avto4certbot.sh 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. #!/bin/bash
  2. #
  3. # author: Koshuba V.O.
  4. # license: GPL 2.0
  5. # create 2022
  6. #
  7. version="0.3.0";
  8. sname="avto4certbot";
  9. # необходимы для работы: nginx,certbot (и если почтовый сервер то сервисы в restartMail)
  10. # create new cert or update
  11. path_ssl="/etc/ssl";
  12. path_cert="/etc/letsencrypt/live";
  13. source "/etc/scripts/avto4certbot/avto4certbot.conf";
  14. ## - nginx
  15. nginx_enable="/etc/nginx/sites-enabled";
  16. nginx_available="/etc/nginx/sites-available";
  17. ## - mail services
  18. mailservice=(
  19. "dbmail"
  20. "postfix"
  21. "stunnel4"
  22. "rspamd"
  23. );
  24. ##
  25. www_root="/tmp/letsencrypt";
  26. ##
  27. path_tmp="/tmp/certbot";
  28. ##
  29. log="/var/log/syslog";
  30. # - shared options
  31. cmd=$1;
  32. # - for mail server
  33. opt=$2;
  34. #-list enable sites
  35. scan_list=();
  36. #
  37. function createCert() {
  38. #
  39. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  40. do
  41. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  42. if [ "$cmd" == "--create" ];
  43. then
  44. certbot -m "${dreg[1]}";
  45. else
  46. certbot --update-registration -m "${dreg[1]}";
  47. fi
  48. ##
  49. ## example manual: certbot certonly --webroot --webroot-path /tmp/letsencrypt -d mydomen.ru
  50. certbot certonly --webroot --webroot-path $www_root -d ${dreg[0]}
  51. done
  52. }
  53. function renew() {
  54. certbot renew;
  55. valtrue=0;
  56. rdate=$(date +%Y-%m-%d);
  57. rtime=$(date +%H:%M);
  58. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  59. do
  60. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  61. keydate=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$6'});
  62. keytime=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$7'});
  63. if [ "$keydate" = "$rdate" ] && [ "$keytime" = "$rtime" ];
  64. then
  65. ((valtrue++));
  66. cat $path_cert/${dreg[0]}/privkey.pem > $path_ssl/private/privkey_${dreg[0]}.pem;
  67. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/fullchain_${dreg[0]}.pem;
  68. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/${dreg[0]}.pem;
  69. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  70. #
  71. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  72. cd $path_ssl/certs
  73. chmod 600 ${dreg[0]}.pem
  74. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  75. cd $path_ssl
  76. echo "$(date) - $sname: update cert for ${domains[$dmn]}">> $log;
  77. fi
  78. done
  79. if [ $valtrue != 0 ];
  80. then
  81. :>/etc/ssl/crt-list.txt
  82. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  83. do
  84. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  85. done
  86. fi
  87. }
  88. function toSSL() {
  89. if [ -d $path_cert ];
  90. then
  91. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  92. do
  93. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  94. ((valtrue++));
  95. cat $path_cert/${dreg[0]}/privkey.pem > $path_ssl/private/privkey_${dreg[0]}.pem;
  96. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/fullchain_${dreg[0]}.pem;
  97. cat $path_cert/${dreg[0]}/fullchain.pem > $path_ssl/private/${dreg[0]}.pem;
  98. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  99. #
  100. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  101. cd $path_ssl/certs
  102. chmod 600 ${dreg[0]}.pem
  103. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  104. cd $path_ssl
  105. echo "$(date) - $sname: update certlist for ${domains[$dmn]}">> $log;
  106. done
  107. if [ $valtrue != 0 ];
  108. then
  109. echo >/etc/ssl/crt-list.txt
  110. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  111. do
  112. eval local dcrt="(" $(echo -e ${domains[$icrt]}) ")";
  113. echo "$path_ssl/private/${dcrt[0]}.pem">>/etc/ssl/crt-list.txt
  114. done
  115. fi
  116. else
  117. echo "Ошибка - отсутствует $path_cert!"
  118. echo "$(date) - $sname: Ошибка - отсутствует $path_cert!">> $log;
  119. fi
  120. }
  121. function downSite(){
  122. sudo systemctl stop nginx.service;
  123. eval list_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  124. if [ ${#list_www[@]} != 0 ]; then
  125. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  126. do
  127. rm $nginx_enable/${list_www[dwx]};
  128. done
  129. fi
  130. }
  131. function upSite(){
  132. sudo systemctl stop nginx.service;
  133. eval cert_bot="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  134. for ((cr=0; cr != ${#cert_bot[@]}; cr++))
  135. do
  136. rm $nginx_enable/${cert_bot[cr]};
  137. done
  138. for ((dnm=0; dnm != ${#domains[@]}; dnm++))
  139. do
  140. eval local dcert="(" $(echo -e ${domains[$dnm]}) ")";
  141. sitename="${dcert[0]}";
  142. siteport="${dcert[2]}";
  143. createConf;
  144. done
  145. sudo systemctl start nginx.service;
  146. }
  147. function createConf(){
  148. if [ ! -d $path_tmp ];
  149. then
  150. mkdir -p $path_tmp;
  151. fi
  152. if [ ! -d $www_root ];
  153. then
  154. mkdir -p $www_root/.well-known/acme-challenge;
  155. chown -R www-data:www-data $www_root;
  156. fi
  157. echo >$path_tmp/$sitename.conf;
  158. echo -e 'server { listen 0.0.0.0:'"$siteport"';' >>$path_tmp/$sitename.conf;
  159. echo -e '\n' >>$path_tmp/$sitename.conf;
  160. echo -e 'server_name '"$sitename"';' >>$path_tmp/$sitename.conf;
  161. echo -e '\n' >>$path_tmp/$sitename.conf;
  162. echo -e 'location /.well-known/acme-challenge {' >>$path_tmp/$sitename.conf;
  163. echo -e ' allow all;' >>$path_tmp/$sitename.conf;
  164. echo -e ' autoindex off;' >>$path_tmp/$sitename.conf;
  165. echo -e ' default_type "text/plain";' >>$path_tmp/$sitename.conf;
  166. echo -e ' root '"$www_root"';' >>$path_tmp/$sitename.conf;
  167. echo -e '}' >>$path_tmp/$sitename.conf;
  168. echo -e '\n' >>$path_tmp/$sitename.conf;
  169. echo -e 'location = /.well-known {' >>$path_tmp/$sitename.conf;
  170. echo -e ' return 404;' >>$path_tmp/$sitename.conf;
  171. echo -e '}' >>$path_tmp/$sitename.conf;
  172. echo -e '\n' >>$path_tmp/$sitename.conf;
  173. echo -e 'error_page 404 /404.html;' >>$path_tmp/$sitename.conf;
  174. echo -e 'error_page 500 502 503 504 /50x.html;' >>$path_tmp/$sitename.conf;
  175. echo -e '\n' >>$path_tmp/$sitename.conf;
  176. echo -e 'error_log /var/log/nginx/err-certbot.log;' >>$path_tmp/$sitename.conf;
  177. echo -e 'access_log /var/log/nginx/access-certbot.log;' >>$path_tmp/$sitename.conf;
  178. echo -e '}' >>$path_tmp/$sitename.conf;
  179. ln -s $path_tmp/$sitename.conf $nginx_enable/$sitename.conf
  180. }
  181. function restartMail(){
  182. for ((scn=0; scn != ${#mailservice[@]}; scn++))
  183. do
  184. /etc/init.d/${mailservice[$scn]} restart;
  185. # systemctl restart ${mailservices[$scn]};
  186. done
  187. }
  188. case "$cmd" in
  189. ## create cert
  190. "--create" | "--create" )
  191. downSite;
  192. upSite;
  193. createCert;
  194. toSSL;
  195. downSite;
  196. if [ "$opt" == "mail" ]; then
  197. restartMail;
  198. fi
  199. ;;
  200. ## update cert
  201. "--update" | "--update" )
  202. downSite;
  203. upSite;
  204. renew;
  205. toSSL;
  206. downSite;
  207. if [ "$opt" == "mail" ]; then
  208. restartMail;
  209. fi
  210. ;;
  211. ## update cert force
  212. "--flist" | "--flist" )
  213. toSSL;
  214. if [ "$opt" == "mail" ]; then
  215. restartMail;
  216. fi
  217. ;;
  218. ## start defaults
  219. * )
  220. echo "please input pameters: avto4certbot.sh --create | --update | --flist";
  221. echo "avto4certbot.sh --create; create new certificate or --create mail; create and restart mail services "
  222. echo "avto4certbot.sh --update; update certificates or --update mail; update and restart mail services;"
  223. echo "avto4certbot.sh --flist; update certificates from ssl or --flist mail; update certs and restart mail services;"
  224. ;;
  225. esac
  226. exit