Skip to content

Instantly share code, notes, and snippets.

@thisismitch
Last active October 18, 2024 15:19
Show Gist options
  • Save thisismitch/7c91e9b2b63f837a0c4b to your computer and use it in GitHub Desktop.
Save thisismitch/7c91e9b2b63f837a0c4b to your computer and use it in GitHub Desktop.
Let's Encrypt Auto-Renewal script for HAProxy
global
log /dev/log local0
log /dev/log local1 notice
chroot /var/lib/haproxy
stats socket /run/haproxy/admin.sock mode 660 level admin
stats timeout 30s
user haproxy
group haproxy
daemon
maxconn 2048
tune.ssl.default-dh-param 2048
# Default SSL material locations
ca-base /etc/ssl/certs
crt-base /etc/ssl/private
# Default ciphers to use on SSL-enabled listening sockets.
# For more information, see ciphers(1SSL). This list is from:
# https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/
ssl-default-bind-ciphers ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!MD5:!DSS
ssl-default-bind-options no-sslv3
defaults
log global
mode http
option httplog
option dontlognull
timeout connect 5000
timeout client 50000
timeout server 50000
errorfile 400 /etc/haproxy/errors/400.http
errorfile 403 /etc/haproxy/errors/403.http
errorfile 408 /etc/haproxy/errors/408.http
errorfile 500 /etc/haproxy/errors/500.http
errorfile 502 /etc/haproxy/errors/502.http
errorfile 503 /etc/haproxy/errors/503.http
errorfile 504 /etc/haproxy/errors/504.http
option forwardfor
option http-server-close
frontend www-http
bind haproxy_www_public_IP:80
reqadd X-Forwarded-Proto:\ http
default_backend www-backend
frontend www-https
bind haproxy_www_public_IP:443 ssl crt /etc/haproxy/certs/example.com.pem
reqadd X-Forwarded-Proto:\ https
acl letsencrypt-acl path_beg /.well-known/acme-challenge/
use_backend letsencrypt-backend if letsencrypt-acl
default_backend www-backend
backend www-backend
redirect scheme https if !{ ssl_fc }
server www-1 www_1_private_IP:80 check
server www-2 www_2_private_IP:80 check
backend letsencrypt-backend
server letsencrypt 127.0.0.1:54321
#!/bin/bash
web_service='haproxy'
config_file='/usr/local/etc/le-renew-haproxy.ini'
domain=`grep "^\s*domains" $config_file | sed "s/^\s*domains\s*=\s*//" | sed 's/(\s*)\|,.*$//'`
http_01_port='54321'
combined_file="/etc/haproxy/certs/${domain}.pem"
le_path='/opt/letsencrypt'
exp_limit=30;
if [ ! -f $config_file ]; then
echo "[ERROR] config file does not exist: $config_file"
exit 1;
fi
cert_file="/etc/letsencrypt/live/$domain/fullchain.pem"
key_file="/etc/letsencrypt/live/$domain/privkey.pem"
if [ ! -f $cert_file ]; then
echo "[ERROR] certificate file not found for domain $domain."
fi
exp=$(date -d "`openssl x509 -in $cert_file -text -noout|grep "Not After"|cut -c 25-`" +%s)
datenow=$(date -d "now" +%s)
days_exp=$(echo \( $exp - $datenow \) / 86400 |bc)
echo "Checking expiration date for $domain..."
if [ "$days_exp" -gt "$exp_limit" ] ; then
echo "The certificate is up to date, no need for renewal ($days_exp days left)."
exit 0;
else
echo "The certificate for $domain is about to expire soon. Starting Let's Encrypt (HAProxy:$http_01_port) renewal script..."
$le_path/letsencrypt-auto certonly --agree-tos --renew-by-default --config $config_file --http-01-port $http_01_port
echo "Creating $combined_file with latest certs..."
sudo bash -c "cat /etc/letsencrypt/live/$domain/fullchain.pem /etc/letsencrypt/live/$domain/privkey.pem > $combined_file"
echo "Reloading $web_service"
/usr/sbin/service $web_service reload
echo "Renewal process finished for domain $domain"
exit 0;
fi
# This is an example of the kind of things you can do in a configuration file.
# All flags used by the client can be configured here. Run Let's Encrypt with
# "--help" to learn more about the available options.
# Use a 4096 bit RSA key instead of 2048
rsa-key-size = 4096
# Uncomment and update to register with the specified e-mail address
email = you@example.com
# Uncomment and update to generate certificates for the specified
# domains.
domains = example.com, www.example.com
# Uncomment to use a text interface instead of ncurses
# text = True
# Uncomment to use the standalone authenticator on port 443
# authenticator = standalone
standalone-supported-challenges = http-01
# Uncomment to use the webroot authenticator. Replace webroot-path with the
# path to the public_html / webroot folder being served by your web server.
# authenticator = webroot
# webroot-path = /usr/share/nginx/html
@olpia
Copy link

olpia commented Apr 7, 2016

Hi,

For me it's necessary to uncomment "authenticator = standalone", my version of letsencrypt-auto is 0.5.0.
Thank you for your tutorial and gists.

@daffychuy
Copy link

Does this still work?

@T0MM0R
Copy link

T0MM0R commented Jul 22, 2016

I added a fork that modified the bash script to loop through all domains listed in /etc/letsencrypt/live and renew all the certs. This is especially helpful if you host multiple domains on your server. Thanks for this! It was really helpful!

@rocboronat
Copy link

Hi everyone!

It doesn't work with last version of letsencrypt auto, as it prompts a interactive screen where it asks you to choose between auth by a file or by a temp webserver. If you want to be non-interactive, run

$le_path/letsencrypt-auto renew --http-01-port $http_01_port

instead of

$le_path/letsencrypt-auto certonly --agree-tos --renew-by-default --config $config_file --http-01-port $http_01_port

Actually, as it will check all the previously generated certs in this machine, it doesn't need any configuration :·)

@skinner12
Copy link

Hi,

I'm using that script but le-renew-haproxy is renew only the first domain wrote in le-renew-haproxy.ini.

For example if I set:

domains = www.example.net, www.example.com

Let's Encrypt updates my certs but then le-renew-haproxy doesn't concatenate the second domain so this command doesn't run for the second domain:

sudo bash -c "cat /etc/letsencrypt/live/$domain/fullchain.pem /etc/letsencrypt/live/$domain/privkey.pem > $combined_file"

Thanks

@tikenn
Copy link

tikenn commented Jan 8, 2017

Thanks for the script! This is quite awesome. I made a fork that will go through multiple config files and their domains, log errors, and even email with mutt if installed.

@dungnx102
Copy link

Thank for the Script, it work is good.

@BlinkyStitt
Copy link

You should get rid of 3DES. https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ stopped recommending it

@WilliamHua
Copy link

Does this gist still work with the specified port?

certbot/certbot#2697 seems to suggest that when specifying a port, a web server will be created; however, the authentication request will still be sent through port 80?

@webpigeon
Copy link

webpigeon commented Jun 1, 2017

@WilliamHua I'm not using this script - but from the looks of it:

the acl rule letsencrypt-acl will intercept any request made on the https port that is to the challenge folder (.well-known/acme-challenge) and redirect it to the correct (standalone) port. So letsencrypt should respond to requests sent to port 443 (doesn't look like it's configured to forward them on port 80 though).

@momolog
Copy link

momolog commented Jan 15, 2018

@thisismitch thanks for this gist!
Can you please briefly explain, what the line
server letsencrypt 127.0.0.1:54321
in the haproxy.cfg
does exactly? Is the "letsencrypt" just setting a symbolic name? And how do I make sure there is actually something listening on port 54321?

@Helwieahmad
Copy link

how to use this for multiple domain with multiple lets encrypt?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment