Hugo Part 3: Auto Renew Certificate

󰃭 2025-03-20

For servers that completely block port 80 for security requirements, we need to temporarily open port 80 when renewing Let’s Encrypt certificates. Here’s an automated solution using systemd timer and AWS CLI (Assume you already configured it).

Create the renewal script:

#!/bin/bash
# /usr/local/bin/certbot-renew-with-sg.sh

SG_ID="sg-CAFEBABE7355608"
RULE_DESCRIPTION="Temporary HTTP for LetsEncrypt"

add_sg_rule() {
    aws ec2 authorize-security-group-ingress \
        --group-id $SG_ID \
        --protocol tcp \
        --port 80 \
        --cidr 0.0.0.0/0 \
        --description "$RULE_DESCRIPTION"
    sleep 10
}

remove_sg_rule() {
    aws ec2 revoke-security-group-ingress \
        --group-id $SG_ID \
        --protocol tcp \
        --port 80 \
        --cidr 0.0.0.0/0
}

do_renew() {
    certbot renew
}

add_sg_rule

for i in {1..3}; do
    if do_renew; then
        break
    else
        if [ $i -eq 3 ]; then
            remove_sg_rule
            exit 1
        fi
        sleep 30
    fi
done

remove_sg_rule

Create systemd service:

# /etc/systemd/system/certbot-renew-sg.service
[Unit]
Description=Renew LetsEncrypt certificate with temporary SG rule
After=network-online.target

[Service]
Type=oneshot
ExecStart=/usr/local/bin/certbot-renew-with-sg.sh
User=root

[Install]
WantedBy=multi-user.target

Create systemd timer:

# /etc/systemd/system/certbot-renew-sg.timer
[Unit]
Description=Run certbot renewal with SG rule monthly

[Timer]
OnCalendar=*-*-01 03:00:00
RandomizedDelaySec=3600
Persistent=true

[Install]
WantedBy=timers.target

Enable the service:

chmod +x /usr/local/bin/certbot-renew-with-sg.sh
systemctl daemon-reload
systemctl enable certbot-renew-sg.timer
systemctl start certbot-renew-sg.timer

The timer will run around 3 AM on the first day of each month with a random delay of up to one hour. You can manually trigger the renewal process with:

systemctl start certbot-renew-sg.service