$55 GRAYBYTE WORDPRESS FILE MANAGER $48

SERVER : premium201.web-hosting.com #1 SMP Wed Mar 26 12:08:09 UTC 2025
SERVER IP : 104.21.43.35 | ADMIN IP 216.73.216.23
OPTIONS : CRL = ON | WGT = ON | SDO = OFF | PKEX = OFF
DEACTIVATED : NONE

/home/bravrvjk/.acme.sh/dnsapi/

HOME
Current File : /home/bravrvjk/.acme.sh/dnsapi//dns_azure.sh
#!/bin/bash
# shellcheck disable=SC2034
dns_azure_info='Azure
Site: Azure.microsoft.com
Docs: github.com/acmesh-official/acme.sh/wiki/dnsapi#dns_azure
Options:
 AZUREDNS_SUBSCRIPTIONID Subscription ID
 AZUREDNS_TENANTID Tenant ID
 AZUREDNS_APPID App ID. App ID of the service principal
 AZUREDNS_CLIENTSECRET Client Secret. Secret from creating the service principal
 AZUREDNS_MANAGEDIDENTITY Use Managed Identity. Use Managed Identity assigned to a resource instead of a service principal. "true"/"false"
'

wiki=https://github.com/acmesh-official/acme.sh/wiki/How-to-use-Azure-DNS

########  Public functions #####################

# Usage: add  _acme-challenge.www.domain.com   "XKrxpRBosdIKFzxW_CT3KLZNf6q0HG9i01zxXp5CPBs"
# Used to add txt record
#
# Ref: https://learn.microsoft.com/en-us/rest/api/dns/record-sets/create-or-update?view=rest-dns-2018-05-01&tabs=HTTP
#

dns_azure_add() {
  fulldomain=$1
  txtvalue=$2

  AZUREDNS_SUBSCRIPTIONID="${AZUREDNS_SUBSCRIPTIONID:-$(_readaccountconf_mutable AZUREDNS_SUBSCRIPTIONID)}"
  if [ -z "$AZUREDNS_SUBSCRIPTIONID" ]; then
    AZUREDNS_SUBSCRIPTIONID=""
    AZUREDNS_TENANTID=""
    AZUREDNS_APPID=""
    AZUREDNS_CLIENTSECRET=""
    _err "You didn't specify the Azure Subscription ID"
    return 1
  fi
  #save subscription id to account conf file.
  _saveaccountconf_mutable AZUREDNS_SUBSCRIPTIONID "$AZUREDNS_SUBSCRIPTIONID"

  AZUREDNS_MANAGEDIDENTITY="${AZUREDNS_MANAGEDIDENTITY:-$(_readaccountconf_mutable AZUREDNS_MANAGEDIDENTITY)}"
  if [ "$AZUREDNS_MANAGEDIDENTITY" = true ]; then
    _info "Using Azure managed identity"
    #save managed identity as preferred authentication method, clear service principal credentials from conf file.
    _saveaccountconf_mutable AZUREDNS_MANAGEDIDENTITY "$AZUREDNS_MANAGEDIDENTITY"
    _saveaccountconf_mutable AZUREDNS_TENANTID ""
    _saveaccountconf_mutable AZUREDNS_APPID ""
    _saveaccountconf_mutable AZUREDNS_CLIENTSECRET ""
  else
    _info "You didn't ask to use Azure managed identity, checking service principal credentials"
    AZUREDNS_TENANTID="${AZUREDNS_TENANTID:-$(_readaccountconf_mutable AZUREDNS_TENANTID)}"
    AZUREDNS_APPID="${AZUREDNS_APPID:-$(_readaccountconf_mutable AZUREDNS_APPID)}"
    AZUREDNS_CLIENTSECRET="${AZUREDNS_CLIENTSECRET:-$(_readaccountconf_mutable AZUREDNS_CLIENTSECRET)}"

    if [ -z "$AZUREDNS_TENANTID" ]; then
      AZUREDNS_SUBSCRIPTIONID=""
      AZUREDNS_TENANTID=""
      AZUREDNS_APPID=""
      AZUREDNS_CLIENTSECRET=""
      _err "You didn't specify the Azure Tenant ID "
      return 1
    fi

    if [ -z "$AZUREDNS_APPID" ]; then
      AZUREDNS_SUBSCRIPTIONID=""
      AZUREDNS_TENANTID=""
      AZUREDNS_APPID=""
      AZUREDNS_CLIENTSECRET=""
      _err "You didn't specify the Azure App ID"
      return 1
    fi

    if [ -z "$AZUREDNS_CLIENTSECRET" ]; then
      AZUREDNS_SUBSCRIPTIONID=""
      AZUREDNS_TENANTID=""
      AZUREDNS_APPID=""
      AZUREDNS_CLIENTSECRET=""
      _err "You didn't specify the Azure Client Secret"
      return 1
    fi

    #save account details to account conf file, don't opt in for azure manages identity check.
    _saveaccountconf_mutable AZUREDNS_MANAGEDIDENTITY "false"
    _saveaccountconf_mutable AZUREDNS_TENANTID "$AZUREDNS_TENANTID"
    _saveaccountconf_mutable AZUREDNS_APPID "$AZUREDNS_APPID"
    _saveaccountconf_mutable AZUREDNS_CLIENTSECRET "$AZUREDNS_CLIENTSECRET"
  fi

  accesstoken=$(_azure_getaccess_token "$AZUREDNS_MANAGEDIDENTITY" "$AZUREDNS_TENANTID" "$AZUREDNS_APPID" "$AZUREDNS_CLIENTSECRET")

  if ! _get_root "$fulldomain" "$AZUREDNS_SUBSCRIPTIONID" "$accesstoken"; then
    _err "invalid domain"
    return 1
  fi
  _debug _domain_id "$_domain_id"
  _debug _sub_domain "$_sub_domain"
  _debug _domain "$_domain"

  acmeRecordURI="https://management.azure.com$(printf '%s' "$_domain_id" | sed 's/\\//g')/TXT/$_sub_domain?api-version=2017-09-01"
  _debug "$acmeRecordURI"
  # Get existing TXT record
  _azure_rest GET "$acmeRecordURI" "" "$accesstoken"
  values="{\"value\":[\"$txtvalue\"]}"
  timestamp="$(_time)"
  if [ "$_code" = "200" ]; then
    vlist="$(echo "$response" | _egrep_o "\"value\"\\s*:\\s*\\[\\s*\"[^\"]*\"\\s*]" | cut -d : -f 2 | tr -d "[]\"")"
    _debug "existing TXT found"
    _debug "$vlist"
    existingts="$(echo "$response" | _egrep_o "\"acmetscheck\"\\s*:\\s*\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d "\"")"
    if [ -z "$existingts" ]; then
      # the record was not created by acme.sh. Copy the exisiting entires
      existingts=$timestamp
    fi
    _diff="$(_math "$timestamp - $existingts")"
    _debug "existing txt age: $_diff"
    # only use recently added records and discard if older than 2 hours because they are probably orphaned
    if [ "$_diff" -lt 7200 ]; then
      _debug "existing txt value: $vlist"
      for v in $vlist; do
        values="$values ,{\"value\":[\"$v\"]}"
      done
    fi
  fi
  # Add the txtvalue TXT Record
  body="{\"properties\":{\"metadata\":{\"acmetscheck\":\"$timestamp\"},\"TTL\":10, \"TXTRecords\":[$values]}}"
  _azure_rest PUT "$acmeRecordURI" "$body" "$accesstoken"
  if [ "$_code" = "200" ] || [ "$_code" = '201' ]; then
    _info "validation value added"
    return 0
  else
    _err "error adding validation value ($_code)"
    return 1
  fi
}

# Usage: fulldomain txtvalue
# Used to remove the txt record after validation
#
# Ref: https://learn.microsoft.com/en-us/rest/api/dns/record-sets/delete?view=rest-dns-2018-05-01&tabs=HTTP
#
dns_azure_rm() {
  fulldomain=$1
  txtvalue=$2

  AZUREDNS_SUBSCRIPTIONID="${AZUREDNS_SUBSCRIPTIONID:-$(_readaccountconf_mutable AZUREDNS_SUBSCRIPTIONID)}"
  if [ -z "$AZUREDNS_SUBSCRIPTIONID" ]; then
    AZUREDNS_SUBSCRIPTIONID=""
    AZUREDNS_TENANTID=""
    AZUREDNS_APPID=""
    AZUREDNS_CLIENTSECRET=""
    _err "You didn't specify the Azure Subscription ID "
    return 1
  fi

  AZUREDNS_MANAGEDIDENTITY="${AZUREDNS_MANAGEDIDENTITY:-$(_readaccountconf_mutable AZUREDNS_MANAGEDIDENTITY)}"
  if [ "$AZUREDNS_MANAGEDIDENTITY" = true ]; then
    _info "Using Azure managed identity"
  else
    _info "You didn't ask to use Azure managed identity, checking service principal credentials"
    AZUREDNS_TENANTID="${AZUREDNS_TENANTID:-$(_readaccountconf_mutable AZUREDNS_TENANTID)}"
    AZUREDNS_APPID="${AZUREDNS_APPID:-$(_readaccountconf_mutable AZUREDNS_APPID)}"
    AZUREDNS_CLIENTSECRET="${AZUREDNS_CLIENTSECRET:-$(_readaccountconf_mutable AZUREDNS_CLIENTSECRET)}"

    if [ -z "$AZUREDNS_TENANTID" ]; then
      AZUREDNS_SUBSCRIPTIONID=""
      AZUREDNS_TENANTID=""
      AZUREDNS_APPID=""
      AZUREDNS_CLIENTSECRET=""
      _err "You didn't specify the Azure Tenant ID "
      return 1
    fi

    if [ -z "$AZUREDNS_APPID" ]; then
      AZUREDNS_SUBSCRIPTIONID=""
      AZUREDNS_TENANTID=""
      AZUREDNS_APPID=""
      AZUREDNS_CLIENTSECRET=""
      _err "You didn't specify the Azure App ID"
      return 1
    fi

    if [ -z "$AZUREDNS_CLIENTSECRET" ]; then
      AZUREDNS_SUBSCRIPTIONID=""
      AZUREDNS_TENANTID=""
      AZUREDNS_APPID=""
      AZUREDNS_CLIENTSECRET=""
      _err "You didn't specify the Azure Client Secret"
      return 1
    fi
  fi

  accesstoken=$(_azure_getaccess_token "$AZUREDNS_MANAGEDIDENTITY" "$AZUREDNS_TENANTID" "$AZUREDNS_APPID" "$AZUREDNS_CLIENTSECRET")

  if ! _get_root "$fulldomain" "$AZUREDNS_SUBSCRIPTIONID" "$accesstoken"; then
    _err "invalid domain"
    return 1
  fi
  _debug _domain_id "$_domain_id"
  _debug _sub_domain "$_sub_domain"
  _debug _domain "$_domain"

  acmeRecordURI="https://management.azure.com$(printf '%s' "$_domain_id" | sed 's/\\//g')/TXT/$_sub_domain?api-version=2017-09-01"
  _debug "$acmeRecordURI"
  # Get existing TXT record
  _azure_rest GET "$acmeRecordURI" "" "$accesstoken"
  timestamp="$(_time)"
  if [ "$_code" = "200" ]; then
    vlist="$(echo "$response" | _egrep_o "\"value\"\\s*:\\s*\\[\\s*\"[^\"]*\"\\s*]" | cut -d : -f 2 | tr -d "[]\"" | grep -v -- "$txtvalue")"
    values=""
    comma=""
    for v in $vlist; do
      values="$values$comma{\"value\":[\"$v\"]}"
      comma=","
    done
    if [ -z "$values" ]; then
      # No values left remove record
      _debug "removing validation record completely $acmeRecordURI"
      _azure_rest DELETE "$acmeRecordURI" "" "$accesstoken"
      if [ "$_code" = "200" ] || [ "$_code" = '204' ]; then
        _info "validation record removed"
      else
        _err "error removing validation record ($_code)"
        return 1
      fi
    else
      # Remove only txtvalue from the TXT Record
      body="{\"properties\":{\"metadata\":{\"acmetscheck\":\"$timestamp\"},\"TTL\":10, \"TXTRecords\":[$values]}}"
      _azure_rest PUT "$acmeRecordURI" "$body" "$accesstoken"
      if [ "$_code" = "200" ] || [ "$_code" = '201' ]; then
        _info "validation value removed"
        return 0
      else
        _err "error removing validation value ($_code)"
        return 1
      fi
    fi
  fi
}

###################  Private functions below ##################################

_azure_rest() {
  m=$1
  ep="$2"
  data="$3"
  accesstoken="$4"

  MAX_REQUEST_RETRY_TIMES=5
  _request_retry_times=0
  while [ "${_request_retry_times}" -lt "$MAX_REQUEST_RETRY_TIMES" ]; do
    _debug3 _request_retry_times "$_request_retry_times"
    export _H1="authorization: Bearer $accesstoken"
    export _H2="accept: application/json"
    export _H3="Content-Type: application/json"
    # clear headers from previous request to avoid getting wrong http code on timeouts
    : >"$HTTP_HEADER"
    _debug "$ep"
    if [ "$m" != "GET" ]; then
      _secure_debug2 "data $data"
      response="$(_post "$data" "$ep" "" "$m")"
    else
      response="$(_get "$ep")"
    fi
    _ret="$?"
    _secure_debug2 "response $response"
    _code="$(grep "^HTTP" "$HTTP_HEADER" | _tail_n 1 | cut -d " " -f 2 | tr -d "\\r\\n")"
    _debug "http response code $_code"
    if [ "$_code" = "401" ]; then
      # we have an invalid access token set to expired
      _saveaccountconf_mutable AZUREDNS_TOKENVALIDTO "0"
      _err "Access denied. Invalid access token. Make sure your Azure settings are correct. See: $wiki"
      return 1
    fi
    # See https://learn.microsoft.com/en-us/azure/architecture/best-practices/retry-service-specific#general-rest-and-retry-guidelines for retryable HTTP codes
    if [ "$_ret" != "0" ] || [ -z "$_code" ] || [ "$_code" = "408" ] || [ "$_code" = "500" ] || [ "$_code" = "503" ] || [ "$_code" = "504" ]; then
      _request_retry_times="$(_math "$_request_retry_times" + 1)"
      _info "REST call error $_code retrying $ep in $_request_retry_times s"
      _sleep "$_request_retry_times"
      continue
    fi
    break
  done
  if [ "$_request_retry_times" = "$MAX_REQUEST_RETRY_TIMES" ]; then
    _err "Error Azure REST called was retried $MAX_REQUEST_RETRY_TIMES times."
    _err "Calling $ep failed."
    return 1
  fi
  response="$(echo "$response" | _normalizeJson)"
  return 0
}

## Ref: https://learn.microsoft.com/en-us/entra/identity-platform/v2-oauth2-client-creds-grant-flow#request-an-access-token
_azure_getaccess_token() {
  managedIdentity=$1
  tenantID=$2
  clientID=$3
  clientSecret=$4

  accesstoken="${AZUREDNS_BEARERTOKEN:-$(_readaccountconf_mutable AZUREDNS_BEARERTOKEN)}"
  expires_on="${AZUREDNS_TOKENVALIDTO:-$(_readaccountconf_mutable AZUREDNS_TOKENVALIDTO)}"

  # can we reuse the bearer token?
  if [ -n "$accesstoken" ] && [ -n "$expires_on" ]; then
    if [ "$(_time)" -lt "$expires_on" ]; then
      # brearer token is still valid - reuse it
      _debug "reusing bearer token"
      printf "%s" "$accesstoken"
      return 0
    else
      _debug "bearer token expired"
    fi
  fi
  _debug "getting new bearer token"

  if [ "$managedIdentity" = true ]; then
    # https://learn.microsoft.com/en-us/entra/identity/managed-identities-azure-resources/how-to-use-vm-token#get-a-token-using-http
    export _H1="Metadata: true"
    response="$(_get http://169.254.169.254/metadata/identity/oauth2/token\?api-version=2018-02-01\&resource=https://management.azure.com/)"
    response="$(echo "$response" | _normalizeJson)"
    accesstoken=$(echo "$response" | _egrep_o "\"access_token\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
    expires_on=$(echo "$response" | _egrep_o "\"expires_on\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
  else
    export _H1="accept: application/json"
    export _H2="Content-Type: application/x-www-form-urlencoded"
    body="resource=$(printf "%s" 'https://management.core.windows.net/' | _url_encode)&client_id=$(printf "%s" "$clientID" | _url_encode)&client_secret=$(printf "%s" "$clientSecret" | _url_encode)&grant_type=client_credentials"
    _secure_debug2 "data $body"
    response="$(_post "$body" "https://login.microsoftonline.com/$tenantID/oauth2/token" "" "POST")"
    _ret="$?"
    _secure_debug2 "response $response"
    response="$(echo "$response" | _normalizeJson)"
    accesstoken=$(echo "$response" | _egrep_o "\"access_token\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
    expires_on=$(echo "$response" | _egrep_o "\"expires_on\":\"[^\"]*\"" | _head_n 1 | cut -d : -f 2 | tr -d \")
  fi

  if [ -z "$accesstoken" ]; then
    _err "No acccess token received. Check your Azure settings. See: $wiki"
    return 1
  fi
  if [ "$_ret" != "0" ]; then
    _err "error $response"
    return 1
  fi
  _saveaccountconf_mutable AZUREDNS_BEARERTOKEN "$accesstoken"
  _saveaccountconf_mutable AZUREDNS_TOKENVALIDTO "$expires_on"
  printf "%s" "$accesstoken"
  return 0
}

_get_root() {
  domain=$1
  subscriptionId=$2
  accesstoken=$3
  i=1
  p=1

  ## Ref: https://learn.microsoft.com/en-us/rest/api/dns/zones/list?view=rest-dns-2018-05-01&tabs=HTTP
  ## returns up to 100 zones in one response. Handling more results is not implemented
  ## (ZoneListResult with continuation token for the next page of results)
  ##
  ## TODO: handle more than 100 results, as per:
  ## https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-dns-limits
  ## The new limit is 250 Public DNS zones per subscription, while the old limit was only 100
  ##
  _azure_rest GET "https://management.azure.com/subscriptions/$subscriptionId/providers/Microsoft.Network/dnszones?\$top=500&api-version=2017-09-01" "" "$accesstoken"
  # Find matching domain name in Json response
  while true; do
    h=$(printf "%s" "$domain" | cut -d . -f "$i"-100)
    _debug2 "Checking domain: $h"
    if [ -z "$h" ]; then
      #not valid
      _err "Invalid domain"
      return 1
    fi

    if _contains "$response" "\"name\":\"$h\"" >/dev/null; then
      _domain_id=$(echo "$response" | _egrep_o "\\{\"id\":\"[^\"]*\\/$h\"" | head -n 1 | cut -d : -f 2 | tr -d \")
      if [ "$_domain_id" ]; then
        if [ "$i" = 1 ]; then
          #create the record at the domain apex (@) if only the domain name was provided as --domain-alias
          _sub_domain="@"
        else
          _sub_domain=$(echo "$domain" | cut -d . -f 1-"$p")
        fi
        _domain=$h
        return 0
      fi
      return 1
    fi
    p=$i
    i=$(_math "$i" + 1)
  done
  return 1
}


Current_dir [ WRITEABLE ] Document_root [ NOT WRITEABLE ]


[ Back ]
NAME
SIZE
LAST TOUCH
USER
CAN-I?
FUNCTIONS
..
--
30 Mar 2026 1.32 AM
bravrvjk / bravrvjk
0700
anon_root
--
30 Mar 2026 1.32 AM
bravrvjk / bravrvjk
0755
wp-site
--
30 Mar 2026 1.32 AM
bravrvjk / bravrvjk
0755
README.md
0.092 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_1984hosting.sh
8.534 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_acmedns.sh
3.618 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_acmeproxy.sh
3.146 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_active24.sh
3.234 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_ad.sh
3.45 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_ali.sh
5.602 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_alviy.sh
4.467 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_anx.sh
3.301 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_artfiles.sh
5.057 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_arvan.sh
4.107 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_aurora.sh
4.819 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_autodns.sh
5.784 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_aws.sh
12.277 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_azion.sh
5.43 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_azure.sh
14.725 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_bookmyname.sh
3.131 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_bunny.sh
7.638 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_cf.sh
7.041 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_clouddns.sh
6.463 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_cloudns.sh
5.765 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_cn.sh
3.83 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_conoha.sh
8.296 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_constellix.sh
5.854 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_cpanel.sh
4.987 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_curanet.sh
4.782 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_cyon.sh
9.591 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_da.sh
4.868 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_ddnss.sh
3.512 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_desec.sh
5.095 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_df.sh
1.656 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dgon.sh
7.613 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_dnsexit.sh
4.319 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dnshome.sh
2.426 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_dnsimple.sh
4.611 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dnsservices.sh
9.341 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_doapi.sh
1.748 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_domeneshop.sh
4.299 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dp.sh
3.815 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_dpi.sh
3.843 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_dreamhost.sh
2.258 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_duckdns.sh
3.835 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_durabledns.sh
4.831 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dyn.sh
7.825 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dynu.sh
5.2 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_dynv6.sh
8.819 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_easydns.sh
4.381 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_edgedns.sh
15.331 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_euserv.sh
9.208 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_exoscale.sh
4.396 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_fornex.sh
3.328 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_freedns.sh
12.043 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_gandi_livedns.sh
5.246 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_gcloud.sh
5.067 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_gcore.sh
5.062 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_gd.sh
5.103 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_geoscaling.sh
7.952 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_googledomains.sh
4.481 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_he.sh
6.357 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_hetzner.sh
6.865 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_hexonet.sh
4.105 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_hostingde.sh
8.637 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_huaweicloud.sh
9.571 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_infoblox.sh
3.858 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_infomaniak.sh
5.859 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_internetbs.sh
5.224 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_inwx.sh
9.757 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_ionos.sh
4.062 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_ionos_cloud.sh
3.965 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_ipv64.sh
4.123 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_ispconfig.sh
7.403 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0775
dns_jd.sh
8.415 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_joker.sh
3.04 KB
4 Nov 2024 12.42 PM
bravrvjk / bravrvjk
0664
dns_kappernet.sh
4.627 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_kas.sh
11.329 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_kinghost.sh
3.054 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_knot.sh
2.234 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_la.sh
3.82 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_leaseweb.sh
3.725 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_lexicon.sh
3.649 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_limacity.sh
2.741 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_linode.sh
4.73 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_linode_v4.sh
4.926 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_loopia.sh
7.838 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_lua.sh
4 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_maradns.sh
2.29 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_me.sh
3.954 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_miab.sh
5.811 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_misaka.sh
3.905 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_myapi.sh
1.312 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_mydevil.sh
2.803 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_mydnsjp.sh
4.847 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_mythic_beasts.sh
6.813 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_namecheap.sh
9.728 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_namecom.sh
4.72 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_namesilo.sh
3.819 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_nanelo.sh
1.893 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_nederhost.sh
3.136 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_neodigit.sh
4.443 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_netcup.sh
4.803 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_netlify.sh
4.278 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_nic.sh
5.611 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_njalla.sh
4.692 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_nm.sh
2.178 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_nsd.sh
1.755 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_nsone.sh
3.978 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_nsupdate.sh
4.004 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_nw.sh
5.589 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_oci.sh
10.601 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_omglol.sh
10.536 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_one.sh
6 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_online.sh
5.627 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_openprovider.sh
9.151 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_openstack.sh
11.752 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_opnsense.sh
6.871 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_ovh.sh
8.138 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_pdns.sh
5.548 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_pleskxml.sh
18.38 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_pointhq.sh
4.286 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_porkbun.sh
4.531 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_rackcorp.sh
3.819 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_rackspace.sh
6.314 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_rage4.sh
2.992 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_rcode0.sh
6.565 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_regru.sh
3.791 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_scaleway.sh
4.195 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_schlundtech.sh
5.596 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_selectel.sh
3.776 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_selfhost.sh
4.061 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_servercow.sh
5.271 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_simply.sh
6.04 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_tele3.sh
1.607 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_tencent.sh
6.126 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_timeweb.sh
11.105 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_transip.sh
5.527 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_udr.sh
4.104 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_ultra.sh
4.785 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_unoeuro.sh
4.511 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_variomedia.sh
3.777 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_veesp.sh
4.528 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_vercel.sh
3.515 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_vscale.sh
3.689 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_vultr.sh
3.895 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_websupport.sh
5.334 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_west_cn.sh
2.652 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_world4you.sh
7.056 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_yandex.sh
3.404 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_yandex360.sh
11.081 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_yc.sh
8.521 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_zilore.sh
3.218 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664
dns_zone.sh
3.959 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0775
dns_zonomi.sh
2.164 KB
4 Nov 2024 12.43 PM
bravrvjk / bravrvjk
0664

GRAYBYTE WORDPRESS FILE MANAGER @ 2025 CONTACT ME
Static GIF