From 69eea9527fd4fc4993e712ca581d25f2d41a01dc Mon Sep 17 00:00:00 2001 From: Lukas Schauer Date: Thu, 22 Dec 2016 10:00:05 +0100 Subject: [PATCH] removed some spaces --- dehydrated | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/dehydrated b/dehydrated index e0949eb..0a808bc 100755 --- a/dehydrated +++ b/dehydrated @@ -524,32 +524,32 @@ sign_csr() { for altname in "${challenge_altnames[@]:0}"; do challenge_token="${challenge_tokens[${idx}]}" keyauth="${keyauths[${idx}]}" - + # Wait for hook script to deploy the challenge if used # shellcheck disable=SC2086 [[ -n "${HOOK}" ]] && [[ "${HOOK_CHAIN}" != "yes" ]] && "${HOOK}" "deploy_challenge" ${deploy_args[${idx}]} - + # Ask the acme-server to verify our challenge and wait until it is no longer pending echo " + Responding to challenge for ${altname}..." result="$(signed_request "${challenge_uris[${idx}]}" '{"resource": "challenge", "keyAuthorization": "'"${keyauth}"'"}' | clean_json)" - + reqstatus="$(printf '%s\n' "${result}" | get_json_string_value status)" - + while [[ "${reqstatus}" = "pending" ]]; do sleep 1 result="$(http_request get "${challenge_uris[${idx}]}")" reqstatus="$(printf '%s\n' "${result}" | get_json_string_value status)" done - + [[ "${CHALLENGETYPE}" = "http-01" ]] && rm -f "${WELLKNOWN}/${challenge_token}" - + # Wait for hook script to clean the challenge if used if [[ -n "${HOOK}" ]] && [[ "${HOOK_CHAIN}" != "yes" ]] && [[ -n "${challenge_token}" ]]; then # shellcheck disable=SC2086 "${HOOK}" "clean_challenge" ${deploy_args[${idx}]} fi idx=$((idx+1)) - + if [[ "${reqstatus}" = "valid" ]]; then echo " + Challenge is valid!" else -- 2.39.5