2016-11-15 14:24:07 +01:00
|
|
|
# How to use DNS API
|
2016-02-07 11:29:28 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 1. Use CloudFlare domain API to automatically issue cert
|
2016-02-07 11:29:28 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
First you need to login to your CloudFlare account to get your API key.
|
2016-02-07 11:29:28 +01:00
|
|
|
|
|
|
|
```
|
|
|
|
export CF_Key="sdfsdfsdfljlbjkljlkjsdfoiwje"
|
|
|
|
export CF_Email="xxxx@sss.com"
|
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Ok, let's issue a cert now:
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_cf -d example.com -d www.example.com
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `CF_Key` and `CF_Email` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
2016-02-07 11:29:28 +01:00
|
|
|
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 2. Use DNSPod.cn domain API to automatically issue cert
|
2016-02-07 11:29:28 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
First you need to login to your DNSPod account to get your API Key and ID.
|
2016-02-07 11:29:28 +01:00
|
|
|
|
|
|
|
```
|
|
|
|
export DP_Id="1234"
|
|
|
|
export DP_Key="sADDsdasdgdsf"
|
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Ok, let's issue a cert now:
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_dp -d example.com -d www.example.com
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `DP_Id` and `DP_Key` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
2016-02-07 11:29:28 +01:00
|
|
|
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 3. Use CloudXNS.com domain API to automatically issue cert
|
2016-02-07 11:29:28 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
First you need to login to your CloudXNS account to get your API Key and Secret.
|
2016-02-07 11:29:28 +01:00
|
|
|
|
|
|
|
```
|
|
|
|
export CX_Key="1234"
|
2016-02-07 13:14:53 +01:00
|
|
|
export CX_Secret="sADDsdasdgdsf"
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Ok, let's issue a cert now:
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_cx -d example.com -d www.example.com
|
2016-02-07 11:29:28 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `CX_Key` and `CX_Secret` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
2016-02-07 11:29:28 +01:00
|
|
|
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 4. Use GoDaddy.com domain API to automatically issue cert
|
2016-07-29 12:07:16 +02:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
First you need to login to your GoDaddy account to get your API Key and Secret.
|
2016-07-29 12:07:16 +02:00
|
|
|
|
|
|
|
https://developer.godaddy.com/keys/
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Please create a Production key, instead of a Test key.
|
2016-07-29 12:07:16 +02:00
|
|
|
|
|
|
|
```
|
|
|
|
export GD_Key="sdfsdfsdfljlbjkljlkjsdfoiwje"
|
|
|
|
export GD_Secret="asdfsdafdsfdsfdsfdsfdsafd"
|
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Ok, let's issue a cert now:
|
2016-07-29 12:07:16 +02:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_gd -d example.com -d www.example.com
|
2016-07-29 12:07:16 +02:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `GD_Key` and `GD_Secret` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
2016-07-29 12:07:16 +02:00
|
|
|
|
2016-10-09 15:56:04 +02:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 5. Use PowerDNS embedded API to automatically issue cert
|
2016-10-09 15:56:04 +02:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
First you need to login to your PowerDNS account to enable the API and set your API-Token in the configuration.
|
2016-10-09 15:56:04 +02:00
|
|
|
|
|
|
|
https://doc.powerdns.com/md/httpapi/README/
|
|
|
|
|
|
|
|
```
|
|
|
|
export PDNS_Url="http://ns.example.com:8081"
|
|
|
|
export PDNS_ServerId="localhost"
|
|
|
|
export PDNS_Token="0123456789ABCDEF"
|
|
|
|
export PDNS_Ttl=60
|
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Ok, let's issue a cert now:
|
2016-10-09 15:56:04 +02:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_pdns -d example.com -d www.example.com
|
2016-10-09 15:56:04 +02:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `PDNS_Url`, `PDNS_ServerId`, `PDNS_Token` and `PDNS_Ttl` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
2016-10-09 15:56:04 +02:00
|
|
|
|
2016-11-14 15:56:07 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 6. Use OVH/kimsufi/soyoustart/runabove API to automatically issue cert
|
2016-07-29 12:07:16 +02:00
|
|
|
|
2016-08-25 05:03:25 +02:00
|
|
|
https://github.com/Neilpang/acme.sh/wiki/How-to-use-OVH-domain-api
|
2016-02-07 11:29:28 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
|
2016-11-15 10:28:15 +01:00
|
|
|
## 7. Use nsupdate to automatically issue cert
|
2016-11-14 15:56:07 +01:00
|
|
|
|
|
|
|
First, generate a key for updating the zone
|
|
|
|
```
|
|
|
|
b=$(dnssec-keygen -a hmac-sha512 -b 512 -n USER -K /tmp foo)
|
|
|
|
cat > /etc/named/keys/update.key <<EOF
|
|
|
|
key "update" {
|
|
|
|
algorithm hmac-sha512;
|
|
|
|
secret "$(awk '/^Key/{print $2}' /tmp/$b.private)";
|
|
|
|
};
|
|
|
|
EOF
|
|
|
|
rm -f /tmp/$b.{private,key}
|
|
|
|
```
|
|
|
|
|
|
|
|
Include this key in your named configuration
|
|
|
|
```
|
|
|
|
include "/etc/named/keys/update.key";
|
|
|
|
```
|
|
|
|
|
|
|
|
Next, configure your zone to allow dynamic updates.
|
2016-11-15 14:24:07 +01:00
|
|
|
|
2016-11-14 15:56:07 +01:00
|
|
|
Depending on your named version, use either
|
|
|
|
```
|
|
|
|
zone "example.com" {
|
|
|
|
type master;
|
|
|
|
allow-update { key "update"; };
|
|
|
|
};
|
|
|
|
```
|
|
|
|
or
|
|
|
|
```
|
|
|
|
zone "example.com" {
|
|
|
|
type master;
|
|
|
|
update-policy {
|
|
|
|
grant update subdomain example.com.;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
|
|
|
|
Finally, make the DNS server and update Key available to `acme.sh`
|
|
|
|
|
2016-11-14 15:56:07 +01:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
export NSUPDATE_SERVER="dns.example.com"
|
|
|
|
export NSUPDATE_KEY="aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa=="
|
2016-11-14 15:56:07 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Ok, let's issue a cert now:
|
2016-11-14 15:56:07 +01:00
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_nsupdate -d example.com -d www.example.com
|
2016-11-14 15:56:07 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `NSUPDATE_SERVER` and `NSUPDATE_KEY` settings will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
|
|
|
|
2016-11-14 15:56:07 +01:00
|
|
|
|
2016-11-15 10:28:15 +01:00
|
|
|
## 8. Use LuaDNS domain API
|
2016-11-06 16:52:43 +01:00
|
|
|
|
|
|
|
Get your API token at https://api.luadns.com/settings
|
|
|
|
|
|
|
|
```
|
|
|
|
export LUA_Key="sdfsdfsdfljlbjkljlkjsdfoiwje"
|
|
|
|
export LUA_Email="xxxx@sss.com"
|
|
|
|
```
|
|
|
|
|
|
|
|
To issue a cert:
|
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_lua -d example.com -d www.example.com
|
2016-11-06 16:52:43 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `LUA_Key` and `LUA_Email` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
|
|
|
|
2016-11-06 16:52:43 +01:00
|
|
|
|
2016-11-15 10:28:15 +01:00
|
|
|
## 9. Use DNSMadeEasy domain API
|
2016-11-07 21:50:59 +01:00
|
|
|
|
|
|
|
Get your API credentials at https://cp.dnsmadeeasy.com/account/info
|
|
|
|
|
|
|
|
```
|
|
|
|
export ME_Key="sdfsdfsdfljlbjkljlkjsdfoiwje"
|
|
|
|
export ME_Secret="qdfqsdfkjdskfj"
|
|
|
|
```
|
|
|
|
|
|
|
|
To issue a cert:
|
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_me -d example.com -d www.example.com
|
2016-11-07 21:50:59 +01:00
|
|
|
```
|
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
The `ME_Key` and `ME_Secret` will be saved in `~/.acme.sh/account.conf` and will be reused when needed.
|
|
|
|
|
2016-11-07 21:50:59 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
# 10. Use custom API
|
2016-11-15 10:28:15 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
If your API is not supported yet, you can write your own DNS API.
|
2016-11-15 10:28:15 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
Let's assume you want to name it 'myapi':
|
2016-11-15 10:28:15 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
1. Create a bash script named `~/.acme.sh/dns_myapi.sh`,
|
|
|
|
2. In the script you must have a function named `dns_myapi_add()` which will be called by acme.sh to add the DNS records.
|
|
|
|
3. Then you can use your API to issue cert like this:
|
2016-11-15 10:28:15 +01:00
|
|
|
|
|
|
|
```
|
2016-11-15 14:24:07 +01:00
|
|
|
acme.sh --issue --dns dns_myapi -d example.com -d www.example.com
|
2016-11-15 10:28:15 +01:00
|
|
|
```
|
|
|
|
|
|
|
|
For more details, please check our sample script: [dns_myapi.sh](dns_myapi.sh)
|
|
|
|
|
2016-11-07 21:50:59 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
## 11. Use lexicon DNS API
|
2016-02-07 11:29:28 +01:00
|
|
|
|
2016-11-15 14:24:07 +01:00
|
|
|
https://github.com/Neilpang/acme.sh/wiki/How-to-use-lexicon-dns-api
|