neilpang
3164b5ab13
|
7 years ago | |
---|---|---|
.. | ||
README.md | 7 years ago | |
apache.sh | 8 years ago | |
cpanel_uapi.sh | 7 years ago | |
dovecot.sh | 8 years ago | |
exim4.sh | 8 years ago | |
fritzbox.sh | 7 years ago | |
haproxy.sh | 8 years ago | |
keychain.sh | 8 years ago | |
kong.sh | 8 years ago | |
myapi.sh | 8 years ago | |
mysqld.sh | 8 years ago | |
nginx.sh | 8 years ago | |
opensshd.sh | 8 years ago | |
pureftpd.sh | 8 years ago | |
strongswan.sh | 7 years ago | |
unifi.sh | 8 years ago | |
vsftpd.sh | 8 years ago |
README.md
Using deploy api
Before you can deploy your cert, you must issue the cert first.
Here are the scripts to deploy the certs/key to the server/services.
1. Deploy the certs to your cpanel host
If you want to deploy using cpanel UAPI see 7.
(cpanel deploy hook is not finished yet, this is just an example.)
Then you can deploy now:
export DEPLOY_CPANEL_USER=myusername
export DEPLOY_CPANEL_PASSWORD=PASSWORD
acme.sh --deploy -d example.com --deploy-hook cpanel
2. Deploy ssl cert on kong proxy engine based on api
Before you can deploy your cert, you must issue the cert first. Currently supports Kong-v0.10.x.
acme.sh --deploy -d ftp.example.com --deploy-hook kong
3. Deploy the cert to remote server through SSH access
(TODO)
4. Deploy the cert to local vsftpd server
acme.sh --deploy -d ftp.example.com --deploy-hook vsftpd
The default vsftpd conf file is /etc/vsftpd.conf
, if your vsftpd conf is not in the default location, you can specify one:
export DEPLOY_VSFTPD_CONF="/etc/vsftpd.conf"
acme.sh --deploy -d ftp.example.com --deploy-hook vsftpd
The default command to restart vsftpd server is service vsftpd restart
, if it doesn't work, you can specify one:
export DEPLOY_VSFTPD_RELOAD="/etc/init.d/vsftpd restart"
acme.sh --deploy -d ftp.example.com --deploy-hook vsftpd
5. Deploy the cert to local exim4 server
acme.sh --deploy -d ftp.example.com --deploy-hook exim4
The default exim4 conf file is /etc/exim/exim.conf
, if your exim4 conf is not in the default location, you can specify one:
export DEPLOY_EXIM4_CONF="/etc/exim4/exim4.conf.template"
acme.sh --deploy -d ftp.example.com --deploy-hook exim4
The default command to restart exim4 server is service exim4 restart
, if it doesn't work, you can specify one:
export DEPLOY_EXIM4_RELOAD="/etc/init.d/exim4 restart"
acme.sh --deploy -d ftp.example.com --deploy-hook exim4
6. Deploy the cert to OSX Keychain
acme.sh --deploy -d ftp.example.com --deploy-hook keychain
7. Deploy to cpanel host using UAPI
This hook is using UAPI and works in cPanel & WHM version 56 or newer.
acme.sh --deploy -d example.com --deploy-hook cpanel_uapi
DEPLOY_CPANEL_USER is required only if you run the script as root and it should contain cpanel username.
export DEPLOY_CPANEL_USER=username
acme.sh --deploy -d example.com --deploy-hook cpanel_uapi
Please note, that the cpanel_uapi hook will deploy only the first domain when your certificate will automatically renew. Therefore you should issue a separete certificate for each domain.
8. Deploy the cert to your FRITZ!Box router
You must specify the credentials that have administrative privileges on the FRITZ!Box in order to deploy the certificate, plus the URL of your FRITZ!Box, through the following environment variables:
$ export DEPLOY_FRITZBOX_USERNAME=my_username
$ export DEPLOY_FRITZBOX_PASSWORD=the_password
$ export DEPLOY_FRITZBOX_URL=https://fritzbox.example.com
After the first deployment, these values will be stored in your $HOME/.acme.sh/account.conf. You may now deploy the certificate like this:
acme.sh --deploy -d fritzbox.example.com --deploy-hook fritzbox
9. Deploy the cert to strongswan
acme.sh --deploy -d ftp.example.com --deploy-hook strongswan