Compare commits
19 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
39308ce37d | ||
![]() |
0a7064d42b | ||
![]() |
120f1a86ea | ||
![]() |
397fa60813 | ||
![]() |
85837641f2 | ||
![]() |
68f8f037be | ||
![]() |
fdc1672b7e | ||
![]() |
8dfda4711e | ||
![]() |
cc2d9e31fd | ||
![]() |
2b5f6dafe3 | ||
![]() |
b3dfeb0a78 | ||
![]() |
b336b895d1 | ||
![]() |
2f54ef1fe6 | ||
![]() |
be54e7b798 | ||
![]() |
451e36d58e | ||
![]() |
708a1b0c11 | ||
![]() |
b92cac74ca | ||
![]() |
d3f400a56b | ||
![]() |
6e3b96982c |
3
.tito/packages/.readme
Normal file
3
.tito/packages/.readme
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
the .tito/packages directory contains metadata files
|
||||||
|
named after their packages. Each file has the latest tagged
|
||||||
|
version and the project's relative directory.
|
1
.tito/packages/smeserver-letsencrypt-client
Normal file
1
.tito/packages/smeserver-letsencrypt-client
Normal file
|
@ -0,0 +1 @@
|
||||||
|
0.2.9-1 ./
|
1
.tito/releasers.conf
Symbolic link
1
.tito/releasers.conf
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../tito_libs/releasers.conf
|
6
.tito/tito.props
Normal file
6
.tito/tito.props
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
[buildconfig]
|
||||||
|
builder = tito.builder.Builder
|
||||||
|
tagger = tito.tagger.VersionTagger
|
||||||
|
changelog_do_not_remove_cherrypick = 0
|
||||||
|
changelog_format = %s (%ae)
|
||||||
|
lib_dir = ../tito_libs
|
|
@ -3,7 +3,7 @@
|
||||||
use esmith::Build::CreateLinks qw(:all);
|
use esmith::Build::CreateLinks qw(:all);
|
||||||
|
|
||||||
templates2events("/etc/dehydrated/config", qw(letsencrypt-update bootstrap-console-save));
|
templates2events("/etc/dehydrated/config", qw(letsencrypt-update bootstrap-console-save));
|
||||||
templates2events("/etc/cron.daily/dehydrated", qw(letsencrypt-update));
|
templates2events("/etc/cron.daily/dehydrated", qw(letsencrypt-update bootstrap-console-save));
|
||||||
templates2events("/etc/dehydrated/domains.txt",
|
templates2events("/etc/dehydrated/domains.txt",
|
||||||
qw(
|
qw(
|
||||||
letsencrypt-update
|
letsencrypt-update
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
staging
|
prod
|
||||||
|
|
|
@ -8,7 +8,7 @@ elsif ($uri =~ m/^(test(ing)?)|staging$/){
|
||||||
$OUT .= "CA=https://acme-staging.api.letsencrypt.org/directory\n";
|
$OUT .= "CA=https://acme-staging.api.letsencrypt.org/directory\n";
|
||||||
}
|
}
|
||||||
elsif ($uri =~ m/^prod/){
|
elsif ($uri =~ m/^prod/){
|
||||||
$OUT .= "CA=https://acme-v01.api.letsencrypt.org/directory\n";
|
$OUT .= "CA=https://acme-v02.api.letsencrypt.org/directory\n";
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
1
root/etc/e-smith/templates/etc/dehydrated/config/45Algo
Normal file
1
root/etc/e-smith/templates/etc/dehydrated/config/45Algo
Normal file
|
@ -0,0 +1 @@
|
||||||
|
KEY_ALGO=rsa
|
|
@ -0,0 +1 @@
|
||||||
|
PREFERRED_CHAIN="issuer= /C=US/O=Internet Security Research Group/CN=ISRG Root X1"
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled' && ((${'httpd-e-smith'}{'TCPPort'} || '80') eq $port)){
|
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled'){
|
||||||
$OUT .=<<"_EOF";
|
$OUT .=<<"_EOF";
|
||||||
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
||||||
<Location /.well-known/acme-challenge/>
|
<Location /.well-known/acme-challenge/>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled' && ((${'httpd-e-smith'}{'TCPPort'} || '80') eq $port)){
|
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled'){
|
||||||
$OUT .=<<"_EOF";
|
$OUT .=<<"_EOF";
|
||||||
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
||||||
<Location /.well-known/acme-challenge/>
|
<Location /.well-known/acme-challenge/>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled' && ((${'httpd-e-smith'}{'TCPPort'} || '80') eq $port)){
|
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled'){
|
||||||
$OUT .=<<"_EOF";
|
$OUT .=<<"_EOF";
|
||||||
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
||||||
<Location /.well-known/acme-challenge/>
|
<Location /.well-known/acme-challenge/>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled' && ((${'httpd-e-smith'}{'TCPPort'} || '80') eq $port)){
|
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled'){
|
||||||
$OUT .=<<"_EOF";
|
$OUT .=<<"_EOF";
|
||||||
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
||||||
<Location /.well-known/acme-challenge/>
|
<Location /.well-known/acme-challenge/>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled' && ((${'httpd-e-smith'}{'TCPPort'} || '80') eq $port)){
|
if (($domain->prop('Letsencrypt') || 'enabled') ne 'disabled'){
|
||||||
$OUT .=<<"_EOF";
|
$OUT .=<<"_EOF";
|
||||||
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
Alias /.well-known/acme-challenge/ /var/lib/dehydrated/challenges/
|
||||||
<Location /.well-known/acme-challenge/>
|
<Location /.well-known/acme-challenge/>
|
||||||
|
|
|
@ -1,11 +1,7 @@
|
||||||
%define version 0.2.1
|
|
||||||
%define release 1
|
|
||||||
%define name smeserver-letsencrypt-client
|
|
||||||
|
|
||||||
Summary: Let's Encrypt client for SME Server based on dehydrated
|
Summary: Let's Encrypt client for SME Server based on dehydrated
|
||||||
Name: %{name}
|
Name: smeserver-letsencrypt-client
|
||||||
Version: %{version}
|
Version: 0.2.9
|
||||||
Release: %{release}%{?dist}
|
Release: 1%{?dist}
|
||||||
License: GPL
|
License: GPL
|
||||||
Group: Applications/System
|
Group: Applications/System
|
||||||
Source: %{name}-%{version}.tar.gz
|
Source: %{name}-%{version}.tar.gz
|
||||||
|
@ -22,6 +18,36 @@ Automatically get certificates from letsencrypt
|
||||||
Using https://github.com/lukas2511/dehydrated
|
Using https://github.com/lukas2511/dehydrated
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Thu Sep 30 2021 Daniel Berteaud <daniel@firewall-services.com> 0.2.9-1
|
||||||
|
- Use RSA instead of EC as it's not working on EL6 (daniel@firewall-
|
||||||
|
services.com)
|
||||||
|
|
||||||
|
* Thu Sep 30 2021 Daniel Berteaud <daniel@firewall-services.com> 0.2.8-1
|
||||||
|
- Fix chain selection on el6 (daniel@firewall-services.com)
|
||||||
|
|
||||||
|
* Thu Sep 30 2021 Daniel Berteaud <daniel@firewall-services.com> 0.2.7-1
|
||||||
|
- Specify ISRG X1 as preferred chain (daniel@firewall-services.com)
|
||||||
|
|
||||||
|
* Fri Oct 23 2020 Daniel Berteaud <daniel@firewall-services.com> 0.2.6-1
|
||||||
|
- Don't restrict ACME challenges to the clear text vhost (daniel@firewall-
|
||||||
|
services.com)
|
||||||
|
- Cleanup spec file for tito (daniel@firewall-services.com)
|
||||||
|
|
||||||
|
* Wed Jul 15 2020 Daniel Berteaud <daniel@firewall-services.com> 0.2.5-1
|
||||||
|
- Bump version
|
||||||
|
|
||||||
|
* Wed Jul 15 2020 Daniel Berteaud <daniel@firewall-services.com> 0.2.4-1
|
||||||
|
- Build with tito
|
||||||
|
- Switch to the v02 API
|
||||||
|
* Thu May 4 2017 Daniel Berteaud <daniel@firewall-services.com> - 0.2.4-1.sme
|
||||||
|
- Expand cron file in bootstarp-cnsole-save
|
||||||
|
|
||||||
|
* Wed Mar 15 2017 Daniel Berteaud <daniel@firewall-services.com> - 0.2.3-1.sme
|
||||||
|
- Set default Uri to prod
|
||||||
|
|
||||||
|
* Wed Nov 23 2016 Daniel Berteaud <daniel@firewall-services.com> - 0.2.2-1.sme
|
||||||
|
- Correctly update cert for the imaps service on SME8
|
||||||
|
|
||||||
* Mon Oct 24 2016 Daniel Berteaud <daniel@firewall-services.com> - 0.2.1-1.sme
|
* Mon Oct 24 2016 Daniel Berteaud <daniel@firewall-services.com> - 0.2.1-1.sme
|
||||||
- Rename cron template metadata
|
- Rename cron template metadata
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user