All Projects â†’ janeczku â†’ Rancher Letsencrypt

janeczku / Rancher Letsencrypt

Licence: apache-2.0
🐼 Rancher service that obtains and manages free SSL certificates from the Let's Encrypt CA

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to Rancher Letsencrypt

Docker Nginx Gunicorn Flask Letsencrypt
Boilerplate code for setting up Nginx + Gunicorn + Flask + automated LetsEncrypt certificates (https) using docker-compose.
Stars: ✭ 117 (-63.21%)
Mutual labels:  letsencrypt, certificate, ssl-certificates
Ssl Proxy
🔒 Simple zero-config SSL reverse proxy with real autogenerated certificates (LetsEncrypt, self-signed, provided)
Stars: ✭ 427 (+34.28%)
Mutual labels:  letsencrypt, certificate, ssl-certificates
Certbot Letencrypt Wildcardcertificates Alydns Au
certbot'renewing letencrypt certificate plugin - automatic verification aliyun/tencentyun/godaddy dns
Stars: ✭ 839 (+163.84%)
Mutual labels:  dns, letsencrypt, certificate
Rancher Lets Encrypt
Automatically create and manage certificates in Rancher using Let's Encrypt webroot verification via a minimal service
Stars: ✭ 88 (-72.33%)
Mutual labels:  letsencrypt, ssl-certificates, rancher
ght-acme.sh
Shell script to sign certificate by the letsencrypt CA
Stars: ✭ 31 (-90.25%)
Mutual labels:  letsencrypt, certificate, ssl-certificates
wat
WAT - Windows ACME Tool
Stars: ✭ 28 (-91.19%)
Mutual labels:  letsencrypt, certificate
letsencrypt-autorenew-docker
letsencrypt certificate generation and cron enabled autorenewal as a docker image
Stars: ✭ 59 (-81.45%)
Mutual labels:  letsencrypt, certificate
Acme Client Quick
get let's encrypt cert in five minutes
Stars: ✭ 295 (-7.23%)
Mutual labels:  letsencrypt, certificate
cert-manager-alidns-webhook
Cert-manager webhook to generate Let's Encrypt certificates over Alibaba Cloud DNS.
Stars: ✭ 31 (-90.25%)
Mutual labels:  letsencrypt, certificate
qiniu-auto-cert
侃牛 CDN èŻäčŠè‡ȘćŠšćŒ–ć·„ć…·
Stars: ✭ 20 (-93.71%)
Mutual labels:  letsencrypt, certificate
gitlab-docker-rancher-letsencrypt-setup
Automated private dev environment with docker, gitlab CI/CD...
Stars: ✭ 15 (-95.28%)
Mutual labels:  letsencrypt, rancher
cert-manager
Automatically provision and manage TLS certificates in Kubernetes
Stars: ✭ 8,781 (+2661.32%)
Mutual labels:  letsencrypt, certificate
acme2
Another PHP client for acme protocal (version 2) implementation, used for generating letsencrypt's free ssl certificates.
Stars: ✭ 45 (-85.85%)
Mutual labels:  letsencrypt, certificate
LetsEncrypt
C# layer for generation of wildcard Let's Encrypt SSL certificates
Stars: ✭ 67 (-78.93%)
Mutual labels:  letsencrypt, certificate
certbot-dns-ovh
Certbot plugin to respond to DNS-01 challenges by updating the zone.
Stars: ✭ 20 (-93.71%)
Mutual labels:  dns, letsencrypt
anvil
Tools for distributing ssl certificates
Stars: ✭ 29 (-90.88%)
Mutual labels:  certificate, ssl-certificates
docker-nginx-certbot
Automatically create and renew website certificates for free using the Let's Encrypt certificate authority.
Stars: ✭ 367 (+15.41%)
Mutual labels:  letsencrypt, ssl-certificates
django-yadpt-starter
Yet Another Django Project Template skeleton for Django projects
Stars: ✭ 28 (-91.19%)
Mutual labels:  letsencrypt, certificate
letsencrypt-inwx
A small cli utility for automating the letsencrypt dns-01 challenge for domains hosted by inwx.
Stars: ✭ 43 (-86.48%)
Mutual labels:  letsencrypt, certificate
freshcerts
ACME certificate protocol (Let's Encrypt) proxy client with a dashboard and monitoring
Stars: ✭ 59 (-81.45%)
Mutual labels:  letsencrypt, certificate

Rancher + Let's Encrypt = Awesome Sauce

Let's Encrypt Certificate Manager for Rancher

Latest Version Circle CI Docker Pulls License

A Rancher service that obtains free SSL/TLS certificates from the Let's Encrypt CA, adds them to Rancher's certificate store and manages renewal and propagation of updated certificates to load balancers.

Requirements

  • Rancher Server >= v1.5.0

  • If using a DNS-based challenge, existing account with one of the supported DNS providers:

    • Aurora DNS
    • AWS Route 53
    • Azure DNS
    • CloudFlare
    • DigitalOcean
    • DNSimple
    • Dyn
    • Gandi
    • NS1
    • Ovh
    • Vultr
  • If using the HTTP challenge, a reverse proxy that routes example.com/.well-known/acme-challenge to rancher-letsencrypt.

How to use

This application is distributed via the Rancher Community Catalog.

Enable the Community Catalog under Admin => Settings in the Rancher UI. Then locate the Let's Encrypt template in the Catalog section of the UI and follow the instructions.

Storing certificate in shared storage volume

By default the created SSL certificate is stored in Rancher's certificate store for usage in Rancher load balancers.

You can specify a volume name to store account data, certificate and private key in a (host scoped) named Docker volume. To share the certificates with other services you may specify a persistent storage driver (e.g. rancher-nfs).

See the README in the Rancher catalog for more information.

Provider specific usage

AWS Route 53

Note: If you have both a private and public zone in Route53 for the domain, you need to run the service configured with public DNS resolvers (this is now the default).

The following IAM policy describes the minimum permissions required when using AWS Route 53 for domain authorization.
Replace <HOSTED_ZONE_ID> with the ID of the hosted zone that encloses the domain(s) for which you are going to obtain certificates. You may use a wildcard (*) in place of the ID to make this policy work with all of the hosted zones associated with an AWS account.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "route53:GetChange",
                "route53:ListHostedZonesByName"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Effect": "Allow",
            "Action": [
                "route53:ChangeResourceRecordSets"
            ],
            "Resource": [
                "arn:aws:route53:::hostedzone/<HOSTED_ZONE_ID>"
            ]
        }
    ]
}

OVH

First create your credentials on https://eu.api.ovh.com/createToken/ by filling out the form like this:

  • Account ID: Your OVH account ID
  • Password: Your password
  • Script name: letsencrypt
  • Script description: Letsencrypt for Rancher
  • Validity: Unlimited
  • Rights:
    • GET /domain/zone/*
    • POST /domain/zone/*
    • DELETE /domain/zone/*

Then deploy this service using the generated key, application secret and consumer key.

HTTP

If you prefer not to use a DNS-based challenge or your provider is not supported, you can use the HTTP challenge. Simply choose HTTP from the list of providers. Then make sure that HTTP requests to domain.com/.well-known/acme-challenge are forwarded to port 80 of the rancher-letsencrypt service, e.g. by configuring a Rancher load balancer accordingly. If you are using another reverse proxy (e.g. Nginx) you need to make sure it passed the original host header through to the backend.

Rancher Load Balancer Let's Encrypt Targets

Building the image

make build && make image

Contributions

PR's welcome!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].