certbot4mail.sh 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. #!/bin/bash
  2. #
  3. # необходимо для работы: nginx,certbot
  4. # create new cert
  5. path_ssl="/etc/ssl";
  6. path_cert="/etc/letsencrypt/live";
  7. source "/etc/scripts/certbot4mail/certbot4mail.conf";
  8. log="/var/log/syslog";
  9. #
  10. cmd=$1;
  11. #
  12. function createCert() {
  13. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  14. do
  15. certbot certonly --webroot --agree-tos --email $adminmail -w $webcrt -d ${domains[$dmn]}
  16. done
  17. }
  18. function renew() {
  19. certbot renew;
  20. valtrue=0;
  21. rdate=$(date +%Y-%m-%d);
  22. rtime=$(date +%H:%M);
  23. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  24. do
  25. keydate=$(ls -l --time-style=long-iso $path_cert/${domains[$dmn]}/cert.pem |awk {'print$6'});
  26. keytime=$(ls -l --time-style=long-iso $path_cert/${domains[$dmn]}/cert.pem |awk {'print$7'});
  27. if [ "$keydate" = "$rdate" ] && [ "$keytime" = "$rtime" ];
  28. then
  29. ((valtrue++));
  30. cat $path_cert/${domains[$dmn]}/cert.pem > $path_ssl/private/${domains[$dmn]}.pem;
  31. cat $path_cert/${domains[$dmn]}/chain.pem >> $path_ssl/private/${domains[$dmn]}.pem;
  32. cat $path_cert/${domains[$dmn]}/fullchain.pem >> $path_ssl/private/${domains[$dmn]}.pem;
  33. cat $path_cert/${domains[$dmn]}/privkey.pem >> $path_ssl/private/${domains[$dmn]}.pem;
  34. #
  35. cp -f $path_ssl/private/${domains[$pem_index]}.pem $path_ssl/certs/${domains[$pem_index]}.pem
  36. cd $path_ssl/certs
  37. chmod 600 ${domains[$pem_index]}.pem
  38. ln -sf ${domains[$pem_index]}.pem `openssl x509 -noout -hash < ${domains[$pem_index]}.pem`.0
  39. cd $path_ssl
  40. echo "$(date) - certbot4mail.sh: update cert for ${domains[$dmn]}">> $log;
  41. fi
  42. done
  43. if [ $valtrue != 0 ];
  44. then
  45. :>/etc/ssl/crt-list.txt
  46. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  47. do
  48. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  49. done
  50. /etc/init.d/dbmail restart;
  51. /etc/init.d/stunnel4 restart;
  52. fi
  53. }
  54. function toSSL() {
  55. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  56. do
  57. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  58. ((valtrue++));
  59. cat $path_cert/${dreg[0]}/cert.pem > $path_ssl/private/${dreg[0]}.pem;
  60. cat $path_cert/${dreg[0]}/chain.pem >> $path_ssl/private/${dreg[0]}.pem;
  61. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/private/${dreg[0]}.pem;
  62. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  63. #
  64. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  65. cd $path_ssl/certs
  66. chmod 600 ${dreg[0]}.pem
  67. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  68. cd $path_ssl
  69. echo "$(date) - auto4certbot.sh: update certlist for ${domains[$dmn]}">> $log;
  70. done
  71. if [ $valtrue != 0 ];
  72. then
  73. :>/etc/ssl/crt-list.txt
  74. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  75. do
  76. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  77. done
  78. /etc/init.d/dbmail restart;
  79. /etc/init.d/stunnel4 restart;
  80. fi
  81. }
  82. case "$cmd" in
  83. ## create cert
  84. "--create" | "--create" )
  85. createCert;
  86. ;;
  87. ## update cert
  88. "--update" | "--update" )
  89. renew;
  90. ;;
  91. ## update cert force
  92. "--flist" | "--flist" )
  93. toSSL;
  94. ;;
  95. ## start defaults
  96. * )
  97. echo "please input pameters: auto4certbot.sh --create | --update | --flist";
  98. echo "auto4certbot.sh --create; create new certificate"
  99. echo "auto4certbot.sh --update; update certificates;"
  100. echo "auto4certbot.sh --flist; update certificates from ssl;"
  101. ;;
  102. esac