auto4certbot.sh 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228
  1. #!/bin/bash
  2. #
  3. # author: Koshuba V.O.
  4. # license: GPL 2.0
  5. # create 2022
  6. #
  7. version="0.2.4";
  8. sname="autocertbot";
  9. # необходимы для работы: nginx,certbot
  10. # create new cert
  11. path_ssl="/etc/ssl";
  12. path_cert="/etc/letsencrypt/live";
  13. source "/etc/scripts/certbot4nginx/auto4certbot.conf";
  14. ## - nginx
  15. nginx_enable="/etc/nginx/sites-enabled";
  16. nginx_available="/etc/nginx/sites-available";
  17. ##
  18. www_root="/tmp/letsencrypt";
  19. ##
  20. path_tmp="/tmp/certbot";
  21. ##
  22. log="/var/log/syslog";
  23. #
  24. cmd=$1;
  25. #-list enable sites
  26. scan_list=();
  27. #
  28. function createCert() {
  29. #
  30. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  31. do
  32. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  33. if [ "$cmd" == "--create" ];
  34. then
  35. certbot -m "${dreg[1]}";
  36. else
  37. certbot --update-registration -m "${dreg[1]}";
  38. fi
  39. ##
  40. ## example manual: certbot certonly --webroot --webroot-path /tmp/letsencrypt -d mydomen.ru
  41. certbot certonly --webroot --webroot-path $www_root -d ${dreg[0]}
  42. done
  43. }
  44. function renew() {
  45. certbot renew;
  46. valtrue=0;
  47. rdate=$(date +%Y-%m-%d);
  48. rtime=$(date +%H:%M);
  49. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  50. do
  51. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  52. keydate=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$6'});
  53. keytime=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$7'});
  54. if [ "$keydate" = "$rdate" ] && [ "$keytime" = "$rtime" ];
  55. then
  56. ((valtrue++));
  57. cat $path_cert/${dreg[0]}/cert.pem > $path_ssl/private/${dreg[0]}.pem;
  58. cat $path_cert/${dreg[0]}/chain.pem >> $path_ssl/private/${dreg[0]}.pem;
  59. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/private/${dreg[0]}.pem;
  60. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  61. #
  62. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  63. cd $path_ssl/certs
  64. chmod 600 ${dreg[0]}.pem
  65. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  66. cd $path_ssl
  67. echo "$(date) - auto4certbot.sh: update cert for ${domains[$dmn]}">> $log;
  68. fi
  69. done
  70. if [ $valtrue != 0 ];
  71. then
  72. :>/etc/ssl/crt-list.txt
  73. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  74. do
  75. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  76. done
  77. fi
  78. }
  79. function toSSL() {
  80. if [ -d $path_cert ];
  81. then
  82. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  83. do
  84. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  85. ((valtrue++));
  86. cat $path_cert/${dreg[0]}/cert.pem > $path_ssl/private/${dreg[0]}.pem;
  87. cat $path_cert/${dreg[0]}/chain.pem >> $path_ssl/private/${dreg[0]}.pem;
  88. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/private/${dreg[0]}.pem;
  89. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  90. #
  91. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  92. cd $path_ssl/certs
  93. chmod 600 ${dreg[0]}.pem
  94. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  95. cd $path_ssl
  96. echo "$(date) - auto4certbot.sh: update certlist for ${domains[$dmn]}">> $log;
  97. done
  98. if [ $valtrue != 0 ];
  99. then
  100. echo >/etc/ssl/crt-list.txt
  101. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  102. do
  103. eval local dcrt="(" $(echo -e ${domains[$icrt]}) ")";
  104. echo "$path_ssl/private/${dcrt[0]}.pem">>/etc/ssl/crt-list.txt
  105. done
  106. fi
  107. else
  108. echo "Ошибка - отсутствует $path_cert!"
  109. fi
  110. }
  111. function downSite(){
  112. sudo systemctl stop nginx.service;
  113. eval list_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  114. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  115. do
  116. rm $nginx_enable/${list_www[dwx]};
  117. done
  118. for ((dnm=0; dnm != ${#domains[@]}; dnm++))
  119. do
  120. eval local dcert="(" $(echo -e ${domains[$dnm]}) ")";
  121. sitename="${dcert[0]}";
  122. siteport="${dcert[2]}";
  123. createConf;
  124. done
  125. sudo systemctl start nginx.service;
  126. }
  127. function upSite(){
  128. sudo systemctl stop nginx.service;
  129. eval cert_bot="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  130. for ((cr=0; cr != ${#cert_bot[@]}; cr++))
  131. do
  132. rm $nginx_enable/${cert_bot[cr]};
  133. done
  134. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  135. do
  136. ln -s $nginx_available/${list_www[dwx]} $nginx_enable/${list_www[dwx]};
  137. done
  138. sudo systemctl start nginx.service;
  139. }
  140. function createConf(){
  141. if [ ! -d $path_tmp ];
  142. then
  143. mkdir -p $path_tmp;
  144. fi
  145. if [ ! -d $www_root ];
  146. then
  147. mkdir -p $www_root/.well-known/acme-challenge;
  148. chown -R www-data:www-data $www_root;
  149. fi
  150. echo >$path_tmp/$sitename.conf;
  151. echo -e 'server { listen 0.0.0.0:'"$siteport"';' >>$path_tmp/$sitename.conf;
  152. echo -e '\n' >>$path_tmp/$sitename.conf;
  153. echo -e 'server_name '"$sitename"';' >>$path_tmp/$sitename.conf;
  154. echo -e '\n' >>$path_tmp/$sitename.conf;
  155. #echo -e 'if ($http_host != $server_name){' >> $path_tmp/$sitename.conf;
  156. #echo -e ' rewrite ^(.*)$ http://$server_name$1 redirect;'>>$path_tmp/$sitename.conf;
  157. #echo -e '}' >>$path_tmp/$sitename.conf;
  158. #echo -e '\n' >>$path_tmp/$sitename.conf;
  159. echo -e 'location /.well-known/acme-challenge {' >>$path_tmp/$sitename.conf;
  160. echo -e ' allow all;' >>$path_tmp/$sitename.conf;
  161. echo -e ' autoindex off;' >>$path_tmp/$sitename.conf;
  162. echo -e ' default_type "text/plain";' >>$path_tmp/$sitename.conf;
  163. echo -e ' root '"$www_root"';' >>$path_tmp/$sitename.conf;
  164. echo -e '}' >>$path_tmp/$sitename.conf;
  165. echo -e '\n' >>$path_tmp/$sitename.conf;
  166. echo -e 'location = /.well-known {' >>$path_tmp/$sitename.conf;
  167. echo -e ' return 404;' >>$path_tmp/$sitename.conf;
  168. echo -e '}' >>$path_tmp/$sitename.conf;
  169. echo -e '\n' >>$path_tmp/$sitename.conf;
  170. echo -e 'error_page 404 /404.html;' >>$path_tmp/$sitename.conf;
  171. echo -e 'error_page 500 502 503 504 /50x.html;' >>$path_tmp/$sitename.conf;
  172. echo -e '\n' >>$path_tmp/$sitename.conf;
  173. echo -e 'error_log /var/log/nginx/err-certbot.log;' >>$path_tmp/$sitename.conf;
  174. echo -e 'access_log /var/log/nginx/access-certbot.log;' >>$path_tmp/$sitename.conf;
  175. echo -e '}' >>$path_tmp/$sitename.conf;
  176. ln -s $path_tmp/$sitename.conf $nginx_enable/$sitename.conf
  177. }
  178. case "$cmd" in
  179. ## create cert
  180. "--create" | "--create" )
  181. downSite;
  182. createCert;
  183. upSite;
  184. toSSL;
  185. ;;
  186. ## update cert
  187. "--update" | "--update" )
  188. downSite;
  189. renew;
  190. upSite;
  191. toSSL;
  192. ;;
  193. ## update cert force
  194. "--flist" | "--flist" )
  195. toSSL;
  196. ;;
  197. ## start defaults
  198. * )
  199. echo "please input pameters: auto4certbot.sh --create | --update | --flist";
  200. echo "auto4certbot.sh --create; create new certificate"
  201. echo "auto4certbot.sh --update; update certificates;"
  202. echo "auto4certbot.sh --flist; update certificates from ssl;"
  203. ;;
  204. esac
  205. exit