2016-02-13 00:56:47 +01:00
|
|
|
#!/usr/bin/env python
|
2016-01-10 15:00:43 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
# Automated Certificate Manager using ACME
|
|
|
|
# Copyright (c) Markus Hauschild, 2016.
|
|
|
|
|
|
|
|
|
2016-01-11 20:51:23 +01:00
|
|
|
import acme_tiny
|
2016-01-10 15:00:43 +01:00
|
|
|
import datetime
|
|
|
|
import dateutil.parser
|
|
|
|
import dateutil.relativedelta
|
2016-01-21 16:43:49 +01:00
|
|
|
import grp
|
2016-01-10 15:00:43 +01:00
|
|
|
import os
|
2016-01-21 16:43:49 +01:00
|
|
|
import pwd
|
2016-01-10 15:00:43 +01:00
|
|
|
import re
|
2016-01-12 17:43:41 +01:00
|
|
|
import shutil
|
2016-01-10 15:00:43 +01:00
|
|
|
import subprocess
|
2016-01-12 17:41:48 +01:00
|
|
|
import tempfile
|
2016-02-13 00:48:38 +01:00
|
|
|
import threading
|
2016-01-10 15:00:43 +01:00
|
|
|
import yaml
|
|
|
|
|
2016-02-13 00:48:38 +01:00
|
|
|
try:
|
|
|
|
from SimpleHTTPServer import SimpleHTTPRequestHandler
|
|
|
|
except ImportError:
|
|
|
|
from http.server import SimpleHTTPRequestHandler
|
|
|
|
|
|
|
|
try:
|
|
|
|
from SocketServer import TCPServer as HTTPServer
|
|
|
|
except ImportError:
|
|
|
|
from http.server import HTTPServer
|
2016-01-10 15:00:43 +01:00
|
|
|
|
|
|
|
ACME_DIR="/etc/acme/"
|
|
|
|
ACME_CONF=ACME_DIR + "acme.conf"
|
|
|
|
ACME_CONFD=ACME_DIR + "domains.d/"
|
|
|
|
|
2016-01-11 21:31:11 +01:00
|
|
|
|
2016-01-12 17:41:48 +01:00
|
|
|
class FileNotFoundError(OSError):
|
2016-02-13 01:02:34 +01:00
|
|
|
pass
|
2016-01-12 17:41:48 +01:00
|
|
|
|
|
|
|
|
2016-01-11 21:31:11 +01:00
|
|
|
class InvalidCertificateError(Exception):
|
|
|
|
pass
|
|
|
|
|
2016-02-13 00:48:38 +01:00
|
|
|
# @brief custom request handler for ACME challenges
|
|
|
|
# @note current working directory is temporarily changed by the script before
|
|
|
|
# the webserver starts, which allows using SimpleHTTPRequestHandler
|
|
|
|
class ACMERequestHandler(SimpleHTTPRequestHandler):
|
|
|
|
# @brief remove directories from GET URL
|
|
|
|
# @details the current working directory contains the challenge files,
|
|
|
|
# there is no need for creating subdirectories for the path
|
|
|
|
# that ACME expects.
|
|
|
|
# Additionally, this allows redirecting the ACME path to this
|
|
|
|
# webserver without having to know which subdirectory is
|
|
|
|
# redirected, which simplifies integration with existing
|
|
|
|
# webservers.
|
|
|
|
def translate_path(self, path):
|
|
|
|
spath = path.split('/')
|
|
|
|
assert(spath[0] == '')
|
|
|
|
spath = spath[1:]
|
|
|
|
if spath[0] == '.well-known':
|
|
|
|
spath = spath[1:]
|
|
|
|
if spath[0] == 'acme-challenge':
|
|
|
|
spath = spath[1:]
|
|
|
|
assert(len(spath) == 1)
|
|
|
|
spath.insert(0, '')
|
|
|
|
path = '/'.join(spath)
|
|
|
|
return SimpleHTTPRequestHandler.translate_path(self, path)
|
|
|
|
|
|
|
|
# @brief start the standalone webserver
|
|
|
|
# @param server the HTTPServer object
|
|
|
|
# @note this function is used to be passed to threading.Thread
|
|
|
|
def start_standalone(server):
|
|
|
|
server.serve_forever()
|
2016-01-11 21:31:11 +01:00
|
|
|
|
2016-01-10 15:43:11 +01:00
|
|
|
# @brief check whether existing certificate is still valid or expiring soon
|
2016-01-10 16:40:22 +01:00
|
|
|
# @param crt_file string containing the path to the certificate file
|
|
|
|
# @param ttl_days the minimum amount of days for which the certificate must be valid
|
|
|
|
# @return True if certificate is still valid for at least ttl_days, False otherwise
|
|
|
|
def cert_isValid(crt_file, ttl_days):
|
2016-01-10 15:00:43 +01:00
|
|
|
if not os.path.isfile(crt_file):
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
# check validity using OpenSSL
|
|
|
|
vc = subprocess.check_output(['openssl', 'x509', '-in', crt_file, '-noout', '-dates'])
|
|
|
|
|
2016-01-21 16:43:49 +01:00
|
|
|
m = re.search(b"notBefore=(.+)", vc)
|
2016-01-10 15:00:43 +01:00
|
|
|
if m:
|
|
|
|
valid_from = dateutil.parser.parse(m.group(1), ignoretz=True)
|
|
|
|
else:
|
2016-01-11 21:31:11 +01:00
|
|
|
raise InvalidCertificateError("No notBefore date found")
|
2016-01-10 15:00:43 +01:00
|
|
|
|
2016-01-21 16:43:49 +01:00
|
|
|
m = re.search(b"notAfter=(.+)", vc)
|
2016-01-10 15:00:43 +01:00
|
|
|
if m:
|
|
|
|
valid_to = dateutil.parser.parse(m.group(1), ignoretz=True)
|
|
|
|
else:
|
2016-01-11 21:31:11 +01:00
|
|
|
raise InvalidCertificateError("No notAfter date found")
|
2016-01-10 15:00:43 +01:00
|
|
|
|
2016-01-10 15:43:11 +01:00
|
|
|
now = datetime.datetime.now()
|
|
|
|
if valid_from > now:
|
2016-01-11 21:31:11 +01:00
|
|
|
raise InvalidCertificateError("Certificate seems to be from the future")
|
2016-01-10 15:00:43 +01:00
|
|
|
|
2016-01-10 16:40:22 +01:00
|
|
|
expiry_limit = now + dateutil.relativedelta.relativedelta(days=+ttl_days)
|
2016-01-10 15:43:11 +01:00
|
|
|
if valid_to < expiry_limit:
|
2016-01-10 15:00:43 +01:00
|
|
|
return False
|
|
|
|
|
|
|
|
return True
|
|
|
|
|
|
|
|
|
2016-01-10 15:43:11 +01:00
|
|
|
# @brief fetch new certificate from letsencrypt
|
|
|
|
# @param domain string containing the domain name
|
|
|
|
# @param settings the domain's configuration options
|
2016-01-10 15:00:43 +01:00
|
|
|
def cert_get(domain, settings):
|
2016-01-11 20:15:31 +01:00
|
|
|
print("Getting certificate for %s." % domain)
|
|
|
|
|
2016-01-10 15:00:43 +01:00
|
|
|
key_file = ACME_DIR + "server.key"
|
2016-01-11 20:56:08 +01:00
|
|
|
if not os.path.isfile(key_file):
|
2016-01-11 21:31:11 +01:00
|
|
|
raise FileNotFoundError("The server key file (%s) is missing!" % key_file)
|
2016-01-11 20:15:31 +01:00
|
|
|
|
|
|
|
acc_file = ACME_DIR + "account.key"
|
2016-01-11 20:56:08 +01:00
|
|
|
if not os.path.isfile(acc_file):
|
2016-01-11 21:31:11 +01:00
|
|
|
raise FileNotFoundError("The account key file (%s) is missing!" % acc_file)
|
2016-01-10 18:07:00 +01:00
|
|
|
|
2016-01-12 17:41:48 +01:00
|
|
|
_, csr_file = tempfile.mkstemp(".csr", "%s." % domain)
|
|
|
|
_, crt_file = tempfile.mkstemp(".crt", "%s." % domain)
|
2016-01-10 15:00:43 +01:00
|
|
|
|
2016-01-12 17:33:20 +01:00
|
|
|
challenge_dir = settings.get("webdir", "/var/www/acme-challenge/")
|
|
|
|
if not os.path.isdir(challenge_dir):
|
|
|
|
raise FileNotFoundError("Challenge directory (%s) does not exist!" % challenge_dir)
|
2016-01-10 15:00:43 +01:00
|
|
|
|
2016-02-13 00:48:38 +01:00
|
|
|
if settings['mode'] == 'standalone':
|
|
|
|
port = settings.get('port', 80)
|
|
|
|
|
|
|
|
current_dir = os.getcwd()
|
|
|
|
os.chdir(challenge_dir)
|
|
|
|
HTTPServer.allow_reuse_address = True
|
|
|
|
server = HTTPServer(("", port), ACMERequestHandler)
|
|
|
|
server_thread = threading.Thread(target=start_standalone, args=(server, ))
|
|
|
|
server_thread.start()
|
|
|
|
|
2016-01-11 21:38:09 +01:00
|
|
|
try:
|
|
|
|
cr = subprocess.check_output(['openssl', 'req', '-new', '-sha256', '-key', key_file, '-out', csr_file, '-subj', '/CN=%s' % domain])
|
|
|
|
|
|
|
|
# get certificate
|
2016-01-21 16:43:49 +01:00
|
|
|
crt = acme_tiny.get_crt(acc_file, csr_file, challenge_dir)
|
2016-01-11 21:38:09 +01:00
|
|
|
with open(crt_file, "w") as crt_fd:
|
|
|
|
crt_fd.write(crt)
|
2016-01-11 20:51:23 +01:00
|
|
|
|
2016-01-12 17:43:41 +01:00
|
|
|
# if resulting certificate is valid: store in final location
|
|
|
|
if cert_isValid(crt_file, 60):
|
|
|
|
crt_final = ACME_DIR + "%s.crt" % domain
|
|
|
|
shutil.copy2(crt_file, crt_final)
|
2016-01-10 16:40:22 +01:00
|
|
|
|
2016-01-12 17:41:48 +01:00
|
|
|
finally:
|
2016-02-13 00:48:38 +01:00
|
|
|
if settings['mode'] == 'standalone':
|
|
|
|
os.chdir(current_dir)
|
|
|
|
server.shutdown()
|
|
|
|
server_thread.join()
|
2016-01-12 17:41:48 +01:00
|
|
|
os.remove(csr_file)
|
|
|
|
os.remove(crt_file)
|
2016-01-10 18:07:00 +01:00
|
|
|
|
2016-01-10 17:29:26 +01:00
|
|
|
|
2016-01-12 17:41:48 +01:00
|
|
|
# @brief put new certificate in place
|
2016-01-10 17:29:26 +01:00
|
|
|
# @param domain string containing the domain name
|
|
|
|
# @param settings the domain's configuration options
|
2016-02-21 11:18:32 +01:00
|
|
|
# @return the action to be executed after the certificate update
|
2016-01-10 17:29:26 +01:00
|
|
|
def cert_put(domain, settings):
|
2016-01-16 18:58:12 +01:00
|
|
|
# TODO error handling
|
|
|
|
crt_user = settings['user']
|
|
|
|
crt_group = settings['group']
|
|
|
|
crt_perm = settings['perm']
|
|
|
|
crt_path = settings['path']
|
2016-01-21 16:43:49 +01:00
|
|
|
crt_format = settings['format'].split(",")
|
2016-02-21 11:18:32 +01:00
|
|
|
crt_action = settings['action']
|
2016-01-16 18:58:12 +01:00
|
|
|
|
2016-01-21 16:43:49 +01:00
|
|
|
key_file = ACME_DIR + "server.key"
|
2016-01-16 18:58:12 +01:00
|
|
|
crt_final = ACME_DIR + "%s.crt" % domain
|
|
|
|
|
2016-01-21 16:43:49 +01:00
|
|
|
with open(crt_path, "w+") as crt_fd:
|
|
|
|
for fmt in crt_format:
|
|
|
|
if fmt == "crt":
|
|
|
|
src_fd = open(crt_final, "r")
|
|
|
|
crt_fd.write(src_fd.read())
|
|
|
|
src_fd.close()
|
|
|
|
if fmt == "key":
|
|
|
|
src_fd = open(key_file, "r")
|
|
|
|
crt_fd.write(src_fd.read())
|
|
|
|
src_fd.close()
|
2016-02-21 12:44:24 +01:00
|
|
|
# TODO fmt == "ca":
|
2016-01-21 16:43:49 +01:00
|
|
|
else:
|
2016-02-21 12:44:24 +01:00
|
|
|
# TODO error handling
|
2016-01-21 16:43:49 +01:00
|
|
|
pass
|
|
|
|
|
|
|
|
# set owner and permissions
|
|
|
|
uid = pwd.getpwnam(crt_user).pw_uid
|
|
|
|
gid = grp.getgrnam(crt_group).gr_gid
|
2016-02-13 00:57:28 +01:00
|
|
|
try:
|
|
|
|
os.chown(crt_path, uid, gid)
|
|
|
|
except OSError:
|
|
|
|
print('Warning: Could not set certificate file ownership!')
|
|
|
|
try:
|
|
|
|
os.chmod(crt_path, int(crt_perm, 8))
|
|
|
|
except OSError:
|
|
|
|
print('Warning: Could not set certificate file permissions!')
|
2016-01-21 16:43:49 +01:00
|
|
|
|
2016-02-21 11:18:32 +01:00
|
|
|
return crt_action
|
2016-01-10 15:00:43 +01:00
|
|
|
|
|
|
|
|
2016-01-10 15:43:11 +01:00
|
|
|
# @brief augment configuration with defaults
|
|
|
|
# @param domainconfig the domain configuration
|
|
|
|
# @param defaults the default configuration
|
|
|
|
# @return the augmented configuration
|
|
|
|
def complete_config(domainconfig, defaults):
|
2016-01-10 18:07:00 +01:00
|
|
|
for name, value in defaults.items():
|
2016-01-10 15:43:11 +01:00
|
|
|
if name not in domainconfig:
|
|
|
|
domainconfig[name] = value
|
|
|
|
return domainconfig
|
|
|
|
|
|
|
|
|
2016-01-10 15:00:43 +01:00
|
|
|
if __name__ == "__main__":
|
2016-01-10 15:48:16 +01:00
|
|
|
# load global configuration
|
|
|
|
if os.path.isfile(ACME_CONF):
|
|
|
|
with open(ACME_CONF) as config_fd:
|
|
|
|
config = yaml.load(config_fd)
|
|
|
|
if not config:
|
|
|
|
config = {}
|
|
|
|
if 'domains' not in config:
|
|
|
|
config['domains'] = {}
|
2016-01-10 15:43:11 +01:00
|
|
|
if 'defaults' not in config:
|
|
|
|
config['defaults'] = {}
|
2016-01-10 15:48:16 +01:00
|
|
|
|
|
|
|
# load domain configuration
|
2016-01-10 15:00:43 +01:00
|
|
|
for config_file in os.listdir(ACME_CONFD):
|
|
|
|
if config_file.endswith(".conf"):
|
|
|
|
with open(ACME_CONFD + config_file) as config_fd:
|
|
|
|
config['domains'].update(yaml.load(config_fd))
|
2016-02-21 11:18:32 +01:00
|
|
|
|
|
|
|
# post-update actions (run only once)
|
|
|
|
actions = set()
|
2016-01-10 15:00:43 +01:00
|
|
|
|
2016-01-10 15:48:16 +01:00
|
|
|
# check certificate validity and obtain/renew certificates if needed
|
2016-01-10 18:07:00 +01:00
|
|
|
for domain, domaincfgs in config['domains'].items():
|
|
|
|
# skip domains without any output files
|
|
|
|
if domaincfgs is None:
|
|
|
|
continue
|
2016-01-10 16:40:22 +01:00
|
|
|
crt_file = ACME_DIR + "%s.crt" % domain
|
|
|
|
ttl_days = int(config.get('ttl_days', 15))
|
|
|
|
if not cert_isValid(crt_file, ttl_days):
|
2016-01-10 18:07:00 +01:00
|
|
|
cert_get(domain, config)
|
|
|
|
for domaincfg in domaincfgs:
|
|
|
|
cfg = complete_config(domaincfg, config['defaults'])
|
|
|
|
cert_put(domain, cfg)
|
2016-02-21 11:18:32 +01:00
|
|
|
|
|
|
|
# run post-update actions
|
|
|
|
for action in actions:
|
|
|
|
subprocess.call(action.split())
|