PKM4$jjlancer/__init__.py""" Provision TLS *Cer*tificates for your *LAN*, using the ACME DNS challenge. """ __version__ = '0.3.1' PKCL1x lancer/_cloudflare.pyimport attr import treq from txacme.interfaces import IResponder from txacme.challenges._libcloud import _validation from zope.interface import implementer from twisted.internet.defer import inlineCallbacks from twisted.internet.task import deferLater from hyperlink import parse base = parse("https://api.cloudflare.com/client/v4/") def global_reactor(): from twisted.internet import reactor return reactor @attr.s(hash=False) @implementer(IResponder) class CloudflareV4Responder(object): """ Cloudflare API V4 responder. """ _email = attr.ib() _api_key = attr.ib() _zone_name = attr.ib() _settle_delay = attr.ib(default=60.0) _reactor = attr.ib(default=attr.Factory(global_reactor)) challenge_type = u'dns-01' def _headers(self): """ Auth headers that Cloudflare expects. """ return { b"X-Auth-Key": self._api_key, b"X-Auth-Email": self._email } @inlineCallbacks def start_responding(self, server_name, challenge, response): validation = _validation(response) full_name = challenge.validation_domain_name(server_name) # subdomain = _split_zone(full_name, self._zone_name) zones_list_url = str(base.child("zones").set("name", self._zone_name)) response = yield treq.get(zones_list_url, headers=self._headers()) data = yield response.json() assert len(data['result']) == 1 zone_id = data['result'][0]['id'] records_base = base.child("zones").child(zone_id).child("dns_records") records_query_url = str(records_base .set("type", "TXT") .set("name", full_name)) response = yield treq.get(records_query_url, headers=self._headers()) data = yield response.json() records = data['result'] dns_record = { "type": "TXT", "ttl": 120, "name": full_name, "content": validation } if records: put_to = str(records_base.child(records[0]["id"])) response = yield treq.put( put_to, json=dns_record, headers=self._headers() ) else: post_to = str(records_base) response = yield treq.post(post_to, json=dns_record, headers=self._headers()) yield response.json() yield deferLater(self._reactor, self._settle_delay, lambda: None) @inlineCallbacks def stop_responding(self, server_name, challenge, response): # Ignore stop_responding right now. yield deferLater(self._reactor, self._settle_delay, lambda: None) PK9M[hm m lancer/_gandi.pyimport attr import treq from txacme.interfaces import IResponder from txacme.challenges._libcloud import _validation, _split_zone from zope.interface import implementer from twisted.internet.defer import inlineCallbacks from twisted.internet.task import deferLater @attr.s(hash=False) @implementer(IResponder) class GandiV5Responder(object): """ Gandi V5 API responder. """ _api_key = attr.ib() _zone_name = attr.ib() _settle_delay = attr.ib(default=60.0) challenge_type = u'dns-01' def _headers(self): return { # b"Content-Type": [b"application/json"], b"X-API-Key": [self._api_key.encode("ascii")] } @inlineCallbacks def start_responding(self, server_name, challenge, response): from twisted.internet import reactor validation = _validation(response) full_name = challenge.validation_domain_name(server_name) subdomain = _split_zone(full_name, self._zone_name) if subdomain == '': subdomain = '@' url = ( 'https://dns.api.gandi.net/api/v5/domains/' '{zone}/records' ).format( zone=self._zone_name, subdomain=subdomain, type='TXT', ) body = {"rrset_name": subdomain, "rrset_type": "TXT", "rrset_ttl": 300, "rrset_values": [ validation ]} print(body) response = yield treq.post(url, json=body, headers=self._headers()) print((yield treq.json_content(response))) yield deferLater(reactor, self._settle_delay, lambda: None) print("start settled") @inlineCallbacks def stop_responding(self, server_name, challenge, response): from twisted.internet import reactor full_name = challenge.validation_domain_name(server_name) subdomain = _split_zone(full_name, self._zone_name) url = ( 'https://dns.api.gandi.net/api/v5/domains/' '{zone}/records/{subdomain}/{type}' ).format( zone=self._zone_name, subdomain=subdomain, type='TXT', ) if subdomain == '': subdomain = '@' response = yield treq.delete(url, headers=self._headers()) print((yield treq.text(response))) yield deferLater(reactor, self._settle_delay, lambda: None) print("stop settled") PK9M ylancer/_impl.py import sys, json, six from secretly import secretly from functools import partial from twisted.internet.defer import Deferred from twisted.internet.task import react from twisted.python.filepath import FilePath from twisted.logger import globalLogBeginner, textFileLogObserver from cryptography.hazmat.primitives import serialization from cryptography.hazmat.backends import default_backend from josepy.jwk import JWKRSA from josepy.jwa import RS256 from txacme.service import AcmeIssuingService from txacme.store import DirectoryStore from txacme.client import Client from txacme.urls import LETSENCRYPT_DIRECTORY, LETSENCRYPT_STAGING_DIRECTORY from txacme.util import generate_private_key from txacme.challenges import LibcloudDNSResponder from ._cloudflare import CloudflareV4Responder from ._gandi import GandiV5Responder def maybe_key(pem_path): acme_key_file = pem_path.child(u'client.key') if acme_key_file.exists(): key = serialization.load_pem_private_key( acme_key_file.getContent(), password=None, backend=default_backend() ) else: key = generate_private_key(u'rsa') acme_key_file.setContent( key.private_bytes( encoding=serialization.Encoding.PEM, format=serialization.PrivateFormat.TraditionalOpenSSL, encryption_algorithm=serialization.NoEncryption() ) ) acme_key = JWKRSA(key=key) return acme_key def main(reactor): acme_path = FilePath(sys.argv[1]).asTextMode() myconfig = acme_path.child("lancer.json") if myconfig.exists(): cfg = json.loads(myconfig.getContent().decode("utf-8")) driver_name = cfg['driver_name'] zone_name = cfg['zone_name'] user_name = cfg['user_name'] staging = cfg.get('staging', False) else: driver_name = six.moves.input("driver ('rackspace' or 'cloudflare')? ") user_name = six.moves.input("user? ") zone_name = six.moves.input("zone? ") staging = False myconfig.setContent(json.dumps({ "driver_name": driver_name, "user_name": user_name, "zone_name": zone_name, "staging": staging }).encode("utf-8")) globalLogBeginner.beginLoggingTo([textFileLogObserver(sys.stdout)]) def action(secret): password = secret if driver_name == 'gandi': responders = [ GandiV5Responder(api_key=password, zone_name=zone_name) ] elif driver_name == 'cloudflare': responders = [ CloudflareV4Responder(email=user_name, api_key=password, zone_name=zone_name) ] else: responders = [ LibcloudDNSResponder.create(reactor, driver_name, user_name, password, zone_name) ] acme_key = maybe_key(acme_path) cert_store = DirectoryStore(acme_path) if staging: le_url = LETSENCRYPT_STAGING_DIRECTORY else: le_url = LETSENCRYPT_DIRECTORY client_creator = partial(Client.from_url, reactor=reactor, url=le_url, key=acme_key, alg=RS256) clock = reactor service = AcmeIssuingService(cert_store, client_creator, clock, responders) service.startService() forever = Deferred() return forever return secretly(reactor, action=action, system='libcloud/' + driver_name, username=user_name) def script(): react(main) PK!Hb=*'.'lancer-0.3.1.dist-info/entry_points.txtN+I/N.,()IKN-Pz9VI..PK|uJ$/00lancer-0.3.1.dist-info/LICENSEThe MIT License (MIT) Copyright (c) 2017 Glyph Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. PK!Hp!Qalancer-0.3.1.dist-info/WHEEL HM K-*ϳR03rOK-J,/RH,zd&Y)r$[)T&UD"PK!H^ lancer-0.3.1.dist-info/METADATAXnϧ `YIzU"ˆ%W˝;3&/(Т_/cG+'*~Jd%T9~\y%Q7d=63qp>9ֵK.VqSķuWRX$ǃlƟA2N.|*#mθpد<}z{^zw~ooot7"eY x!KW7`HIrL1mʾE~1c+wZ+TVN%1ٺ침snUmC6JDuZH:U FYMq*F8"/ĵ1v$ɐ6AܓJs E)+~6"^4S//Ar ܉r_ NSK]GuNu 态Ȯ^K(6H /KBTouکjdDjJ/DNk+sejKE0^+5򪓋+gDmEFL?`Ht(/WKl'jGq.`@%nDc)&z%_>odR/;hM[ 8"GRd_zm]I_"[ "XO`Tu heöx6m8VayzUJKbFW|xmM|1FzFw-b:,F'h/'pr8F^R7tk\m@ QRmkk% EF^+Z,1=ރ<;*JRA D ??~o P _ ebժFk3  VuO SR%!yS!?S'?; gZʭ&7r^җ;]R~U(Fy[V/ܔM Ԅ_WRB( +ȃ{nP@B2#TiT<) N(Q#pEǢ8ͨm uhԕr\-؎?x(@ 4r@b[.eJE9T!u\ρMO^6R.rh%Vl48"u"!׻}iTиf#Pt8<3tԷ9k rRD%t6^clTF_|N(tGZ%,4,GxX+Cjt yDmt]iZvS ɽQAx!3Ggmrż Cp6sGJ 1>{M>S_>1ߡoH SH7p_d|>?s 6h *\If&?&g_P'PmjsFKq(hs7eB}^h wR@mGMRpt m0U}=)-b $F7-y̅]8?D"@擎RCo2;Xxe(H׀@a_(^m(ڽiϖH?\ r# ~D6"z~Bn3D:G0ȉֶ^>䥑+ Nm0n;-&N`AHdҔD-$c>&8488e|X&HŅ08بpqC J']K6[W^wR";oÒ4Pxfz^٩" -Pmk\mN'UYUZw*hSQO̯ yh=ڝH%8 KAx4ia0"|R-i[G nfoetry BXm]:jIEzGlq1 on\1hܸEqEwQ 6>4g:I1b# ká?T!cgۅŘH# UA@0z2Շi7P|-۔cQW eߏk.0dI&NJnNPUh3H.)v'ܓ> K";:I #=nGg g`U.\p<0oNPJ1t:L +.-:;>XMmmO)(]G4NO쐁q7͉|܋Bh۹ {G^yT6InkʼnrDYy>6$t}Cz}g 8s&I!4 ɵqIw,;BQCJ)Y,b:*?ɬ|f_"PeBEF-e