Skip to content

Commit f8965f6

Browse files
author
janeczku
committed
Release v0.3.0
1 parent 4627704 commit f8965f6

File tree

4 files changed

+25
-15
lines changed

4 files changed

+25
-15
lines changed

Dockerfile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
FROM alpine:3.3
2-
MAINTAINER Jan Broer <jan@festplatte.eu.org>
2+
MAINTAINER <jan@rancher.com>
33

44
RUN apk add --no-cache ca-certificates
55

6-
ENV LETSENCRYPT_RELEASE v0.2.9
6+
ENV LETSENCRYPT_RELEASE v0.3.0
77

88
ADD https://github.com/janeczku/rancher-letsencrypt/releases/download/${LETSENCRYPT_RELEASE}/rancher-letsencrypt-linux-amd64.tar.gz /tmp/rancher-letsencrypt.tar.gz
99

README.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,17 @@ A [Rancher](http://rancher.com/rancher/) service that obtains free SSL/TLS certi
2020
This application is distributed via the [Rancher Community Catalog](https://github.com/rancher/community-catalog).
2121

2222
Enable the Community Catalog under `Admin` => `Settings` in the Rancher UI.
23-
Then find the `Let's Encrypt` template in the Catalog section of the UI and follow the instructions.
23+
Then locate the `Let's Encrypt` template in the Catalog section of the UI and follow the instructions.
24+
25+
#### Accessing certificates and private keys from other services
26+
The created SSL certificate is stored in Rancher for usage in load balancers.
27+
If you want to use it from other services (e.g. a Nginx container) you can opt to save the certificate and private key to a host path,
28+
named volume or Convoy storage volume. You can then mount the volume or host path to other containers and access the files as follows:
29+
`<path_on_host or volume name>/<certificate name>/fullchain.pem`
30+
`<path_on_host or volume name>/<certificate name>/privkey.pem`
31+
where `<certificate name>` is the name you specified in the UI forced to this set of characters: `[a-zA-Z0-9-_.]`.
32+
33+
2434

2535
### Provider specific usage
2636

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
v0.2.9
1+
v0.3.0

context.go

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -71,17 +71,17 @@ func (c *Context) InitContext() {
7171
}
7272

7373
providerOpts := letsencrypt.ProviderOpts{
74-
Provider: letsencrypt.DnsProvider(providerParam),
75-
CloudflareEmail: getEnvOption("CLOUDFLARE_EMAIL", false),
76-
CloudflareKey: getEnvOption("CLOUDFLARE_KEY", false),
77-
DoAccessToken: getEnvOption("DO_ACCESS_TOKEN", false),
78-
AwsAccessKey: getEnvOption("AWS_ACCESS_KEY", false),
79-
AwsSecretKey: getEnvOption("AWS_SECRET_KEY", false),
80-
DNSimpleEmail: getEnvOption("DNSIMPLE_EMAIL", false),
81-
DNSimpleKey: getEnvOption("DNSIMPLE_KEY", false),
82-
DynCustomerName: getEnvOption("DYN_CUSTOMER_NAME", false),
83-
DynUserName: getEnvOption("DYN_USER_NAME", false),
84-
DynPassword: getEnvOption("DYN_PASSWORD", false),
74+
Provider: letsencrypt.DnsProvider(providerParam),
75+
CloudflareEmail: getEnvOption("CLOUDFLARE_EMAIL", false),
76+
CloudflareKey: getEnvOption("CLOUDFLARE_KEY", false),
77+
DoAccessToken: getEnvOption("DO_ACCESS_TOKEN", false),
78+
AwsAccessKey: getEnvOption("AWS_ACCESS_KEY", false),
79+
AwsSecretKey: getEnvOption("AWS_SECRET_KEY", false),
80+
DNSimpleEmail: getEnvOption("DNSIMPLE_EMAIL", false),
81+
DNSimpleKey: getEnvOption("DNSIMPLE_KEY", false),
82+
DynCustomerName: getEnvOption("DYN_CUSTOMER_NAME", false),
83+
DynUserName: getEnvOption("DYN_USER_NAME", false),
84+
DynPassword: getEnvOption("DYN_PASSWORD", false),
8585
}
8686

8787
c.Acme, err = letsencrypt.NewClient(emailParam, keyType, apiVersion, providerOpts)

0 commit comments

Comments
 (0)