Automatically generate a Let's Encrypt cert for all 5apps xmpp domains
Uses the Gandi LiveDNS API
This commit is contained in:
parent
214e69427e
commit
185649a5f9
9
data_bags/credentials/gandi_api_5apps.json
Normal file
9
data_bags/credentials/gandi_api_5apps.json
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
{
|
||||||
|
"id": "gandi_api_5apps",
|
||||||
|
"key": {
|
||||||
|
"encrypted_data": "+tcD9x5MkNpf2Za5iLM7oTGrmAXxuWFEbyg4xrcWypSkSTjdIncOfD1UoIoS\nGzy1\n",
|
||||||
|
"iv": "ymls2idI/PdiRZCgsulwrA==\n",
|
||||||
|
"version": 1,
|
||||||
|
"cipher": "aes-256-cbc"
|
||||||
|
}
|
||||||
|
}
|
@ -1,49 +1,22 @@
|
|||||||
# nginx config to generate a Let's Encrypt cert
|
# Generate a Let's Encrypt cert for 5apps.com, muc.5apps.com and xmpp.5apps.com
|
||||||
|
|
||||||
include_recipe "kosmos-base::letsencrypt"
|
include_recipe "kosmos-base::letsencrypt"
|
||||||
|
|
||||||
root_directory = "/var/www/xmpp.5apps.com"
|
gandi_api_data_bag_item = data_bag_item('credentials', 'gandi_api_5apps')
|
||||||
|
|
||||||
directory "#{root_directory}/.well-known" do
|
template "/root/letsencrypt_hook.sh" do
|
||||||
owner node["nginx"]["user"]
|
variables gandi_api_key: gandi_api_data_bag_item["key"]
|
||||||
group node["nginx"]["group"]
|
mode 0770
|
||||||
action :create
|
|
||||||
recursive true
|
|
||||||
end
|
end
|
||||||
|
|
||||||
template "#{node['nginx']['dir']}/sites-available/xmpp.5apps.com" do
|
# Generate a Let's Encrypt cert (only if no cert has been generated before).
|
||||||
source 'nginx_conf_xmpp.5apps.com.erb'
|
# The renew cron will take care of renewing
|
||||||
owner 'www-data'
|
execute "letsencrypt cert for 5apps xmpp" do
|
||||||
mode 0640
|
command "./certbot-auto certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos --manual-auth-hook \"/root/letsencrypt_hook.sh auth\" --manual-cleanup-hook \"/root/letsencrypt_hook.sh cleanup\" --deploy-hook letsencrypt_renew_hook --email ops@5apps.com -d 5apps.com -d muc.5apps.com -d xmpp.5apps.com -n"
|
||||||
variables server_name: 'xmpp.5apps.com',
|
environment
|
||||||
root_directory: root_directory,
|
|
||||||
ssl_cert: "/etc/letsencrypt/live/xmpp.5apps.com/fullchain.pem",
|
|
||||||
ssl_key: "/etc/letsencrypt/live/xmpp.5apps.com/privkey.pem"
|
|
||||||
notifies :reload, 'service[nginx]', :delayed
|
|
||||||
end
|
|
||||||
|
|
||||||
# Generate a Let's Encrypt cert (only if the nginx vhost exists and no cert
|
|
||||||
# has been generated before. The renew cron will take care of renewing
|
|
||||||
execute "letsencrypt cert for xmpp.5apps.com" do
|
|
||||||
command "./certbot-auto certonly --webroot --agree-tos --email ops@5apps.com --webroot-path #{root_directory} -d xmpp.5apps.com -n"
|
|
||||||
cwd "/usr/local/certbot"
|
cwd "/usr/local/certbot"
|
||||||
only_if do
|
not_if do
|
||||||
File.exist?("#{node['nginx']['dir']}/sites-enabled/xmpp.5apps.com") &&
|
File.exist?("/etc/prosody/certs/5apps.com.crt")
|
||||||
!File.exist?("/etc/letsencrypt/live/xmpp.5apps.com/fullchain.pem")
|
|
||||||
end
|
end
|
||||||
notifies :create, "template[#{node['nginx']['dir']}/sites-available/xmpp.5apps.com]", :delayed
|
|
||||||
notifies :run, "execute[copy the tls cert to prosody folder]", :delayed
|
|
||||||
end
|
end
|
||||||
|
|
||||||
execute "copy the tls cert to prosody folder" do
|
|
||||||
action :nothing
|
|
||||||
command <<-EOF
|
|
||||||
cp /etc/letsencrypt/live/xmpp.5apps.com/fullchain.pem /var/lib/prosody/xmpp.5apps.com.crt
|
|
||||||
cp /etc/letsencrypt/live/xmpp.5apps.com/privkey.pem /var/lib/prosody/xmpp.5apps.com.key
|
|
||||||
EOF
|
|
||||||
notifies :restart, "service[prosody]", :delayed
|
|
||||||
end
|
|
||||||
|
|
||||||
nginx_site 'xmpp.5apps.com' do
|
|
||||||
enable true
|
|
||||||
end
|
|
||||||
|
63
site-cookbooks/5apps-xmpp_server/templates/default/letsencrypt_hook.sh.erb
Executable file
63
site-cookbooks/5apps-xmpp_server/templates/default/letsencrypt_hook.sh.erb
Executable file
@ -0,0 +1,63 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
#
|
||||||
|
|
||||||
|
set -euf -o pipefail
|
||||||
|
|
||||||
|
# ************** USAGE **************
|
||||||
|
#
|
||||||
|
# Example usage (with this hook file saved in /root/):
|
||||||
|
#
|
||||||
|
# sudo su -
|
||||||
|
# certbot certonly --manual --preferred-challenges dns --manual-public-ip-logging-ok --agree-tos -d "5apps.com" -d muc.5apps.com -d "xmpp.5apps.com" \
|
||||||
|
# --manual-auth-hook "/root/letsencrypt_hook.sh auth" --manual-cleanup-hook "/root/letsencrypt_hook.sh cleanup"
|
||||||
|
#
|
||||||
|
# This hook requires configuration, continue reading.
|
||||||
|
#
|
||||||
|
# ************** CONFIGURATION **************
|
||||||
|
#
|
||||||
|
# GANDI_API_KEY: Your Gandi Live API key
|
||||||
|
#
|
||||||
|
# PROVIDER_UPDATE_DELAY:
|
||||||
|
# How many seconds to wait after updating your DNS records. This may be required,
|
||||||
|
# depending on how slow your DNS host is to begin serving new DNS records after updating
|
||||||
|
# them via the API. 30 seconds is a safe default, but some providers can be very slow
|
||||||
|
# (e.g. Linode).
|
||||||
|
#
|
||||||
|
# Defaults to 30 seconds.
|
||||||
|
#
|
||||||
|
GANDI_API_KEY="<%= @gandi_api_key %>"
|
||||||
|
PROVIDER_UPDATE_DELAY=30
|
||||||
|
|
||||||
|
regex='.*\.(.*\..*)'
|
||||||
|
if [[ $CERTBOT_DOMAIN =~ $regex ]]
|
||||||
|
then
|
||||||
|
DOMAIN="${BASH_REMATCH[1]}"
|
||||||
|
else
|
||||||
|
DOMAIN="${CERTBOT_DOMAIN}"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# To be invoked via Certbot's --manual-auth-hook
|
||||||
|
function auth {
|
||||||
|
curl -s -D- -H "Content-Type: application/json" \
|
||||||
|
-H "X-Api-Key: ${GANDI_API_KEY}" \
|
||||||
|
-d "{\"rrset_name\": \"_acme-challenge.${CERTBOT_DOMAIN}.\",
|
||||||
|
\"rrset_type\": \"TXT\",
|
||||||
|
\"rrset_ttl\": 3600,
|
||||||
|
\"rrset_values\": [\"${CERTBOT_VALIDATION}\"]}" \
|
||||||
|
"https://dns.api.gandi.net/api/v5/domains/${DOMAIN}/records"
|
||||||
|
|
||||||
|
|
||||||
|
sleep ${PROVIDER_UPDATE_DELAY}
|
||||||
|
}
|
||||||
|
|
||||||
|
# To be invoked via Certbot's --manual-cleanup-hook
|
||||||
|
function cleanup {
|
||||||
|
curl -s -X DELETE -H "Content-Type: application/json" \
|
||||||
|
-H "X-Api-Key: ${GANDI_API_KEY}" \
|
||||||
|
https://dns.api.gandi.net/api/v5/domains/${DOMAIN}/records/_acme-challenge.${CERTBOT_DOMAIN}./TXT
|
||||||
|
}
|
||||||
|
|
||||||
|
HANDLER=$1; shift;
|
||||||
|
if [ -n "$(type -t $HANDLER)" ] && [ "$(type -t $HANDLER)" = function ]; then
|
||||||
|
$HANDLER "$@"
|
||||||
|
fi
|
@ -1,23 +0,0 @@
|
|||||||
server {
|
|
||||||
listen 80; # For Let's Encrypt
|
|
||||||
<% if File.exist?(@ssl_cert) && File.exist?(@ssl_key) -%>
|
|
||||||
listen 443 ssl http2;
|
|
||||||
<% end -%>
|
|
||||||
|
|
||||||
server_name <%= @server_name %>;
|
|
||||||
|
|
||||||
# Used by Let's Encrypt (certbot in webroot mode)
|
|
||||||
location /.well-known {
|
|
||||||
root "<%= @root_directory %>";
|
|
||||||
}
|
|
||||||
|
|
||||||
location / {
|
|
||||||
return 200 'Nothing to see here';
|
|
||||||
add_header Content-Type text/plain;
|
|
||||||
}
|
|
||||||
|
|
||||||
<% if File.exist?(@ssl_cert) && File.exist?(@ssl_key) -%>
|
|
||||||
ssl_certificate <%= @ssl_cert %>;
|
|
||||||
ssl_certificate_key <%= @ssl_key %>;
|
|
||||||
<% end -%>
|
|
||||||
}
|
|
@ -2,7 +2,7 @@
|
|||||||
# Cookbook Name:: kosmos-base
|
# Cookbook Name:: kosmos-base
|
||||||
# Recipe:: letsencrypt
|
# Recipe:: letsencrypt
|
||||||
#
|
#
|
||||||
# Copyright 2016, Kosmos
|
# Copyright 2018, Kosmos
|
||||||
#
|
#
|
||||||
# All rights reserved - Do Not Redistribute
|
# All rights reserved - Do Not Redistribute
|
||||||
#
|
#
|
||||||
@ -10,7 +10,7 @@
|
|||||||
git "/usr/local/certbot" do
|
git "/usr/local/certbot" do
|
||||||
repository "https://github.com/certbot/certbot"
|
repository "https://github.com/certbot/certbot"
|
||||||
action :sync
|
action :sync
|
||||||
revision "v0.25.0"
|
revision "v0.26.1"
|
||||||
user "root"
|
user "root"
|
||||||
group "root"
|
group "root"
|
||||||
end
|
end
|
||||||
@ -21,13 +21,20 @@ letsencrypt_renew_hook = <<-EOF
|
|||||||
# Reloading nginx is enough to read the new certificates
|
# Reloading nginx is enough to read the new certificates
|
||||||
systemctl reload nginx
|
systemctl reload nginx
|
||||||
|
|
||||||
# Copy the prosody certificate and restart the server if it has been renewed
|
# Copy the prosody certificates and restart the server if it has been renewed
|
||||||
# This is necessary because the prosody user doesn't have access to the
|
# This is necessary because the prosody user doesn't have access to the
|
||||||
# letsencrypt live folder
|
# letsencrypt live folder
|
||||||
echo "${RENEWED_DOMAINS}" | grep xmpp.5apps.com
|
echo "${RENEWED_DOMAINS}" | grep 5apps.com
|
||||||
if [ $? -ne 1 ]; then
|
if [ $? -ne 1 ]; then
|
||||||
cp /etc/letsencrypt/live/xmpp.5apps.com/fullchain.pem /var/lib/prosody/xmpp.5apps.com.crt
|
cp "${RENEWED_LINEAGE}/fullchain.pem" /etc/prosody/certs/5apps.com.crt
|
||||||
cp /etc/letsencrypt/live/xmpp.5apps.com/privkey.pem /var/lib/prosody/xmpp.5apps.com.key
|
cp "${RENEWED_LINEAGE}/privkey.pem" /etc/prosody/certs/5apps.com.key
|
||||||
|
cp "${RENEWED_LINEAGE}/fullchain.pem" /etc/prosody/certs/muc.5apps.com.crt
|
||||||
|
cp "${RENEWED_LINEAGE}/privkey.pem" /etc/prosody/certs/muc.5apps.com.key
|
||||||
|
cp "${RENEWED_LINEAGE}/fullchain.pem" /etc/prosody/certs/xmpp.5apps.com.crt
|
||||||
|
cp "${RENEWED_LINEAGE}/privkey.pem" /etc/prosody/certs/xmpp.5apps.com.key
|
||||||
|
chown prosody:prosody /etc/prosody/certs/*
|
||||||
|
chmod 600 /etc/prosody/certs/*.key
|
||||||
|
chmod 640 /etc/prosody/certs/*.crt
|
||||||
systemctl restart prosody
|
systemctl restart prosody
|
||||||
else
|
else
|
||||||
exit 0
|
exit 0
|
||||||
@ -45,6 +52,6 @@ cron "renew Let's Encrypt certificates" do
|
|||||||
minute "0"
|
minute "0"
|
||||||
hour "4"
|
hour "4"
|
||||||
mailto "logs@5apps.com"
|
mailto "logs@5apps.com"
|
||||||
# The post hook is only executed if a cert has been renewed
|
# The hook is only executed if a cert has been renewed
|
||||||
command "/usr/local/certbot/certbot-auto renew --renew-hook letsencrypt_renew_hook -n 1> /dev/null"
|
command "/usr/local/certbot/certbot-auto renew --deploy-hook letsencrypt_renew_hook -n 1> /dev/null"
|
||||||
end
|
end
|
||||||
|
Loading…
x
Reference in New Issue
Block a user