Skip to content

Commit f75b05c

Browse files
Merge branch 'master' of github.com:Neilpang/acme.sh
2 parents e2f8b26 + 54f1be6 commit f75b05c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+4677
-1714
lines changed

Dockerfile

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
1-
FROM alpine:3.6
1+
FROM alpine:3.9
22

33
RUN apk update -f \
44
&& apk --no-cache add -f \
55
openssl \
66
coreutils \
7+
bind-tools \
78
curl \
89
socat \
10+
tzdata \
911
&& rm -rf /var/cache/apk/*
1012

1113
ENV LE_CONFIG_HOME /acme.sh

README.md

Lines changed: 40 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Twitter: [@neilpangxa](https://twitter.com/neilpangxa)
3535
- [discourse.org](https://meta.discourse.org/t/setting-up-lets-encrypt/40709)
3636
- [Centminmod](https://centminmod.com/letsencrypt-acmetool-https.html)
3737
- [splynx](https://forum.splynx.com/t/free-ssl-cert-for-splynx-lets-encrypt/297)
38-
- [archlinux](https://aur.archlinux.org/packages/acme.sh-git/)
38+
- [archlinux](https://www.archlinux.org/packages/community/any/acme.sh)
3939
- [opnsense.org](https://github.com/opnsense/plugins/tree/master/security/acme-client/src/opnsense/scripts/OPNsense/AcmeClient)
4040
- [CentOS Web Panel](http://centos-webpanel.com/)
4141
- [lnmp.org](https://lnmp.org/)
@@ -70,11 +70,17 @@ For all build statuses, check our [weekly build project](https://github.com/Neil
7070

7171
https://github.com/Neilpang/acmetest
7272

73+
# Supported CA
74+
75+
- Letsencrypt.org CA(default)
76+
- [BuyPass.com CA](https://github.com/Neilpang/acme.sh/wiki/BuyPass.com-CA)
77+
- [Pebble strict Mode](https://github.com/letsencrypt/pebble)
7378

7479
# Supported modes
7580

7681
- Webroot mode
7782
- Standalone mode
83+
- Standalone tls-alpn mode
7884
- Apache mode
7985
- Nginx mode
8086
- DNS mode
@@ -221,8 +227,20 @@ acme.sh --issue --standalone -d example.com -d www.example.com -d cp.example.com
221227

222228
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
223229

230+
# 5. Use Standalone ssl server to issue cert
231+
232+
**(requires you to be root/sudoer or have permission to listen on port 443 (TCP))**
233+
234+
Port `443` (TCP) **MUST** be free to listen on, otherwise you will be prompted to free it and try again.
235+
236+
```bash
237+
acme.sh --issue --alpn -d example.com -d www.example.com -d cp.example.com
238+
```
239+
240+
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
241+
224242

225-
# 5. Use Apache mode
243+
# 6. Use Apache mode
226244

227245
**(requires you to be root/sudoer, since it is required to interact with Apache server)**
228246

@@ -236,13 +254,13 @@ Just set string "apache" as the second argument and it will force use of apache
236254
acme.sh --issue --apache -d example.com -d www.example.com -d cp.example.com
237255
```
238256

239-
**This apache mode is only to issue the cert, it will not change your apache config files.
257+
**This apache mode is only to issue the cert, it will not change your apache config files.
240258
You will need to configure your website config files to use the cert by yourself.
241259
We don't want to mess your apache server, don't worry.**
242260

243261
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
244262

245-
# 6. Use Nginx mode
263+
# 7. Use Nginx mode
246264

247265
**(requires you to be root/sudoer, since it is required to interact with Nginx server)**
248266

@@ -260,86 +278,23 @@ So, the config is not changed.
260278
acme.sh --issue --nginx -d example.com -d www.example.com -d cp.example.com
261279
```
262280

263-
**This nginx mode is only to issue the cert, it will not change your nginx config files.
281+
**This nginx mode is only to issue the cert, it will not change your nginx config files.
264282
You will need to configure your website config files to use the cert by yourself.
265283
We don't want to mess your nginx server, don't worry.**
266284

267285
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
268286

269-
# 7. Automatic DNS API integration
287+
# 8. Automatic DNS API integration
270288

271289
If your DNS provider supports API access, we can use that API to automatically issue the certs.
272290

273291
You don't have to do anything manually!
274292

275-
### Currently acme.sh supports:
276-
277-
1. CloudFlare.com API
278-
1. DNSPod.cn API
279-
1. CloudXNS.com API
280-
1. GoDaddy.com API
281-
1. PowerDNS.com API
282-
1. OVH, kimsufi, soyoustart and runabove API
283-
1. nsupdate API
284-
1. LuaDNS.com API
285-
1. DNSMadeEasy.com API
286-
1. AWS Route 53
287-
1. aliyun.com(阿里云) API
288-
1. ISPConfig 3.1 API
289-
1. Alwaysdata.com API
290-
1. Linode.com API
291-
1. FreeDNS (https://freedns.afraid.org/)
292-
1. cyon.ch
293-
1. Domain-Offensive/Resellerinterface/Domainrobot API
294-
1. Gandi LiveDNS API
295-
1. Knot DNS API
296-
1. DigitalOcean API (native)
297-
1. ClouDNS.net API
298-
1. Infoblox NIOS API (https://www.infoblox.com/)
299-
1. VSCALE (https://vscale.io/)
300-
1. Dynu API (https://www.dynu.com)
301-
1. DNSimple API
302-
1. NS1.com API
303-
1. DuckDNS.org API
304-
1. Name.com API
305-
1. Dyn Managed DNS API
306-
1. Yandex PDD API (https://pdd.yandex.ru)
307-
1. Hurricane Electric DNS service (https://dns.he.net)
308-
1. UnoEuro API (https://www.unoeuro.com/)
309-
1. INWX (https://www.inwx.de/)
310-
1. Servercow (https://servercow.de)
311-
1. Namesilo (https://www.namesilo.com)
312-
1. InternetX autoDNS API (https://internetx.com)
313-
1. Azure DNS
314-
1. selectel.com(selectel.ru) DNS API
315-
1. zonomi.com DNS API
316-
1. DreamHost.com API
317-
1. DirectAdmin API
318-
1. KingHost (https://www.kinghost.com.br/)
319-
1. Zilore (https://zilore.com)
320-
1. Loopia.se API
321-
1. acme-dns (https://github.com/joohoi/acme-dns)
322-
1. TELE3 (https://www.tele3.cz)
323-
1. EUSERV.EU (https://www.euserv.eu)
324-
1. DNSPod.com API (https://www.dnspod.com)
325-
1. Google Cloud DNS API
326-
1. ConoHa (https://www.conoha.jp)
327-
1. netcup DNS API (https://www.netcup.de)
328-
1. GratisDNS.dk (https://gratisdns.dk)
329-
330-
And:
331-
332-
**lexicon DNS API: https://github.com/Neilpang/acme.sh/wiki/How-to-use-lexicon-dns-api
333-
(DigitalOcean, DNSimple, DNSMadeEasy, DNSPark, EasyDNS, Namesilo, NS1, PointHQ, Rage4 and Vultr etc.)**
334-
335-
336-
**More APIs coming soon...**
337-
338-
If your DNS provider is not on the supported list above, you can write your own DNS API script easily. If you do, please consider submitting a [Pull Request](https://github.com/Neilpang/acme.sh/pulls) and contribute it to the project.
339-
340-
For more details: [How to use DNS API](dnsapi)
341-
342-
# 8. Use DNS manual mode:
293+
### Currently acme.sh supports most of the dns providers:
294+
295+
https://github.com/Neilpang/acme.sh/wiki/dnsapi
296+
297+
# 9. Use DNS manual mode:
343298

344299
See: https://github.com/Neilpang/acme.sh/wiki/dns-manual-mode first.
345300

@@ -375,7 +330,7 @@ Ok, it's done.
375330

376331
**Please use dns api mode instead.**
377332

378-
# 9. Issue ECC certificates
333+
# 10. Issue ECC certificates
379334

380335
`Let's Encrypt` can now issue **ECDSA** certificates.
381336

@@ -407,7 +362,7 @@ Valid values are:
407362

408363

409364

410-
# 10. Issue Wildcard certificates
365+
# 11. Issue Wildcard certificates
411366

412367
It's simple, just give a wildcard domain as the `-d` parameter.
413368

@@ -417,7 +372,7 @@ acme.sh --issue -d example.com -d '*.example.com' --dns dns_cf
417372

418373

419374

420-
# 11. How to renew the certs
375+
# 12. How to renew the certs
421376

422377
No, you don't need to renew the certs manually. All the certs will be renewed automatically every **60** days.
423378

@@ -434,7 +389,7 @@ acme.sh --renew -d example.com --force --ecc
434389
```
435390

436391

437-
# 12. How to stop cert renewal
392+
# 13. How to stop cert renewal
438393

439394
To stop renewal of a cert, you can execute the following to remove the cert from the renewal list:
440395

@@ -447,7 +402,7 @@ The cert/key file is not removed from the disk.
447402
You can remove the respective directory (e.g. `~/.acme.sh/example.com`) by yourself.
448403

449404

450-
# 13. How to upgrade `acme.sh`
405+
# 14. How to upgrade `acme.sh`
451406

452407
acme.sh is in constant development, so it's strongly recommended to use the latest code.
453408

@@ -472,25 +427,25 @@ acme.sh --upgrade --auto-upgrade 0
472427
```
473428

474429

475-
# 14. Issue a cert from an existing CSR
430+
# 15. Issue a cert from an existing CSR
476431

477432
https://github.com/Neilpang/acme.sh/wiki/Issue-a-cert-from-existing-CSR
478433

479434

480-
# 15. Under the Hood
435+
# 16. Under the Hood
481436

482437
Speak ACME language using shell, directly to "Let's Encrypt".
483438

484439
TODO:
485440

486441

487-
# 16. Acknowledgments
442+
# 17. Acknowledgments
488443

489444
1. Acme-tiny: https://github.com/diafygi/acme-tiny
490445
2. ACME protocol: https://github.com/ietf-wg-acme/acme
491446

492447

493-
# 17. License & Others
448+
# 18. License & Others
494449

495450
License is GPLv3
496451

@@ -499,9 +454,9 @@ Please Star and Fork me.
499454
[Issues](https://github.com/Neilpang/acme.sh/issues) and [pull requests](https://github.com/Neilpang/acme.sh/pulls) are welcome.
500455

501456

502-
# 18. Donate
457+
# 19. Donate
503458
Your donation makes **acme.sh** better:
504459

505460
1. PayPal/Alipay(支付宝)/Wechat(微信): [https://donate.acme.sh/](https://donate.acme.sh/)
506-
461+
507462
[Donate List](https://github.com/Neilpang/acme.sh/wiki/Donate-list)

0 commit comments

Comments
 (0)