You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
acme.sh/README.md

377 lines
12 KiB

8 years ago
# An ACME Shell script: acme.sh [![Build Status](https://travis-ci.org/Neilpang/acme.sh.svg?branch=master)](https://travis-ci.org/Neilpang/acme.sh)
- An ACME protocol client written purely in Shell (Unix shell) language.
8 years ago
- Full ACME protocol implementation.
- Simple, powerful and very easy to use. You only need 3 minutes to learn it.
- Bash, dash and sh compatible.
- Simplest shell script for Let's Encrypt free certificate client.
8 years ago
- Purely written in Shell with no dependencies on python or the official Let's Encrypt client.
- Just one script to issue, renew and install your certificates automatically.
9 years ago
- DOES NOT require `root/sudoer` access.
9 years ago
It's probably the `easiest&smallest&smartest` shell script to automatically issue & renew the free certificates from Let's Encrypt.
9 years ago
Wiki: https://github.com/Neilpang/acme.sh/wiki
9 years ago
8 years ago
8 years ago
# [中文说明](https://github.com/Neilpang/acme.sh/wiki/%E8%AF%B4%E6%98%8E)
8 years ago
# Tested OS
9 years ago
| NO | Status| Platform|
|----|-------|---------|
9 years ago
|1|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/ubuntu-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)| Ubuntu
|2|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/debian-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)| Debian
|3|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/centos-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|CentOS
9 years ago
|4|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/windows-cygwin.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Windows (cygwin with curl, openssl and crontab included)
9 years ago
|5|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/freebsd.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|FreeBSD
|6|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/pfsense.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|pfsense
|7|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/opensuse-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|openSUSE
|8|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/alpine-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Alpine Linux (with curl)
|9|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/base-archlinux.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Archlinux
|10|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/fedora-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|fedora
|11|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/kalilinux-kali-linux-docker.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Kali Linux
|12|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/oraclelinux-latest.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Oracle Linux
|13|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/proxmox.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)| Proxmox https://pve.proxmox.com/wiki/HTTPSCertificateConfiguration#Let.27s_Encrypt_using_acme.sh
9 years ago
|14|-----| Cloud Linux https://github.com/Neilpang/le/issues/111
9 years ago
|15|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/openbsd.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|OpenBSD
|16|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/mageia.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Mageia
|17|-----| OpenWRT: Tested and working. See [wiki page](https://github.com/Neilpang/acme.sh/wiki/How-to-run-on-OpenWRT)
|18|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/solaris.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|SunOS/Solaris
8 years ago
|19|[![](https://cdn.rawgit.com/Neilpang/acmetest/master/status/gentoo-stage3-amd64.svg)](https://github.com/Neilpang/letest#here-are-the-latest-status)|Gentoo Linux
9 years ago
8 years ago
For all build statuses, check our [daily build project](https://github.com/Neilpang/acmetest):
9 years ago
https://github.com/Neilpang/acmetest
9 years ago
8 years ago
# Supported modes
8 years ago
- Webroot mode
- Standalone mode
- Apache mode
- DNS mode
8 years ago
# 1. How to install
9 years ago
8 years ago
### 1. Install online
9 years ago
9 years ago
Check this project: https://github.com/Neilpang/get.acme.sh
```bash
curl https://get.acme.sh | sh
9 years ago
```
Or:
```bash
wget -O - https://get.acme.sh | sh
9 years ago
```
8 years ago
### 2. Or, Install from git
8 years ago
Clone this project and launch installation:
```bash
git clone https://github.com/Neilpang/acme.sh.git
cd ./acme.sh
./acme.sh --install
9 years ago
```
9 years ago
You `don't have to be root` then, although `it is recommended`.
8 years ago
Advanced Installation: https://github.com/Neilpang/acme.sh/wiki/How-to-install
9 years ago
The installer will perform 3 actions:
8 years ago
1. Create and copy `acme.sh` to your home dir (`$HOME`): `~/.acme.sh/`.
All certs will be placed in this folder too.
2. Create alias for: `acme.sh=~/.acme.sh/acme.sh`.
3. Create daily cron job to check and renew the certs if needed.
Cron entry example:
```bash
0 0 * * * "/home/user/.acme.sh"/acme.sh --cron --home "/home/user/.acme.sh" > /dev/null
```
9 years ago
8 years ago
After the installation, you must close the current terminal and reopen it to make the alias take effect.
Ok, you are ready to issue certs now.
9 years ago
9 years ago
Show help message:
9 years ago
```
root@v1:~# acme.sh -h
9 years ago
```
8 years ago
# 2. Just issue a cert
9 years ago
**Example 1:** Single domain.
9 years ago
```bash
acme.sh --issue -d example.com -w /home/wwwroot/example.com
9 years ago
```
**Example 2:** Multiple domains in the same cert.
```bash
8 years ago
acme.sh --issue -d example.com -d www.example.com -d cp.example.com -w /home/wwwroot/example.com
9 years ago
```
9 years ago
The parameter `/home/wwwroot/example.com` is the web root folder. You **MUST** have `write access` to this folder.
9 years ago
8 years ago
Second argument **"example.com"** is the main domain you want to issue the cert for.
You must have at least one domain there.
9 years ago
You must point and bind all the domains to the same webroot dir: `/home/wwwroot/example.com`.
9 years ago
8 years ago
Generated/issued certs will be placed in `~/.acme.sh/example.com/`
9 years ago
8 years ago
The issued cert will be renewed automatically every **60** days.
9 years ago
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
8 years ago
# 3. Install the issued cert to Apache/Nginx etc.
8 years ago
After you issue a cert, you probably want to install/copy the cert to your Apache/Nginx or other servers.
You **MUST** use this command to copy the certs to the target files, **DO NOT** use the certs files in **~/.acme.sh/** folder, they are for internal use only, the folder structure may change in the future.
8 years ago
**Apache** example:
```bash
acme.sh --installcert -d example.com \
8 years ago
--certpath /path/to/certfile/in/apache/cert.pem \
--keypath /path/to/keyfile/in/apache/key.pem \
--fullchainpath /path/to/fullchain/certfile/apache/fullchain.pem \
--reloadcmd "service apache2 restart"
8 years ago
```
8 years ago
**Nginx** example:
8 years ago
```bash
acme.sh --installcert -d example.com \
8 years ago
--keypath /path/to/keyfile/in/nginx/key.pem \
--fullchainpath /path/to/fullchain/nginx/cert.pem \
--reloadcmd "service nginx restart"
9 years ago
```
Only the domain is required, all the other parameters are optional.
8 years ago
Install/copy the issued cert/key to the production Apache or Nginx path.
The cert will be `renewed every **60** days by default` (which is configurable). Once the cert is renewed, the Apache/Nginx service will be restarted automatically by the command: `service apache2 restart` or `service nginx restart`.
9 years ago
8 years ago
# 4. Use Standalone server to issue cert
9 years ago
8 years ago
**(requires you to be root/sudoer or have permission to listen on port 80 (TCP))**
8 years ago
Port `80` (TCP) **MUST** be free to listen on, otherwise you will be prompted to free it and try again.
```bash
acme.sh --issue --standalone -d example.com -d www.example.com -d cp.example.com
```
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
8 years ago
# 5. Use Standalone TLS server to issue cert
**(requires you to be root/sudoer or have permission to listen on port 443 (TCP))**
acme.sh supports `tls-sni-01` validation.
8 years ago
Port `443` (TCP) **MUST** be free to listen on, otherwise you will be prompted to free it and try again.
```bash
acme.sh --issue --tls -d example.com -d www.example.com -d cp.example.com
```
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
8 years ago
8 years ago
# 6. Use Apache mode
8 years ago
**(requires you to be root/sudoer, since it is required to interact with Apache server)**
8 years ago
If you are running a web server, Apache or Nginx, it is recommended to use the `Webroot mode`.
8 years ago
Particularly, if you are running an Apache server, you should use Apache mode instead. This mode doesn't write any files to your web root folder.
8 years ago
Just set string "apache" as the second argument and it will force use of apache plugin automatically.
```
8 years ago
acme.sh --issue --apache -d example.com -d www.example.com -d cp.example.com
```
More examples: https://github.com/Neilpang/acme.sh/wiki/How-to-issue-a-cert
8 years ago
8 years ago
# 7. Use DNS mode:
Support the `dns-01` challenge.
```bash
8 years ago
acme.sh --issue --dns -d example.com -d www.example.com -d cp.example.com
```
8 years ago
You should get an output like below:
```
Add the following txt record:
Domain:_acme-challenge.example.com
Txt value:9ihDbjYfTExAYeDs4DBUeuTo18KBzwvTEjUnSwd32-c
Add the following txt record:
Domain:_acme-challenge.www.example.com
Txt value:9ihDbjxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Please add those txt records to the domains. Waiting for the dns to take effect.
```
Then just rerun with `renew` argument:
```bash
acme.sh --renew -d example.com
```
Ok, it's finished.
8 years ago
8 years ago
# 8. Automatic DNS API integration
8 years ago
If your DNS provider supports API access, we can use that API to automatically issue the certs.
9 years ago
8 years ago
You don't have to do anything manually!
### Currently acme.sh supports:
9 years ago
8 years ago
1. CloudFlare.com API
1. DNSPod.cn API
1. CloudXNS.com API
1. GoDaddy.com API
1. OVH, kimsufi, soyoustart and runabove API
1. AWS Route 53, see: https://github.com/Neilpang/acme.sh/issues/65
1. PowerDNS.com API
1. lexicon DNS API: https://github.com/Neilpang/acme.sh/wiki/How-to-use-lexicon-dns-api
8 years ago
(DigitalOcean, DNSimple, DNSMadeEasy, DNSPark, EasyDNS, Namesilo, NS1, PointHQ, Rage4 and Vultr etc.)
8 years ago
1. LuaDNS.com API
1. DNSMadeEasy.com API
1. nsupdate API
8 years ago
**More APIs coming soon...**
8 years ago
If your DNS provider is not on the supported list above, you can write your own DNS API script easily. If you do, please consider submitting a [Pull Request](https://github.com/Neilpang/acme.sh/pulls) and contribute it to the project.
8 years ago
For more details: [How to use DNS API](dnsapi)
8 years ago
# 9. Issue ECC certificates
8 years ago
`Let's Encrypt` can now issue **ECDSA** certificates.
8 years ago
And we support them too!
9 years ago
Just set the `length` parameter with a prefix `ec-`.
For example:
8 years ago
### Single domain ECC cerfiticate
```bash
8 years ago
acme.sh --issue -w /home/wwwroot/example.com -d example.com --keylength ec-256
```
8 years ago
### SAN multi domain ECC certificate
```bash
8 years ago
acme.sh --issue -w /home/wwwroot/example.com -d example.com -d www.example.com --keylength ec-256
```
Please look at the last parameter above.
Valid values are:
1. **ec-256 (prime256v1, "ECDSA P-256")**
2. **ec-384 (secp384r1, "ECDSA P-384")**
3. **ec-521 (secp521r1, "ECDSA P-521", which is not supported by Let's Encrypt yet.)**
8 years ago
8 years ago
# 10. How to renew the issued certs
8 years ago
8 years ago
No, you don't need to renew the certs manually. All the certs will be renewed automatically every **60** days.
8 years ago
However, you can also force to renew any cert:
```
8 years ago
acme.sh --renew -d example.com --force
8 years ago
```
or, for ECC cert:
8 years ago
8 years ago
```
8 years ago
acme.sh --renew -d example.com --force --ecc
8 years ago
```
8 years ago
8 years ago
# 11. How to upgrade `acme.sh`
8 years ago
acme.sh is in constant developement, so it's strongly recommended to use the latest code.
8 years ago
You can update acme.sh to the latest code:
8 years ago
8 years ago
```
acme.sh --upgrade
```
8 years ago
You can also enable auto upgrade:
```
8 years ago
acme.sh --upgrade --auto-upgrade
```
8 years ago
Then **acme.sh** will be kept up to date automatically.
Disable auto upgrade:
8 years ago
```
8 years ago
acme.sh --upgrade --auto-upgrade 0
```
8 years ago
8 years ago
# 12. Issue a cert from an existing CSR
https://github.com/Neilpang/acme.sh/wiki/Issue-a-cert-from-existing-CSR
# Under the Hood
9 years ago
Speak ACME language using shell, directly to "Let's Encrypt".
9 years ago
TODO:
8 years ago
# Acknowledgments
9 years ago
1. Acme-tiny: https://github.com/diafygi/acme-tiny
2. ACME protocol: https://github.com/ietf-wg-acme/acme
9 years ago
3. Certbot: https://github.com/certbot/certbot
9 years ago
8 years ago
8 years ago
# License & Others
9 years ago
License is GPLv3
9 years ago
Please Star and Fork me.
9 years ago
8 years ago
[Issues](https://github.com/Neilpang/acme.sh/issues) and [pull requests](https://github.com/Neilpang/acme.sh/pulls) are welcome.
9 years ago
8 years ago
# Donate
9 years ago
8 years ago
1. PayPal: donate@acme.sh
8 years ago
8 years ago
[Donate List](https://github.com/Neilpang/acme.sh/wiki/Donate-list)