routeros-scripts/doc/check-certificates.md

79 lines
2.3 KiB
Markdown
Raw Normal View History

2020-03-27 20:41:18 +00:00
Renew certificates and notify on expiration
===========================================
[⬅️ Go back to main README](../README.md)
2020-03-27 20:41:18 +00:00
> **Info**: This script can not be used on its own but requires the base
2022-02-11 22:34:39 +00:00
> installation. See [main README](../README.md) for details.
2020-03-27 20:41:18 +00:00
Description
-----------
This script tries to download and renew certificates, then notifies about
certificates that are still about to expire.
2021-06-17 13:23:51 +00:00
### Sample notification
![check-certificates notification](check-certificates.d/notification.avif)
2021-06-17 13:23:51 +00:00
2020-03-27 20:41:18 +00:00
Requirements and installation
-----------------------------
Just install the script:
$ScriptInstallUpdate check-certificates;
Configuration
-------------
For automatic download and renewal of certificates you need configuration
in `global-config-overlay`, these are the parameters:
* `CertRenewPass`: an array of passphrases to try
* `CertRenewTime`: on what remaining time to try a renew
2020-03-27 20:41:18 +00:00
* `CertRenewUrl`: the url to download certificates from
* `CertWarnTime`: on what remaining time to warn via notification
2020-03-27 20:41:18 +00:00
> **Info**: Copy relevant configuration from
> [`global-config`](../global-config.rsc) (the one without `-overlay`) to
> your local `global-config-overlay` and modify it to your specific needs.
Certificates on the web server should be named by their common name, like
`CN.pem` (`PEM` format) or`CN.p12` (`PKCS#12` format). Alternatively any
subject alternative name (aka *Subject Alt Name* or *SAN*) can be used.
2020-03-27 20:41:18 +00:00
Also notification settings are required for
[e-mail](mod/notification-email.md),
[matrix](mod/notification-matrix.md),
[ntfy](mod/notification-ntfy.md) and/or
[telegram](mod/notification-telegram.md).
2020-03-27 20:41:18 +00:00
Usage and invocation
--------------------
Just run the script:
/system/script/run check-certificates;
2020-03-27 20:41:18 +00:00
... or create a scheduler for periodic execution:
/system/scheduler/add interval=1d name=check-certificates on-event="/system/script/run check-certificates;" start-time=startup;
2020-03-27 20:41:18 +00:00
Tips & Tricks
-------------
The script checks for full connectivity before acting, so scheduling at
startup is perfectly valid:
/system/scheduler/add name=check-certificates@startup on-event="/system/script/run check-certificates;" start-time=startup;
2020-03-27 20:41:18 +00:00
See also
--------
* [Renew locally issued certificates](certificate-renew-issued.md)
---
[⬅️ Go back to main README](../README.md)
[⬆️ Go back to top](#top)