v-add-letsencrypt-domain 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574
  1. #!/bin/bash
  2. # info: check letsencrypt domain
  3. # options: USER DOMAIN [ALIASES] [MAIL]
  4. # labels: web
  5. #
  6. # example: v-add-letsencrypt-domain admin wonderland.com www.wonderland.com
  7. #
  8. # The function check and validates domain with Let's Encrypt
  9. #----------------------------------------------------------#
  10. # Variable&Function #
  11. #----------------------------------------------------------#
  12. # Argument definition
  13. user=$1
  14. domain=$2
  15. aliases=$3
  16. mail=${4// }
  17. # Includes
  18. # shellcheck source=/usr/local/hestia/func/main.sh
  19. source $HESTIA/func/main.sh
  20. # shellcheck source=/usr/local/hestia/func/domain.sh
  21. source $HESTIA/func/domain.sh
  22. # shellcheck source=/usr/local/hestia/conf/hestia.conf
  23. source $HESTIA/conf/hestia.conf
  24. # LE API
  25. LE_API='https://acme-v02.api.letsencrypt.org'
  26. if [[ "$LE_STAGING" = 'yes' ]]; then
  27. LE_API='https://acme-staging-v02.api.letsencrypt.org'
  28. fi
  29. # encode base64
  30. encode_base64() {
  31. cat |base64 |tr '+/' '-_' |tr -d '\r\n='
  32. }
  33. # Let's Encrypt v2 curl function
  34. query_le_v2() {
  35. protected='{"nonce": "'$3'",'
  36. protected=''$protected' "url": "'$1'",'
  37. protected=''$protected' "alg": "RS256", "kid": "'$KID'"}'
  38. content="Content-Type: application/jose+json"
  39. payload_=$(echo -n "$2" |encode_base64)
  40. protected_=$(echo -n "$protected" |encode_base64)
  41. signature_=$(printf "%s" "$protected_.$payload_" |\
  42. openssl dgst -sha256 -binary -sign $USER_DATA/ssl/user.key |\
  43. encode_base64)
  44. post_data='{"protected":"'"$protected_"'",'
  45. post_data=$post_data'"payload":"'"$payload_"'",'
  46. post_data=$post_data'"signature":"'"$signature_"'"}'
  47. # Save http response to file passed as "$4" arg or print to stdout if not provided
  48. # http response headers are always sent to stdout
  49. local save_to_file=${4:-"/dev/stdout"}
  50. curl --location --insecure --retry 5 --retry-connrefused --silent --dump-header /dev/stdout --data "$post_data" "$1" --header "$content" --output "$save_to_file"
  51. debug_log "API call" "exit status: $?"
  52. }
  53. #----------------------------------------------------------#
  54. # Verifications #
  55. #----------------------------------------------------------#
  56. check_args '2' "$#" 'USER DOMAIN [ALIASES] [MAIL]'
  57. is_format_valid 'user' 'domain' 'aliases'
  58. is_object_valid 'user' 'USER' "$user"
  59. is_object_unsuspended 'user' 'USER' "$user"
  60. if [ ! -z "$mail" ]; then
  61. is_boolean_format_valid "$mail" 'mail'
  62. fi
  63. # Set DNS CAA record retrieval commands
  64. if [ ! -z "$DNS_SYSTEM" ]; then
  65. dns_domain=$($BIN/v-list-dns-domains $user | grep $domain | cut -d' ' -f1)
  66. caa_record=$($BIN/v-list-dns-records $user $domain | grep -i "CAA" | cut -d' ' -f1)
  67. fi
  68. if [ -z "$mail" ] || [ "$mail" = 'no' ]; then
  69. mail=''
  70. is_system_enabled "$WEB_SYSTEM" 'WEB_SYSTEM'
  71. is_object_valid 'web' 'DOMAIN' "$domain"
  72. is_object_unsuspended 'web' 'DOMAIN' "$domain"
  73. get_domain_values 'web'
  74. # check if alias is the letsencrypt wildcard domain, if not, make the normal checks
  75. if [[ "$aliases" != "*.$domain" ]]; then
  76. for alias in $(echo "$aliases" |tr ',' '\n' |sort -u); do
  77. check_alias="$(echo $ALIAS |tr ',' '\n' |grep ^$alias$)"
  78. if [ -z "$check_alias" ]; then
  79. check_result $E_NOTEXIST "domain alias $alias doesn't exist"
  80. fi
  81. done
  82. fi;
  83. else
  84. is_system_enabled "$MAIL_SYSTEM" 'MAIL_SYSTEM'
  85. is_object_valid 'mail' 'DOMAIN' "$domain"
  86. is_object_unsuspended 'mail' 'DOMAIN' "$domain"
  87. fi
  88. # Dump debug info
  89. debug_log() {
  90. echo -e "\n==[${1}]==\n${2}\n" >> "$log_file"
  91. }
  92. # Perform verification if read-only mode is enabled
  93. check_hestia_demo_mode
  94. #----------------------------------------------------------#
  95. # Action #
  96. #----------------------------------------------------------#
  97. # Generate correct variables for mail domain SSL certificates
  98. if [ ! -z "$mail" ]; then
  99. root_domain=$domain
  100. domain="mail.$root_domain"
  101. webmail=$(get_object_value "mail" "DOMAIN" "$root_domain" '$WEBMAIL');
  102. if [ ! -z "$webmail" ]; then
  103. aliases="$WEBMAIL_ALIAS.$root_domain"
  104. fi
  105. fi
  106. log_file="/var/log/hestia/LE-${user}-${domain}.log"
  107. touch "$log_file"
  108. chmod 600 "$log_file"
  109. echo -e "\n\n=============================
  110. Date Time: $(date +%Y-%m-%d) $(date +%H:%M:%S)
  111. WEB_SYSTEM: ${WEB_SYSTEM}
  112. PROXY_SYSTEM: ${PROXY_SYSTEM}
  113. user: ${user}
  114. domain: ${domain}
  115. " >> "$log_file"
  116. # Registering LetsEncrypt user account
  117. $BIN/v-add-letsencrypt-user $user
  118. if [ "$?" -ne 0 ]; then
  119. touch $HESTIA/data/queue/letsencrypt.pipe
  120. sed -i "/ $domain /d" $HESTIA/data/queue/letsencrypt.pipe
  121. send_notice "LETSENCRYPT" "Account registration failed ($user)"
  122. check_result $E_CONNECT "LE account registration ($user)" > /dev/null
  123. fi
  124. # Parsing LetsEncrypt account data
  125. source $USER_DATA/ssl/le.conf
  126. # Checking wildcard alias
  127. if [ "$aliases" = "*.$domain" ]; then
  128. wildcard='yes'
  129. proto="dns-01"
  130. if [ ! -e "$HESTIA/data/users/$user/dns/$domain.conf" ]; then
  131. check_result $E_NOTEXIST "DNS domain $domain doesn't exist"
  132. fi
  133. else
  134. proto="http-01"
  135. fi
  136. echo -e "
  137. - aliases: ${aliases}
  138. - proto: ${proto}
  139. - wildcard: ${wildcard}
  140. " >> "$log_file"
  141. # Check if dns records exist for requested domain/aliases
  142. if [ "$proto" = "http-01" ]; then
  143. for identifier in $(echo $domain,$aliases |tr ',' '\n' |sort -u); do
  144. if [[ "$identifier" = *[![:ascii:]]* ]]; then
  145. identifier=$(idn -t --quiet -a $identifier)
  146. fi
  147. if ! nslookup "${identifier}" > /dev/null 2>&1 ; then
  148. check_result $E_NOTEXIST "DNS record for $identifier doesn't exist"
  149. fi
  150. done
  151. fi
  152. # Ensure DNS CAA record exists for Let's Encrypt before requesting certificate
  153. if [ ! -z "$DNS_SYSTEM" ]; then
  154. # Check for DNS zone
  155. if [ "$dns_domain" = "$domain" ]; then
  156. # Replace DNS domain CAA records with Let's Encrypt values
  157. if [ -z "$caa_record" ]; then
  158. $BIN/v-add-dns-record $user $domain '@' 'CAA' '0 issue "letsencrypt.org"'
  159. else
  160. $BIN/v-delete-dns-record $user $domain $caa_record
  161. $BIN/v-add-dns-record $user $domain '@' 'CAA' '0 issue "letsencrypt.org"'
  162. fi
  163. fi
  164. fi
  165. # Requesting nonce / STEP 1
  166. answer=$(curl -s -I "$LE_API/directory")
  167. nonce=$(echo "$answer" |grep -i nonce |cut -f2 -d \ |tr -d '\r\n')
  168. status=$(echo "$answer"|grep HTTP/ |tail -n1 |cut -f 2 -d ' ')
  169. debug_log "Step 1" "- status: ${status}\n- nonce: ${nonce}\n- answer: ${answer}"
  170. if [[ "$status" -ne 200 ]]; then
  171. # Delete DNS CAA record
  172. if [ ! -z "$DNS_SYSTEM" ]; then
  173. if [ "$dns_domain" = "$domain" ]; then
  174. if [ ! -z "$caa_record" ]; then
  175. $BIN/v-delete-dns-record $user $domain $caa_record
  176. fi
  177. fi
  178. fi
  179. check_result $E_CONNECT "Let's Encrypt nonce request status $status ($domain)"
  180. fi
  181. # Placing new order / STEP 2
  182. url="$LE_API/acme/new-order"
  183. payload='{"identifiers":['
  184. for identifier in $(echo $domain,$aliases |tr ',' '\n' |sort -u); do
  185. if [[ "$identifier" = *[![:ascii:]]* ]]; then
  186. identifier=$(idn -t --quiet -a $identifier)
  187. fi
  188. payload=$payload'{"type":"dns","value":"'$identifier'"},'
  189. done
  190. payload=$(echo "$payload"|sed "s/,$//")
  191. payload=$payload']}'
  192. answer=$(query_le_v2 "$url" "$payload" "$nonce")
  193. nonce=$(echo "$answer" |grep -i nonce |cut -f2 -d \ |tr -d '\r\n')
  194. authz=$(echo "$answer" |grep "acme/authz" |cut -f2 -d '"')
  195. finalize=$(echo "$answer" |grep 'finalize":' |cut -f4 -d '"')
  196. status=$(echo "$answer" |grep HTTP/ |tail -n1 |cut -f2 -d ' ')
  197. debug_log "Step 2" "- status: ${status}\n- nonce: ${nonce}\n- authz: ${authz}\n- finalize: ${finalize}\n- payload: ${payload}\n- answer: ${answer}"
  198. if [[ "$status" -ne 201 ]]; then
  199. # Delete DNS CAA record
  200. if [ ! -z "$DNS_SYSTEM" ]; then
  201. if [ "$dns_domain" = "$domain" ]; then
  202. if [ ! -z "$caa_record" ]; then
  203. $BIN/v-delete-dns-record $user $domain $caa_record
  204. fi
  205. fi
  206. fi
  207. check_result $E_CONNECT "Let's Encrypt new auth status $status ($domain)"
  208. fi
  209. # Requesting authorization token / STEP 3
  210. for auth in $authz; do
  211. payload=''
  212. answer=$(query_le_v2 "$auth" "$payload" "$nonce")
  213. url=$(echo "$answer" |grep -A3 $proto |grep -m1 url |cut -f 4 -d \")
  214. token=$(echo "$answer" |grep -A3 $proto |grep token |cut -f 4 -d \")
  215. nonce=$(echo "$answer" |grep -i nonce |cut -f2 -d \ |tr -d '\r\n')
  216. status=$(echo "$answer"|grep HTTP/ |tail -n1 |cut -f 2 -d ' ')
  217. debug_log "Step 3" "- status: ${status}\n- nonce: ${nonce}\n- url: ${url}\n- token: ${token}\n- answer: ${answer}"
  218. if [[ "$status" -ne 200 ]]; then
  219. # Delete DNS CAA record
  220. if [ ! -z "$DNS_SYSTEM" ]; then
  221. dns_domain=$($BIN/v-list-dns-domains $user | grep $domain | cut -d' ' -f1)
  222. caa_record=$($BIN/v-list-dns-records $user $domain | grep -i "letsencrypt" | cut -d' ' -f1)
  223. if [ "$dns_domain" = "$domain" ]; then
  224. if [ ! -z "$caa_record" ]; then
  225. $BIN/v-delete-dns-record $user $domain $caa_record
  226. fi
  227. fi
  228. fi
  229. check_result $E_CONNECT "Let's Encrypt acme/authz bad status $status ($domain)"
  230. fi
  231. # Accepting challenge / STEP 4
  232. if [ "$wildcard" = 'yes' ]; then
  233. record=$(printf "%s" "$token.$THUMB" |\
  234. openssl dgst -sha256 -binary |encode_base64)
  235. old_records=$($BIN/v-list-dns-records $user $domain plain|grep 'TXT')
  236. old_records=$(echo "$old_records" |grep _acme-challenge |cut -f 1)
  237. for old_record in $old_records; do
  238. $BIN/v-delete-dns-record $user $domain $old_record
  239. done
  240. $BIN/v-add-dns-record $user $domain "_acme-challenge" "TXT" $record
  241. check_result $? "DNS _acme-challenge record wasn't created ($domain)"
  242. else
  243. if [ -z "$mail" ]; then
  244. if [ "$WEB_SYSTEM" = 'nginx' ] || [ "$PROXY_SYSTEM" = 'nginx' ]; then
  245. conf="$HOMEDIR/$user/conf/web/$domain/nginx.conf_letsencrypt"
  246. sconf="$HOMEDIR/$user/conf/web/$domain/nginx.ssl.conf_letsencrypt"
  247. echo 'location ~ "^/\.well-known/acme-challenge/([-_A-Za-z0-9]+)$" {' \
  248. > $conf
  249. echo ' default_type text/plain;' >> $conf
  250. echo ' return 200 "$1.'$THUMB'";' >> $conf
  251. echo '}' >> $conf
  252. if [ ! -e "$sconf" ]; then
  253. ln -s "$conf" "$sconf"
  254. fi
  255. if [ ! -z "$PROXY_SYSTEM" ]; then
  256. $BIN/v-restart-proxy
  257. check_result $? "Proxy restart failed" > /dev/null
  258. fi
  259. else
  260. # Get root directory from configuration
  261. domain_config="$HOMEDIR/$user/conf/web/$domain"
  262. if [ -f "$domain_config/apache2.conf" ]; then
  263. well_known="$(cat $domain_config/apache2.conf | egrep \
  264. '^\s+DocumentRoot'| awk '{split($0, a, " "); \
  265. print a[2]}')/.well-known"
  266. else
  267. well_known="$(cat $domain_config/nginx.conf | egrep '^\s+root'| \
  268. awk '{split($0, a, " "); print a[2]}' | \
  269. sed 's/;$//')/.well-known"
  270. fi
  271. acme_challenge="$well_known/acme-challenge"
  272. mkdir -p $acme_challenge
  273. echo "$token.$THUMB" > $acme_challenge/$token
  274. chown -R $user:$user $well_known
  275. fi
  276. else
  277. if [ "$WEB_SYSTEM" = 'nginx' ] || [ "$PROXY_SYSTEM" = 'nginx' ]; then
  278. conf="$HOMEDIR/$user/conf/mail/$root_domain/nginx.conf_letsencrypt"
  279. sconf="$HOMEDIR/$user/conf/mail/$root_domain/nginx.ssl.conf_letsencrypt"
  280. echo 'location ~ "^/\.well-known/acme-challenge/([-_A-Za-z0-9]+)$" {' \
  281. > $conf
  282. echo ' default_type text/plain;' >> $conf
  283. echo ' return 200 "$1.'$THUMB'";' >> $conf
  284. echo '}' >> $conf
  285. if [ ! -e "$sconf" ]; then
  286. ln -s "$conf" "$sconf"
  287. fi
  288. if [ ! -z "$PROXY_SYSTEM" ]; then
  289. $BIN/v-restart-proxy
  290. check_result $? "Proxy restart failed" > /dev/null
  291. fi
  292. else
  293. get_object_value 'mail' 'DOMAIN' "$root_domain" "WEBMAIL"
  294. if [ ! -z "$WEBMAIL" ]; then
  295. well_known="/var/lib/$WEBMAIL/.well-known"
  296. acme_challenge="$well_known/acme-challenge"
  297. mkdir -p $acme_challenge
  298. echo "$token.$THUMB" > $acme_challenge/$token
  299. chown -R $user:$user $well_known
  300. fi
  301. fi
  302. fi
  303. if [ "$WEB_SYSTEM" = 'nginx' ]; then
  304. $BIN/v-restart-web
  305. check_result $? "Web restart failed" > /dev/null
  306. fi
  307. fi
  308. # Requesting ACME validation / STEP 5
  309. validation_check=$(echo "$answer" |grep '"valid"')
  310. if [[ ! -z "$validation_check" ]]; then
  311. validation='valid'
  312. else
  313. validation='pending'
  314. sleep 5
  315. fi
  316. # Doing pol check on status
  317. i=1
  318. while [ "$validation" = 'pending' ]; do
  319. payload='{}'
  320. answer=$(query_le_v2 "$url" "$payload" "$nonce")
  321. validation=$(echo "$answer"|grep -A1 $proto |tail -n1|cut -f4 -d \")
  322. nonce=$(echo "$answer" |grep -i nonce |cut -f2 -d \ |tr -d '\r\n')
  323. status=$(echo "$answer"|grep HTTP/ |tail -n1 |cut -f 2 -d ' ')
  324. details=$(echo "$answer"| grep detail | cut -f 1 -d ',' | cut -f 2-4 -d ':' | cut -f 2 -d '"')
  325. debug_log "Step 5" "- status: ${status}\n- nonce: ${nonce}\n- validation: ${validation}\n- details: ${details}\n- answer: ${answer}"
  326. if [[ "$status" -ne 200 ]]; then
  327. # Delete DNS CAA record
  328. if [ ! -z "$DNS_SYSTEM" ]; then
  329. dns_domain=$($BIN/v-list-dns-domains $user | grep $domain | cut -d' ' -f1)
  330. caa_record=$($BIN/v-list-dns-records $user $domain | grep -i "letsencrypt" | cut -d' ' -f1)
  331. if [ "$dns_domain" = "$domain" ]; then
  332. if [ ! -z "$caa_record" ]; then
  333. $BIN/v-delete-dns-record $user $domain $caa_record
  334. fi
  335. fi
  336. fi
  337. debug_log "Abort Step 5" "=> Wrong status"
  338. check_result $E_CONNECT "Let's Encrypt validation status $status ($domain). Details: $details"
  339. fi
  340. i=$((i + 1))
  341. if [ "$i" -gt 10 ]; then
  342. # Delete DNS CAA record
  343. if [ ! -z "$DNS_SYSTEM" ]; then
  344. dns_domain=$($BIN/v-list-dns-domains $user | grep $domain | cut -d' ' -f1)
  345. caa_record=$($BIN/v-list-dns-records $user $domain | grep -i "letsencrypt" | cut -d' ' -f1)
  346. if [ "$dns_domain" = "$domain" ]; then
  347. if [ ! -z "$caa_record" ]; then
  348. $BIN/v-delete-dns-record $user $domain $caa_record
  349. fi
  350. fi
  351. fi
  352. debug_log "Abort Step 5" "=> Too many validation retries"
  353. check_result $E_CONNECT "Let's Encrypt domain validation timeout ($domain)"
  354. fi
  355. sleep $((i*2))
  356. done
  357. if [ "$validation" = 'invalid' ]; then
  358. # Delete DNS CAA record
  359. if [ ! -z "$DNS_SYSTEM" ]; then
  360. dns_domain=$($BIN/v-list-dns-domains $user | grep $domain | cut -d' ' -f1)
  361. caa_record=$($BIN/v-list-dns-records $user $domain | grep -i "letsencrypt" | cut -d' ' -f1)
  362. if [ "$dns_domain" = "$domain" ]; then
  363. if [ ! -z "$caa_record" ]; then
  364. $BIN/v-delete-dns-record $user $domain $caa_record
  365. fi
  366. fi
  367. fi
  368. check_result $E_CONNECT "Let's Encrypt domain verification failed ($domain)"
  369. fi
  370. done
  371. # Generating new ssl certificate
  372. ssl_dir=$($BIN/v-generate-ssl-cert "$domain" "info@$domain" "US" "California"\
  373. "San Francisco" "Hestia" "IT" "$aliases" |tail -n1 |awk '{print $2}')
  374. # Sending CSR to finalize order / STEP 6
  375. csr=$(openssl req -in $ssl_dir/$domain.csr -outform DER |encode_base64)
  376. payload='{"csr":"'$csr'"}'
  377. answer=$(query_le_v2 "$finalize" "$payload" "$nonce")
  378. nonce=$(echo "$answer" |grep -i nonce |cut -f2 -d \ |tr -d '\r\n')
  379. status=$(echo "$answer"|grep HTTP/ |tail -n1 |cut -f 2 -d ' ')
  380. certificate=$(echo "$answer"|grep 'certificate":' |cut -f4 -d '"')
  381. debug_log "Step 6" "- status: ${status}\n- nonce: ${nonce}\n- payload: ${payload}\n- certificate: ${certificate}\n- answer: ${answer}"
  382. if [[ "$status" -ne 200 ]]; then
  383. [ -d "$ssl_dir" ] && rm -rf "$ssl_dir"
  384. check_result $E_CONNECT "Let's Encrypt finalize bad status $status ($domain)"
  385. fi
  386. # Downloading signed certificate / STEP 7
  387. status=0
  388. retry=0
  389. while [[ $status != 200 && $retry -lt 3 ]]; do
  390. answer=$(query_le_v2 "$certificate" "" "$nonce" "$ssl_dir/$domain.pem")
  391. status=$(echo "$answer"|grep HTTP/ |tail -n1 |cut -f 2 -d ' ')
  392. debug_log "Step 7" "- status: ${status}\n- retry: ${retry}\n- answer: ${answer}"
  393. if [[ $status != 200 ]]; then
  394. retry=$((retry + 1))
  395. sleep $((retry * 2)) # Sleep for 2s, 4s, 6s, 8s
  396. fi
  397. done
  398. # Fallback on depreciated download method for certs (unauthenticated GET)
  399. if [[ $status != 200 ]]; then
  400. answer=$(curl --insecure --retry 5 --retry-connrefused --silent --dump-header /dev/stdout "$certificate" --output "$ssl_dir/$domain.pem")
  401. status=$(echo "$answer"|grep HTTP/ |tail -n1 |cut -f 2 -d ' ')
  402. debug_log "Step 7 - Fallback" "- status: ${status}\n- answer: ${answer}"
  403. fi
  404. debug_log "CERT DIR" "$(ls -las "$ssl_dir/")"
  405. debug_log "CERT PEM" "$(cat "$ssl_dir/$domain.pem")"
  406. if [[ "$status" -ne 200 ]]; then
  407. [ -d "$ssl_dir" ] && rm -rf "$ssl_dir"
  408. check_result $E_NOTEXIST "Let's Encrypt downloading signed cert failed status:$status ($domain)"
  409. fi
  410. # Splitting up downloaded pem
  411. crt_end=$(grep -n 'END CERTIFICATE' $ssl_dir/$domain.pem |head -n1 |cut -f1 -d:)
  412. head -n $crt_end $ssl_dir/$domain.pem > $ssl_dir/$domain.crt
  413. pem_lines=$(wc -l $ssl_dir/$domain.pem |cut -f 1 -d ' ')
  414. ca_end=$(grep -n 'BEGIN CERTIFICATE' $ssl_dir/$domain.pem |tail -n1 |cut -f 1 -d :)
  415. ca_end=$(( pem_lines - crt_end + 1 ))
  416. tail -n $ca_end $ssl_dir/$domain.pem > $ssl_dir/$domain.ca
  417. debug_log "CERT CRT" "$(cat "$ssl_dir/$domain.crt")"
  418. debug_log "CERT CA-1" "$(cat "$ssl_dir/$domain.ca")"
  419. # Temporary fix for double "END CERTIFICATE"
  420. if [[ $(head -n 1 $ssl_dir/$domain.ca) = "-----END CERTIFICATE-----" ]]; then
  421. sed -i '1,2d' $ssl_dir/$domain.ca
  422. fi
  423. debug_log "CERT CA-2" "$(cat "$ssl_dir/$domain.ca")"
  424. # Rename certs for mail
  425. if [ ! -z "$mail" ]; then
  426. mv $ssl_dir/$domain.ca $ssl_dir/$root_domain.ca
  427. mv $ssl_dir/$domain.crt $ssl_dir/$root_domain.crt
  428. mv $ssl_dir/$domain.csr $ssl_dir/$root_domain.csr
  429. mv $ssl_dir/$domain.key $ssl_dir/$root_domain.key
  430. mv $ssl_dir/$domain.pem $ssl_dir/$root_domain.pem
  431. fi
  432. # Adding SSL
  433. if [ -z "$mail" ]; then
  434. ssl_home=$(search_objects 'web' 'LETSENCRYPT' 'yes' 'SSL_HOME')
  435. ssl_enabled="$(get_object_value 'web' 'DOMAIN' "$domain" '$SSL')"
  436. ssl_force="$(get_object_value 'web' 'DOMAIN' "$domain" '$SSL_FORCE')"
  437. [[ "$ssl_enabled" = "yes" ]] && $BIN/v-delete-web-domain-ssl $user $domain > /dev/null 2>&1
  438. $BIN/v-add-web-domain-ssl $user $domain $ssl_dir $ssl_home
  439. [[ "$ssl_force" = "yes" ]] && $BIN/v-add-web-domain-ssl-force $user $domain > /dev/null 2>&1
  440. else
  441. ssl_enabled="$(get_object_value 'mail' 'DOMAIN' "$root_domain" '$SSL')"
  442. [[ "$ssl_enabled" = "yes" ]] && $BIN/v-delete-mail-domain-ssl $user $root_domain > /dev/null 2>&1
  443. $BIN/v-add-mail-domain-ssl $user $root_domain $ssl_dir
  444. fi
  445. if [ "$?" -ne '0' ]; then
  446. [ -d "$ssl_dir" ] && rm -rf "$ssl_dir"
  447. touch $HESTIA/data/queue/letsencrypt.pipe
  448. sed -i "/ $domain /d" $HESTIA/data/queue/letsencrypt.pipe
  449. send_notice 'LETSENCRYPT' "$domain certificate installation failed ($domain)"
  450. check_result $? "SSL install" > /dev/null
  451. fi
  452. # Adding LE autorenew cronjob
  453. if [ -z "$(grep v-update-lets $HESTIA/data/users/admin/cron.conf)" ]; then
  454. min=$(generate_password '012345' '2')
  455. hour=$(generate_password '1234567' '1')
  456. cmd="sudo $BIN/v-update-letsencrypt-ssl"
  457. $BIN/v-add-cron-job admin "$min" "$hour" '*' '*' '*' "$cmd" > /dev/null
  458. fi
  459. # Updating letsencrypt key
  460. if [ -z "$mail" ]; then
  461. if [ -z "$LETSENCRYPT" ]; then
  462. add_object_key "web" 'DOMAIN' "$domain" 'LETSENCRYPT' 'FTP_USER'
  463. add_object_key "web" 'DOMAIN' "$domain" 'LETSENCRYPT_FAIL_COUNT' 'LETSENCRYPT'
  464. fi
  465. update_object_value 'web' 'DOMAIN' "$domain" '$LETSENCRYPT' 'yes'
  466. update_object_value 'web' 'DOMAIN' "$domain" '$LETSENCRYPT_FAIL_COUNT' "0"
  467. else
  468. if [ -z "$LETSENCRYPT" ]; then
  469. add_object_key "mail" 'DOMAIN' "$root_domain" 'LETSENCRYPT'
  470. add_object_key "mail" 'DOMAIN' "$root_domain" 'LETSENCRYPT_FAIL_COUNT' 'LETSENCRYPT'
  471. fi
  472. update_object_value 'mail' 'DOMAIN' "$root_domain" '$LETSENCRYPT' 'yes'
  473. update_object_value 'mail' 'DOMAIN' "$root_domain" '$LETSENCRYPT_FAIL_COUNT' "0"
  474. fi
  475. # Remove challenge folder if exist
  476. if [ ! -z "$well_known" ]; then
  477. rm -fr $well_known
  478. fi
  479. # Remove temporary SSL folder
  480. [ -d "$ssl_dir" ] && rm -rf "$ssl_dir"
  481. #----------------------------------------------------------#
  482. # Hestia #
  483. #----------------------------------------------------------#
  484. # Deleting task from queue
  485. touch $HESTIA/data/queue/letsencrypt.pipe
  486. sed -i "/ $domain /d" $HESTIA/data/queue/letsencrypt.pipe
  487. # Notifying user
  488. send_notice 'LETSENCRYPT' "$domain SSL has been installed successfully"
  489. # Logging
  490. log_event "$OK" "$ARGUMENTS"
  491. # Cleanup debug since the SSL was issues succesfully
  492. rm -f "$log_file"
  493. exit