Server IP : 195.201.23.43 / Your IP : 3.141.40.192 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/webmin/virtual-server/ |
Upload File : |
#!/usr/bin/perl # Request and install a cert and key from Let's Encrypt require './virtual-server-lib.pl'; &ReadParse(); &error_setup($text{'letsencrypt_err'}); $d = &get_domain($in{'dom'}); &can_edit_domain($d) && &can_edit_ssl() && &can_edit_letsencrypt() && (&domain_has_website($d) || $d->{'dns'}) || &error($text{'edit_ecannot'}); $d->{'disabled'} && &error($text{'letsencrypt_eenabled'}); if ($in{'dname_def'}) { @dnames = &get_hostnames_for_ssl($d); $custom_dname = undef; } else { foreach my $dname (split(/\s+/, $in{'dname'})) { $dname = lc(&parse_domain_name($dname)); my $checkname = $dname; $checkname =~ s/^www\.//; $checkname =~ s/^\*\.//; $err = &valid_domain_name($checkname); &error($err) if ($err); push(@dnames, $dname); } $custom_dname = join(" ", @dnames); } @dnames || &error($text{'letsencrypt_ednames'}); push(@dnames, "*.".$d->{'dom'}) if ($in{'dwild'}); # Filter wildcard to prevent redundancy my $fdnames = &filter_ssl_wildcards(\@dnames); @dnames = @$fdnames; if ($in{'only'}) { # Just update renewal date and domains $d->{'letsencrypt_dname'} = $custom_dname; $d->{'letsencrypt_dwild'} = $in{'dwild'}; $d->{'letsencrypt_renew'} = $in{'renew'}; &save_domain($d); &redirect("cert_form.cgi?dom=$d->{'id'}"); } else { &ui_print_unbuffered_header(&domain_in($d), $text{'letsencrypt_title'}, ""); # Build list of domains my @cdoms = ( $d ); if (!$d->{'alias'} && $in{'dname_def'}) { push(@cdoms, grep { &domain_has_website($_) } &get_domain_by("alias", $d->{'id'})); } # Validate connectivity if ($in{'connectivity'} == 2) { &$first_print(&text('letsencrypt_conncheck', join(" ", map { &show_domain_name($_) } @cdoms))); my @errs; foreach my $cd (@cdoms) { push(@errs, &check_domain_connectivity($cd, { 'mail' => 1, 'ssl' => 1 })); } if (@errs) { &$second_print($text{'letsencrypt_connerrs'}); print "<ul>\n"; foreach my $e (@errs) { print "<li>",$e->{'desc'}," : ", $e->{'error'},"\n"; } print "</ul>\n"; &ui_print_footer(&domain_footer_link($d), "", $text{'index_return'}); return; } else { &$second_print($text{'letsencrypt_connok'}); } } # Validate config if ($in{'connectivity'} >= 1) { &$first_print(&text('letsencrypt_validcheck', join(" ", map { &show_domain_name($_) } @cdoms))); my $vcheck = $in{'dwild'} ? ['dns'] : ['web']; my @errs = map { &validate_letsencrypt_config($_, $vcheck) } @cdoms; if (@errs) { &$second_print($text{'letsencrypt_connerrs'}); print "<ul>\n"; foreach my $e (@errs) { print "<li>",$e->{'desc'}," : ", $e->{'error'},"\n"; } print "</ul>\n"; &ui_print_footer(&domain_footer_link($d), "", $text{'index_return'}); return; } else { &$second_print($text{'letsencrypt_connok'}); } } # Run the before command &set_domain_envs($d, "SSL_DOMAIN"); $merr = &making_changes(); &reset_domain_envs($d); &error(&text('setup_emaking', "<tt>$merr</tt>")) if (defined($merr)); &$first_print(&text('letsencrypt_doing2', join(", ", map { "<tt>$_</tt>" } @dnames))); &foreign_require("webmin"); $phd = &public_html_dir($d); $before = &before_letsencrypt_website($d); ($ok, $cert, $key, $chain) = &request_domain_letsencrypt_cert( $d, \@dnames, 0, undef, undef, $in{'ctype'}); &after_letsencrypt_website($d, $before); if (!$ok) { &$second_print(&text('letsencrypt_failed', $cert)); } else { &$second_print($text{'letsencrypt_done'}); # Figure out which services (webmin, postfix, etc) # were using the old cert @beforecerts = &get_all_domain_service_ssl_certs($d); # Worked .. copy to the domain &obtain_lock_ssl($d); &$first_print($text{'newkey_apache'}); &install_letsencrypt_cert($d, $cert, $key, $chain); # Save renewal state $d->{'letsencrypt_dname'} = $custom_dname; $d->{'letsencrypt_dwild'} = $in{'dwild'}; $d->{'letsencrypt_renew'} = $in{'renew'}; $d->{'letsencrypt_ctype'} = $in{'ctype'} =~ /^ec/ ? "ecdsa" : "rsa"; $d->{'letsencrypt_last'} = time(); $d->{'letsencrypt_last_success'} = time(); &refresh_ssl_cert_expiry($d); &save_domain($d); # Update other services using the cert &update_all_domain_service_ssl_certs($d, \@beforecerts); # For domains that were using the SSL cert on this domain # originally but can no longer due to the cert hostname # changing, break the linkage &break_invalid_ssl_linkages($d); # Copy SSL directives to domains using same cert foreach $od (&get_domain_by("ssl_same", $d->{'id'})) { next if (!&domain_has_ssl_cert($od)); $od->{'ssl_cert'} = $d->{'ssl_cert'}; $od->{'ssl_key'} = $d->{'ssl_key'}; $od->{'ssl_newkey'} = $d->{'ssl_newkey'}; $od->{'ssl_csr'} = $d->{'ssl_csr'}; $od->{'ssl_pass'} = $d->{'ssl_pass'}; &save_domain_passphrase($od); &save_domain($od); } # Update DANE DNS records &sync_domain_tlsa_records($d); foreach $od (&get_domain_by("ssl_same", $d->{'id'})) { &sync_domain_tlsa_records($od); } &release_lock_ssl($d); &$second_print($text{'setup_done'}); # Run the after command &set_domain_envs($d, "SSL_DOMAIN"); local $merr = &made_changes(); &$second_print(&text('setup_emade', "<tt>$merr</tt>")) if (defined($merr)); &reset_domain_envs($d); &run_post_actions(); &webmin_log("letsencrypt", "domain", $d->{'dom'}, $d); } &ui_print_footer("cert_form.cgi?dom=$in{'dom'}", $text{'cert_return'}, &domain_footer_link($d), "", $text{'index_return'}); }Private