Compare commits
52 Commits
1.2.0
...
feb2727610
Author | SHA1 | Date | |
---|---|---|---|
feb2727610
|
|||
df3fc81a9d | |||
2a41f240a3 | |||
1b8831b888 | |||
295c554933 | |||
d02cf72bbc | |||
5d3eed683d | |||
0157a462ed | |||
63f586768f | |||
5863d5b808 | |||
c42462b4e1 | |||
3db15537e8 | |||
9465157295 | |||
8d36f0c117 | |||
b574ae146e | |||
0eeb08f4d8 | |||
639120e46d | |||
75488a4009 | |||
b962b65145 | |||
0614aa0565 | |||
83f8c39e48 | |||
961f218621 | |||
6134b05328 | |||
ada326f2d8 | |||
5d14d166eb | |||
3a6466612b | |||
36b71a0ebb | |||
e0da513893 | |||
df56fcf997 | |||
3c3cc47d32 | |||
053cef4c31 | |||
b6d93c1164 | |||
a41c409f9d | |||
e859aa7218 | |||
a4b59c360e | |||
e7bd87d5bd | |||
6ef0abfd6b | |||
868eb4eb59 | |||
578284bb10 | |||
e10bdd741d | |||
0aa35c3ef6 | |||
90f5095eef | |||
3daee369ca | |||
6a27c9232c | |||
e130fc041e | |||
591e35c91a | |||
375cf5da74 | |||
09eb18adda | |||
d09988c241 | |||
6d696dd4b2 | |||
c23657ce01 | |||
634f0cac4a |
88
.gitea/workflows/build-develop.yaml
Normal file
88
.gitea/workflows/build-develop.yaml
Normal file
@ -0,0 +1,88 @@
|
||||
name: Build Image
|
||||
on:
|
||||
push:
|
||||
branches:
|
||||
- 'develop'
|
||||
|
||||
env:
|
||||
TEST_TAG: mrmeeb/certbot-cron:test
|
||||
FULL_TAG: git.mrmeeb.stream/mrmeeb/certbot-cron:develop
|
||||
|
||||
jobs:
|
||||
"Validate Image":
|
||||
runs-on: [ubuntu-docker-latest, linux/amd64]
|
||||
steps:
|
||||
- name: Build locally
|
||||
uses: docker/build-push-action@v5
|
||||
with:
|
||||
load: true
|
||||
tags: ${{ env.TEST_TAG }}
|
||||
provenance: false
|
||||
- name: Test certificate issuing
|
||||
id: test
|
||||
run: |
|
||||
# First create a volume
|
||||
docker volume create ${{ gitea.sha }} && \
|
||||
# Then issue a certificate
|
||||
docker run --rm -v ${{ gitea.sha }}:/config -e STAGING=true -e EMAIL=${{ secrets.EMAIL }} -e DOMAINS=${{ gitea.sha }}.mrmeeb.stream -e PLUGIN=cloudflare -e CLOUDFLARE_TOKEN=${{ secrets.CLOUDFLARE_TOKEN }} -e ONE_SHOT=true -e GENERATE_DHPARAM=false ${{ env.TEST_TAG }} && \
|
||||
# Then revoke it again
|
||||
docker run --rm --entrypoint "/usr/bin/certbot" -v ${{ gitea.sha }}:/config ${{ env.TEST_TAG }} revoke --non-interactive --agree-tos --email ${{ secrets.EMAIL }} --staging --config-dir /config/letsencrypt --work-dir /config/.tmp --logs-dir /config/logs --cert-path /config/letsencrypt/live/${{ gitea.sha }}.mrmeeb.stream/fullchain.pem
|
||||
- name: Tidy up
|
||||
if: always()
|
||||
run: |
|
||||
echo "Removing docker volume ${{ gitea.sha }}" && \
|
||||
docker volume rm ${{ gitea.sha }}
|
||||
- name: Test Failure
|
||||
uses: rjstone/discord-webhook-notify@v1
|
||||
if: failure()
|
||||
with:
|
||||
severity: error
|
||||
details: Test Failed!
|
||||
webhookUrl: ${{ secrets.DISCORD_WEBHOOK }}
|
||||
username: Gitea
|
||||
avatarUrl: ${{ vars.RUNNER_ICON_URL }}
|
||||
|
||||
"Publish Image":
|
||||
runs-on: [ubuntu-docker-latest, linux/amd64]
|
||||
needs: ["Validate Image"]
|
||||
steps:
|
||||
- name: Set up QEMU
|
||||
uses: docker/setup-qemu-action@v3
|
||||
- name: Set up Docker Buildx
|
||||
uses: docker/setup-buildx-action@v3
|
||||
- name: Login to Gitea Container Registry
|
||||
uses: docker/login-action@v3
|
||||
with:
|
||||
registry: git.mrmeeb.stream
|
||||
username: ${{ env.GITHUB_ACTOR }}
|
||||
password: ${{ secrets.GTCR_TOKEN }}
|
||||
- name: Build and push
|
||||
uses: docker/build-push-action@v5
|
||||
with:
|
||||
push: true
|
||||
platforms: linux/amd64,linux/arm64
|
||||
tags: ${{ env.FULL_TAG }}
|
||||
provenance: false
|
||||
- name: Build Failure
|
||||
uses: rjstone/discord-webhook-notify@v1
|
||||
if: failure()
|
||||
with:
|
||||
severity: error
|
||||
details: Build Failed!
|
||||
webhookUrl: ${{ secrets.DISCORD_WEBHOOK }}
|
||||
username: Gitea
|
||||
avatarUrl: ${{ vars.RUNNER_ICON_URL }}
|
||||
|
||||
"Notify":
|
||||
runs-on: [ubuntu-docker-latest, linux/amd64]
|
||||
needs: ["Validate Image", "Publish Image"]
|
||||
steps:
|
||||
- name: Notify of success
|
||||
uses: rjstone/discord-webhook-notify@v1
|
||||
if: success()
|
||||
with:
|
||||
severity: info
|
||||
details: Build succeeded!
|
||||
webhookUrl: ${{ secrets.DISCORD_WEBHOOK }}
|
||||
username: Gitea
|
||||
avatarUrl: ${{ vars.RUNNER_ICON_URL }}
|
@ -2,7 +2,7 @@ name: Build Image
|
||||
on:
|
||||
push:
|
||||
branches:
|
||||
- 'master'
|
||||
- 'main'
|
||||
|
||||
env:
|
||||
TEST_TAG: mrmeeb/certbot-cron:test
|
||||
|
@ -2,7 +2,7 @@ name: Test Pull Request
|
||||
on:
|
||||
pull_request:
|
||||
branches:
|
||||
- 'master'
|
||||
- 'main'
|
||||
- 'develop'
|
||||
|
||||
env:
|
||||
|
15
Dockerfile
15
Dockerfile
@ -18,9 +18,6 @@ ENV TZ=UTC
|
||||
ENV GENERATE_DHPARAM=true
|
||||
ENV INTERVAL="0 */6 * * *"
|
||||
ENV ONE_SHOT=false
|
||||
ENV APPRISE_URL=
|
||||
ENV NOTIFY_ON_FAILURE=false
|
||||
ENV NOTIFY_ON_SUCCESS=false
|
||||
|
||||
# Single domain
|
||||
ENV DOMAINS=
|
||||
@ -40,7 +37,7 @@ ENV CLOUDFLARE_TOKEN=
|
||||
ENV CERT_COUNT=1
|
||||
|
||||
#Get required packages
|
||||
RUN apk update && apk add curl bash python3 py3-virtualenv procps tzdata nano shadow xz busybox-suid openssl logrotate
|
||||
RUN apk update && apk add curl bash python3 py3-virtualenv procps tzdata nano shadow xz busybox-suid openssl
|
||||
|
||||
#Make folders
|
||||
RUN mkdir /config && \
|
||||
@ -62,16 +59,18 @@ RUN python3 -m venv /app/certbot/ && /app/certbot/bin/pip install --upgrade pip
|
||||
#Added additional pip steps to fix cython 3.0.0 issue - https://github.com/yaml/pyyaml/issues/601
|
||||
COPY requirements.txt /app/certbot/requirements.txt
|
||||
RUN apk add --no-cache --virtual .deps gcc python3-dev libc-dev libffi-dev && \
|
||||
/app/certbot/bin/pip install wheel setuptools && \
|
||||
/app/certbot/bin/pip install wheel && \
|
||||
/app/certbot/bin/pip install "Cython<3.0" pyyaml --no-build-isolation && \
|
||||
/app/certbot/bin/pip install -r /app/certbot/requirements.txt && \
|
||||
ln -s /app/certbot/bin/certbot /usr/bin/certbot && \
|
||||
ln -s /app/certbot/bin/apprise /usr/bin/apprise && \
|
||||
ln -s /app/certbot/bin/certbot /usr/bin/certbot &&\
|
||||
apk del .deps
|
||||
|
||||
COPY root /
|
||||
|
||||
RUN chmod +x /container-init.sh /certbot-prepare.sh /check-one-shot.sh /renew-function.sh && \
|
||||
RUN chmod +x /container-init.sh && \
|
||||
chmod +x /certbot-prepare.sh && \
|
||||
chmod +x /certbot-renew.sh && \
|
||||
chmod +x /check-one-shot.sh && \
|
||||
chown -R ${PUID}:${PGID} /app /config
|
||||
|
||||
ENTRYPOINT [ "/init" ]
|
||||
|
10
README.md
10
README.md
@ -4,9 +4,10 @@ Dockerised Certbot that utilises cron to schedule creating and renewing SSL cert
|
||||
|
||||
## Tags
|
||||
|
||||
I use the [Feature Branch](https://www.atlassian.com/git/tutorials/comparing-workflows/feature-branch-workflow) workflow. The `latest` tag contains all of the latest changes that have been merged from individual feature branches. Feature branches are squashed into `master`.
|
||||
|
||||
Pinned releases are created by creating a tag off `master` to capture the repo in a particular state. They are recommended for stability.
|
||||
|Tag |Description|
|
||||
|-------|-----------|
|
||||
|latest |Latest image built from the main branch. Usually coincides with a tagged release.|
|
||||
|develop|Latest image built from the develop branch. Commits are made to the develop branch before being merged to main. Old versions of `develop` are removed after 14 days.|
|
||||
|
||||
## Running
|
||||
|
||||
@ -53,9 +54,6 @@ Core options to the container
|
||||
| GENERATE_DHPARAM | true (case-sensitive) | Generate Diffie-Hellman keys in /config/letsencrypt/keys |
|
||||
| INTERVAL | 0 */6 * * * | How often certbot attempts to renew the certificate. Cron syntax |
|
||||
| CERT_COUNT | 1 | How many certificates certbot will try to issue. [Details here](https://git.mrmeeb.stream/MrMeeb/certbot-cron-docker#multiple-certificates) |
|
||||
| APPRISE_URL | None | URL for Apprise notifications. [Syntax](https://github.com/caronc/apprise?tab=readme-ov-file#supported-notifications)
|
||||
| NOTIFY_ON_SUCCESS | false | Notify on a successful renewal attempt. Note that this isn't just when the cert is renewed, but on every renewal attempt. |
|
||||
| NOTIFY_ON_FAILURE | false | Notify on a failed renewal attempt.
|
||||
|
||||
### Certificate Options
|
||||
|
||||
|
@ -1,5 +1,4 @@
|
||||
# For pinning Python packages to then be parsed by Renovate
|
||||
# For pinning Certbot packages to then be parsed by Renovate
|
||||
|
||||
certbot ==2.10.0
|
||||
certbot-dns-cloudflare ==2.10.0
|
||||
apprise ==1.8.0
|
||||
certbot ==2.9.0
|
||||
certbot-dns-cloudflare ==2.9.0
|
@ -46,22 +46,9 @@ function better_exit {
|
||||
|
||||
}
|
||||
|
||||
# Check APPRISE_URL is set if either NOTIFY_ON_SUCCESS or NOTIFY_ON_FAILURE are set
|
||||
if [ "${NOTIFY_ON_SUCCESS}" = "true" ] || [ "${NOTIFY_ON_FAILURE}" = "true" ] && [ -z "${APPRISE_URL}" ]; then
|
||||
|
||||
echo "You have notifications enabled but have not set APPRISE_URL. Please set APPRISE_URL and restart the container."
|
||||
better_exit
|
||||
|
||||
fi
|
||||
|
||||
# Cleanup renew list and create it fresh, ready for commands to be run and added
|
||||
echo "#!/command/with-contenv bash
|
||||
|
||||
date
|
||||
echo \"Attempting to renew certificates\"
|
||||
source /renew-function.sh
|
||||
" > /config/.renew-list.sh
|
||||
chmod +x /config/.renew-list.sh
|
||||
echo "#!/command/with-contenv bash" > /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
|
||||
# Create original config file to track changes to environmental variables
|
||||
if [ ! -f /config/.donoteditthisfile ]
|
||||
@ -319,14 +306,14 @@ function single_domain {
|
||||
echo "Using staging endpoint - THIS SHOULD BE USED FOR TESTING ONLY"
|
||||
${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds $PROPOGATION_TIME --dns-cloudflare-credentials /config/.secrets/cloudflare.ini --staging
|
||||
# Add to renewal list
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds $PROPOGATION_TIME --dns-cloudflare-credentials /config/.secrets/cloudflare.ini --staging\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds $PROPOGATION_TIME --dns-cloudflare-credentials /config/.secrets/cloudflare.ini --staging" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
elif [ $STAGING = false ]
|
||||
then
|
||||
echo "Using production endpoint"
|
||||
${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds $PROPOGATION_TIME --dns-cloudflare-credentials /config/.secrets/cloudflare.ini
|
||||
# Add to renewal list
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds $PROPOGATION_TIME --dns-cloudflare-credentials /config/.secrets/cloudflare.ini\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds $PROPOGATION_TIME --dns-cloudflare-credentials /config/.secrets/cloudflare.ini" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
else
|
||||
echo "Unrecognised option for STAGING variable - check your configuration"
|
||||
@ -345,14 +332,14 @@ function single_domain {
|
||||
echo "Using staging endpoint - THIS SHOULD BE USED FOR TESTING ONLY"
|
||||
REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --standalone --staging
|
||||
# Add to renewal list
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --standalone --staging\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --standalone --staging" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
elif [ $STAGING = false ]
|
||||
then
|
||||
echo "Using production endpoint"
|
||||
REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --standalone
|
||||
# Add to renewal list
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --standalone\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --standalone" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
else
|
||||
echo "Unrecognised option for STAGING variable - check your configuration"
|
||||
@ -371,14 +358,14 @@ function single_domain {
|
||||
echo "Using staging endpoint - THIS SHOULD BE USED FOR TESTING ONLY"
|
||||
REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot --staging
|
||||
# Add to renewal list
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot --staging\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot --staging" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
elif [ $STAGING = false ]
|
||||
then
|
||||
echo "Using production endpoint"
|
||||
REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot
|
||||
# Add to renewal list
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
else
|
||||
echo "Unrecognised option for STAGING variable - check your configuration"
|
||||
@ -644,7 +631,7 @@ echo \
|
||||
${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds ${PROPOGATION_TIME_MULTI} --dns-cloudflare-credentials /config/.secrets/cloudflare.ini --staging
|
||||
# Add to renewal list
|
||||
echo "## Certificate ${x}" >> /config/.renew-list.sh
|
||||
echo "renew \"${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds ${PROPOGATION_TIME_MULTI} --dns-cloudflare-credentials /config/.secrets/cloudflare.ini --staging\"" >> /config/.renew-list.sh
|
||||
echo "${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds ${PROPOGATION_TIME_MULTI} --dns-cloudflare-credentials /config/.secrets/cloudflare.ini --staging" >> /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
elif [ ${STAGING_MULTI} = false ]
|
||||
@ -653,7 +640,7 @@ echo \
|
||||
${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds ${PROPOGATION_TIME_MULTI} --dns-cloudflare-credentials /config/.secrets/cloudflare.ini
|
||||
# Add to renewal list
|
||||
echo "## Certificate ${x}" >> /config/.renew-list.sh
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds ${PROPOGATION_TIME_MULTI} --dns-cloudflare-credentials /config/.secrets/cloudflare.ini\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=$CUSTOM_CA_PATH ${BASE_COMMAND[@]} --dns-cloudflare --dns-cloudflare-propagation-seconds ${PROPOGATION_TIME_MULTI} --dns-cloudflare-credentials /config/.secrets/cloudflare.ini" >> /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
else
|
||||
@ -674,7 +661,7 @@ echo \
|
||||
REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --standalone --staging
|
||||
# Add to renewal list
|
||||
echo "## Certificate ${x}" >> /config/.renew-list.sh
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --standalone --staging\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --standalone --staging" >> /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
elif [ ${STAGING_MULTI} = false ]
|
||||
@ -683,7 +670,7 @@ echo \
|
||||
REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --standalone
|
||||
# Add to renewal list
|
||||
echo "## Certificate ${x}" >> /config/.renew-list.sh
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --standalone\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --standalone" >> /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
else
|
||||
@ -704,7 +691,7 @@ echo \
|
||||
REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot --staging
|
||||
# Add to renewal list
|
||||
echo "## Certificate ${x}" >> /config/.renew-list.sh
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot --staging\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot --staging" >> /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
elif [ ${STAGING_MULTI} = false ]
|
||||
@ -713,7 +700,7 @@ echo \
|
||||
REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot
|
||||
# Add to renewal list
|
||||
echo "## Certificate ${x}" >> /config/.renew-list.sh
|
||||
echo "renew \"REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot\"" >> /config/.renew-list.sh
|
||||
echo "REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH_MULTI} ${BASE_COMMAND[@]} --webroot --webroot-path /config/webroot" >> /config/.renew-list.sh
|
||||
echo "" >> /config/.renew-list.sh
|
||||
echo "Creation/renewal attempt complete"
|
||||
else
|
||||
@ -767,10 +754,6 @@ else
|
||||
echo "CERT_COUNT varaible not recognised. It needs to be a value of 1 or greater."
|
||||
fi
|
||||
|
||||
# Finish /config/.renew-list.sh now all certs have been added
|
||||
echo "
|
||||
echo \"Renewal attempts complete\"" >> /config/.renew-list.sh
|
||||
|
||||
if [ $GENERATE_DHPARAM = true ] && [ ! -s /config/letsencrypt/keys/ssl-dhparams.pem ]
|
||||
then
|
||||
echo ""
|
||||
@ -786,8 +769,7 @@ if [ $ONE_SHOT == "true" ]; then
|
||||
|
||||
elif [ $ONE_SHOT == "false" ]; then
|
||||
|
||||
echo "$INTERVAL /config/.renew-list.sh >> /config/logs/renew.log
|
||||
0 0 * * * logrotate -v --state /config/logs/logrotate.status /logrotate.conf" > /config/.crontab.txt
|
||||
echo "$INTERVAL /certbot-renew.sh >> /config/logs/renew.log" > /config/.crontab.txt
|
||||
|
||||
echo ""
|
||||
|
||||
|
6
root/certbot-renew.sh
Normal file
6
root/certbot-renew.sh
Normal file
@ -0,0 +1,6 @@
|
||||
#!/command/with-contenv bash
|
||||
# shellcheck shell=bash
|
||||
echo ''
|
||||
date
|
||||
echo "Attempting to renew certificates"
|
||||
bash /config/.renew-list.sh
|
@ -31,13 +31,7 @@ TZ=${TZ}
|
||||
ONE_SHOT=${ONE_SHOT}
|
||||
INTERVAL=${INTERVAL}
|
||||
GENERATE_DHPARAM=${GENERATE_DHPARAM}
|
||||
CERT_COUNT=${CERT_COUNT}
|
||||
NOTIFY_ON_SUCCESS=${NOTIFY_ON_SUCCESS}
|
||||
NOTIFY_ON_FAILURE=${NOTIFY_ON_FAILURE}"
|
||||
if [ ! -z ${APPRISE_URL} ]; then
|
||||
echo \
|
||||
"APPRISE_URL=[hidden]"
|
||||
fi
|
||||
CERT_COUNT=${CERT_COUNT}"
|
||||
## Send extra detail to logs if single certificate config
|
||||
if [ ${CERT_COUNT} == 1 ]; then
|
||||
echo \
|
||||
|
@ -1,15 +0,0 @@
|
||||
missingok
|
||||
|
||||
/config/logs/letsencrypt.log {
|
||||
daily
|
||||
rotate 10
|
||||
postrotate
|
||||
find /config/logs -type f -regex '.*letsencrypt\.log\.\(.[2-9]\|[2-9].\|[1-9][0-9]\{2,\}\).*' -delete
|
||||
endscript
|
||||
}
|
||||
|
||||
/config/logs/renew.log {
|
||||
rotate 5
|
||||
size 100k
|
||||
compress
|
||||
}
|
@ -1,27 +0,0 @@
|
||||
function renew() {
|
||||
|
||||
#Variables:
|
||||
|
||||
#$1 = Certbot command
|
||||
|
||||
RENEWAL_DOMAINS=$(echo $1 | sed -r 's/.*\s-d\s(\S*).*/\1/')
|
||||
CUSTOM_CA_PATH=$(echo $1 | sed -r 's/REQUESTS_CA_BUNDLE=(\S*)\s(.*)/\1/')
|
||||
CERTBOT_COMMAND=$(echo $1 | sed -r 's/REQUESTS_CA_BUNDLE=(\S*)\s(.*)/\2/')
|
||||
|
||||
echo "Renewing certificate for ${RENEWAL_DOMAINS}"
|
||||
|
||||
echo "REQUESTS_CA_BUNDLE=${CUSTOM_CA_PATH} ${CERTBOT_COMMAND}" | bash
|
||||
|
||||
if [ $? = 0 ]; then
|
||||
echo "Renewal attempt of certificate for ${RENEWAL_DOMAINS} succeeded"
|
||||
if [ "${NOTIFY_ON_SUCCESS}" = "true" ]; then
|
||||
apprise -b "Renewal of certificate for ${RENEWAL_DOMAINS} succeeded" ${APPRISE_URL}
|
||||
fi
|
||||
else
|
||||
echo "Renewal attempt of certificate for ${RENEWAL_DOMAINS} failed"
|
||||
if [ "${NOTIFY_ON_FAILURE}" = "true" ]; then
|
||||
apprise -b "Renewal of certificate for ${RENEWAL_DOMAINS} failed" ${APPRISE_URL}
|
||||
fi
|
||||
fi
|
||||
|
||||
}
|
Reference in New Issue
Block a user