Page Menu
Home
Software Heritage
Search
Configure Global Search
Log In
Files
F9696776
README.md
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
3 KB
Subscribers
None
README.md
View Options
[](https://forge.puppetlabs.com/danzilio/letsencrypt) [](https://travis-ci.org/danzilio/puppet-letsencrypt) [](http://danzilio.github.io/puppet-letsencrypt)
This
module
installs
the
Let
'
s
Encrypt
client
from
source
and
allows
you
to
request
certificates
.
##
Support
This
module
requires
Puppet
>=
3.4
.
and
is
currently
only
written
to
work
on
Debian
and
RedHat
based
operating
systems
.
##
Dependencies
On
EL
(
Red
Hat
,
CentOS
etc
.)
systems
,
the
EPEL
repository
needs
to
be
enabled
for
the
Let
'
s
Encrypt
client
package
.
The
module
can
integrate
with
[
stahnma
/
epel
](
https
:
//forge.puppetlabs.com/stahnma/epel)
to
set
up
the
repo
by
setting
the
`
configure_epel
`
parameter
to
`
true
`
and
installing
the
module
.
##
Usage
To
install
the
Let
'
s
Encrypt
client
with
the
default
configuration
settings
you
must
provide
your
email
address
to
register
with
the
Let
'
s
Encrypt
servers
:
```
puppet
class
{
::
letsencrypt
:
email
=>
'
foo
@
example
.
com
'
,
}
```
If
using
EL7
without
EPEL
-
preconfigured
,
add
`
configure_epel
`
:
```
puppet
class
{
::
letsencrypt
:
configure_epel
=>
true
,
email
=>
'
foo
@
example
.
com
'
,
}
```
This
will
install
the
Let
'
s
Encrypt
client
and
its
dependencies
,
agree
to
the
Terms
of
Service
,
initialize
the
client
,
and
install
a
configuration
file
for
the
client
.
Alternatively
,
you
can
specify
your
email
address
in
the
$
config
hash
:
```
puppet
class
{
::
letsencrypt
:
config
=>
{
email
=>
'
foo
@
example
.
com
'
,
server
=>
'
https
:
//acme-v01.api.letsencrypt.org/directory',
}
}
```
If
you
don
'
t
wish
to
provide
your
email
address
,
you
can
set
the
`
unsafe_registration
`
parameter
to
`
true
`
(
this
is
not
recommended
):
```
puppet
class
{
::
letsencrypt
:
unsafe_registration
=>
true
,
}
```
To
request
a
certificate
for
`
foo
.
example
.
com
`
using
the
`
certonly
`
installer
and
the
`
standalone
`
authenticator
:
```
puppet
letsencrypt
::
certonly
{
'
foo
.
example
.
com
'
:
}
```
To
request
a
certificate
for
`
foo
.
example
.
com
`
and
`
bar
.
example
.
com
`
with
the
`
certonly
`
installer
and
the
`
apache
`
authenticator
:
```
puppet
letsencrypt
::
certonly
{
'
foo
'
:
domains
=>
[
'
foo
.
example
.
com
'
,
'
bar
.
example
.
com
'
],
plugin
=>
'
apache
'
,
}
```
If
you
need
to
pass
a
command
line
flag
to
the
`
letsencrypt
-
auto
`
command
that
is
not
supported
natively
by
this
module
,
you
can
use
the
`
additional_args
`
parameter
to
pass
those
arguments
:
```
puppet
letsencrypt
::
certonly
{
'
foo
'
:
domains
=>
[
'
foo
.
example
.
com
'
,
'
bar
.
example
.
com
'
],
plugin
=>
'
apache
'
,
additional_args
=>
[
'
--
foo
bar
'
,
'
--
baz
quuz
'
],
}
```
##
Development
1
.
Fork
it
2
.
Create
a
feature
branch
3
.
Write
a
failing
test
4
.
Write
the
code
to
make
that
test
pass
5
.
Refactor
the
code
6
.
Submit
a
pull
request
We
politely
request
(
demand
)
tests
for
all
new
features
.
Pull
requests
that
contain
new
features
without
a
test
will
not
be
considered
.
If
you
need
help
,
just
ask
!
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Mon, Aug 18, 9:26 PM (1 d, 8 h)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
3399316
Attached To
R192 puppet-puppet-letsencrypt
Event Timeline
Log In to Comment