|
50 | 50 | FULLCHAIN_PATH = deploy.get('fullchain_path',"/root/.acme.sh/" + DOMAIN_NAME + "/fullchain.cer")
|
51 | 51 | PROTOCOL = deploy.get('protocol','http://')
|
52 | 52 | PORT = deploy.get('port','80')
|
| 53 | +FTP_ENABLED = deploy.getboolean('ftp_enabled',fallback=False) |
53 | 54 | now = datetime.now()
|
54 | 55 | cert = "letsencrypt-%s-%s-%s-%s" %(now.year, now.strftime('%m'), now.strftime('%d'), ''.join(c for c in now.strftime('%X') if
|
55 | 56 | c.isdigit()))
|
|
122 | 123 | print (r)
|
123 | 124 | sys.exit(1)
|
124 | 125 |
|
125 |
| -# Set our cert as active for FTP plugin |
126 |
| -r = requests.put( |
127 |
| - PROTOCOL + FREENAS_ADDRESS + ':' + PORT + '/api/v1.0/services/ftp/', |
128 |
| - verify=VERIFY, |
129 |
| - auth=(USER, PASSWORD), |
130 |
| - headers={'Content-Type': 'application/json'}, |
131 |
| - data=json.dumps({ |
132 |
| - "ftp_ssltls_certfile": cert, |
133 |
| - }), |
134 |
| -) |
| 126 | +if FTP_ENABLED: |
| 127 | + # Set our cert as active for FTP plugin |
| 128 | + r = requests.put( |
| 129 | + PROTOCOL + FREENAS_ADDRESS + ':' + PORT + '/api/v1.0/services/ftp/', |
| 130 | + verify=VERIFY, |
| 131 | + auth=(USER, PASSWORD), |
| 132 | + headers={'Content-Type': 'application/json'}, |
| 133 | + data=json.dumps({ |
| 134 | + "ftp_ssltls_certfile": cert, |
| 135 | + }), |
| 136 | + ) |
135 | 137 |
|
136 |
| -if r.status_code == 200: |
137 |
| - print ("Setting active certificate successful") |
138 |
| -else: |
139 |
| - print ("Error setting active certificate!") |
140 |
| - print (r) |
141 |
| - sys.exit(1) |
| 138 | + if r.status_code == 200: |
| 139 | + print ("Setting active FTP certificate successful") |
| 140 | + else: |
| 141 | + print ("Error setting active FTP certificate!") |
| 142 | + print (r) |
| 143 | + sys.exit(1) |
142 | 144 |
|
143 | 145 | # Reload nginx with new cert
|
144 | 146 | try:
|
|
0 commit comments