All Projects → kegato → letsencrypt-inwx

kegato / letsencrypt-inwx

Licence: MIT License
A small cli utility for automating the letsencrypt dns-01 challenge for domains hosted by inwx.

Programming Languages

rust
11053 projects
shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to letsencrypt-inwx

wat
WAT - Windows ACME Tool
Stars: ✭ 28 (-34.88%)
Mutual labels:  letsencrypt, certificate, acme, certbot
ght-acme.sh
Shell script to sign certificate by the letsencrypt CA
Stars: ✭ 31 (-27.91%)
Mutual labels:  letsencrypt, certificate, acme, dns-01
Certbot
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
Stars: ✭ 28,541 (+66274.42%)
Mutual labels:  letsencrypt, certificate, acme, certbot
Letscertbot
Let's Certbot is a tool builds automated scripts base on Certbot for obtaining, renewing, deploying SSL certificates.
Stars: ✭ 84 (+95.35%)
Mutual labels:  letsencrypt, acme, certbot
Ansible Letsencrypt
Ansible role for LetsEncrypt
Stars: ✭ 66 (+53.49%)
Mutual labels:  letsencrypt, certificate, certbot
Acme client
Java ACME Client application
Stars: ✭ 77 (+79.07%)
Mutual labels:  letsencrypt, certificate, acme
Certificaat
General-purpose ACME client
Stars: ✭ 88 (+104.65%)
Mutual labels:  letsencrypt, certificate, acme
Chef Acme
Chef cookbook to request SSL certificates at Let's Encrypt
Stars: ✭ 98 (+127.91%)
Mutual labels:  letsencrypt, certificate, acme
LetsEncrypt
C# layer for generation of wildcard Let's Encrypt SSL certificates
Stars: ✭ 67 (+55.81%)
Mutual labels:  letsencrypt, certificate, wildcard
Sewer
Let's Encrypt(ACME) client. Python library & CLI app.
Stars: ✭ 131 (+204.65%)
Mutual labels:  letsencrypt, acme, certbot
Node Acme Lambda
Use AWS Lambda to manage SSL certificates for ACME providers like Let's Encrypt.
Stars: ✭ 120 (+179.07%)
Mutual labels:  letsencrypt, certificate, acme
acme
Go client library implementation for ACME v2 (RFC8555)
Stars: ✭ 77 (+79.07%)
Mutual labels:  letsencrypt, acme, certbot
Certbot Letencrypt Wildcardcertificates Alydns Au
certbot'renewing letencrypt certificate plugin - automatic verification aliyun/tencentyun/godaddy dns
Stars: ✭ 839 (+1851.16%)
Mutual labels:  letsencrypt, certificate, certbot
docker-nginx-certbot
Automatically create and renew website certificates for free using the Let's Encrypt certificate authority.
Stars: ✭ 367 (+753.49%)
Mutual labels:  letsencrypt, acme, certbot
Dehydrated
letsencrypt/acme client implemented as a shell-script – just add water
Stars: ✭ 5,261 (+12134.88%)
Mutual labels:  letsencrypt, certificate, acme
Acme.sh
A pure Unix shell script implementing ACME client protocol
Stars: ✭ 24,723 (+57395.35%)
Mutual labels:  letsencrypt, acme, certbot
Ansible Role Certbot
Ansible Role - Certbot (for Let's Encrypt)
Stars: ✭ 477 (+1009.3%)
Mutual labels:  letsencrypt, certificate, certbot
Lego
Let's Encrypt client and ACME library written in Go
Stars: ✭ 4,978 (+11476.74%)
Mutual labels:  letsencrypt, certificate, acme
Getssl
obtain free SSL certificates from letsencrypt ACME server Suitable for automating the process on remote servers.
Stars: ✭ 1,687 (+3823.26%)
Mutual labels:  letsencrypt, certificate, acme
Acmetool
🔒 acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
Stars: ✭ 1,882 (+4276.74%)
Mutual labels:  letsencrypt, certificate, acme

letsencrypt-inwx CircleCI Docker Pulls Crates.io

A small cli utility for automating the letsencrypt dns-01 challenge for domains hosted by inwx. This allows you to obtain wildcard certificates from letsencrypt.

Installation

Ubuntu / Debian

  • Build the .deb package or download it from releases and install it with sudo dpkg -i <path_to_the_deb_file>

Other linux

  • Build the executable or download it from releases and copy it to /usr/bin/
  • Copy both certbot scripts from ./etc/ to /usr/lib/letsencrypt-inwx/

With cargo

  • Run cargo install letsencrypt-inwx

Configuration

You can store the configuration file at /etc/letsencrypt-inwx.json or at ~/.config/letsencrypt-inwx.json when used with certbot or specify it's path with the -c option. The configuration file should look like this (without the comments):

{
    "accounts": [
        {
            "username": "user",
            "password": "pass",
            // optional, if the domain is not configured all accounts will be tried
            "domains": [
                "example.com"
            ],
            // optional, if true the public inwx test server will be used
            "ote": false
        }
    ],
    // optional
    "options": {
        // optional, if true letsencrypt-inwx will not wait until the created record is publicly visible, default: false
        "no_dns_check": false,
        // optional, the amount of time in seconds to wait after creating a record, default: 5 seconds
        "wait_interval": 5,
        // optional: the dns server to use, default: the google public dns server
        "dns_server": "8.8.8.8"
    }
}

Usage

With Docker and certbot

  • Generate your certificate by running docker run --rm -it -v /etc/letsencrypt-inwx.json:/etc/letsencrypt-inwx.json -v /etc/letsencrypt:/etc/letsencrypt kegato/letsencrypt-inwx certonly --email <your_email> --preferred-challenges=dns-01 --manual --manual-auth-hook /usr/lib/letsencrypt-inwx/certbot-inwx-auth --manual-cleanup-hook /usr/lib/letsencrypt-inwx/certbot-inwx-cleanup --manual-public-ip-logging-ok -d <your_domain>
  • You can find your certificate in /etc/letsencrypt/live/<your_domain>/
  • You can renew your certificate by running docker run --rm -it -v /etc/letsencrypt-inwx.json:/etc/letsencrypt-inwx.json -v /etc/letsencrypt:/etc/letsencrypt kegato/letsencrypt-inwx renew

With certbot

  • You can get certificates from certbot by running sudo certbot certonly -n --agree-tos --email <your_email> --preferred-challenges=dns-01 --manual --manual-auth-hook /usr/lib/letsencrypt-inwx/certbot-inwx-auth --manual-cleanup-hook /usr/lib/letsencrypt-inwx/certbot-inwx-cleanup --manual-public-ip-logging-ok -d <your_domain>

Manually

  • Create a txt record with letsencrypt-inwx create -c <config_file> -d _acme-challenge.<your_domain> -v <acme_token>
  • Delete it with letsencrypt-inwx delete -c <config_file> -d _acme-challenge.<your_domain>

Building

Requirements

libssl-dev and pkg-config are required when building on Ubuntu / Debian see here.

.deb package

  • Install cargo-deb by running cargo install cargo-deb
  • Run cargo deb to build the package

only the executable

  • Run cargo build --release to build the letsencrypt-inwx executable
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].