setup: Add config examples, deploy readme and arch PKGBUILD

This commit is contained in:
Kishi85 2019-02-25 18:14:03 +01:00
parent dc2144b0d3
commit b99014c7c3
5 changed files with 143 additions and 0 deletions

16
docs/acertmgr.conf Normal file
View File

@ -0,0 +1,16 @@
---
# Required: Authority API endpoint to use
#authority: "https://acme-v01.api.letsencrypt.org"
#authority: "https://acme-staging.api.letsencrypt.org"
# Optional: account_key location. This defaults to "/etc/acme/account.key"
#account_key: "/etc/acme/acc.key"
# Optional: global server_key location. Otherwise separate key per server
#server_key: "/etc/acme/serv.key"
# Optional: global challenge handling mode with parameters
#mode: webdir
#webdir: /var/www/acme-challenge/
#mode: standalone
#port: 13135

View File

@ -0,0 +1,31 @@
pkgname=python-acertmgr
_pkgname=acertmgr
pkgver=v0.0.0
pkgrel=1
pkgdesc='An automated certificate manager using ACME/letsencrypt'
arch=('any')
url='https://github.com/moepman/acertmgr'
license=('ISC')
depends=('python-cryptography')
optdepends=('yaml: python-yaml'
'dns.nsupdate: python-dnspython')
makedepends=('git')
conflicts=('python-acertmgr')
provides=('python-acertmgr')
source=('git://github.com/moepman/acertmgr.git')
md5sums=('SKIP')
pkgver() {
cd $_pkgname
git describe --long --tags | sed 's/\([^-]*-g\)/r\1/;s/-/./g'
}
build() {
cd $_pkgname
python setup.py build
}
package() {
cd $_pkgname
python setup.py install --root=${pkgdir} --optimize=1
}

View File

@ -0,0 +1,31 @@
pkgname=python2-acertmgr
_pkgname=acertmgr
pkgver=v0.0.0
pkgrel=1
pkgdesc='An automated certificate manager using ACME/letsencrypt'
arch=('any')
url='https://github.com/moepman/acertmgr'
license=('ISC')
depends=('python2-cryptography')
optdepends=('yaml: python2-yaml'
'dns.nsupdate: python2-dnspython')
makedepends=('git')
conflicts=('python-acertmgr')
provides=('python-acertmgr')
source=('git://github.com/moepman/acertmgr.git')
md5sums=('SKIP')
pkgver() {
cd $_pkgname
git describe --long --tags | sed 's/\([^-]*-g\)/r\1/;s/-/./g'
}
build() {
cd $_pkgname
python2 setup.py build
}
package() {
cd $_pkgname
python2 setup.py install --root=${pkgdir} --optimize=1
}

63
docs/domain.conf Normal file
View File

@ -0,0 +1,63 @@
---
mail.example.com:
- path: /etc/postfix/ssl/mail.key
user: root
group: root
perm: '400'
format: key
action: '/etc/init.d/postfix reload'
- path: /etc/postfix/ssl/mail.crt
user: root
group: root
perm: '400'
format: crt,ca
action: '/etc/init.d/postfix reload'
jabber.example.com:
- path: /etc/ejabberd/server.pem
user: jabber
group: jabber
perm: '400'
format: key,crt,ca
action: '/etc/init.d/ejabberd restart'
# this will create a certificate with subject alternative names
www.example.com example.com:
- path: /var/www/ssl/cert.pem
user: apache
group: apache
perm: '400'
action: '/etc/init.d/apache2 reload'
format: crt,ca
- path: /var/www/ssl/key.pem
user: apache
group: apache
perm: '400'
action: '/etc/init.d/apache2 reload'
format: key
# this will create a certificate with subject alternative names
# using a different challenge handler for one domain
mail.example.com smtp.example.com webmail.example.net:
- mode: dns.nsupdate
nsupdate_server: ns1.example.com
nsupdate_keyname: mail
nsupdate_keyvalue: Test1234512359==
- domain: webmail.example.net
mode: dns.nsupdate
nsupdate_server: ns1.example.net
nsupdate_keyname: webmail.
nsupdate_keyfile: /etc/nsupdate.key
dns_updatedomain: webmail.example.net
- path: /etc/postfix/ssl/mail.key
user: root
group: root
perm: '400'
format: key
action: '/etc/init.d/postfix reload'
- path: /etc/postfix/ssl/mail.crt
user: root
group: root
perm: '400'
format: crt,ca
action: '/etc/init.d/postfix reload'

View File

@ -66,4 +66,6 @@ setup(
'acertmgr=acertmgr:main',
],
},
data_files=[('readme', ['README.md']),
('config', ['docs/acertmgr.conf','docs/domain.conf'])]
)