mirror of
https://github.com/plantroon/acme.sh.git
synced 2024-11-16 11:21:47 +00:00
Some documentation in README
This commit is contained in:
parent
3365df7778
commit
1a5989350f
@ -1 +1,92 @@
|
||||
#Using deploy api
|
||||
|
||||
#Using the ssh deploy plugin
|
||||
|
||||
The ssh deploy plugin allows you to deploy certificates to a remote host
|
||||
using SSH command to connect to the remote server. The ssh plugin is invoked
|
||||
with the following command...
|
||||
|
||||
```bash
|
||||
acme.sh --deploy -d example.com --deploy-hook ssh
|
||||
```
|
||||
Prior to running this for the first time you must tell the plugin where
|
||||
and how to deploy the certificates. This is done by exporting the following
|
||||
environment variables.
|
||||
|
||||
This is not required for subsequent runs as the
|
||||
values are stored by acme.sh in the domain configuration files.
|
||||
|
||||
Required...
|
||||
```bash
|
||||
export ACME_DEPLOY_SSH_USER="admin"
|
||||
```
|
||||
Optional...
|
||||
```bash
|
||||
export ACME_DEPLOY_SSH_SERVER="qnap"
|
||||
export ACME_DEPLOY_SSH_PORT="22"
|
||||
export ACME_DEPLOY_SSH_SERVICE_STOP=""
|
||||
export ACME_DEPLOY_SSH_KEYFILE="/etc/stunnel/stunnel.pem"
|
||||
export ACME_DEPLOY_SSH_CERTFILE="/etc/stunnel/stunnel.pem"
|
||||
export ACME_DEPLOY_SSH_CAFILE="/etc/stunnel/uca.pem"
|
||||
export ACME_DEPLOY_SSH_FULLCHAIN=""
|
||||
export ACME_DEPLOY_SSH_REMOTE_CMD="/etc/init.d/stunnel.sh restart"
|
||||
export ACME_DEPLOY_SSH_SERVICE_START=""
|
||||
```
|
||||
The values used above are illustrative only and represent those used
|
||||
to deploy certificates to a QNAP NAS device running QTS 4.2
|
||||
|
||||
###ACME_DEPLOY_SSH_USER
|
||||
Username at the remote host that SSH will login with. Note that
|
||||
SSH must be able to login to remote host without a password... SSH Keys
|
||||
must have been exchanged with the remote host. Validate and test that you
|
||||
can login to USER@URL from the host running acme.sh before using this script.
|
||||
|
||||
The USER@URL at the remote server must also have has permissions to write to
|
||||
the target location of the certificate files and to execute any commands
|
||||
(e.g. to stop/start services).
|
||||
|
||||
###ACME_DEPLOY_SSH_SERVER
|
||||
URL or IP Address of the remote server. If not provided then the domain
|
||||
name provided on the acme.sh --deploy command line is used.
|
||||
|
||||
###ACME_DEPLOY_SSH_PORT
|
||||
Port number that SSH will attempt to connect to at the remote server. If
|
||||
not specified then defaults to 22.
|
||||
|
||||
###ACME_DEPLOY_SSH_SERVICE_STOP
|
||||
Command to execute on the remote server prior to copying any certificates. This
|
||||
would typically be used to stop the service for which the certificates are
|
||||
being deployed.
|
||||
|
||||
###ACME_DEPLOY_SSH_KEYFILE
|
||||
###ACME_DEPLOY_SSH_CERTFILE
|
||||
###ACME_DEPLOY_SSH_CAFILE
|
||||
###ACME_DEPLOY_SSH_FULLCHAIN
|
||||
These four variables identify the target location for the respective
|
||||
certificates issued by LetsEncrypt. Directory path and filenames are those
|
||||
on the remote server and the SSH user must have write permissions.
|
||||
|
||||
###ACME_DEPLOY_SSH_REMOTE_CMD
|
||||
Command to execute on the remote server after copying any certificates. This
|
||||
could be any additional command required prior to starting the service again,
|
||||
or could be a all-inclusive restart (stop and start of service). If
|
||||
ACME_DEPLOY_SSH_SERVICE_STOP value was provided then a 2 second sleep is
|
||||
inserted prior to calling this command to allow the system to stabalize.
|
||||
|
||||
###ACME_DEPLOY_SSH_SERVICE_START
|
||||
Command to execute on the remote server after copying any certificates. This
|
||||
would typically be used to stop the service for which the certificates are
|
||||
being deployed. If ACME_DEPLOY_SSH_SERVICE_STOP or ACME_DEPLOY_SSH_REMOTE_CMD
|
||||
value were provided then a 2 second sleep is inserted prior to calling
|
||||
this command to allow the system to stabalize.
|
||||
|
||||
##Backups
|
||||
Before writing a certificate file to the remote server the existing
|
||||
certificate will be copied to a backup directory on the remote server.
|
||||
These are placed in a hidden directory in the home directory of the SSH
|
||||
user
|
||||
```bash
|
||||
~/.acme_ssh_deploy/[domain name]-backup-[timestamp]
|
||||
```
|
||||
Any backups older than 180 days will be deleted when new certificates
|
||||
are deployed.
|
||||
|
Loading…
Reference in New Issue
Block a user