9 - if [[ ! -e "ngrok/ngrok" ]]; then mkdir -p ngrok; (cd ngrok; wget https://dl.ngrok.com/ngrok_2.0.19_linux_amd64.zip -O ngrok.zip; unzip ngrok.zip ngrok; chmod +x ngrok); fi
10 - ngrok/ngrok http 8080 --log stdout --log-format logfmt --log-level debug > tmp.log &
13 - export TMP_URL="$(grep -Eo "Hostname:[a-z0-9]+.ngrok.io" tmp.log | head -1 | cut -d':' -f2)"
14 - (mkdir -p .acme-challenges/.well-known/acme-challenge; cd .acme-challenges; python -m SimpleHTTPServer 8080) &
15 - if [[ -z "${TMP_URL}" ]]; then exit 1; fi
16 - echo 'CA="https://acme-staging.api.letsencrypt.org/directory"' > config.sh
17 - echo 'WELLKNOWN=".acme-challenges/.well-known/acme-challenge"' >> config.sh
18 - echo 'ROOTCERT="lets-encrypt-staging.pem"' >> config.sh
19 - echo "${TMP_URL}" > domains.txt
22 - ./letsencrypt.sh --help
23 - mv config.sh tmp_config.sh
24 - ./letsencrypt.sh --sign "${TMP_URL}" -f tmp_config.sh
25 - mv tmp_config.sh config.sh
26 - ./letsencrypt.sh --cron
28 - openssl x509 -in "certs/${TMP_URL}/cert.pem" -noout -text
29 - openssl verify -verbose -CAfile "certs/lets-encrypt-staging.pem" -purpose sslserver "certs/${TMP_URL}/cert.pem"
31 - ./letsencrypt.sh --revoke "certs/${TMP_URL}/cert.pem" --privkey "certs/${TMP_URL}/privkey.pem"