avto4certbot.sh 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444
  1. #!/bin/bash
  2. #
  3. # author: Koshuba V.O.
  4. # license: GPL 2.0
  5. # create 2022
  6. #
  7. version="0.5.0";
  8. sname="avto4certbot";
  9. # script path
  10. path_script=$( cd -- $( dirname -- "${BASH_SOURCE[0]}" ) &> /dev/null && pwd );
  11. source "$path_script/avto4certbot.conf";
  12. # service LAMP
  13. web_service="";
  14. # new certificate or renewal event
  15. event_sw=0;
  16. # event begin or end the work script
  17. event_key="1";
  18. # message from errors
  19. reports=();
  20. # work_sites
  21. active_sites=();
  22. ##--@S static values
  23. # depends
  24. pkgdep=("curl" "certbot" "letsencrypt") # packages
  25. get_tools=("curl" "certbot" "letsencrypt")
  26. # - options
  27. cmd=$1;
  28. # - for LAMP server
  29. opt=$2;
  30. # - for proxy mode
  31. sw_proxy=$3;
  32. #--@F Get info area
  33. function getInfo() {
  34. ## test - null values
  35. if [ $tmp_dir == "" ]; then
  36. tmp_dir="/tmp";
  37. fi
  38. web_dir="$tmp_dir/www"
  39. conf_dir="$tmp_dir/conf"
  40. if [ $log_file == "" ]; then
  41. log_file="/var/log/syslog";
  42. fi
  43. if [ $sites_nginx == "" ]; then
  44. available_nginx="/etc/nginx/sites-available";
  45. fi
  46. if [ $sites_apache == "" ]; then
  47. available_apache="/etc/apache2/sites-available";
  48. fi
  49. if [ $sites_nginx == "" ]; then
  50. sites_nginx="/etc/nginx/sites-enabled";
  51. fi
  52. if [ $sites_apache == "" ]; then
  53. sites_apache="/etc/apache2/sites-enabled";
  54. if [ "$(apachectl -M|grep rewrite|wc -m)" == "0" ]; then
  55. a2enmod rewrite
  56. fi
  57. fi
  58. ## apache2 mode: prefork or worker (multi-instance)
  59. if [ $apache2_service == "" ]; then
  60. apache2_service="apache2";
  61. fi
  62. if [ $path_ssl == "" ]; then
  63. path_ssl="/etc/ssl";
  64. fi
  65. if [ $path_cert == "" ]; then
  66. path_cert="/etc/letsencrypt/live";
  67. fi
  68. ## create temp directory
  69. if [ ! -d $tmp_dir ]; then
  70. mkdir -p $tmp_dir;
  71. fi
  72. ## create web directory
  73. if [ ! -d "$web_dir/.well-known/acme-challenge" ]; then
  74. mkdir -p $web_dir/.well-known/acme-challenge;
  75. chown -R www-data:www-data $web_dir;
  76. fi
  77. ## create conf directory
  78. if [ ! -d $conf_dir ]; then
  79. mkdir -p $conf_dir;
  80. fi
  81. ##
  82. if [[ "$opt" != "" ]] && [[ $opt != "nginx" ]] && [[ "$opt" == "apache" ]]; then
  83. find $sites_apache/* -maxdepth 0 -type l -printf '%f\n' >$tmp_dir/active_sites.inf 2>/dev/null;
  84. get_tools[${#get_tools[@]}]="apache2";
  85. web_service="$apache2_service";
  86. fi
  87. if [[ "$opt" != "" ]] && [[ $opt != "apache" ]] && [[ "$opt" == "nginx" ]]; then
  88. find $sites_nginx/* -maxdepth 0 -type l -printf '%f\n' >$tmp_dir/active_sites.inf 2>/dev/null;
  89. get_tools[${#get_tools[@]}]="nginx";
  90. web_service="nginx";
  91. fi
  92. }
  93. #--@F Check the program dependency
  94. function checkDep() {
  95. # - msg debug
  96. echo "check depends..."
  97. if [ ! "$lang" ]; then
  98. lang="C.UTF-8"
  99. fi
  100. for ((itools = 0; itools != ${#get_tools[@]}; itools++)); do
  101. checktool=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  102. if [[ $checktool = "" ]]; then
  103. sudo apt install ${pkgdep[$itools]}
  104. fi
  105. checktool=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  106. if [[ $checktool != "" ]]; then
  107. eval get_${get_tools[$itools]}=$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')
  108. list_tools[${#list_tools[@]}]="$(whereis -b ${get_tools[$itools]} | awk '/^'${get_tools[$itools]}':/{print $2}')"
  109. else
  110. ## lang messages if yes then lang else us...
  111. reports=()
  112. reports[${#reports[@]}]="Sorry, there are no required packages to work, please install:${pkgdep[@]}"
  113. makeErr
  114. exit
  115. fi
  116. done
  117. }
  118. function swSites(){
  119. ## clear active sites
  120. if [ "$event_key" = "1" ]; then
  121. active_sites=( $(cat $tmp_dir/active_sites.inf) );
  122. for ((xd=0; xd != ${#active_sites[@]}; xd++)); do
  123. if [[ "$opt" != "" ]] && [[ $opt != "nginx" ]] && [[ "$opt" == "apache" ]]; then
  124. if [ -f $sites_apache/${active_sites[$xd]} ]; then
  125. rm $sites_apache/${active_sites[$xd]}
  126. fi
  127. fi
  128. if [[ "$opt" != "" ]] && [[ $opt != "apache" ]] && [[ "$opt" == "nginx" ]]; then
  129. if [ -f $sites_nginx/${active_sites[$xd]} ]; then
  130. rm $sites_nginx/${active_sites[$xd]}
  131. fi
  132. fi
  133. done
  134. fi
  135. ## restore active sites
  136. if [ "$event_key" = "0" ]; then
  137. # clear tmp configs
  138. if [[ "$opt" != "" ]] && [[ $opt != "nginx" ]] && [[ "$opt" == "apache" ]]; then
  139. rm $sites_apache/*.conf
  140. fi
  141. if [[ "$opt" != "" ]] && [[ $opt != "apache" ]] && [[ "$opt" == "nginx" ]]; then
  142. rm $sites_nginx/*.conf
  143. fi
  144. # restore active links
  145. active_sites=( $(cat $tmp_dir/active_sites.inf) );
  146. for ((xd=0; xd != ${#active_sites[@]}; xd++)); do
  147. if [[ "$opt" != "" ]] && [[ $opt != "nginx" ]] && [[ "$opt" == "apache" ]]; then
  148. if [ ! -f $sites_apache/${active_sites[$xd]} ]; then
  149. ln -s $available_apache/${active_sites[$xd]} $sites_apache/${active_sites[$xd]}
  150. fi
  151. fi
  152. if [[ "$opt" != "" ]] && [[ $opt != "apache" ]] && [[ "$opt" == "nginx" ]]; then
  153. if [ ! -f $sites_nginx/${active_sites[$xd]} ]; then
  154. ln -s $available_nginx/${active_sites[$xd]} $sites_nginx/${active_sites[$xd]}
  155. fi
  156. fi
  157. done
  158. fi
  159. }
  160. ##--@F make all errors
  161. function makeErr() {
  162. for ((rpt_index=0; rpt_index != ${#reports[@]}; rpt_index++))
  163. do
  164. echo "$rdate $sname: ${reports[$rpt_index]}">>$log_file;
  165. echo "${reports[$rpt_index]}";
  166. done
  167. exit 0;
  168. }
  169. function createCert() {
  170. #
  171. for ((xd=0; xd != ${#domains[@]}; xd++)); do
  172. local site_data=( $(echo -e ${domains[$xd]}|sed 's/ /\n /g') );
  173. site_name="${site_data[0]}";
  174. site_owner="${site_data[1]}";
  175. certbot -m "$site_owner" certonly --webroot --webroot-path $web_dir -d $site_name
  176. sleep 2;
  177. done
  178. }
  179. ##--@F exec task
  180. function scanSSL(){
  181. ## if event - yes
  182. event_sw=0;
  183. rdate=$(date +%Y-%m-%d);
  184. rtime=$(date +%H:%M);
  185. for ((xd=0; xd != ${#domains[@]}; xd++)); do
  186. local site_data=( $(echo -e ${domains[$xd]}|sed 's/ /\n /g') );
  187. site_name="${site_data[0]}";
  188. if [ -d $path_cert/$site_name ]; then
  189. keydate=$(ls -l --time-style=long-iso $path_cert/$site_name/cert.pem |awk {'print$6'});
  190. keytime=$(ls -l --time-style=long-iso $path_cert/$site_name/cert.pem |awk {'print$7'});
  191. if [[ "$keydate" = "$rdate" ]] && [[ "$keytime" = "$rtime" ]]; then
  192. ((event_sw++));
  193. cat $path_cert/$site_name/privkey.pem > $path_ssl/private/privkey_$site_name.pem;
  194. cat $path_cert/$site_name/fullchain.pem > $path_ssl/private/fullchain_$site_name.pem;
  195. cat $path_cert/$site_name/fullchain.pem > $path_ssl/private/$site_name.pem;
  196. cat $path_cert/$site_name/privkey.pem >> $path_ssl/private/$site_name.pem;
  197. #
  198. cp -f $path_ssl/private/$site_name.pem $path_ssl/certs/$site_name.pem
  199. cd $path_ssl/certs
  200. chmod 600 $site_name.pem
  201. ln -sf $site_name.pem `openssl x509 -noout -hash < $site_name.pem`.0
  202. cd $path_ssl
  203. echo "$(date) - $sname: update cert for $site_name">> $log_file;
  204. fi
  205. fi
  206. done
  207. if [ $event_sw != 0 ];then
  208. echo>/etc/ssl/crt-list.txt
  209. for ((xd=0; xd != ${#domains[@]}; xd++)); do
  210. local site_data=( $(echo -e ${domains[$xd]}|sed 's/ /\n /g') );
  211. echo "$path_ssl/${site_data[0]}.pem">>/etc/ssl/crt-list.txt
  212. done
  213. fi
  214. }
  215. ##--@F create configs
  216. function createConf(){
  217. for ((xd=0; xd != ${#domains[@]}; xd++)); do
  218. local site_data=( $(echo -e ${domains[$xd]}|sed 's/ /\n /g') );
  219. site_name="${site_data[0]}";
  220. site_owner="${site_data[1]}";
  221. site_port="${site_data[2]}";
  222. ## apache2 config
  223. if [[ "$opt" != "" ]] && [[ $opt != "nginx" ]] && [[ "$opt" == "apache" ]]; then
  224. ## добавить проверку режима apache2 и путь для активации конфигурации
  225. echo >$conf_dir/$site_name.conf;
  226. echo -e '<VirtualHost *:'"$site_port"'>' >>$conf_dir/$site_name.conf;
  227. echo -e ' ServerName '"$site_name"'' >>$conf_dir/$site_name.conf;
  228. echo -e ' ServerAlias '"$site_name"'' >>$conf_dir/$site_name.conf;
  229. echo -e ' DocumentRoot '"$web_dir"'' >>$conf_dir/$site_name.conf;
  230. echo -e ''>>$conf_dir/$site_name.conf;
  231. echo -e ' <Directory '"$web_dir"'>' >>$conf_dir/$site_name.conf;
  232. echo -e ' RewriteEngine On'>>$conf_dir/$site_name.conf;
  233. echo -e ' RewriteCond %{REQUEST_URI} !^/\.well\-known/acme\-challenge/'>>$conf_dir/$site_name.conf;
  234. echo -e ' Options -Indexes +FollowSymLinks +MultiViews' >>$conf_dir/$site_name.conf;
  235. echo -e ' AllowOverride All' >>$conf_dir/$site_name.conf;
  236. echo -e ' Require all granted' >>$conf_dir/$site_name.conf;
  237. echo -e ' </Directory>\n' >>$conf_dir/$site_name.conf;
  238. echo -e ' ErrorLog ${APACHE_LOG_DIR}/error.log' >>$conf_dir/$site_name.conf;
  239. echo -e ' CustomLog ${APACHE_LOG_DIR}/access.log combined' >>$conf_dir/$site_name.conf;
  240. echo -e '</VirtualHost>' >>$conf_dir/$site_name.conf;
  241. if [ ! -f $sites_apache/$site_name.conf ]; then
  242. ln -s $conf_dir/$site_name.conf $sites_apache/$site_name.conf
  243. fi
  244. fi
  245. ## nginx config
  246. if [[ "$opt" != "" ]] && [[ $opt != "apache" ]] && [[ "$opt" == "nginx" ]]; then
  247. echo >$conf_dir/$site_name.conf;
  248. echo -e 'server { listen 0.0.0.0:'"$site_port"';' >>$conf_dir/$site_name.conf;
  249. echo -e ' server_name '"$site_name"';' >>$conf_dir/$site_name.conf;
  250. echo -e ' location /.well-known/acme-challenge {' >>$conf_dir/$site_name.conf;
  251. echo -e ' allow all;' >>$conf_dir/$site_name.conf;
  252. echo -e ' autoindex off;' >>$conf_dir/$site_name.conf;
  253. echo -e ' default_type "text/plain";' >>$conf_dir/$site_name.conf;
  254. echo -e ' root '"$web_dir"';' >>$conf_dir/$site_name.conf;
  255. echo -e ' }' >>$conf_dir/$site_name.conf;
  256. echo -e ' location = /.well-known {' >>$conf_dir/$site_name.conf;
  257. echo -e ' return 404;' >>$conf_dir/$site_name.conf;
  258. echo -e ' }' >>$conf_dir/$site_name.conf;
  259. echo -e ' error_page 404 /404.html;' >>$conf_dir/$site_name.conf;
  260. echo -e ' error_page 500 502 503 504 /50x.html;\n' >>$conf_dir/$site_name.conf;
  261. echo -e ' error_log /var/log/nginx/err-certbot.log;' >>$conf_dir/$site_name.conf;
  262. echo -e ' access_log /var/log/nginx/access-certbot.log;' >>$conf_dir/$site_name.conf;
  263. echo -e '}' >>$conf_dir/$site_name.conf;
  264. if [ ! -f $sites_nginx/$site_name.conf ]; then
  265. ln -s $conf_dir/$site_name.conf $sites_nginx/$site_name.conf
  266. fi
  267. fi
  268. done
  269. }
  270. ##--@F restart services
  271. function updateScs(){
  272. if [[ "${services[@]}" != "" ]] && [[ "${#services[@]}" != "0" ]]; then
  273. for ((scn=0; scn != ${#services[@]}; scn++)); do
  274. systemctl restart ${services[$scn]};
  275. done
  276. fi
  277. }
  278. ##--@F help
  279. function pHelp(){
  280. echo "$sname:$version"
  281. echo "please input pameters: avto4certbot.sh --create [apache & nginx && proxy]| --update [apache & nginx] | --flist [apache & nginx]";
  282. echo "avto4certbot.sh --create; create new certificate or --create [apache & nginx && proxy]; create new certificate "
  283. echo "avto4certbot.sh --update; update certificates or --update [apache & nginx && proxy]; update [apache & nginx];"
  284. echo "avto4certbot.sh --flist; update certificates from ssl or --flist [apache & nginx && proxy]; rescan list certificates;"
  285. echo "avto4certbot.sh --help; this help"
  286. echo "* examples:"
  287. echo " avtocertbot.sh --update apache"
  288. echo " or"
  289. echo " avtocertbot.sh --update nginx"
  290. echo " or"
  291. echo " avtocertbot.sh --update apache proxy"
  292. }
  293. case "$cmd" in
  294. ## create cert
  295. "--create" | "--create" )
  296. if [ "$opt" != "" ]; then
  297. getInfo;
  298. checkDep;
  299. event_key="1";
  300. if [ $sw_proxy == "proxy" ]; then
  301. if [[ "$http_proxy" != "" ]] && [[ "$(systemctl list-units|grep "$http_proxy"|wc -m)" != "0" ]]; then
  302. systemctl stop $http_proxy
  303. createConf;
  304. systemctl start $web_service;
  305. createCert;
  306. scanSSL;
  307. event_key="0";
  308. systemctl stop $web_service;
  309. swSites;
  310. updateScs;
  311. systemctl start $http_proxy
  312. else
  313. reports=()
  314. reports[${#reports[@]}]="Sorry, there are not found proxy: $http_proxy"
  315. makeErr
  316. exit
  317. fi
  318. else
  319. systemctl stop $web_service;
  320. swSites;
  321. createConf;
  322. systemctl start $web_service;
  323. createCert;
  324. scanSSL;
  325. event_key="0";
  326. systemctl stop $web_service;
  327. swSites;
  328. systemctl start $web_service;
  329. updateScs;
  330. fi
  331. else
  332. pHelp;
  333. fi
  334. ;;
  335. ## update cert
  336. "--update" | "--update" )
  337. if [ "$opt" != "" ]; then
  338. getInfo;
  339. checkDep;
  340. event_key="1";
  341. if [ $sw_proxy == "proxy" ]; then
  342. if [[ "$http_proxy" != "" ]] && [[ "$(systemctl list-units|grep "$http_proxy"|wc -m)" != "0" ]]; then
  343. systemctl stop $http_proxy
  344. createConf;
  345. systemctl start $web_service;
  346. certbot -n renew;
  347. scanSSL;
  348. event_key="0";
  349. systemctl stop $web_service;
  350. swSites;
  351. updateScs;
  352. systemctl start $http_proxy
  353. else
  354. reports=()
  355. reports[${#reports[@]}]="Sorry, there are not found proxy: $http_proxy"
  356. makeErr
  357. exit
  358. fi
  359. else
  360. systemctl stop $web_service;
  361. swSites;
  362. createConf;
  363. systemctl start $web_service;
  364. certbot -n renew;
  365. scanSSL;
  366. event_key="0";
  367. systemctl stop $web_service;
  368. swSites;
  369. systemctl start $web_service;
  370. updateScs;
  371. else
  372. pHelp;
  373. fi
  374. ;;
  375. ## create cert
  376. "--flist" | "--flist" )
  377. if [ "$opt" != "" ]; then
  378. getInfo;
  379. checkDep;
  380. if [ $sw_proxy == "proxy" ]; then
  381. if [[ "$http_proxy" != "" ]] && [[ "$(systemctl list-units|grep "$http_proxy"|wc -m)" != "0" ]]; then
  382. scanSSL;
  383. systemctl restart $http_proxy
  384. updateScs;
  385. else
  386. reports=()
  387. reports[${#reports[@]}]="Sorry, there are not found proxy: $http_proxy"
  388. makeErr
  389. exit
  390. fi
  391. else
  392. scanSSL;
  393. systemctl restart $web_service;
  394. updateScs;
  395. else
  396. pHelp;
  397. fi
  398. ;;
  399. ## start defaults
  400. * )
  401. pHelp;
  402. ;;
  403. esac
  404. exit