 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # These are run for every test, not once per file | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Create dual certificates (one wildcard) and copy RSA and ECDSA chain and key to two locations" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| cat <<- 'EOF' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| DUAL_RSA_ECDSA="true" | |||||
| ACCOUNT_KEY_TYPE="prime256v1" | |||||
| PRIVATE_KEY_ALG="prime256v1" | |||||
| DOMAIN_KEY_LOCATION="/etc/nginx/pki/private/server.key;/root/a.${GETSSL_HOST}/server.key" | |||||
| DOMAIN_CHAIN_LOCATION="/etc/nginx/pki/domain-chain.crt;/root/a.${GETSSL_HOST}/domain-chain.crt" # this is the domain cert and CA cert | |||||
| EOF | |||||
| check_nginx | |||||
| if [ "$OLD_NGINX" = "false" ]; then | |||||
| echo 'RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-dual-certs ${NGINX_CONFIG} && /getssl/test/restart-nginx"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| else | |||||
| echo 'CHECK_REMOTE="false"' >> ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| fi | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| if [ "$OLD_NGINX" = "false" ]; then | |||||
| assert_line --partial "rsa certificate installed OK on server" | |||||
| assert_line --partial "prime256v1 certificate installed OK on server" | |||||
| fi | |||||
| # Check that the RSA chain and key have been copied to both locations | |||||
| assert [ -e "/etc/nginx/pki/domain-chain.crt" ] | |||||
| assert [ -e "/root/a.${GETSSL_HOST}/domain-chain.crt" ] | |||||
| assert [ -e "/etc/nginx/pki/private/server.key" ] | |||||
| assert [ -e "/root/a.${GETSSL_HOST}/server.key" ] | |||||
| # Check that the ECDSA chain and key have been copied to both locations | |||||
| assert [ -e "/etc/nginx/pki/domain-chain.ec.crt" ] | |||||
| assert [ -e "/root/a.${GETSSL_HOST}/domain-chain.ec.crt" ] | |||||
| assert [ -e "/etc/nginx/pki/private/server.ec.key" ] | |||||
| assert [ -e "/root/a.${GETSSL_HOST}/server.ec.key" ] | |||||
| cleanup_environment | |||||
| } | |||||
| @ -0,0 +1,46 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Check for globbing for wildcard domains" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Using staging server, skipping internal test" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| # Create a directory in /root which looks like a domain so that if glob expansion is performed a certificate for the wrong domain will be created | |||||
| mkdir -p "${INSTALL_DIR}/a.${GETSSL_HOST}" | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| } | |||||
| @test "Force renewal of wildcard certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Not trying on staging server yet" | |||||
| fi | |||||
| run ${CODE_DIR}/getssl -f "*.$GETSSL_HOST" | |||||
| assert_success | |||||
| refute_line --partial "certificate is valid for more than" | |||||
| check_output_for_errors | |||||
| } | |||||
| @ -0,0 +1,69 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| curl --silent -X POST -d '{"host":"wild-'$GETSSL_HOST'", "addresses":["'$GETSSL_IP'"]}' http://10.30.50.3:8055/add-a | |||||
| fi | |||||
| } | |||||
| teardown() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| curl --silent -X POST -d '{"host":"wild-'$GETSSL_HOST'", "addresses":["'$GETSSL_IP'"]}' http://10.30.50.3:8055/clear-a | |||||
| fi | |||||
| } | |||||
| @test "Check can create certificate for wildcard domain as arg and non-wildcard in SANS" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| # Staging server generates an error if try to create a certificate for *.domain and a.domain | |||||
| # so create for *.wild-domain and a.domain instead | |||||
| GETSSL_CMD_HOST="*.wild-${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| echo 'SANS="${GETSSL_HOST}"' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||||
| # verify certificate is for wildcard domain with non-wildcard domain in the Subject Alternative Name list | |||||
| assert_output --regexp "Subject: CN[ ]?=[ ]?\*.wild-${GETSSL_HOST}" | |||||
| assert_output --partial "DNS:${GETSSL_HOST}" | |||||
| } | |||||
| @test "Check can create certificate for non-wildcard domain as arg and wildcard in SANS" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| echo 'SANS="*.wild-${GETSSL_HOST}"' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| run openssl x509 -noout -text -in "${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt" | |||||
| # verify certificate is for non-wildcard domain with wildcard domain in the Subject Alternative Name list | |||||
| assert_output --regexp "Subject: CN[ ]?=[ ]?${GETSSL_HOST}" | |||||
| assert_output --partial "DNS:*.wild-${GETSSL_HOST}" | |||||
| } | |||||
| @ -0,0 +1,42 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Check can create certificate for wildcard domain using --all" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Using staging server, skipping internal test" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| # Create .getssl directory and .getssl/*.{host} directory | |||||
| init_getssl | |||||
| cp "${CODE_DIR}/test/test-config/${CONFIG_FILE}" "${INSTALL_DIR}/.getssl/*.${GETSSL_HOST}/getssl.cfg" | |||||
| # create another domain in the .getssl directory | |||||
| run ${CODE_DIR}/getssl -c "a.${GETSSL_HOST}" | |||||
| cp "${CODE_DIR}/test/test-config/${CONFIG_FILE}" "${INSTALL_DIR}/.getssl/a.${GETSSL_HOST}/getssl.cfg" | |||||
| # Create a directory in /root which looks like a domain so that if glob expansion is performed the wildcard certificate won't be created | |||||
| mkdir -p "${INSTALL_DIR}/a.${GETSSL_HOST}" | |||||
| run ${CODE_DIR}/getssl --all | |||||
| assert_success | |||||
| assert_line --partial "Certificate saved in /root/.getssl/*.${GETSSL_HOST}/*.${GETSSL_HOST}" | |||||
| assert_line --partial "Certificate saved in /root/.getssl/a.${GETSSL_HOST}/a.${GETSSL_HOST}" | |||||
| check_output_for_errors | |||||
| } | |||||
| @ -0,0 +1,49 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Create certificate to check wildcard revoke" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| } | |||||
| @test "Check we can revoke a wildcard certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| CONFIG_FILE="getssl-staging-dns01.cfg" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| . "${CODE_DIR}/test/test-config/${CONFIG_FILE}" | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| CERT=${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.crt | |||||
| KEY=${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/${GETSSL_CMD_HOST}.key | |||||
| run ${CODE_DIR}/getssl -d --revoke $CERT $KEY $CA | |||||
| assert_line "certificate revoked" | |||||
| assert_success | |||||
| check_output_for_errors "debug" | |||||
| } | |||||
| @ -0,0 +1,45 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Check that new creating a new configuration files uses details from existing certificate" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Using staging server, skipping internal test" | |||||
| else | |||||
| CONFIG_FILE="getssl-dns01.cfg" | |||||
| fi | |||||
| # Create and install certificate for wildcard + another domain | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| echo 'SANS="a.${GETSSL_HOST}"' > ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl_test_specific.cfg | |||||
| create_certificate | |||||
| assert_success | |||||
| check_output_for_errors | |||||
| # Delete configuration | |||||
| rm -r ${INSTALL_DIR}/.getssl | |||||
| # Create configuration | |||||
| run ${CODE_DIR}/getssl -c "${GETSSL_CMD_HOST}" | |||||
| # Assert that the newly created configuration contains the additional domain in SANS | |||||
| # if this fails then error in tests will be "grep failed" - this means SANS did not hold the expected value | |||||
| # eg SANS="a.centos7.getssl.test" | |||||
| grep -q "SANS=\"a.${GETSSL_HOST}\"" ${INSTALL_DIR}/.getssl/${GETSSL_CMD_HOST}/getssl.cfg | |||||
| assert_success | |||||
| } | |||||
| @ -0,0 +1,31 @@ | |||||
| #! /usr/bin/env bats | |||||
| load '/bats-support/load.bash' | |||||
| load '/bats-assert/load.bash' | |||||
| load '/getssl/test/test_helper.bash' | |||||
| # This is run for every test | |||||
| setup() { | |||||
| if [ -z "$STAGING" ]; then | |||||
| export CURL_CA_BUNDLE=/root/pebble-ca-bundle.crt | |||||
| fi | |||||
| } | |||||
| @test "Check that trying to create a wildcard certificate using http-01 validation shows an error message" { | |||||
| if [ -n "$STAGING" ]; then | |||||
| skip "Internal test, no need to test on staging server" | |||||
| else | |||||
| CONFIG_FILE="getssl-http01.cfg" | |||||
| fi | |||||
| # Try and create a wildcard certificate using http-01 validation | |||||
| GETSSL_CMD_HOST="*.${GETSSL_HOST}" | |||||
| setup_environment | |||||
| init_getssl | |||||
| create_certificate | |||||
| assert_failure | |||||
| assert_line --partial "cannot use http-01 validation for wildcard domains" | |||||
| } | |||||
| @ -0,0 +1,37 @@ | |||||
| # Test that more than one location can be specified for CERT and KEY locations and that the | |||||
| # files are copied to both locations when both RSA and ECDSA certificates are created | |||||
| # | |||||
| CA="https://pebble:14000/dir" | |||||
| VALIDATE_VIA_DNS=true | |||||
| DNS_ADD_COMMAND="/getssl/dns_scripts/dns_add_challtestsrv" | |||||
| DNS_DEL_COMMAND="/getssl/dns_scripts/dns_del_challtestsrv" | |||||
| AUTH_DNS_SERVER=10.30.50.3 | |||||
| # Speed up the test by reducing the number or retries and the wait between retries. | |||||
| DNS_WAIT=2 | |||||
| DNS_WAIT_COUNT=11 | |||||
| DNS_EXTRA_WAIT=0 | |||||
| DUAL_RSA_ECDSA="true" | |||||
| ACCOUNT_KEY_TYPE="prime256v1" | |||||
| PRIVATE_KEY_ALG="prime256v1" | |||||
| # Additional domains - this could be multiple domains / subdomains in a comma separated list | |||||
| SANS="" | |||||
| # SANS="a.${GETSSL_HOST}" | |||||
| # Location for all your certs, these can either be on the server (full path name) | |||||
| # or using ssh /sftp as for the ACL | |||||
| DOMAIN_CERT_LOCATION="/etc/nginx/pki/server.crt" | |||||
| DOMAIN_KEY_LOCATION="/etc/nginx/pki/private/server.key;/root/a.${GETSSL_HOST}/server.key" | |||||
| CA_CERT_LOCATION="/etc/nginx/pki/chain.crt" | |||||
| DOMAIN_CHAIN_LOCATION="/etc/nginx/pki/domain-chain.crt;/root/a.${GETSSL_HOST}/domain-chain.crt" # this is the domain cert and CA cert | |||||
| DOMAIN_PEM_LOCATION="" # this is the domain_key, domain cert and CA cert | |||||
| # The command needed to reload apache / nginx or whatever you use | |||||
| RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-dual-certs ${NGINX_CONFIG} && /getssl/test/restart-nginx" | |||||
| # Define the server type and confirm correct certificate is installed | |||||
| SERVER_TYPE="https" | |||||
| CHECK_REMOTE="true" | |||||
| @ -0,0 +1,36 @@ | |||||
| # Uncomment and modify any variables you need | |||||
| # see https://github.com/srvrco/getssl/wiki/Config-variables for details | |||||
| # see https://github.com/srvrco/getssl/wiki/Example-config-files for example configs | |||||
| # | |||||
| CA="https://pebble:14000/dir" | |||||
| VALIDATE_VIA_DNS=true | |||||
| DNS_ADD_COMMAND="/getssl/dns_scripts/dns_add_challtestsrv" | |||||
| DNS_DEL_COMMAND="/getssl/dns_scripts/dns_del_challtestsrv" | |||||
| AUTH_DNS_SERVER=10.30.50.3 | |||||
| # Speed up the test by reducing the number or retries and the wait between retries. | |||||
| DNS_WAIT=2 | |||||
| DNS_WAIT_COUNT=11 | |||||
| DNS_EXTRA_WAIT=0 | |||||
| ACCOUNT_KEY_TYPE="secp384r1" | |||||
| PRIVATE_KEY_ALG="secp384r1" | |||||
| # Additional domains - this could be multiple domains / subdomains in a comma separated list | |||||
| SANS="" | |||||
| # Location for all your certs, these can either be on the server (full path name) | |||||
| # or using ssh /sftp as for the ACL | |||||
| DOMAIN_CERT_LOCATION="/etc/nginx/pki/server.crt" | |||||
| DOMAIN_KEY_LOCATION="/etc/nginx/pki/private/server.key" | |||||
| CA_CERT_LOCATION="/etc/nginx/pki/chain.crt" | |||||
| DOMAIN_CHAIN_LOCATION="" # this is the domain cert and CA cert | |||||
| DOMAIN_PEM_LOCATION="" # this is the domain_key, domain cert and CA cert | |||||
| # The command needed to reload apache / nginx or whatever you use | |||||
| RELOAD_CMD="cp /getssl/test/test-config/nginx-ubuntu-ssl ${NGINX_CONFIG} && /getssl/test/restart-nginx" | |||||
| # Define the server type and confirm correct certificate is installed | |||||
| SERVER_TYPE="https" | |||||
| CHECK_REMOTE="true" | |||||