10 - if [[ ! -e "ngrok/ngrok" ]]; then mkdir -p ngrok; (cd ngrok; wget https://dl.ngrok.com/ngrok_2.0.19_linux_amd64.zip -O ngrok.zip; unzip ngrok.zip ngrok; chmod +x ngrok); fi
12 # run ngrok and grab url from logfile
13 - ngrok/ngrok http 8080 --log stdout --log-format logfmt --log-level debug > tmp.log &
16 - export TMP_URL="$(grep -Eo "Hostname:[a-z0-9]+.ngrok.io" tmp.log | head -1 | cut -d':' -f2)"
17 - if [[ -z "${TMP_URL}" ]]; then exit 1; fi
19 # start python http server in challenges directory
20 - (mkdir -p .acme-challenges/.well-known/acme-challenge; cd .acme-challenges; python -m SimpleHTTPServer 8080) &
23 - echo 'CA="https://acme-staging.api.letsencrypt.org/directory"' > config.sh
24 - echo 'WELLKNOWN=".acme-challenges/.well-known/acme-challenge"' >> config.sh
25 - echo "${TMP_URL}" > domains.txt
28 # check if help command is worling
29 - ./letsencrypt.sh --help
31 # move config out of the way and try signing certificate by using temporary config location
32 - mv config.sh tmp_config.sh
33 - ./letsencrypt.sh --sign "${TMP_URL}" -f tmp_config.sh
34 - mv tmp_config.sh config.sh
36 # run in cron mode (should find a non-expiring certificate) + check running without given mode (should default to cron mode)
37 - ./letsencrypt.sh --cron
40 # check if certificate is valid in various ways
41 - openssl x509 -in "certs/${TMP_URL}/cert.pem" -noout -text
42 - openssl x509 -in "certs/${TMP_URL}/fullchain.pem" -noout -text > /dev/null
43 - "errout=\"$(openssl verify -verbose -CAfile \"certs/${TMP_URL}/fullchain.pem\" -purpose sslserver \"certs/${TMP_URL}/fullchain.pem\" | grep -v ': OK$' || true)\""
44 - if [[ ! -z "${errout}" ]]; then printf -- "${errout}"; exit 1; fi
49 # revoke certificate using certificate key
50 - ./letsencrypt.sh --revoke "certs/${TMP_URL}/cert.pem" --privkey "certs/${TMP_URL}/privkey.pem"