2019-03-02 16:39:41 +01:00
|
|
|
#!/usr/bin/env sh
|
2017-03-05 13:43:01 +01:00
|
|
|
|
2019-03-21 15:53:11 +01:00
|
|
|
# Here is a script to deploy cert to routeros router.
|
|
|
|
# Deploy the cert to remote routeros
|
|
|
|
#
|
|
|
|
# ```sh
|
|
|
|
# acme.sh --deploy -d ftp.example.com --deploy-hook routeros
|
|
|
|
# ```
|
|
|
|
#
|
|
|
|
# Before you can deploy the certificate to router os, you need
|
|
|
|
# to add the id_rsa.pub key to the routeros and assign a user
|
|
|
|
# to that key.
|
|
|
|
#
|
|
|
|
# The user need to have access to ssh, ftp, read and write.
|
|
|
|
#
|
|
|
|
# There are no need to enable ftp service for the script to work,
|
|
|
|
# as they are transmitted over SCP, however ftp is needed to store
|
|
|
|
# the files on the router.
|
|
|
|
#
|
|
|
|
# Then you need to set the environment variables for the
|
|
|
|
# deploy script to work.
|
|
|
|
#
|
|
|
|
# ```sh
|
|
|
|
# export ROUTER_OS_USERNAME=certuser
|
|
|
|
# export ROUTER_OS_HOST=router.example.com
|
|
|
|
#
|
|
|
|
# acme.sh --deploy -d ftp.example.com --deploy-hook routeros
|
|
|
|
# ```
|
|
|
|
#
|
|
|
|
# The deploy script will remove previously deployed certificates,
|
|
|
|
# and it does this with an assumption on how RouterOS names imported
|
|
|
|
# certificates, adding a "cer_0" suffix at the end. This is true for
|
|
|
|
# versions 6.32 -> 6.41.3, but it is not guaranteed that it will be
|
|
|
|
# true for future versions when upgrading.
|
|
|
|
#
|
|
|
|
# If the router have other certificates with the same name as the one
|
|
|
|
# beeing deployed, then this script will remove those certificates.
|
|
|
|
#
|
|
|
|
# At the end of the script, the services that use those certificates
|
|
|
|
# could be updated. Currently only the www-ssl service is beeing
|
|
|
|
# updated, but more services could be added.
|
|
|
|
#
|
|
|
|
# For instance:
|
|
|
|
# ```sh
|
|
|
|
# export ROUTER_OS_ADDITIONAL_SERVICES="/ip service set api-ssl certificate=$_cdomain.cer_0"
|
|
|
|
# ```
|
|
|
|
#
|
|
|
|
# One optional thing to do as well is to create a script that updates
|
|
|
|
# all the required services and run that script in a single command.
|
|
|
|
#
|
|
|
|
# returns 0 means success, otherwise error.
|
2017-03-05 13:43:01 +01:00
|
|
|
|
|
|
|
######## Public functions #####################
|
|
|
|
|
|
|
|
#domain keyfile certfile cafile fullchain
|
|
|
|
routeros_deploy() {
|
|
|
|
_cdomain="$1"
|
|
|
|
_ckey="$2"
|
|
|
|
_ccert="$3"
|
|
|
|
_cca="$4"
|
|
|
|
_cfullchain="$5"
|
|
|
|
|
|
|
|
_debug _cdomain "$_cdomain"
|
|
|
|
_debug _ckey "$_ckey"
|
|
|
|
_debug _ccert "$_ccert"
|
|
|
|
_debug _cca "$_cca"
|
|
|
|
_debug _cfullchain "$_cfullchain"
|
|
|
|
|
|
|
|
if [ -z "$ROUTER_OS_HOST" ]; then
|
2018-03-26 07:41:56 +02:00
|
|
|
_debug "Using _cdomain as ROUTER_OS_HOST, please set if not correct."
|
2018-03-26 08:24:04 +02:00
|
|
|
ROUTER_OS_HOST="$_cdomain"
|
2017-03-05 13:43:01 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -z "$ROUTER_OS_USERNAME" ]; then
|
|
|
|
_err "Need to set the env variable ROUTER_OS_USERNAME"
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
|
2019-03-21 15:53:11 +01:00
|
|
|
if [ -z "$ROUTER_OS_ADDITIONAL_SERVICES" ]; then
|
|
|
|
_debug "Not enabling additional services"
|
|
|
|
ROUTER_OS_ADDITIONAL_SERVICES=""
|
|
|
|
fi
|
|
|
|
|
2017-03-05 13:43:01 +01:00
|
|
|
_info "Trying to push key '$_ckey' to router"
|
2017-03-06 19:39:55 +01:00
|
|
|
scp "$_ckey" "$ROUTER_OS_USERNAME@$ROUTER_OS_HOST:$_cdomain.key"
|
2018-03-26 22:00:01 +02:00
|
|
|
_info "Trying to push cert '$_cfullchain' to router"
|
|
|
|
scp "$_cfullchain" "$ROUTER_OS_USERNAME@$ROUTER_OS_HOST:$_cdomain.cer"
|
2019-11-26 10:39:08 +01:00
|
|
|
DEPLOY_SCRIPT_CMD="/system script add name=\"LE Cert Deploy - $_cdomain\" owner=admin policy=ftp,read,write,password,sensitive \
|
|
|
|
source=\"## generated by routeros deploy script in acme.sh;\
|
|
|
|
\n/certificate remove [ find name=$_cdomain.cer_0 ];\
|
|
|
|
\n/certificate remove [ find name=$_cdomain.cer_1 ];\
|
|
|
|
\ndelay 1;\
|
|
|
|
\n/certificate import file-name=$_cdomain.cer passphrase=\\\"\\\";\
|
|
|
|
\n/certificate import file-name=$_cdomain.key passphrase=\\\"\\\";\
|
|
|
|
\ndelay 1;\
|
|
|
|
\n/file remove $_cdomain.cer;\
|
|
|
|
\n/file remove $_cdomain.key;\
|
|
|
|
\ndelay 2;\
|
|
|
|
\n/ip service set www-ssl certificate=$_cdomain.cer_0;\
|
|
|
|
\n$ROUTER_OS_ADDITIONAL_SERVICES;\
|
2019-06-03 03:38:39 +02:00
|
|
|
\n\"
|
|
|
|
"
|
2017-03-06 19:39:55 +01:00
|
|
|
# shellcheck disable=SC2029
|
2019-06-03 03:38:39 +02:00
|
|
|
ssh "$ROUTER_OS_USERNAME@$ROUTER_OS_HOST" "$DEPLOY_SCRIPT_CMD"
|
2019-05-29 06:05:20 +02:00
|
|
|
# shellcheck disable=SC2029
|
2019-05-25 17:32:13 +02:00
|
|
|
ssh "$ROUTER_OS_USERNAME@$ROUTER_OS_HOST" "/system script run \"LE Cert Deploy - $_cdomain\""
|
2019-05-29 06:05:20 +02:00
|
|
|
# shellcheck disable=SC2029
|
2019-05-25 17:32:13 +02:00
|
|
|
ssh "$ROUTER_OS_USERNAME@$ROUTER_OS_HOST" "/system script remove \"LE Cert Deploy - $_cdomain\""
|
2017-03-05 13:43:01 +01:00
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|