avto4certbot.sh 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307
  1. #!/bin/bash
  2. #
  3. # author: Koshuba V.O.
  4. # license: GPL 2.0
  5. # create 2022
  6. #
  7. version="0.3.2";
  8. sname="avto4certbot";
  9. # необходимы для работы: nginx,certbot (и если почтовый сервер то сервисы в restartMail)
  10. # create new cert or update
  11. path_ssl="/etc/ssl";
  12. path_cert="/etc/letsencrypt/live";
  13. # script path
  14. path_script="$(dirname $(readlink --canonicalize-existing "$0"))"
  15. source "$path_script/avto4certbot.conf";
  16. ## - nginx
  17. nginx_enable="/etc/nginx/sites-enabled";
  18. nginx_available="/etc/nginx/sites-available";
  19. ## - mail services
  20. mailservice=(
  21. "dbmail"
  22. "postfix"
  23. "stunnel4"
  24. "rspamd"
  25. );
  26. ##--@S static values
  27. # depends
  28. pkgdep=("curl" "nginx" "certbot" "letsencrypt") # packages
  29. get_tools=("curl" "nginx" "certbot" "letsencrypt")
  30. ##
  31. www_root="/tmp/letsencrypt";
  32. ##
  33. path_tmp="/tmp/certbot";
  34. ##
  35. log="/var/log/syslog";
  36. # - shared options
  37. cmd=$1;
  38. # - for mail server
  39. opt=$2;
  40. #-list enable sites
  41. scan_list=();
  42. #
  43. eval enable_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  44. #
  45. #--@F Check the program dependency
  46. function checkDep() {
  47. # - msg debug
  48. echo "check depends..."
  49. if [ ! "$lang" ]; then
  50. lang="C.UTF-8"
  51. fi
  52. for ((itools = 0; itools != ${#get_tools[@]}; itools++)); do
  53. checktool=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  54. if [[ $checktool = "" ]]; then
  55. sudo apt install ${pkgdep[$itools]}
  56. fi
  57. checktool=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  58. if [[ $checktool != "" ]]; then
  59. eval get_${get_tools[$itools]}=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  60. list_tools[${#list_tools[@]}]="$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')"
  61. else
  62. ## lang messages if yes then lang else us...
  63. reports=()
  64. reports[${#reports[@]}]="Sorry, there are no required packages to work, please install:${pkgdep[@]}"
  65. makeErr
  66. exit
  67. fi
  68. done
  69. }
  70. function createCert() {
  71. #
  72. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  73. do
  74. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  75. if [ "$cmd" == "--create" ];
  76. then
  77. certbot -m "${dreg[1]}";
  78. else
  79. certbot --update-registration -m "${dreg[1]}";
  80. fi
  81. ##
  82. ## example manual: certbot certonly --webroot --webroot-path /tmp/letsencrypt -d mydomen.ru
  83. certbot certonly --webroot --webroot-path $www_root -d ${dreg[0]}
  84. done
  85. }
  86. function renew() {
  87. certbot renew;
  88. valtrue=0;
  89. rdate=$(date +%Y-%m-%d);
  90. rtime=$(date +%H:%M);
  91. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  92. do
  93. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  94. keydate=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$6'});
  95. keytime=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$7'});
  96. if [ "$keydate" = "$rdate" ] && [ "$keytime" = "$rtime" ];
  97. then
  98. ((valtrue++));
  99. cat $path_cert/${dreg[0]}/privkey.pem > $path_ssl/private/privkey_${dreg[0]}.pem;
  100. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/fullchain_${dreg[0]}.pem;
  101. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/${dreg[0]}.pem;
  102. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  103. #
  104. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  105. cd $path_ssl/certs
  106. chmod 600 ${dreg[0]}.pem
  107. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  108. cd $path_ssl
  109. echo "$(date) - $sname: update cert for ${domains[$dmn]}">> $log;
  110. fi
  111. done
  112. if [ $valtrue != 0 ];
  113. then
  114. :>/etc/ssl/crt-list.txt
  115. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  116. do
  117. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  118. done
  119. fi
  120. }
  121. function toSSL() {
  122. if [ -d $path_cert ];
  123. then
  124. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  125. do
  126. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  127. ((valtrue++));
  128. cat $path_cert/${dreg[0]}/privkey.pem > $path_ssl/private/privkey_${dreg[0]}.pem;
  129. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/fullchain_${dreg[0]}.pem;
  130. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/${dreg[0]}.pem;
  131. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  132. #
  133. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  134. cd $path_ssl/certs
  135. chmod 600 ${dreg[0]}.pem
  136. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  137. cd $path_ssl
  138. echo "$(date) - $sname: update certlist for ${domains[$dmn]}">> $log;
  139. done
  140. if [ $valtrue != 0 ];
  141. then
  142. echo >/etc/ssl/crt-list.txt
  143. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  144. do
  145. eval local dcrt="(" $(echo -e ${domains[$icrt]}) ")";
  146. echo "$path_ssl/private/${dcrt[0]}.pem">>/etc/ssl/crt-list.txt
  147. done
  148. fi
  149. else
  150. echo "Ошибка - отсутствует $path_cert!"
  151. echo "$(date) - $sname: Ошибка - отсутствует $path_cert!">> $log;
  152. fi
  153. }
  154. function downSite(){
  155. sudo systemctl stop nginx.service;
  156. eval list_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  157. if [ ${#list_www[@]} != 0 ]; then
  158. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  159. do
  160. rm $nginx_enable/${list_www[dwx]};
  161. done
  162. fi
  163. }
  164. function upSite(){
  165. sudo systemctl stop nginx.service;
  166. eval cert_bot="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  167. for ((cr=0; cr != ${#cert_bot[@]}; cr++))
  168. do
  169. rm $nginx_enable/${cert_bot[cr]};
  170. done
  171. for ((dnm=0; dnm != ${#domains[@]}; dnm++))
  172. do
  173. eval local dcert="(" $(echo -e ${domains[$dnm]}) ")";
  174. sitename="${dcert[0]}";
  175. siteport="${dcert[2]}";
  176. createConf;
  177. done
  178. sudo systemctl start nginx.service;
  179. }
  180. function restoreSite() {
  181. sudo systemctl stop nginx.service;
  182. for ((dwx=0; dwx != ${#enable_www[@]}; dwx++))
  183. do
  184. ln -s $nginx_available/${enable_www[dwx]} $nginx_enable/${enable_www[dwx]};
  185. done
  186. sudo systemctl start nginx.service;
  187. }
  188. function createConf(){
  189. if [ ! -d $path_tmp ];
  190. then
  191. mkdir -p $path_tmp;
  192. fi
  193. if [ ! -d $www_root ];
  194. then
  195. mkdir -p $www_root/.well-known/acme-challenge;
  196. chown -R www-data:www-data $www_root;
  197. fi
  198. echo >$path_tmp/$sitename.conf;
  199. echo -e 'server { listen 0.0.0.0:'"$siteport"';' >>$path_tmp/$sitename.conf;
  200. echo -e '\n' >>$path_tmp/$sitename.conf;
  201. echo -e 'server_name '"$sitename"';' >>$path_tmp/$sitename.conf;
  202. echo -e '\n' >>$path_tmp/$sitename.conf;
  203. echo -e 'location /.well-known/acme-challenge {' >>$path_tmp/$sitename.conf;
  204. echo -e ' allow all;' >>$path_tmp/$sitename.conf;
  205. echo -e ' autoindex off;' >>$path_tmp/$sitename.conf;
  206. echo -e ' default_type "text/plain";' >>$path_tmp/$sitename.conf;
  207. echo -e ' root '"$www_root"';' >>$path_tmp/$sitename.conf;
  208. echo -e '}' >>$path_tmp/$sitename.conf;
  209. echo -e '\n' >>$path_tmp/$sitename.conf;
  210. echo -e 'location = /.well-known {' >>$path_tmp/$sitename.conf;
  211. echo -e ' return 404;' >>$path_tmp/$sitename.conf;
  212. echo -e '}' >>$path_tmp/$sitename.conf;
  213. echo -e '\n' >>$path_tmp/$sitename.conf;
  214. echo -e 'error_page 404 /404.html;' >>$path_tmp/$sitename.conf;
  215. echo -e 'error_page 500 502 503 504 /50x.html;' >>$path_tmp/$sitename.conf;
  216. echo -e '\n' >>$path_tmp/$sitename.conf;
  217. echo -e 'error_log /var/log/nginx/err-certbot.log;' >>$path_tmp/$sitename.conf;
  218. echo -e 'access_log /var/log/nginx/access-certbot.log;' >>$path_tmp/$sitename.conf;
  219. echo -e '}' >>$path_tmp/$sitename.conf;
  220. ln -s $path_tmp/$sitename.conf $nginx_enable/$sitename.conf
  221. }
  222. function restartMail(){
  223. for ((scn=0; scn != ${#mailservice[@]}; scn++))
  224. do
  225. /etc/init.d/${mailservice[$scn]} restart;
  226. # systemctl restart ${mailservices[$scn]};
  227. done
  228. }
  229. case "$cmd" in
  230. ## create cert
  231. "--create" | "--create" )
  232. downSite;
  233. upSite;
  234. createCert;
  235. toSSL;
  236. downSite;
  237. if [ "$opt" == "mail" ]; then
  238. restartMail;
  239. else
  240. restoreSite;
  241. fi
  242. ;;
  243. ## update cert
  244. "--update" | "--update" )
  245. downSite;
  246. upSite;
  247. renew;
  248. toSSL;
  249. downSite;
  250. if [ "$opt" == "mail" ]; then
  251. restartMail;
  252. else
  253. restoreSite;
  254. fi
  255. ;;
  256. ## update cert force
  257. "--flist" | "--flist" )
  258. toSSL;
  259. if [ "$opt" == "mail" ]; then
  260. restartMail;
  261. fi
  262. ;;
  263. ## start defaults
  264. * )
  265. checkDep;
  266. echo "please input pameters: avto4certbot.sh --create | --update | --flist";
  267. echo "avto4certbot.sh --create; create new certificate or --create mail; create and restart mail services "
  268. echo "avto4certbot.sh --update; update certificates or --update mail; update and restart mail services;"
  269. echo "avto4certbot.sh --flist; update certificates from ssl or --flist mail; update certs and restart mail services;"
  270. ;;
  271. esac
  272. exit