123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125 |
- #!/bin/bash
- #
- # необходимо для работы: nginx,certbot
- # create new cert
- path_ssl="/etc/ssl";
- path_cert="/etc/letsencrypt/live";
- source "/etc/scripts/certbot4mail/certbot4mail.conf";
- log="/var/log/syslog";
- #
- cmd=$1;
- #
- function createCert() {
- for ((dmn=0; dmn != ${#domains[@]}; dmn++))
- do
- certbot certonly --webroot --agree-tos --email $adminmail -w $webcrt -d ${domains[$dmn]}
- done
- }
- function renew() {
- certbot renew;
- valtrue=0;
- rdate=$(date +%Y-%m-%d);
- rtime=$(date +%H:%M);
- for ((dmn=0; dmn != ${#domains[@]}; dmn++))
- do
- keydate=$(ls -l --time-style=long-iso $path_cert/${domains[$dmn]}/cert.pem |awk {'print$6'});
- keytime=$(ls -l --time-style=long-iso $path_cert/${domains[$dmn]}/cert.pem |awk {'print$7'});
- if [ "$keydate" = "$rdate" ] && [ "$keytime" = "$rtime" ];
- then
- ((valtrue++));
- cat $path_cert/${domains[$dmn]}/cert.pem > $path_ssl/private/${domains[$dmn]}.pem;
- cat $path_cert/${domains[$dmn]}/chain.pem >> $path_ssl/private/${domains[$dmn]}.pem;
- cat $path_cert/${domains[$dmn]}/fullchain.pem >> $path_ssl/private/${domains[$dmn]}.pem;
- cat $path_cert/${domains[$dmn]}/privkey.pem >> $path_ssl/private/${domains[$dmn]}.pem;
- # to postfix
- cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/manual/fullchain.pem;
- cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/manual/privkey.pem;
- #
- cp -f $path_ssl/private/${domains[$pem_index]}.pem $path_ssl/certs/${domains[$pem_index]}.pem
- cd $path_ssl/certs
- chmod 600 ${domains[$pem_index]}.pem
- ln -sf ${domains[$pem_index]}.pem `openssl x509 -noout -hash < ${domains[$pem_index]}.pem`.0
- cd $path_ssl
- echo "$(date) - certbot4mail.sh: update cert for ${domains[$dmn]}">> $log;
- fi
- done
- if [ $valtrue != 0 ];
- then
- :>/etc/ssl/crt-list.txt
- for ((icrt=0; icrt != ${#domains[@]}; icrt++))
- do
- echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
- done
- /etc/init.d/dbmail restart;
- /etc/init.d/stunnel4 restart;
- /etc/init.d/postfix restart;
- fi
- }
- function toSSL() {
- for ((dmn=0; dmn != ${#domains[@]}; dmn++))
- do
- eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
- ((valtrue++));
- cat $path_cert/${dreg[0]}/cert.pem > $path_ssl/private/${dreg[0]}.pem;
- cat $path_cert/${dreg[0]}/chain.pem >> $path_ssl/private/${dreg[0]}.pem;
- cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/private/${dreg[0]}.pem;
- cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
- # to postfix
- cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/manual/fullchain.pem;
- cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/manual/privkey.pem;
- #
- cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
- cd $path_ssl/certs
- chmod 600 ${dreg[0]}.pem
- ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
- cd $path_ssl
- echo "$(date) - auto4certbot.sh: update certlist for ${domains[$dmn]}">> $log;
- done
- if [ $valtrue != 0 ];
- then
- :>/etc/ssl/crt-list.txt
- for ((icrt=0; icrt != ${#domains[@]}; icrt++))
- do
- echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
- done
- /etc/init.d/dbmail restart;
- /etc/init.d/stunnel4 restart;
- /etc/init.d/postfix restart;
- fi
- }
- case "$cmd" in
- ## create cert
- "--create" | "--create" )
- createCert;
- ;;
- ## update cert
- "--update" | "--update" )
- renew;
- ;;
- ## update cert force
- "--flist" | "--flist" )
- toSSL;
- ;;
- ## start defaults
- * )
- echo "please input pameters: auto4certbot.sh --create | --update | --flist";
- echo "auto4certbot.sh --create; create new certificate"
- echo "auto4certbot.sh --update; update certificates;"
- echo "auto4certbot.sh --flist; update certificates from ssl;"
- ;;
- esac
|