Skip to main content

Quickly obtain or renew Letsencrypt ssl certificates for multiple domains. Automatically configure Nginx as a https frontend and http reverse proxy for these.

Project description

Manage multiple domains served over http and/or https using Let’s encrypt ssl certificates.

Multicerti configures nginx to act as a reverse http and https proxy server and deals automatically with the creation and renewal of ssl certificates using certbot. The nginx configuration is generated using the nginxparser module from Fatih Erikli.

The script doesn’t have a lot of options, but it provides a very quick way to deploy multiple sites over https.

Quick deployment

1. Requirements

Nginx

Multicerti requires nginx. Install it using your favorite package manager, or download it from https://nginx.org/en/download.html .

If you’ve already been using nginx on your server and already have customized nginx’s configuration, you should make a backup copy of your current nginx.conf, because multicerti will overwrite it.

On FreeBSD, enable nginx in your rc.conf by running

sysrc nginx_enable=YES

Python 3

Python 3.3 or later is required. If you haven’t already, install it using your favorite package manager. Make sure to also have pip3 installed. Usually, you can install pip3 by running:

python3 -m ensurepip

On Debian or Ubuntu, you’ll probably need to install pip3 from the package manager. You’ll also need to get the python3-dev, libssl-dev and libffi-dev packages so that the python modules required by multicerti correctly install.

apt-get install python3-pip python3-dev libssl-dev libffi-dev

2. Install multicerti

Install

pip3 install multicerti

Then run

multicerti reload

so that multicerti inspects your nginx installation and generates its default configuration files.

3. Edit the multicerti.conf file

It’s a json file. By default, its location is /usr/local/etc/multicerti/multicerti.conf. Just add one or more virtual hosts to the vhosts list. Also add a registration_email key to the configuration file. This email is used when registering the ssl certificates with certbot.

{
    "vhosts": [
        {
            "domains": ["mysite.example.com"],
            "protocols": ["http", "https"],
            "backends": ["10.0.0.2:8080", "10.0.0.2:8081"],
            "http_to_https": true
        },
        {
            "domains": ["secure.example.com", "payment.example.com"],
            "protocols": ["https"],
            "backends": ["10.0.0.3:80"]
        },
        {
            "domains": ["oldsite.example.com"],
            "protocols": ["http", "https"],
            "redirect": "https://mysite.example.com"
        }

    ],
    "registration_email": "sysadmin@example.com"
}

You can use the “.example.com” string to add both the example.com and www.example.com domains to the list. You can also set a specific email address for a virtual host entry. For example:

{
    "vhosts": [
        {
            "domains": [".example.com"],
            "protocols": ["http", "https"],
            "backends": ["10.0.0.2:8080", "10.0.0.2:8081"],
            "registration_email": "bob@example.com",
            "http_to_https": true
        }
    ],
    "registration_email": "sysadmin@example.com",
}

This would register the example.com and www.example.com domains with the same ssl certificate, using bob@example.com as a registration email address. The http_to_https option, as its name implies, redirects all http requests to https urls.

4. Run multicerti

If you’re using a server on which you had already customized your nginx installation, you should backup your nginx.conf, because multicerti will overwrite it.

Now run, as root:

multicerti reload

This is all you have to do. This will register and/or renew all your ssl certificates, and direct all your http and https traffic to the correct backends.

Let’s Encrypt certificates issued by certbot have a validity of 90 days. Running multicerti reload as a monthly cron task will renew your certificates in due time. Pick a random day of the month and a random time of the day if you do that (not the first of the month at midnight). This is to avoid traffic peaks to the Let’s Encrypt’s servers.

Virtual hosts definition

Each virtual host is defined as single json dictionnary that you add to the "vhosts" entry of the multicerti.conf file. Each virtual host definition must contain the following keys:

  • "domains"

    This is a list of domains. You can use the ".example.com" shortcut to add both the www.example.com and example.com domain.

    {
        "domains": [".example.com", "admin.example.com"],
        ...
    }
  • "protocols"

    A list of protocols. The only available protocols are "http" or "https". You can supply one of them, or both. If you only supply "http", no ssl certificate will be issued for the domains of this virtual host.

    {
        "domains": [".example.com", "admin.example.com"],
        "protocols": ["http", "https"],
        ...
    }

Each virtual host must also contain exactly one of the following three keys:

  • "backends"

    A list of "ip:port" strings. The http and/or https requests for the matching domains will be proxied to these adresses.

    {
        "domains": [".example.com", "admin.example.com"],
        "protocols": ["http", "https"],
        "backends": ["10.0.0.4:8080", "10.0.0.4:8081"]
    }
  • "redirect"

    A redirect url. For example:

    {
        "domains": ["old-site.example.com"],
        "protocols": ["http"],
        "redirect": "http://new-site.example.com"
    }

    A request for http://old-site.example.com/path/ would receive a 301 http redirect to http://new-site.example.com/path/ response.

  • "root"

    The path of a directory on the local machine. This is if you want to serve static content directly.

    {
        "domains": ["static.example.com"],
        "protocols": ["http", "https"],
        "root": "/var/www/static.example.com/"
    }

Each virtual host can also contain one of the following optional keys:

  • "http_to_https"

    This would redirect all the requests to http://domain.com/url to https://domain.com/url

    {
        "domains": [".example.com", "admin.example.com"],
        "protocols": ["http", "https"],
        "backends": ["10.0.0.4:8080", "10.0.0.4:8081"],
        "http_to_https": true
    }
  • "registration_email"

    An e-mail address to use during the registration process with letsencrypt. You’ll receive notices of certificate expirations at this address. If you don’t supply a "registration_email" in the virtual host configuration, the global "registration_email" of the multicerti.conf will be used.

Multicerti.conf

The multicerti.conf file is located at /usr/local/etc/multicerti/multicerti.conf. If you want to use a different file, you can use the -c option:

multicerti reload -c /my/directory/my_multicerti.conf

This json configuration file should contain the following keys:

  • "vhosts"

    A list of virtual hosts represented as dictionnaries, as described in the predeceding section

  • "registration_email"

    Unless you only use http and no https, you’ll need to supply an e-mail address to use during the automated ssl certificate registration process.

The following keys are already created for you on the first run of multicerti. In most cases you don’t need to change any of them.

  • "nginx_status"

    The command used to check if nginx is running. It should be something like ["service", "nginx", "status"] or ["systemctl", "status", "nginx"]. Note that it’s a list, not a string.

  • "nginx_start"

    The command used to start nginx. It should be something like ["service", "nginx", "start"] or ["systemctl", "start", "nginx"]. Note that it’s a list, not a string.

  • "nginx_reload"

    The command used to reload nginx configuration. It should be something like ["service", "nginx", "reload"] or ["systemctl", "reload", "nginx"]. Note that it’s a list, not a string.

  • "nginx"

    The path of the nginx binary. If it’s already on your PATH, you can just keep the default: "nginx". Otherwise maybe you’ll want to specify the full path, for example "/usr/local/sbin/nginx".

  • "nginx_conf_location"

    The location of the nginx.conf file that should be overwritten by multicerti. Depending on your system, the initial configuration is set either to "/usr/local/etc/nginx/nginx.conf" or to "/etc/nginx/nginx.conf".

  • "nginx_conf_template"

    The location of the template file used by multicerti to generate the nginx.conf file. The default is "/usr/local/etc/multicerti/nginx.conf.tpl". More on that in the next section.

Customize the generated nginx configuration

You can customize the nginx.conf that is generated by multicerti by editing the nginx.conf.tpl file (whose default location is /usr/local/etc/multicerti/nginx.conf.tpl ). It looks like a normal nginx.conf file, but it contains two placeholders: %(upstreams)s and %(servers)s. You can change everything else (number of nginx workers, logging options etc…). Then regenerate nginx.conf using the command:

multicerti reload --skip-certbot

The –skip-certbot option prevents multicerti from trying to create or renew ssl certificates. This is what you want if you’re only changing the number of nginx workers or the location of the nginx log files for example.

GitHub repo

https://github.com/leforestier/multicerti

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

multicerti-0.3.0.tar.gz (14.9 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page