{"id":19232757,"url":"https://github.com/makeomatic/docker-letsencrypt","last_synced_at":"2025-02-23T11:40:52.796Z","repository":{"id":142912424,"uuid":"61217970","full_name":"makeomatic/docker-letsencrypt","owner":"makeomatic","description":null,"archived":false,"fork":false,"pushed_at":"2016-06-16T17:11:41.000Z","size":41,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":7,"default_branch":"master","last_synced_at":"2025-01-05T00:24:39.017Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Shell","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/makeomatic.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2016-06-15T15:14:07.000Z","updated_at":"2017-12-18T02:57:37.000Z","dependencies_parsed_at":"2023-04-09T14:31:59.667Z","dependency_job_id":null,"html_url":"https://github.com/makeomatic/docker-letsencrypt","commit_stats":null,"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/makeomatic%2Fdocker-letsencrypt","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/makeomatic%2Fdocker-letsencrypt/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/makeomatic%2Fdocker-letsencrypt/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/makeomatic%2Fdocker-letsencrypt/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/makeomatic","download_url":"https://codeload.github.com/makeomatic/docker-letsencrypt/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":240310872,"owners_count":19781341,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-11-09T16:07:24.976Z","updated_at":"2025-02-23T11:40:52.779Z","avatar_url":"https://github.com/makeomatic.png","language":"Shell","readme":"# Alpine Linux Docker Letsencrypt / Certbot\n\nInstallation of https://github.com/certbot/certbot\n\n## Docs\n\nhttps://certbot.eff.org/docs/using.html\n\n## Using with haproxy\n\nUse `makeomatic/haproxy-consul:letsencrypt` image\n\n## Automatic renewals\n\nChange entrypoint to `/usr/sbin/crond` and pass args [\"-f\",\"-d\",\"5\"], mount `.getssl` dir and provide configurations.\nSample is provded below and more information can be found at script's original repo https://github.com/srvrco/getssl\nThis version is adapted to alpine linux docker image\n\n## Sample configurations\n\n```sh\n# .getssl/getssl.cfg\n\n# Uncomment and modify any variables you need\n# The staging server is best for testing (hence set as default)\nCA=\"https://acme-staging.api.letsencrypt.org\"\nAGREEMENT=\"https://letsencrypt.org/documents/LE-SA-v1.0.1-July-27-2015.pdf\"\nACCOUNT_EMAIL=\"email@example.com\"\nACCOUNT_KEY_LENGTH=4096\nACCOUNT_KEY=\"/.getssl/account.key\"\nPRIVATE_KEY_ALG=\"rsa\"\n\n# The command needed to reload apache / nginx or whatever you use\n#RELOAD_CMD=\"\"\n# The time period within which you want to allow renewal of a certificate\n#\tthis prevents hitting some of the rate limits.\nRENEW_ALLOW=\"30\"\n\n# Define the server type.\tThis can either be a webserver, ldaps or a port number which\n# will be checked for certificate expiry and also will be checked after\n# an update to confirm correct certificate is running (if CHECK_REMOTE) is set to true\nSERVER_TYPE=\"webserver\"\nCHECK_REMOTE=\"true\"\n\n# openssl config file.\tThe default should work in most cases.\nSSLCONF=\"/etc/ssl/openssl.cnf\"\nVALIDATE_VIA_DNS=\"true\"\nDNS_ADD_COMMAND=\"/usr/local/bin/dns_add_cloudflare\"\nDNS_DEL_COMMAND=\"/usr/local/bin/dns_del_cloudflare\"\nDNS_WAIT=3\nDNS_EXTRA_WAIT=30\n```\n\n```sh\n# .getssl/domain.tld/getssl.cfg\n# Uncomment and modify any variables you need\n# Global getssl.cfg vars are overwritten here\n\n# This server issues full certificates, however has rate limits\nCA=\"https://acme-staging.api.letsencrypt.org\"\n\n# Set an email address associated with your account - generally set at account level rather than domain.\nPRIVATE_KEY_ALG=\"rsa\"\n\n# Additional domains - this could be multiple domains / subdomains in a comma separated list\nSANS=www.example.tld,admin.example.tld\n\n# Acme Challenge Location. The first line for the domain, the following ones for each additional domain.\n# If these start with ssh: then the next variable is assumed to be the hostname and the rest the location.\n# An ssh key will be needed to provide you with access to the remote server.\n# If these start with ftp: then the next variables are ftpuserid:ftppassword:servername:ACL_location\n#ACL=('/var/www/radiofx.co/web/.well-known/acme-challenge'\n#     'ssh:server5:/var/www/radiofx.co/web/.well-known/acme-challenge'\n#     'ftp:ftpuserid:ftppassword:radiofx.co:/web/.well-known/acme-challenge')\n\n# Location for all your certs, these can either be on the server (so full path name) or using ssh as for the ACL\n# consul:host:port:/prefix\n# only http is available at the moment\nDOMAIN_CERT_LOCATION=\"consul:localhost:8500:/letsencrypt\"\nDOMAIN_KEY_LOCATION=\"consul:localhost:8500:/letsencrypt\"\nCA_CERT_LOCATION=\"consul:localhost:8500:/letsencrypt\"\nDOMAIN_CHAIN_LOCATION=\"consul:localhost:8500:/letsencrypt\"\nDOMAIN_PEM_LOCATION=\"consul:localhost:8500:/letsencrypt\"\n\n# The command needed to reload apache / nginx or whatever you use\n#RELOAD_CMD=\"\"\n# The time period within which you want to allow renewal of a certificate\n#  this prevents hitting some of the rate limits.\nRENEW_ALLOW=\"30\"\n\n# Define the server type.  This can either be a webserver, ldaps or a port number which\n# will be checked for certificate expiry and also will be checked after\n# an update to confirm correct certificate is running (if CHECK_REMOTE) is set to true\n#SERVER_TYPE=\"webserver\"\n#CHECK_REMOTE=\"true\"\n\n# Use the following 3 variables if you want to validate via DNS\n#VALIDATE_VIA_DNS=\"true\"\n#DNS_ADD_COMMAND=\n#DNS_DEL_COMMAND=\n#AUTH_DNS_SERVER=\"\"\n#DNS_WAIT=10\n#DNS_EXTRA_WAIT=60\n```\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmakeomatic%2Fdocker-letsencrypt","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmakeomatic%2Fdocker-letsencrypt","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmakeomatic%2Fdocker-letsencrypt/lists"}