服务器环境
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
| $ cat /etc/os-release
PRETTY_NAME="Debian GNU/Linux 12 (bookworm)"
NAME="Debian GNU/Linux"
VERSION_ID="12"
VERSION="12 (bookworm)"
VERSION_CODENAME=bookworm
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"
$ uname -a
Linux ushost 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.128-1 (2025-02-07) x86_64 GNU/Linux
$ certbot --version
certbot 2.1.0
|
获取证书
token已脱敏
1
2
3
| sudo apt -y install certbot
sudo mkdir -p /opt/certbot/dns
|
编辑验证域名脚本/opt/certbot/dns/auth.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
| #!/bin/bash
# Get your API key from https://www.cloudflare.com/a/account/my-account
API_TOKEN="Bearer V9nmyI_o20Avum44JI6YLsyH9bNpMS8Y7fuVvSCo"
DOMAIN="yanyong.cc"
# Get the Cloudflare zone id
ZONE_ID=$(curl -sS -X GET "https://api.cloudflare.com/client/v4/zones?name=$DOMAIN" \
-H "Content-Type: application/json" \
-H "Authorization: $API_TOKEN" | python3 -c "import sys, json; print(json.load(sys.stdin)['result'][0]['id'])")
# Create TXT record
CREATE_DOMAIN="_acme-challenge.$CERTBOT_DOMAIN"
RECORD_ID=$(curl -sS -X POST "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/dns_records" \
-H "Content-Type: application/json" \
-H "Authorization: $API_TOKEN" \
--data '{"type":"TXT","name":"'"$CREATE_DOMAIN"'","content":"'"$CERTBOT_VALIDATION"'","ttl":120}' \
| python3 -c "import sys, json; print(json.load(sys.stdin)['result']['id'])")
# Save info for cleanup
if [ ! -d /tmp/CERTBOT_$CERTBOT_DOMAIN ]; then
mkdir -m 0700 /tmp/CERTBOT_$CERTBOT_DOMAIN
fi
echo $ZONE_ID > /tmp/CERTBOT_$CERTBOT_DOMAIN/ZONE_ID
echo $RECORD_ID >> /tmp/CERTBOT_$CERTBOT_DOMAIN/RECORD_ID
# Sleep to make sure the change has time to propagate over to DNS
sleep 30
|
编辑清理域名脚本/opt/certbot/dns/clean.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
| #!/bin/bash
# Get your API key from https://www.cloudflare.com/a/account/my-account
API_TOKEN="Bearer V9nmyI_o20Avum44JI6YLsyH9bNpMS8Y7fuVvSCo"
if [ -f /tmp/CERTBOT_$CERTBOT_DOMAIN/ZONE_ID ]; then
ZONE_ID=$(cat /tmp/CERTBOT_$CERTBOT_DOMAIN/ZONE_ID)
rm -f /tmp/CERTBOT_$CERTBOT_DOMAIN/ZONE_ID
fi
if [ -f /tmp/CERTBOT_$CERTBOT_DOMAIN/RECORD_ID ]; then
RECORD_ID=$(cat /tmp/CERTBOT_$CERTBOT_DOMAIN/RECORD_ID)
rm -f /tmp/CERTBOT_$CERTBOT_DOMAIN/RECORD_ID
fi
# Remove the challenge TXT record from the zone
if [ -n "${ZONE_ID}" ] && [ -n "${RECORD_ID}" ]; then
for id in $RECORD_ID; do
curl -sS -X DELETE "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/dns_records/$id" \
-H "Content-Type: application/json" \
-H "Authorization: $API_TOKEN"
done
fi
|
添加执行权限
1
2
| sudo chmod +x /opt/certbot/dns/auth.sh
sudo chmod +x /opt/certbot/dns/clean.sh
|
获取证书,先添加--dry-run
测试一下是否正确
从2.0.0版本开始private keys默认ecdsa算法,有需要可以--key-type=rsa
指定rsa算法
1
2
3
4
5
6
7
8
| sudo certbot certonly -d yanyong.cc -d *.yanyong.cc \
--email [email protected] \
--agree-tos \
--no-eff-email \
--manual --preferred-challenges=dns \
--manual-auth-hook /opt/certbot/dns/auth.sh \
--manual-cleanup-hook /opt/certbot/dns/clean.sh \
--deploy-hook 'systemctl reload nginx'
|
测试续签
1
| sudo certbot renew --dry-run
|
nginx配置参考
1
2
3
| ssl_certificate /etc/letsencrypt/live/yanyong.cc/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/yanyong.cc/privkey.pem;
ssl_trusted_certificate /etc/letsencrypt/live/yanyong.cc/chain.pem;
|
参考链接
https://eff-certbot.readthedocs.io/en/stable/using.html#
https://developers.cloudflare.com/api/