acme.sh/deploy
2017-10-02 08:34:32 +09:00
..
apache.sh deploy apache script: fix comment (dovecot/apache) 2017-03-02 08:39:31 +01:00
cpanel_uapi.sh #1042 2017-09-26 07:04:30 +04:00
dovecot.sh fix format 2017-02-19 20:40:53 +08:00
exim4.sh spelling: oops 2017-03-26 05:29:11 +00:00
haproxy.sh fix format 2017-02-19 20:40:53 +08:00
keychain.sh deploy for OSX Keychain 2017-03-06 11:09:12 +09:00
kong.sh Update the notes 2017-04-28 00:25:30 +08:00
myapi.sh exe 2017-02-05 23:14:25 +08:00
mysqld.sh fix format 2017-02-19 20:40:53 +08:00
nginx.sh fix format 2017-02-19 20:40:53 +08:00
opensshd.sh fix format 2017-02-19 20:40:53 +08:00
pureftpd.sh fix format 2017-02-19 20:40:53 +08:00
README.md Update README.md 2017-10-02 08:34:32 +09:00
strongswan.sh Create strongswan.sh 2017-10-02 08:32:36 +09:00
unifi.sh Add deployment script for unifi controller 2017-07-30 12:21:20 +01:00
vsftpd.sh spelling: oops 2017-03-26 05:29:11 +00:00

Using deploy api

Before you can deploy your cert, you must issue the cert first.

Here are the scripts to deploy the certs/key to the server/services.

1. Deploy the certs to your cpanel host.

If you want to deploy using cpanel UAPI see 7.

(cpanel deploy hook is not finished yet, this is just an example.)

Then you can deploy now:

export DEPLOY_CPANEL_USER=myusername
export DEPLOY_CPANEL_PASSWORD=PASSWORD
acme.sh --deploy -d example.com --deploy-hook cpanel

2. Deploy ssl cert on kong proxy engine based on api.

Before you can deploy your cert, you must issue the cert first. Currently supports Kong-v0.10.x.

acme.sh --deploy -d ftp.example.com --deploy-hook kong

3. Deploy the cert to remote server through SSH access.

(TODO)

4. Deploy the cert to local vsftpd server.

acme.sh --deploy -d ftp.example.com --deploy-hook vsftpd

The default vsftpd conf file is /etc/vsftpd.conf, if your vsftpd conf is not in the default location, you can specify one:

export DEPLOY_VSFTPD_CONF="/etc/vsftpd.conf"

acme.sh --deploy -d ftp.example.com --deploy-hook vsftpd

The default command to restart vsftpd server is service vsftpd restart, if it doesn't work, you can specify one:

export DEPLOY_VSFTPD_RELOAD="/etc/init.d/vsftpd restart"

acme.sh --deploy -d ftp.example.com --deploy-hook vsftpd

5. Deploy the cert to local exim4 server.

acme.sh --deploy -d ftp.example.com --deploy-hook exim4

The default exim4 conf file is /etc/exim/exim.conf, if your exim4 conf is not in the default location, you can specify one:

export DEPLOY_EXIM4_CONF="/etc/exim4/exim4.conf.template"

acme.sh --deploy -d ftp.example.com --deploy-hook exim4

The default command to restart exim4 server is service exim4 restart, if it doesn't work, you can specify one:

export DEPLOY_EXIM4_RELOAD="/etc/init.d/exim4 restart"

acme.sh --deploy -d ftp.example.com --deploy-hook exim4

6. Deploy the cert to OSX Keychain

acme.sh --deploy -d ftp.example.com --deploy-hook keychain

7. Deploy to cpanel host using UAPI

This hook is using UAPI and works in cPanel & WHM version 56 or newer.

acme.sh  --deploy  -d example.com  --deploy-hook cpanel_uapi

DEPLOY_CPANEL_USER is required only if you run the script as root and it should contain cpanel username.

export DEPLOY_CPANEL_USER=username
acme.sh  --deploy  -d example.com  --deploy-hook cpanel_uapi

Please note, that the cpanel_uapi hook will deploy only the first domain when your certificate will automatically renew. Therefore you should issue a separete certificate for each domain.

8. Deploy the cert to strongswan

acme.sh --deploy -d ftp.example.com --deploy-hook strongswan