certbot4mail.sh 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. #!/bin/bash
  2. #
  3. # author: Koshuba V.O.
  4. # license: GPL 2.0
  5. # create 2022
  6. #
  7. version="0.2.9";
  8. sname="certbot4mail";
  9. # необходимы для работы: nginx,certbot
  10. # create new cert
  11. path_ssl="/etc/ssl";
  12. path_cert="/etc/letsencrypt/live";
  13. source "/etc/scripts/certbot4mail/certbot4mail.conf";
  14. ## - nginx
  15. nginx_enable="/etc/nginx/sites-enabled";
  16. nginx_available="/etc/nginx/sites-available";
  17. ##
  18. www_root="/tmp/letsencrypt";
  19. ##
  20. path_tmp="/tmp/certbot";
  21. ##
  22. log="/var/log/syslog";
  23. #
  24. cmd=$1;
  25. #-list enable sites
  26. scan_list=();
  27. #
  28. function createCert() {
  29. #
  30. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  31. do
  32. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  33. if [ "$cmd" == "--create" ];
  34. then
  35. certbot -m "${dreg[1]}";
  36. else
  37. certbot --update-registration -m "${dreg[1]}" -d "${dreg[0]}" ;
  38. fi
  39. ##
  40. ## example manual: certbot certonly --webroot --webroot-path /tmp/letsencrypt -d mydomen.ru
  41. certbot certonly --webroot --webroot-path $www_root -d ${dreg[0]}
  42. done
  43. }
  44. function renew() {
  45. certbot renew;
  46. valtrue=0;
  47. rdate=$(date +%Y-%m-%d);
  48. rtime=$(date +%H:%M);
  49. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  50. do
  51. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  52. keydate=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$6'});
  53. keytime=$(ls -l --time-style=long-iso $path_cert/${dreg[0]}/cert.pem |awk {'print$7'});
  54. if [ "$keydate" = "$rdate" ] && [ "$keytime" = "$rtime" ];
  55. then
  56. ((valtrue++));
  57. cat $path_cert/${dreg[0]}/cert.pem > $path_ssl/private/${dreg[0]}.pem;
  58. cat $path_cert/${dreg[0]}/chain.pem >> $path_ssl/private/${dreg[0]}.pem;
  59. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/private/${dreg[0]}.pem;
  60. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  61. #
  62. # to postfix
  63. if [ ! -d $path_ssl/manual ]; then
  64. mkdir -p $path_ssl/manual;
  65. fi
  66. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/manual/fullchain.pem;
  67. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/manual/privkey.pem;
  68. #
  69. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  70. cd $path_ssl/certs
  71. chmod 600 ${dreg[0]}.pem
  72. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  73. cd $path_ssl
  74. echo "$(date) - certbot4mail.sh: update cert for ${domains[$dmn]}">> $log;
  75. fi
  76. done
  77. if [ $valtrue != 0 ];
  78. then
  79. :>/etc/ssl/crt-list.txt
  80. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  81. do
  82. echo "$path_ssl/${domains[$icrt]}.pem">>/etc/ssl/crt-list.txt
  83. done
  84. fi
  85. }
  86. function toSSL() {
  87. if [ -d $path_cert ];
  88. then
  89. for ((dmn=0; dmn != ${#domains[@]}; dmn++))
  90. do
  91. eval local dreg="(" $(echo -e ${domains[$dmn]}) ")";
  92. ((valtrue++));
  93. cat $path_cert/${dreg[0]}/cert.pem > $path_ssl/private/${dreg[0]}.pem;
  94. cat $path_cert/${dreg[0]}/chain.pem >> $path_ssl/private/${dreg[0]}.pem;
  95. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/private/${dreg[0]}.pem;
  96. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/private/${dreg[0]}.pem;
  97. # to postfix
  98. if [ ! -d $path_ssl/manual ]; then
  99. mkdir -p $path_ssl/manual;
  100. fi
  101. cat $path_cert/${dreg[0]}/fullchain.pem >> $path_ssl/manual/fullchain.pem;
  102. cat $path_cert/${dreg[0]}/privkey.pem >> $path_ssl/manual/privkey.pem;
  103. #
  104. cp -f $path_ssl/private/${dreg[0]}.pem $path_ssl/certs/${dreg[0]}.pem
  105. cd $path_ssl/certs
  106. chmod 600 ${dreg[0]}.pem
  107. ln -sf ${dreg[0]}.pem `openssl x509 -noout -hash < ${dreg[0]}.pem`.0
  108. cd $path_ssl
  109. echo "$(date) - certbot4mail.sh: update certlist for ${domains[$dmn]}">> $log;
  110. done
  111. if [ $valtrue != 0 ];
  112. then
  113. echo >/etc/ssl/crt-list.txt
  114. for ((icrt=0; icrt != ${#domains[@]}; icrt++))
  115. do
  116. eval local dcrt="(" $(echo -e ${domains[$icrt]}) ")";
  117. echo "$path_ssl/private/${dcrt[0]}.pem">>/etc/ssl/crt-list.txt
  118. done
  119. fi
  120. else
  121. echo "Ошибка - отсутствует $path_cert!"
  122. fi
  123. }
  124. function downSite(){
  125. sudo systemctl stop nginx.service;
  126. eval list_www="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  127. for ((dwx=0; dwx != ${#list_www[@]}; dwx++))
  128. do
  129. rm $nginx_enable/${list_www[dwx]};
  130. done
  131. }
  132. function upSite(){
  133. sudo systemctl stop nginx.service;
  134. eval cert_bot="(" $(find $nginx_enable/* -maxdepth 0 -type l -printf '%f\n') ")";
  135. for ((cr=0; cr != ${#cert_bot[@]}; cr++))
  136. do
  137. rm $nginx_enable/${cert_bot[cr]};
  138. done
  139. for ((dnm=0; dnm != ${#domains[@]}; dnm++))
  140. do
  141. eval local dcert="(" $(echo -e ${domains[$dnm]}) ")";
  142. sitename="${dcert[0]}";
  143. siteport="${dcert[2]}";
  144. createConf;
  145. done
  146. sudo systemctl start nginx.service;
  147. }
  148. function createConf(){
  149. if [ ! -d $path_tmp ];
  150. then
  151. mkdir -p $path_tmp;
  152. fi
  153. if [ ! -d $www_root ];
  154. then
  155. mkdir -p $www_root/.well-known/acme-challenge;
  156. chown -R www-data:www-data $www_root;
  157. fi
  158. echo >$path_tmp/$sitename.conf;
  159. echo -e 'server { listen 0.0.0.0:'"$siteport"';' >>$path_tmp/$sitename.conf;
  160. echo -e '\n' >>$path_tmp/$sitename.conf;
  161. echo -e 'server_name '"$sitename"';' >>$path_tmp/$sitename.conf;
  162. echo -e '\n' >>$path_tmp/$sitename.conf;
  163. echo -e 'location /.well-known/acme-challenge {' >>$path_tmp/$sitename.conf;
  164. echo -e ' allow all;' >>$path_tmp/$sitename.conf;
  165. echo -e ' autoindex off;' >>$path_tmp/$sitename.conf;
  166. echo -e ' default_type "text/plain";' >>$path_tmp/$sitename.conf;
  167. echo -e ' root '"$www_root"';' >>$path_tmp/$sitename.conf;
  168. echo -e '}' >>$path_tmp/$sitename.conf;
  169. echo -e '\n' >>$path_tmp/$sitename.conf;
  170. echo -e 'location = /.well-known {' >>$path_tmp/$sitename.conf;
  171. echo -e ' return 404;' >>$path_tmp/$sitename.conf;
  172. echo -e '}' >>$path_tmp/$sitename.conf;
  173. echo -e '\n' >>$path_tmp/$sitename.conf;
  174. echo -e 'error_page 404 /404.html;' >>$path_tmp/$sitename.conf;
  175. echo -e 'error_page 500 502 503 504 /50x.html;' >>$path_tmp/$sitename.conf;
  176. echo -e '\n' >>$path_tmp/$sitename.conf;
  177. echo -e 'error_log /var/log/nginx/err-certbot.log;' >>$path_tmp/$sitename.conf;
  178. echo -e 'access_log /var/log/nginx/access-certbot.log;' >>$path_tmp/$sitename.conf;
  179. echo -e '}' >>$path_tmp/$sitename.conf;
  180. ln -s $path_tmp/$sitename.conf $nginx_enable/$sitename.conf
  181. }
  182. function restartMail(){
  183. /etc/init.d/dbmail restart;
  184. /etc/init.d/stunnel4 restart;
  185. /etc/init.d/postfix restart;
  186. }
  187. case "$cmd" in
  188. ## create cert
  189. "--create" | "--create" )
  190. downSite;
  191. createCert;
  192. upSite;
  193. toSSL;
  194. downSite;
  195. restartMail;
  196. ;;
  197. ## update cert
  198. "--update" | "--update" )
  199. downSite;
  200. renew;
  201. upSite;
  202. toSSL;
  203. downSite;
  204. restartMail;
  205. ;;
  206. ## update cert force
  207. "--flist" | "--flist" )
  208. toSSL;
  209. restartMail;
  210. ;;
  211. ## start defaults
  212. * )
  213. echo "please input pameters: certbot4mail.sh --create | --update | --flist";
  214. echo "certbot4mail.sh --create; create new certificate"
  215. echo "certbot4mail.sh --update; update certificates;"
  216. echo "certbot4mail.sh --flist; update certificates from ssl;"
  217. ;;
  218. esac
  219. exit