diff --git a/seed/applicationservice/2022.03.08/base/funcs/funcs.py b/seed/applicationservice/2022.03.08/base/funcs/funcs.py
index 6b32c0f..556642e 100644
--- a/seed/applicationservice/2022.03.08/base/funcs/funcs.py
+++ b/seed/applicationservice/2022.03.08/base/funcs/funcs.py
@@ -6,8 +6,8 @@ from os.path import dirname as _dirname, abspath as _abspath, join as _join, isf
from os import makedirs as _makedirs
-HERE = _dirname(_abspath(__main__.__file__))
-PASSWORD_DIR = _join(HERE, 'password')
+_HERE = _dirname(_abspath(__main__.__file__))
+_PASSWORD_DIR = _join(_HERE, 'password')
def get_password(server_name: str,
@@ -56,7 +56,7 @@ def _set_password(server_name: str,
) -> str:
if not server_name or not username:
return
- dir_name = _join('password', server_name, description)
+ dir_name = _join(_PASSWORD_DIR, server_name, description)
if not _isdir(dir_name):
_makedirs(dir_name)
file_name = _join(dir_name, username)
diff --git a/seed/applicationservice/2022.03.08/gitea/manual/image/preinstall/gitea.sh b/seed/applicationservice/2022.03.08/gitea/manual/image/preinstall/gitea.sh
index d71aaf2..dc4db79 100644
--- a/seed/applicationservice/2022.03.08/gitea/manual/image/preinstall/gitea.sh
+++ b/seed/applicationservice/2022.03.08/gitea/manual/image/preinstall/gitea.sh
@@ -1 +1 @@
-PKG="$PKG git openssh-server"
+PKG="$PKG git"
diff --git a/seed/applicationservice/2022.03.08/letsencrypt/README.md b/seed/applicationservice/2022.03.08/letsencrypt/README.md
new file mode 100644
index 0000000..cc48ba5
--- /dev/null
+++ b/seed/applicationservice/2022.03.08/letsencrypt/README.md
@@ -0,0 +1,34 @@
+# Gestion Let's encrypt
+
+## Fonctionnement du service application
+
+Ce service gère le téléchargement et la mise à disposition des certificats Let's encrypt.
+
+Le certificat doit être disponible avant l'installation de la machine de destination.
+C'est pourquoi ce le certificat est téléchargement grâce au défi DNS-1.
+
+Il faut donc installer certbot + python3-certbot-dns-xxx (sur une Fedora), par exemple pour OVH "python3-certbot-dns-ovh".
+
+Attention, en utilisant ce service vous acceptez les conditions d'utilisation de Let's Encrypt !
+
+## Utiliser Let's encrypt dans une machine
+
+Dans applicationservice.yml ajouter la dépendance "letsencrypt".
+
+Sur la machine installer Certb
+
+## Configurer Let's encrypt
+
+```
+rougail.letsencrypt.domain_names": ["nom de domaine"],
+rougail.letsencrypt.authority_cn": {"0": "nom de domaine"},
+rougail.letsencrypt.authority_name": {"0": "NomAutorité"},
+rougail.letsencrypt.plugin_name": {"0": "ovh"},
+rougail.letsencrypt.credential_filename": {"0": "/home/user/ovh.ini"},
+rougail.letsencrypt.email": {"0": "gnunux@gnunux.info"}
+```
+
+## Exemple avec OVH
+
+Installation du greffon Certbot : https://certbot-dns-ovh.readthedocs.io/en/stable/
+Création d'une clef d'API : https://eu.api.ovh.com/createToken/
diff --git a/seed/applicationservice/2022.03.08/letsencrypt/applicationservice.yml b/seed/applicationservice/2022.03.08/letsencrypt/applicationservice.yml
new file mode 100644
index 0000000..3cd83fa
--- /dev/null
+++ b/seed/applicationservice/2022.03.08/letsencrypt/applicationservice.yml
@@ -0,0 +1,4 @@
+format: '0.1'
+description: Let's encrypt
+depends:
+ - base-fedora-35
diff --git a/seed/applicationservice/2022.03.08/letsencrypt/dictionaries/20-letsencrypt.xml b/seed/applicationservice/2022.03.08/letsencrypt/dictionaries/20-letsencrypt.xml
new file mode 100644
index 0000000..a9f395e
--- /dev/null
+++ b/seed/applicationservice/2022.03.08/letsencrypt/dictionaries/20-letsencrypt.xml
@@ -0,0 +1,25 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ authority_cn
+ authority_name
+ plugin_name
+ credential_filename
+ email
+ domain_names
+
+
+
+
+
diff --git a/seed/applicationservice/2022.03.08/letsencrypt/funcs/letsencrypt.py b/seed/applicationservice/2022.03.08/letsencrypt/funcs/letsencrypt.py
new file mode 100644
index 0000000..2270e43
--- /dev/null
+++ b/seed/applicationservice/2022.03.08/letsencrypt/funcs/letsencrypt.py
@@ -0,0 +1,75 @@
+import __main__
+from subprocess import run as _run
+from os.path import dirname as _dirname, abspath as _abspath, join as _join, isfile as _isfile, isdir as _isdir
+from datetime import datetime as _datetime
+from shutil import copyfile as _copyfile
+from os import makedirs as _makedirs
+
+
+
+_HERE = _dirname(_abspath(__main__.__file__))
+_LE_DIR = _join(_HERE, 'pki', 'letsencrypt')
+_X509_DIR = _join(_HERE, 'pki', 'x509')
+
+
+def letsencrypt_certif(domain: str,
+ authority_cn: str,
+ authority_name: str,
+ plugin_name: str,
+ credential_filename: str,
+ email: str,
+ ) -> None:
+ if None in (domain, authority_cn, authority_name, plugin_name, credential_filename, email):
+ return
+ date_file = _join(_LE_DIR, f'{domain}.date')
+ date = _datetime.now()
+ today = str(date.date())
+ if not _isfile(date_file):
+ letsencrypt_date = '0'
+ else:
+ with open(date_file, 'r') as fh:
+ letsencrypt_date = fh.read().strip()
+ if letsencrypt_date != today:
+ print(f"Obtain or renew Let's Encrypt certificate for {domain}...")
+ cli_args = ['certbot',
+ 'certonly',
+ f'--dns-{plugin_name}',
+ f'--dns-{plugin_name}-credentials',
+ credential_filename,
+ '-d',
+ domain,
+ '--quiet',
+ '--config-dir',
+ f'{_LE_DIR}/{domain}/config',
+ '--work-dir',
+ f'{_LE_DIR}/{domain}/work',
+ '--logs-dir',
+ f'{_LE_DIR}/{domain}/logs',
+ '--agree-tos',
+ '-m',
+ email,
+ '--dns-ovh-propagation-seconds',
+ '360',
+ ]
+ ret = _run(cli_args, capture_output=True)
+ if ret.returncode != 0:
+ raise ValueError(ret.stderr)
+ print("Done")
+ with open(date_file, 'w') as fh:
+ fh.write(today)
+ rootdir = _join(_X509_DIR, f'{authority_name}+{authority_cn}')
+ chaindir = _join(rootdir, 'ca')
+ certdir = _join(rootdir, 'certificats', domain, 'server')
+ week_number = date.isocalendar().week
+ for dirname in (chaindir, certdir):
+ if not _isdir(dirname):
+ _makedirs(dirname)
+ _copyfile(_join(_LE_DIR, domain, 'config/live', domain, 'chain.pem'),
+ _join(chaindir, f'certificate_{week_number}.crt'),
+ )
+ _copyfile(_join(_LE_DIR, domain, 'config/live', domain, 'privkey.pem'),
+ _join(certdir, 'private.key'),
+ )
+ _copyfile(_join(_LE_DIR, domain, 'config/live', domain, 'fullchain.pem'),
+ _join(certdir, f'certificate_{week_number}.crt'),
+ )
diff --git a/seed/applicationservice/2022.03.08/postfix-relay/funcs/opendkim.py b/seed/applicationservice/2022.03.08/postfix-relay/funcs/opendkim.py
index 608947a..d907bf2 100644
--- a/seed/applicationservice/2022.03.08/postfix-relay/funcs/opendkim.py
+++ b/seed/applicationservice/2022.03.08/postfix-relay/funcs/opendkim.py
@@ -10,12 +10,12 @@ def _eprint(*args, **kwargs):
_dknewkey.eprint = _eprint
-HERE = _dirname(_abspath(__main__.__file__))
-DKIM_DIR = _join(HERE, 'pki/dkim')
+_HERE = _dirname(_abspath(__main__.__file__))
+_DKIM_DIR = _join(_HERE, 'pki/dkim')
def get_dkim_key(domain_name_eth0, domain):
- dkim_dir = _join(DKIM_DIR, domain_name_eth0, domain)
+ dkim_dir = _join(_DKIM_DIR, domain_name_eth0, domain)
dkim_file_src = _join(dkim_dir, f'{domain}')
dkim_file_key = _join(dkim_dir, f'{domain}.key')
dkim_file = _join(dkim_dir, f'{domain}.dns')
diff --git a/seed/applicationservice/2022.03.08/roundcube/dictionaries/31_roundcube.xml b/seed/applicationservice/2022.03.08/roundcube/dictionaries/31_roundcube.xml
index 7304b84..be7f801 100644
--- a/seed/applicationservice/2022.03.08/roundcube/dictionaries/31_roundcube.xml
+++ b/seed/applicationservice/2022.03.08/roundcube/dictionaries/31_roundcube.xml
@@ -35,7 +35,7 @@
revprox_client_external_domainname
revprox_client_location
- /index.php/login/oauth
+ index.php/login/oauth
oauth2_client_login