2014-06-20 01:16:38 +00:00
|
|
|
# Creates an nginx configuration file so we serve HTTP/HTTPS on all
|
|
|
|
# domains for which a mail account has been set up.
|
|
|
|
########################################################################
|
|
|
|
|
2015-01-31 13:24:26 +00:00
|
|
|
import os, os.path, shutil, re, tempfile, rtyaml
|
2014-06-20 01:16:38 +00:00
|
|
|
|
|
|
|
from mailconfig import get_mail_domains
|
2015-06-04 12:06:02 +00:00
|
|
|
from dns_update import get_custom_dns_config, do_dns_update, get_dns_zones
|
2014-06-22 15:34:36 +00:00
|
|
|
from utils import shell, safe_domain_name, sort_domains
|
2014-06-20 01:16:38 +00:00
|
|
|
|
|
|
|
def get_web_domains(env):
|
2014-07-20 15:15:33 +00:00
|
|
|
# What domains should we serve websites for?
|
2014-06-20 01:16:38 +00:00
|
|
|
domains = set()
|
|
|
|
|
2014-07-20 15:15:33 +00:00
|
|
|
# At the least it's the PRIMARY_HOSTNAME so we can serve webmail
|
|
|
|
# as well as Z-Push for Exchange ActiveSync.
|
|
|
|
domains.add(env['PRIMARY_HOSTNAME'])
|
|
|
|
|
|
|
|
# Also serve web for all mail domains so that we might at least
|
2015-02-17 00:08:04 +00:00
|
|
|
# provide auto-discover of email settings, and also a static website
|
|
|
|
# if the user wants to make one. These will require an SSL cert.
|
2014-07-20 15:15:33 +00:00
|
|
|
# ...Unless the domain has an A/AAAA record that maps it to a different
|
|
|
|
# IP address than this box. Remove those domains from our list.
|
2015-06-04 11:38:48 +00:00
|
|
|
domains |= (get_mail_domains(env) - get_domains_with_a_records(env))
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2015-06-04 11:45:08 +00:00
|
|
|
# Sort the list so the nginx conf gets written in a stable order.
|
2014-06-22 15:34:36 +00:00
|
|
|
domains = sort_domains(domains, env)
|
2014-06-20 01:16:38 +00:00
|
|
|
|
|
|
|
return domains
|
2015-06-04 11:38:48 +00:00
|
|
|
|
|
|
|
def get_domains_with_a_records(env):
|
|
|
|
domains = set()
|
|
|
|
dns = get_custom_dns_config(env)
|
|
|
|
for domain, rtype, value in dns:
|
|
|
|
if rtype == "CNAME" or (rtype in ("A", "AAAA") and value != "local"):
|
|
|
|
domains.add(domain)
|
|
|
|
return domains
|
|
|
|
|
2015-06-04 12:32:00 +00:00
|
|
|
def get_web_domains_with_root_overrides(env):
|
|
|
|
# Load custom settings so we can tell what domains have a redirect or proxy set up on '/',
|
|
|
|
# which means static hosting is not happening.
|
|
|
|
root_overrides = { }
|
|
|
|
nginx_conf_custom_fn = os.path.join(env["STORAGE_ROOT"], "www/custom.yaml")
|
|
|
|
if os.path.exists(nginx_conf_custom_fn):
|
|
|
|
custom_settings = rtyaml.load(open(nginx_conf_custom_fn))
|
|
|
|
for domain, settings in custom_settings.items():
|
|
|
|
for type, value in [('redirect', settings.get('redirects', {}).get('/')),
|
|
|
|
('proxy', settings.get('proxies', {}).get('/'))]:
|
|
|
|
if value:
|
|
|
|
root_overrides[domain] = (type, value)
|
|
|
|
return root_overrides
|
|
|
|
|
|
|
|
|
2015-06-04 12:06:02 +00:00
|
|
|
def get_default_www_redirects(env):
|
|
|
|
# Returns a list of www subdomains that we want to provide default redirects
|
|
|
|
# for, i.e. any www's that aren't domains the user has actually configured
|
|
|
|
# to serve for real. Which would be unusual.
|
|
|
|
web_domains = set(get_web_domains(env))
|
|
|
|
www_domains = set('www.' + zone for zone, zonefile in get_dns_zones(env))
|
|
|
|
return sort_domains(www_domains - web_domains - get_domains_with_a_records(env), env)
|
|
|
|
|
2015-05-28 18:45:35 +00:00
|
|
|
def do_web_update(env):
|
2014-06-20 01:16:38 +00:00
|
|
|
# Build an nginx configuration file.
|
2014-08-12 11:00:54 +00:00
|
|
|
nginx_conf = open(os.path.join(os.path.dirname(__file__), "../conf/nginx-top.conf")).read()
|
|
|
|
|
2015-06-04 11:45:08 +00:00
|
|
|
# Load the templates.
|
2015-06-04 12:06:02 +00:00
|
|
|
template0 = open(os.path.join(os.path.dirname(__file__), "../conf/nginx.conf")).read()
|
|
|
|
template1 = open(os.path.join(os.path.dirname(__file__), "../conf/nginx-alldomains.conf")).read()
|
2014-08-16 12:33:10 +00:00
|
|
|
template2 = open(os.path.join(os.path.dirname(__file__), "../conf/nginx-primaryonly.conf")).read()
|
2015-06-04 12:06:02 +00:00
|
|
|
template3 = "\trewrite / https://$REDIRECT_DOMAIN permanent;\n"
|
2015-06-04 11:45:08 +00:00
|
|
|
|
|
|
|
# Add the PRIMARY_HOST configuration first so it becomes nginx's default server.
|
2015-06-04 12:06:02 +00:00
|
|
|
nginx_conf += make_domain_config(env['PRIMARY_HOSTNAME'], [template0, template1, template2], env)
|
2015-06-04 11:45:08 +00:00
|
|
|
|
|
|
|
# Add configuration all other web domains.
|
2015-06-04 12:32:00 +00:00
|
|
|
has_root_proxy_or_redirect = get_web_domains_with_root_overrides(env)
|
2014-06-20 01:16:38 +00:00
|
|
|
for domain in get_web_domains(env):
|
2015-06-04 11:45:08 +00:00
|
|
|
if domain == env['PRIMARY_HOSTNAME']: continue # handled above
|
2015-06-04 12:32:00 +00:00
|
|
|
if domain not in has_root_proxy_or_redirect:
|
|
|
|
nginx_conf += make_domain_config(domain, [template0, template1], env)
|
|
|
|
else:
|
|
|
|
nginx_conf += make_domain_config(domain, [template0], env)
|
2015-06-04 12:06:02 +00:00
|
|
|
|
|
|
|
# Add default www redirects.
|
|
|
|
for domain in get_default_www_redirects(env):
|
|
|
|
nginx_conf += make_domain_config(domain, [template0, template3], env)
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2014-07-06 12:16:50 +00:00
|
|
|
# Did the file change? If not, don't bother writing & restarting nginx.
|
|
|
|
nginx_conf_fn = "/etc/nginx/conf.d/local.conf"
|
|
|
|
if os.path.exists(nginx_conf_fn):
|
|
|
|
with open(nginx_conf_fn) as f:
|
|
|
|
if f.read() == nginx_conf:
|
|
|
|
return ""
|
|
|
|
|
2014-06-20 01:16:38 +00:00
|
|
|
# Save the file.
|
2014-07-06 12:16:50 +00:00
|
|
|
with open(nginx_conf_fn, "w") as f:
|
2014-06-20 01:16:38 +00:00
|
|
|
f.write(nginx_conf)
|
|
|
|
|
2014-08-17 22:43:57 +00:00
|
|
|
# Kick nginx. Since this might be called from the web admin
|
|
|
|
# don't do a 'restart'. That would kill the connection before
|
|
|
|
# the API returns its response. A 'reload' should be good
|
|
|
|
# enough and doesn't break any open connections.
|
|
|
|
shell('check_call', ["/usr/sbin/service", "nginx", "reload"])
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2015-05-28 18:45:35 +00:00
|
|
|
return "web updated\n"
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2015-06-04 11:45:08 +00:00
|
|
|
def make_domain_config(domain, templates, env):
|
|
|
|
# GET SOME VARIABLES
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2014-06-23 10:53:09 +00:00
|
|
|
# Where will its root directory be for static files?
|
|
|
|
root = get_web_root(domain, env)
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2014-06-22 15:34:36 +00:00
|
|
|
# What private key and SSL certificate will we use for this domain?
|
2015-02-17 00:40:43 +00:00
|
|
|
ssl_key, ssl_certificate, ssl_via = get_domain_ssl_files(domain, env)
|
2014-06-22 15:34:36 +00:00
|
|
|
|
|
|
|
# For hostnames created after the initial setup, ensure we have an SSL certificate
|
|
|
|
# available. Make a self-signed one now if one doesn't exist.
|
2015-01-31 13:24:26 +00:00
|
|
|
ensure_ssl_certificate_exists(domain, ssl_key, ssl_certificate, env)
|
2014-06-22 15:34:36 +00:00
|
|
|
|
2015-06-04 11:45:08 +00:00
|
|
|
# ADDITIONAL DIRECTIVES.
|
2014-08-16 12:33:10 +00:00
|
|
|
|
2015-06-04 11:45:08 +00:00
|
|
|
nginx_conf_extra = ""
|
2014-07-09 12:31:32 +00:00
|
|
|
|
2014-10-10 15:49:14 +00:00
|
|
|
# Because the certificate may change, we should recognize this so we
|
|
|
|
# can trigger an nginx update.
|
|
|
|
def hashfile(filepath):
|
|
|
|
import hashlib
|
|
|
|
sha1 = hashlib.sha1()
|
|
|
|
f = open(filepath, 'rb')
|
|
|
|
try:
|
|
|
|
sha1.update(f.read())
|
|
|
|
finally:
|
|
|
|
f.close()
|
|
|
|
return sha1.hexdigest()
|
2015-06-04 11:45:08 +00:00
|
|
|
nginx_conf_extra += "# ssl files sha1: %s / %s\n" % (hashfile(ssl_key), hashfile(ssl_certificate))
|
2014-10-10 15:49:14 +00:00
|
|
|
|
2014-08-24 21:34:15 +00:00
|
|
|
# Add in any user customizations in YAML format.
|
2014-07-09 12:31:32 +00:00
|
|
|
nginx_conf_custom_fn = os.path.join(env["STORAGE_ROOT"], "www/custom.yaml")
|
|
|
|
if os.path.exists(nginx_conf_custom_fn):
|
|
|
|
yaml = rtyaml.load(open(nginx_conf_custom_fn))
|
|
|
|
if domain in yaml:
|
|
|
|
yaml = yaml[domain]
|
2014-08-16 17:43:55 +00:00
|
|
|
for path, url in yaml.get("proxies", {}).items():
|
2015-06-04 11:45:08 +00:00
|
|
|
nginx_conf_extra += "\tlocation %s {\n\t\tproxy_pass %s;\n\t}\n" % (path, url)
|
2014-12-05 16:57:26 +00:00
|
|
|
for path, url in yaml.get("redirects", {}).items():
|
2015-06-04 11:45:08 +00:00
|
|
|
nginx_conf_extra += "\trewrite %s %s permanent;\n" % (path, url)
|
2014-07-09 12:31:32 +00:00
|
|
|
|
2014-08-26 16:16:20 +00:00
|
|
|
# Add in any user customizations in the includes/ folder.
|
|
|
|
nginx_conf_custom_include = os.path.join(env["STORAGE_ROOT"], "www", safe_domain_name(domain) + ".conf")
|
|
|
|
if os.path.exists(nginx_conf_custom_include):
|
2015-06-04 11:45:08 +00:00
|
|
|
nginx_conf_extra += "\tinclude %s;\n" % (nginx_conf_custom_include)
|
|
|
|
# PUT IT ALL TOGETHER
|
|
|
|
|
|
|
|
# Combine the pieces. Iteratively place each template into the "# ADDITIONAL DIRECTIVES HERE" placeholder
|
|
|
|
# of the previous template.
|
|
|
|
nginx_conf = "# ADDITIONAL DIRECTIVES HERE\n"
|
|
|
|
for t in templates + [nginx_conf_extra]:
|
|
|
|
nginx_conf = re.sub("[ \t]*# ADDITIONAL DIRECTIVES HERE *\n", t, nginx_conf)
|
2014-08-24 21:34:15 +00:00
|
|
|
|
2015-06-04 11:45:08 +00:00
|
|
|
# Replace substitution strings in the template & return.
|
|
|
|
nginx_conf = nginx_conf.replace("$STORAGE_ROOT", env['STORAGE_ROOT'])
|
|
|
|
nginx_conf = nginx_conf.replace("$HOSTNAME", domain)
|
|
|
|
nginx_conf = nginx_conf.replace("$ROOT", root)
|
|
|
|
nginx_conf = nginx_conf.replace("$SSL_KEY", ssl_key)
|
|
|
|
nginx_conf = nginx_conf.replace("$SSL_CERTIFICATE", ssl_certificate)
|
|
|
|
nginx_conf = nginx_conf.replace("$REDIRECT_DOMAIN", re.sub(r"^www\.", "", domain)) # for default www redirects to parent domain
|
2014-07-09 12:31:32 +00:00
|
|
|
|
2014-06-22 15:34:36 +00:00
|
|
|
return nginx_conf
|
|
|
|
|
2014-10-07 16:05:38 +00:00
|
|
|
def get_web_root(domain, env, test_exists=True):
|
2014-06-23 10:53:09 +00:00
|
|
|
# Try STORAGE_ROOT/web/domain_name if it exists, but fall back to STORAGE_ROOT/web/default.
|
|
|
|
for test_domain in (domain, 'default'):
|
|
|
|
root = os.path.join(env["STORAGE_ROOT"], "www", safe_domain_name(test_domain))
|
2014-10-07 16:05:38 +00:00
|
|
|
if os.path.exists(root) or not test_exists: break
|
2014-06-23 10:53:09 +00:00
|
|
|
return root
|
|
|
|
|
2014-12-05 19:25:14 +00:00
|
|
|
def get_domain_ssl_files(domain, env, allow_shared_cert=True):
|
2014-06-20 01:16:38 +00:00
|
|
|
# What SSL private key will we use? Allow the user to override this, but
|
|
|
|
# in many cases using the same private key for all domains would be fine.
|
2014-06-30 13:15:36 +00:00
|
|
|
# Don't allow the user to override the key for PRIMARY_HOSTNAME because
|
2014-06-20 01:16:38 +00:00
|
|
|
# that's what's in the main file.
|
|
|
|
ssl_key = os.path.join(env["STORAGE_ROOT"], 'ssl/ssl_private_key.pem')
|
2014-07-09 16:38:42 +00:00
|
|
|
ssl_key_is_alt = False
|
2014-06-30 20:41:29 +00:00
|
|
|
alt_key = os.path.join(env["STORAGE_ROOT"], 'ssl/%s/private_key.pem' % safe_domain_name(domain))
|
2014-06-30 13:15:36 +00:00
|
|
|
if domain != env['PRIMARY_HOSTNAME'] and os.path.exists(alt_key):
|
2014-06-20 01:16:38 +00:00
|
|
|
ssl_key = alt_key
|
2014-07-09 16:38:42 +00:00
|
|
|
ssl_key_is_alt = True
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2014-07-09 16:38:42 +00:00
|
|
|
# What SSL certificate will we use?
|
|
|
|
ssl_certificate_primary = os.path.join(env["STORAGE_ROOT"], 'ssl/ssl_certificate.pem')
|
2015-02-17 00:40:43 +00:00
|
|
|
ssl_via = None
|
2014-06-30 13:15:36 +00:00
|
|
|
if domain == env['PRIMARY_HOSTNAME']:
|
2014-07-09 16:38:42 +00:00
|
|
|
# For PRIMARY_HOSTNAME, use the one we generated at set-up time.
|
|
|
|
ssl_certificate = ssl_certificate_primary
|
2014-06-20 01:16:38 +00:00
|
|
|
else:
|
2014-07-09 16:38:42 +00:00
|
|
|
# For other domains, we'll probably use a certificate in a different path.
|
2014-06-30 20:41:29 +00:00
|
|
|
ssl_certificate = os.path.join(env["STORAGE_ROOT"], 'ssl/%s/ssl_certificate.pem' % safe_domain_name(domain))
|
2014-06-20 01:16:38 +00:00
|
|
|
|
2014-07-09 16:38:42 +00:00
|
|
|
# But we can be smart and reuse the main SSL certificate if is has
|
|
|
|
# a Subject Alternative Name matching this domain. Don't do this if
|
|
|
|
# the user has uploaded a different private key for this domain.
|
2014-12-05 19:25:14 +00:00
|
|
|
if not ssl_key_is_alt and allow_shared_cert:
|
2014-08-21 10:43:55 +00:00
|
|
|
from status_checks import check_certificate
|
2014-10-07 14:49:36 +00:00
|
|
|
if check_certificate(domain, ssl_certificate_primary, None)[0] == "OK":
|
2014-07-09 16:38:42 +00:00
|
|
|
ssl_certificate = ssl_certificate_primary
|
2015-02-17 00:40:43 +00:00
|
|
|
ssl_via = "Using multi/wildcard certificate of %s." % env['PRIMARY_HOSTNAME']
|
2014-07-09 16:38:42 +00:00
|
|
|
|
2015-02-17 00:40:43 +00:00
|
|
|
# For a 'www.' domain, see if we can reuse the cert of the parent.
|
|
|
|
elif domain.startswith('www.'):
|
|
|
|
ssl_certificate_parent = os.path.join(env["STORAGE_ROOT"], 'ssl/%s/ssl_certificate.pem' % safe_domain_name(domain[4:]))
|
|
|
|
if os.path.exists(ssl_certificate_parent) and check_certificate(domain, ssl_certificate_parent, None)[0] == "OK":
|
|
|
|
ssl_certificate = ssl_certificate_parent
|
|
|
|
ssl_via = "Using multi/wildcard certificate of %s." % domain[4:]
|
|
|
|
|
|
|
|
return ssl_key, ssl_certificate, ssl_via
|
2014-06-22 15:34:36 +00:00
|
|
|
|
2015-01-31 13:24:26 +00:00
|
|
|
def ensure_ssl_certificate_exists(domain, ssl_key, ssl_certificate, env):
|
2014-07-09 16:38:42 +00:00
|
|
|
# For domains besides PRIMARY_HOSTNAME, generate a self-signed certificate if
|
|
|
|
# a certificate doesn't already exist. See setup/mail.sh for documentation.
|
2014-06-22 15:34:36 +00:00
|
|
|
|
2014-06-30 13:15:36 +00:00
|
|
|
if domain == env['PRIMARY_HOSTNAME']:
|
2014-06-22 15:34:36 +00:00
|
|
|
return
|
|
|
|
|
2014-07-09 16:38:42 +00:00
|
|
|
# Sanity check. Shouldn't happen. A non-primary domain might use this
|
|
|
|
# certificate (see above), but then the certificate should exist anyway.
|
|
|
|
if ssl_certificate == os.path.join(env["STORAGE_ROOT"], 'ssl/ssl_certificate.pem'):
|
|
|
|
return
|
|
|
|
|
2014-06-22 15:34:36 +00:00
|
|
|
if os.path.exists(ssl_certificate):
|
|
|
|
return
|
|
|
|
|
|
|
|
os.makedirs(os.path.dirname(ssl_certificate), exist_ok=True)
|
|
|
|
|
|
|
|
# Generate a new self-signed certificate using the same private key that we already have.
|
|
|
|
|
2015-01-31 13:24:26 +00:00
|
|
|
# Start with a CSR written to a temporary file.
|
|
|
|
with tempfile.NamedTemporaryFile(mode="w") as csr_fp:
|
|
|
|
csr_fp.write(create_csr(domain, ssl_key, env))
|
|
|
|
csr_fp.flush() # since we won't close until after running 'openssl x509', since close triggers delete.
|
2014-06-22 15:34:36 +00:00
|
|
|
|
2015-01-31 13:24:26 +00:00
|
|
|
# And then make the certificate.
|
|
|
|
shell("check_call", [
|
|
|
|
"openssl", "x509", "-req",
|
|
|
|
"-days", "365",
|
|
|
|
"-in", csr_fp.name,
|
|
|
|
"-signkey", ssl_key,
|
|
|
|
"-out", ssl_certificate])
|
2014-06-22 15:34:36 +00:00
|
|
|
|
2014-10-10 15:49:14 +00:00
|
|
|
def create_csr(domain, ssl_key, env):
|
|
|
|
return shell("check_output", [
|
|
|
|
"openssl", "req", "-new",
|
|
|
|
"-key", ssl_key,
|
|
|
|
"-sha256",
|
store IDNs (internationalized domain names) in IDNA (ASCII) in our database, not in Unicode
I changed my mind. In 1bf8f1991f6f08e0fb1e3d2572d280d894a5e431 I allowed Unicode domain names to go into the database. I thought that was nice because it's what the user *means*. But it's not how the web works. Web and DNS were working, but mail wasn't. Postfix (as shipped with Ubuntu 14.04 without support for SMTPUTF8) exists in an ASCII-only world. When it goes to the users/aliases table, it queries in ASCII (IDNA) only and had no hope of delivering mail if the domain was in full Unicode in the database. I was thinking ahead to SMTPUTF8, where we *could* put Unicode in the database (though that would prevent IDNA-encoded addressing from being deliverable) not realizing it isn't well supported yet anyway.
It's IDNA that goes on the wire in most places anyway (SMTP without SMTPUTF8 (and therefore how Postfix queries our users/aliases tables), DNS zone files, nginx config, CSR 'CN' field, X509 Common Name and Subject Alternative Names fields), so we should really be talking in terms of IDNA (i.e. ASCII).
This partially reverts commit 1bf8f1991f6f08e0fb1e3d2572d280d894a5e431, where I added a lot of Unicode=>IDNA conversions when writing configuration files. Instead I'm doing Unicode=>IDNA before email addresses get into the users/aliases table. Now we assume the database uses IDNA-encoded ASCII domain names. When adding/removing aliases, addresses are converted to ASCII (w/ IDNA). User accounts must be ASCII-only anyway because of Dovecot's auth limitations, so we don't do any IDNA conversion (don't want to change the user's login info behind their back!). The aliases control panel page converts domains back to Unicode for display to be nice. The status checks converts the domains to Unicode just for the output headings.
A migration is added to convert existing aliases with Unicode domains into IDNA. Any custom DNS or web settings with Unicode may need to be changed.
Future support for SMTPUTF8 will probably need to add columns in the users/aliases table so that it lists both IDNA and Unicode forms.
2015-03-29 13:33:31 +00:00
|
|
|
"-subj", "/C=%s/ST=/L=/O=/CN=%s" % (env["CSR_COUNTRY"], domain)])
|
2014-10-10 15:49:14 +00:00
|
|
|
|
|
|
|
def install_cert(domain, ssl_cert, ssl_chain, env):
|
|
|
|
if domain not in get_web_domains(env):
|
|
|
|
return "Invalid domain name."
|
|
|
|
|
|
|
|
# Write the combined cert+chain to a temporary path and validate that it is OK.
|
|
|
|
# The certificate always goes above the chain.
|
|
|
|
import tempfile, os
|
|
|
|
fd, fn = tempfile.mkstemp('.pem')
|
|
|
|
os.write(fd, (ssl_cert + '\n' + ssl_chain).encode("ascii"))
|
|
|
|
os.close(fd)
|
|
|
|
|
|
|
|
# Do validation on the certificate before installing it.
|
|
|
|
from status_checks import check_certificate
|
2015-02-17 00:40:43 +00:00
|
|
|
ssl_key, ssl_certificate, ssl_via = get_domain_ssl_files(domain, env, allow_shared_cert=False)
|
2014-10-10 15:49:14 +00:00
|
|
|
cert_status, cert_status_details = check_certificate(domain, fn, ssl_key)
|
|
|
|
if cert_status != "OK":
|
|
|
|
if cert_status == "SELF-SIGNED":
|
|
|
|
cert_status = "This is a self-signed certificate. I can't install that."
|
|
|
|
os.unlink(fn)
|
2014-10-24 21:30:33 +00:00
|
|
|
if cert_status_details is not None:
|
|
|
|
cert_status += " " + cert_status_details
|
2014-10-10 15:49:14 +00:00
|
|
|
return cert_status
|
|
|
|
|
|
|
|
# Copy the certificate to its expected location.
|
|
|
|
os.makedirs(os.path.dirname(ssl_certificate), exist_ok=True)
|
2014-10-21 11:45:14 +00:00
|
|
|
shutil.move(fn, ssl_certificate)
|
2014-10-10 15:49:14 +00:00
|
|
|
|
2015-05-28 18:45:35 +00:00
|
|
|
ret = ["OK"]
|
2014-10-28 11:38:04 +00:00
|
|
|
|
|
|
|
# When updating the cert for PRIMARY_HOSTNAME, also update DNS because it is
|
|
|
|
# used in the DANE TLSA record and restart postfix and dovecot which use
|
|
|
|
# that certificate.
|
|
|
|
if domain == env['PRIMARY_HOSTNAME']:
|
|
|
|
ret.append( do_dns_update(env) )
|
|
|
|
|
|
|
|
shell('check_call', ["/usr/sbin/service", "postfix", "restart"])
|
|
|
|
shell('check_call', ["/usr/sbin/service", "dovecot", "restart"])
|
|
|
|
ret.append("mail services restarted")
|
|
|
|
|
2014-10-10 15:49:14 +00:00
|
|
|
# Kick nginx so it sees the cert.
|
2015-05-28 18:45:35 +00:00
|
|
|
ret.append( do_web_update(env) )
|
|
|
|
return "\n".join(ret)
|
2014-10-10 15:49:14 +00:00
|
|
|
|
2014-10-07 16:05:38 +00:00
|
|
|
def get_web_domains_info(env):
|
2015-06-04 12:32:00 +00:00
|
|
|
has_root_proxy_or_redirect = get_web_domains_with_root_overrides(env)
|
2015-02-05 13:55:57 +00:00
|
|
|
|
|
|
|
# for the SSL config panel, get cert status
|
2014-10-10 15:49:14 +00:00
|
|
|
def check_cert(domain):
|
|
|
|
from status_checks import check_certificate
|
2015-02-17 00:40:43 +00:00
|
|
|
ssl_key, ssl_certificate, ssl_via = get_domain_ssl_files(domain, env)
|
2014-10-10 15:49:14 +00:00
|
|
|
if not os.path.exists(ssl_certificate):
|
|
|
|
return ("danger", "No Certificate Installed")
|
|
|
|
cert_status, cert_status_details = check_certificate(domain, ssl_certificate, ssl_key)
|
|
|
|
if cert_status == "OK":
|
2015-02-17 00:40:43 +00:00
|
|
|
if not ssl_via:
|
2014-12-05 19:43:52 +00:00
|
|
|
return ("success", "Signed & valid. " + cert_status_details)
|
|
|
|
else:
|
|
|
|
# This is an alternate domain but using the same cert as the primary domain.
|
2015-02-17 00:40:43 +00:00
|
|
|
return ("success", "Signed & valid. " + ssl_via)
|
2014-10-10 15:49:14 +00:00
|
|
|
elif cert_status == "SELF-SIGNED":
|
|
|
|
return ("warning", "Self-signed. Get a signed certificate to stop warnings.")
|
|
|
|
else:
|
|
|
|
return ("danger", "Certificate has a problem: " + cert_status)
|
|
|
|
|
2014-10-07 16:05:38 +00:00
|
|
|
return [
|
|
|
|
{
|
|
|
|
"domain": domain,
|
|
|
|
"root": get_web_root(domain, env),
|
|
|
|
"custom_root": get_web_root(domain, env, test_exists=False),
|
2014-10-10 15:49:14 +00:00
|
|
|
"ssl_certificate": check_cert(domain),
|
2015-06-04 12:32:00 +00:00
|
|
|
"static_enabled": domain not in has_root_proxy_or_redirect,
|
2014-10-07 16:05:38 +00:00
|
|
|
}
|
|
|
|
for domain in get_web_domains(env)
|
2015-06-04 12:06:02 +00:00
|
|
|
] + \
|
|
|
|
[
|
|
|
|
{
|
|
|
|
"domain": domain,
|
|
|
|
"ssl_certificate": check_cert(domain),
|
|
|
|
"static_enabled": False,
|
|
|
|
}
|
|
|
|
for domain in get_default_www_redirects(env)
|
2014-10-07 16:05:38 +00:00
|
|
|
]
|