mirror of
https://github.com/SnowMB/traefik-certificate-extractor.git
synced 2025-01-19 06:19:33 +08:00
Added basic extractor
This commit is contained in:
parent
4cc43d84b6
commit
3711251c3a
23
.gitignore
vendored
Normal file
23
.gitignore
vendored
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
certs/
|
||||||
|
data/
|
||||||
|
|
||||||
|
# Python ignores
|
||||||
|
__pycache__/
|
||||||
|
*.py[cod]
|
||||||
|
*$py.class
|
||||||
|
.Python
|
||||||
|
build/
|
||||||
|
develop-eggs/
|
||||||
|
dist/
|
||||||
|
downloads/
|
||||||
|
eggs/
|
||||||
|
.eggs/
|
||||||
|
lib/
|
||||||
|
lib64/
|
||||||
|
parts/
|
||||||
|
sdist/
|
||||||
|
var/
|
||||||
|
wheels/
|
||||||
|
*.egg-info/
|
||||||
|
.installed.cfg
|
||||||
|
*.egg
|
18
Dockerfile
Normal file
18
Dockerfile
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
# Use Python on Alpine Linux as base image
|
||||||
|
FROM python:alpine
|
||||||
|
|
||||||
|
# Create working directory
|
||||||
|
RUN mkdir -p /app
|
||||||
|
WORKDIR /app
|
||||||
|
|
||||||
|
# Copy requirements.txt to force Docker not to use the cache
|
||||||
|
COPY requirements.txt /app
|
||||||
|
|
||||||
|
# Install app dependencies
|
||||||
|
RUN pip3 install -r requirements.txt
|
||||||
|
|
||||||
|
# Copy app source
|
||||||
|
COPY . /app
|
||||||
|
|
||||||
|
# Define entrypoint of the app
|
||||||
|
ENTRYPOINT ["python3", "extractor.py"]
|
29
README.md
29
README.md
@ -1,2 +1,29 @@
|
|||||||
# traefik-certificate-extractor
|
# Traefik Certificate Extractor
|
||||||
|
|
||||||
Tool to extract Let's Encrypt certificates from Traefik's ACME storage file.
|
Tool to extract Let's Encrypt certificates from Traefik's ACME storage file.
|
||||||
|
|
||||||
|
## Installation
|
||||||
|
```
|
||||||
|
git clone https://github.com/DanielHuisman/traefik-certificate-extractor
|
||||||
|
```
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
```
|
||||||
|
python3 extractor.py [directory]
|
||||||
|
```
|
||||||
|
Default directory is `./data`. The output directory is `./certs`.
|
||||||
|
|
||||||
|
## Output
|
||||||
|
```
|
||||||
|
certs/
|
||||||
|
example.com/
|
||||||
|
cert.pem
|
||||||
|
chain.pem
|
||||||
|
fullchain.pem
|
||||||
|
privkey.pem
|
||||||
|
sub.example.nl/
|
||||||
|
cert.pem
|
||||||
|
chain.pem
|
||||||
|
fullchain.pem
|
||||||
|
privkey.pem
|
||||||
|
```
|
||||||
|
83
extractor.py
Normal file
83
extractor.py
Normal file
@ -0,0 +1,83 @@
|
|||||||
|
import sys
|
||||||
|
import os
|
||||||
|
import errno
|
||||||
|
import time
|
||||||
|
import json
|
||||||
|
from base64 import b64decode
|
||||||
|
from watchdog.observers import Observer
|
||||||
|
from watchdog.events import FileSystemEventHandler
|
||||||
|
|
||||||
|
class Handler(FileSystemEventHandler):
|
||||||
|
def on_created(self, event):
|
||||||
|
self.handle(event)
|
||||||
|
|
||||||
|
def on_modified(self, event):
|
||||||
|
self.handle(event)
|
||||||
|
|
||||||
|
def handle(self, event):
|
||||||
|
# Check if it's a JSON file
|
||||||
|
if not event.is_directory and event.src_path.endswith('.json'):
|
||||||
|
print('Certificates changed')
|
||||||
|
|
||||||
|
# Read JSON file
|
||||||
|
data = json.loads(open(event.src_path).read())
|
||||||
|
certs = data['DomainsCertificate']['Certs']
|
||||||
|
|
||||||
|
# Loop over all certificates
|
||||||
|
for c in certs:
|
||||||
|
# Decode private key, certificate and chain
|
||||||
|
privatekey = b64decode(c['Certificate']['PrivateKey']).decode('utf-8')
|
||||||
|
fullchain = b64decode(c['Certificate']['Certificate']).decode('utf-8')
|
||||||
|
start = fullchain.find('-----BEGIN CERTIFICATE-----', 1)
|
||||||
|
cert = fullchain[0:start]
|
||||||
|
chain = fullchain[start:]
|
||||||
|
|
||||||
|
# Create domain directory if it doesn't exist
|
||||||
|
directory = 'certs/' + c['Certificate']['Domain'] + '/'
|
||||||
|
try:
|
||||||
|
os.makedirs(directory)
|
||||||
|
except OSError as error:
|
||||||
|
if error.errno != errno.EEXIST:
|
||||||
|
raise
|
||||||
|
|
||||||
|
# Write private key, certificate and chain to file
|
||||||
|
with open(directory + 'privkey.pem', 'w') as f:
|
||||||
|
f.write(privatekey)
|
||||||
|
|
||||||
|
with open(directory + 'cert.pem', 'w') as f:
|
||||||
|
f.write(cert)
|
||||||
|
|
||||||
|
with open(directory + 'chain.pem', 'w') as f:
|
||||||
|
f.write(chain)
|
||||||
|
|
||||||
|
with open(directory + 'fullchain.pem', 'w') as f:
|
||||||
|
f.write(fullchain)
|
||||||
|
|
||||||
|
print('Extracted certificate for: ' + c['Domains']['Main'] + (', ' + ', '.join(c['Domains']['SANs']) if c['Domains']['SANs'] else ''))
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
# Determine path to watch
|
||||||
|
path = sys.argv[1] if len(sys.argv) > 1 else './data'
|
||||||
|
|
||||||
|
# Create output directory if it doesn't exist
|
||||||
|
try:
|
||||||
|
os.makedirs('certs')
|
||||||
|
except OSError as error:
|
||||||
|
if error.errno != errno.EEXIST:
|
||||||
|
raise
|
||||||
|
|
||||||
|
# Create event handler and observer
|
||||||
|
event_handler = Handler()
|
||||||
|
observer = Observer()
|
||||||
|
|
||||||
|
# Register the directory to watch
|
||||||
|
observer.schedule(event_handler, path)
|
||||||
|
|
||||||
|
# Main loop to watch the directory
|
||||||
|
observer.start()
|
||||||
|
try:
|
||||||
|
while True:
|
||||||
|
time.sleep(1)
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
observer.stop()
|
||||||
|
observer.join()
|
1
requirements.txt
Normal file
1
requirements.txt
Normal file
@ -0,0 +1 @@
|
|||||||
|
watchdog
|
Loading…
x
Reference in New Issue
Block a user