avto4certbot.sh 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327
  1. #!/bin/bash
  2. #
  3. # author: Koshuba V.O.
  4. # license: GPL 2.0
  5. # create 2022
  6. #
  7. version="0.4.3";
  8. sname="avto4certbot";
  9. # необходимы для работы: nginx,certbot (и если почтовый сервер то сервисы в restartMail)
  10. # create new cert or update
  11. path_ssl="/etc/ssl";
  12. path_cert="/etc/letsencrypt/live";
  13. # script path
  14. path_script=$( cd -- $( dirname -- "${BASH_SOURCE[0]}" ) &> /dev/null && pwd );
  15. source "$path_script/avto4certbot.conf";
  16. ## - nginx
  17. nginx_enable="/etc/nginx/sites-enabled";
  18. nginx_available="/etc/nginx/sites-available";
  19. ## - apache
  20. nginx_enable="/etc/apache/sites-enabled";
  21. nginx_available="/etc/apache/sites-available";
  22. ## - mail service or others
  23. set_service=(
  24. "nginx"
  25. #"apache"
  26. );
  27. ##--@S static values
  28. # depends
  29. pkgdep=("curl" "certbot" "letsencrypt") # packages
  30. get_tools=("curl" "certbot" "letsencrypt")
  31. ##
  32. www_root="/tmp/letsencrypt";
  33. ##
  34. path_tmp="/tmp/certbot";
  35. ##
  36. log="/var/log/syslog";
  37. # - shared options
  38. cmd=$1;
  39. # - for mail server
  40. opt=$2;
  41. #-list enable sites
  42. scan_list=();
  43. #
  44. eval enable_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n' 2>/dev/null) ")";
  45. #
  46. #--@F Check the program dependency
  47. function checkDep() {
  48. # - msg debug
  49. echo "check depends..."
  50. if [ ! "$lang" ]; then
  51. lang="C.UTF-8"
  52. fi
  53. for ((itools = 0; itools != ${#get_tools[@]}; itools++)); do
  54. checktool=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  55. if [[ $checktool = "" ]]; then
  56. sudo apt install ${pkgdep[$itools]}
  57. fi
  58. checktool=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  59. if [[ $checktool != "" ]]; then
  60. eval get_${get_tools[$itools]}=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  61. list_tools[${#list_tools[@]}]="$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')"
  62. else
  63. ## lang messages if yes then lang else us...
  64. reports=()
  65. reports[${#reports[@]}]="Sorry, there are no required packages to work, please install:${pkgdep[@]}"
  66. makeErr
  67. exit
  68. fi
  69. done
  70. }
  71. ##--@F make all errors
  72. function makeErr() {
  73. for ((rpt_index=0; rpt_index != ${#reports[@]}; rpt_index++))
  74. do
  75. echo "$rdate $sname: ${reports[$rpt_index]}">>$log;
  76. echo "${reports[$rpt_index]}";
  77. done
  78. exit 0;
  79. }
  80. function createCert() {
  81. #
  82. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  83. do
  84. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  85. if [ "$cmd" == "--create" ];
  86. then
  87. certbot -m "${dreg[1]}";
  88. else
  89. certbot --update-registration -m "${dreg[1]}";
  90. fi
  91. ##
  92. ## example manual: certbot certonly --webroot --webroot-path /tmp/letsencrypt -d mydomen.ru
  93. certbot certonly --webroot --webroot-path $www_root -d ${dreg[0]}
  94. done
  95. }
  96. function renew() {
  97. certbot renew;
  98. valtrue=0;
  99. rdate=$(date +%Y-%m-%d);
  100. rtime=$(date +%H:%M);
  101. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  102. do
  103. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  104. keydate=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$6'});
  105. keytime=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$7'});
  106. if [[ "$keydate" = "$rdate" ]] && [[ "$keytime" = "$rtime" ]]; then
  107. ((valtrue++));
  108. if [ -d $path_cert/${dreg[0]} ]; then
  109. cat $path_cert/${dreg[0]}/privkey.pem > $path_ssl/private/privkey_${dreg[0]}.pem;
  110. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/fullchain_${dreg[0]}.pem;
  111. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/${dreg[0]}.pem;
  112. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  113. #
  114. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  115. cd $path_ssl/certs
  116. chmod 600 ${dreg[0]}.pem
  117. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  118. cd $path_ssl
  119. echo "$(date) - $sname: update cert for ${domains[$dmn]}">> $log;
  120. fi
  121. fi
  122. done
  123. if [ $valtrue != 0 ];then
  124. :>/etc/ssl/crt-list.txt
  125. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  126. do
  127. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  128. done
  129. fi
  130. }
  131. function toSSL() {
  132. if [ -d $path_cert ];
  133. then
  134. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  135. do
  136. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  137. ((valtrue++));
  138. if [ -d $path_cert/${dreg[0]} ]; then
  139. cat $path_cert/${dreg[0]}/privkey.pem > $path_ssl/private/privkey_${dreg[0]}.pem;
  140. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/fullchain_${dreg[0]}.pem;
  141. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/${dreg[0]}.pem;
  142. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  143. #
  144. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  145. cd $path_ssl/certs
  146. chmod 600 ${dreg[0]}.pem
  147. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  148. cd $path_ssl
  149. echo "$(date) - $sname: update certlist for ${domains[$dmn]}">> $log;
  150. fi
  151. done
  152. if [ $valtrue != 0 ]; then
  153. echo >/etc/ssl/crt-list.txt
  154. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  155. do
  156. eval local dcrt="(" $(echo -e ${domains[$icrt]}) ")";
  157. echo "$path_ssl/private/${dcrt[0]}.pem">>/etc/ssl/crt-list.txt
  158. done
  159. fi
  160. else
  161. echo "Ошибка - отсутствует $path_cert!"
  162. echo "$(date) - $sname: Ошибка - отсутствует $path_cert!">> $log;
  163. fi
  164. }
  165. function downSite(){
  166. sudo systemctl stop nginx.service;
  167. eval list_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n' 2>/dev/null) ")";
  168. if [ ${#list_www[@]} != 0 ]; then
  169. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  170. do
  171. rm $nginx_enable/${list_www[dwx]};
  172. done
  173. fi
  174. }
  175. function upSite(){
  176. sudo systemctl stop nginx.service;
  177. eval cert_bot="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n' 2>/dev/null) ")";
  178. for ((cr=0; cr != ${#cert_bot[@]}; cr++))
  179. do
  180. rm $nginx_enable/${cert_bot[cr]};
  181. done
  182. for ((dnm=0; dnm != ${#domains[@]}; dnm++))
  183. do
  184. eval local dcert="(" $(echo -e ${domains[$dnm]}) ")";
  185. sitename="${dcert[0]}";
  186. siteport="${dcert[2]}";
  187. createConf;
  188. done
  189. sudo systemctl start nginx.service;
  190. }
  191. function restoreSite() {
  192. sudo systemctl stop nginx.service;
  193. eval list_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n' 2>/dev/null) ")";
  194. if [ ${#list_www[@]} != 0 ]; then
  195. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  196. do
  197. rm $nginx_enable/${list_www[dwx]};
  198. done
  199. fi
  200. for ((dwx=0; dwx != ${#enable_www[@]}; dwx++))
  201. do
  202. ln -s $nginx_available/${enable_www[dwx]} $nginx_enable/${enable_www[dwx]};
  203. done
  204. sudo systemctl start nginx.service;
  205. }
  206. function createConf(){
  207. if [ ! -d $path_tmp ];
  208. then
  209. mkdir -p $path_tmp;
  210. fi
  211. if [ ! -d $www_root ];
  212. then
  213. mkdir -p $www_root/.well-known/acme-challenge;
  214. chown -R www-data:www-data $www_root;
  215. fi
  216. echo >$path_tmp/$sitename.conf;
  217. echo -e 'server { listen 0.0.0.0:'"$siteport"';' >>$path_tmp/$sitename.conf;
  218. echo -e '\n' >>$path_tmp/$sitename.conf;
  219. echo -e 'server_name '"$sitename"';' >>$path_tmp/$sitename.conf;
  220. echo -e '\n' >>$path_tmp/$sitename.conf;
  221. echo -e 'location /.well-known/acme-challenge {' >>$path_tmp/$sitename.conf;
  222. echo -e ' allow all;' >>$path_tmp/$sitename.conf;
  223. echo -e ' autoindex off;' >>$path_tmp/$sitename.conf;
  224. echo -e ' default_type "text/plain";' >>$path_tmp/$sitename.conf;
  225. echo -e ' root '"$www_root"';' >>$path_tmp/$sitename.conf;
  226. echo -e '}' >>$path_tmp/$sitename.conf;
  227. echo -e '\n' >>$path_tmp/$sitename.conf;
  228. echo -e 'location = /.well-known {' >>$path_tmp/$sitename.conf;
  229. echo -e ' return 404;' >>$path_tmp/$sitename.conf;
  230. echo -e '}' >>$path_tmp/$sitename.conf;
  231. echo -e '\n' >>$path_tmp/$sitename.conf;
  232. echo -e 'error_page 404 /404.html;' >>$path_tmp/$sitename.conf;
  233. echo -e 'error_page 500 502 503 504 /50x.html;' >>$path_tmp/$sitename.conf;
  234. echo -e '\n' >>$path_tmp/$sitename.conf;
  235. echo -e 'error_log /var/log/nginx/err-certbot.log;' >>$path_tmp/$sitename.conf;
  236. echo -e 'access_log /var/log/nginx/access-certbot.log;' >>$path_tmp/$sitename.conf;
  237. echo -e '}' >>$path_tmp/$sitename.conf;
  238. ln -s $path_tmp/$sitename.conf $nginx_enable/$sitename.conf
  239. }
  240. function restartService(){
  241. for ((scn=0; scn != ${#set_service[@]}; scn++))
  242. do
  243. /etc/init.d/${set_service[$scn]} restart;
  244. # systemctl restart ${set_services[$scn]};
  245. done
  246. }
  247. case "$cmd" in
  248. ## create cert
  249. "--create" | "--create" )
  250. downSite;
  251. upSite;
  252. createCert;
  253. toSSL;
  254. downSite;
  255. if [ "$opt" == "srv" ]; then
  256. restartService;
  257. else
  258. restoreSite;
  259. fi
  260. ;;
  261. ## update cert
  262. "--update" | "--update" )
  263. downSite;
  264. upSite;
  265. renew;
  266. downSite;
  267. if [[ "$opt" == "srv" ]] && [[ $valtrue != 0 ]]; then
  268. restartService;
  269. else
  270. restoreSite;
  271. fi
  272. ;;
  273. ## update cert force
  274. "--flist" | "--flist" )
  275. toSSL;
  276. if [ "$opt" == "srv" ]; then
  277. restartService;
  278. fi
  279. ;;
  280. ## start defaults
  281. * )
  282. checkDep;
  283. echo "$sname:$version"
  284. echo "please input pameters: avto4certbot.sh --create | --update | --flist";
  285. echo "avto4certbot.sh --create; create new certificate or --create srv; create and restart mail or other services "
  286. echo "avto4certbot.sh --update; update certificates or --update srv; update and restart mail or others services;"
  287. echo "avto4certbot.sh --flist; update certificates from ssl or --flist srv; update certs and restart mail or other services;"
  288. ;;
  289. esac
  290. exit