mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-29 15:06:26 +02:00
Implemented SAN via Letsencrypt and Certbot
This commit is contained in:
157
library/find_cert_folder.py
Normal file
157
library/find_cert_folder.py
Normal file
@@ -0,0 +1,157 @@
|
||||
#!/usr/bin/python
|
||||
|
||||
from __future__ import absolute_import, division, print_function
|
||||
__metaclass__ = type
|
||||
|
||||
DOCUMENTATION = r'''
|
||||
---
|
||||
module: find_cert_folder
|
||||
short_description: Find SSL certificate folder covering a given domain
|
||||
description:
|
||||
- Searches through certificates to find a folder that covers the given domain.
|
||||
options:
|
||||
domain:
|
||||
description:
|
||||
- Domain name to search for in the certificates.
|
||||
required: true
|
||||
type: str
|
||||
certbot_flavor:
|
||||
description:
|
||||
- Certificate type. Either 'san', 'wildcard', or 'dedicated'.
|
||||
required: true
|
||||
type: str
|
||||
cert_base_path:
|
||||
description:
|
||||
- Path where certificates are stored.
|
||||
required: false
|
||||
type: str
|
||||
default: /etc/letsencrypt/live
|
||||
debug:
|
||||
description:
|
||||
- Enable verbose debug output.
|
||||
required: false
|
||||
type: bool
|
||||
default: false
|
||||
author:
|
||||
- Kevin Veen-Birkenbach
|
||||
'''
|
||||
|
||||
EXAMPLES = r'''
|
||||
- name: Find cert folder for matomo.cymais.cloud
|
||||
find_cert_folder:
|
||||
domain: "matomo.cymais.cloud"
|
||||
certbot_flavor: "san"
|
||||
cert_base_path: "/etc/letsencrypt/live"
|
||||
register: result
|
||||
'''
|
||||
|
||||
RETURN = r'''
|
||||
folder:
|
||||
description: The name of the folder covering the domain.
|
||||
type: str
|
||||
returned: always
|
||||
'''
|
||||
|
||||
import os
|
||||
import subprocess
|
||||
from ansible.module_utils.basic import AnsibleModule
|
||||
|
||||
def run_openssl(cert_path):
|
||||
try:
|
||||
output = subprocess.check_output(
|
||||
['openssl', 'x509', '-in', cert_path, '-noout', '-text'],
|
||||
universal_newlines=True
|
||||
)
|
||||
return output
|
||||
except subprocess.CalledProcessError:
|
||||
return ""
|
||||
|
||||
def extract_sans(cert_text):
|
||||
dns_entries = []
|
||||
in_san = False
|
||||
for line in cert_text.splitlines():
|
||||
line = line.strip()
|
||||
if 'X509v3 Subject Alternative Name:' in line:
|
||||
in_san = True
|
||||
continue
|
||||
if in_san:
|
||||
if not line:
|
||||
break
|
||||
dns_entries += [e.strip().replace('DNS:', '') for e in line.split(',') if e.strip()]
|
||||
return dns_entries
|
||||
|
||||
def find_matching_folders(domain, cert_files, flavor, debug):
|
||||
exact_matches = []
|
||||
wildcard_matches = []
|
||||
|
||||
for cert_path in cert_files:
|
||||
cert_text = run_openssl(cert_path)
|
||||
if not cert_text:
|
||||
continue
|
||||
sans = extract_sans(cert_text)
|
||||
if debug:
|
||||
print(f"Checking {cert_path}: {sans}")
|
||||
for entry in sans:
|
||||
if entry == domain:
|
||||
exact_matches.append(os.path.dirname(cert_path))
|
||||
elif entry.startswith('*.'):
|
||||
base = entry[2:]
|
||||
if domain.endswith('.' + base):
|
||||
wildcard_matches.append(os.path.dirname(cert_path))
|
||||
|
||||
if flavor in ('san', 'dedicated'):
|
||||
return exact_matches or wildcard_matches
|
||||
elif flavor == 'wildcard':
|
||||
return wildcard_matches or exact_matches
|
||||
else:
|
||||
return []
|
||||
|
||||
def find_cert_folder(module):
|
||||
domain = module.params['domain']
|
||||
certbot_flavor = module.params['certbot_flavor']
|
||||
cert_base_path = module.params['cert_base_path']
|
||||
debug = module.params['debug']
|
||||
|
||||
cert_files = []
|
||||
for root, dirs, files in os.walk(cert_base_path):
|
||||
if 'cert.pem' in files:
|
||||
cert_files.append(os.path.join(root, 'cert.pem'))
|
||||
|
||||
if debug:
|
||||
print(f"Found {len(cert_files)} cert.pem files under {cert_base_path}")
|
||||
|
||||
preferred = find_matching_folders(domain, cert_files, certbot_flavor, debug)
|
||||
|
||||
if not preferred and certbot_flavor == 'san':
|
||||
if debug:
|
||||
print("Fallback: searching SAN matches without SAN structure parsing")
|
||||
for cert_path in cert_files:
|
||||
cert_text = run_openssl(cert_path)
|
||||
if f"DNS:{domain}" in cert_text:
|
||||
preferred.append(os.path.dirname(cert_path))
|
||||
|
||||
if not preferred:
|
||||
module.fail_json(msg=f"No certificate covering domain {domain} found.")
|
||||
|
||||
preferred = sorted(preferred, key=lambda p: (p.count('-'), len(p)))
|
||||
folder = os.path.basename(preferred[0])
|
||||
|
||||
module.exit_json(folder=folder)
|
||||
|
||||
def main():
|
||||
module_args = dict(
|
||||
domain=dict(type='str', required=True),
|
||||
certbot_flavor=dict(type='str', required=True),
|
||||
cert_base_path=dict(type='str', required=False, default='/etc/letsencrypt/live'),
|
||||
debug=dict(type='bool', required=False, default=False),
|
||||
)
|
||||
|
||||
module = AnsibleModule(
|
||||
argument_spec=module_args,
|
||||
supports_check_mode=True
|
||||
)
|
||||
|
||||
find_cert_folder(module)
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
Reference in New Issue
Block a user