mirror of
				https://github.com/linuxserver/docker-swag.git
				synced 2025-10-31 21:17:42 +09:00 
			
		
		
		
	| @@ -110,6 +110,7 @@ RUN \ | |||||||
|     certbot-dns-google \ |     certbot-dns-google \ | ||||||
|     certbot-dns-hetzner \ |     certbot-dns-hetzner \ | ||||||
|     certbot-dns-inwx \ |     certbot-dns-inwx \ | ||||||
|  |     certbot-dns-ionos \ | ||||||
|     certbot-dns-linode \ |     certbot-dns-linode \ | ||||||
|     certbot-dns-luadns \ |     certbot-dns-luadns \ | ||||||
|     certbot-dns-netcup \ |     certbot-dns-netcup \ | ||||||
|   | |||||||
| @@ -110,6 +110,7 @@ RUN \ | |||||||
|     certbot-dns-google \ |     certbot-dns-google \ | ||||||
|     certbot-dns-hetzner \ |     certbot-dns-hetzner \ | ||||||
|     certbot-dns-inwx \ |     certbot-dns-inwx \ | ||||||
|  |     certbot-dns-ionos \ | ||||||
|     certbot-dns-linode \ |     certbot-dns-linode \ | ||||||
|     certbot-dns-luadns \ |     certbot-dns-luadns \ | ||||||
|     certbot-dns-netcup \ |     certbot-dns-netcup \ | ||||||
|   | |||||||
| @@ -110,6 +110,7 @@ RUN \ | |||||||
|     certbot-dns-google \ |     certbot-dns-google \ | ||||||
|     certbot-dns-hetzner \ |     certbot-dns-hetzner \ | ||||||
|     certbot-dns-inwx \ |     certbot-dns-inwx \ | ||||||
|  |     certbot-dns-ionos \ | ||||||
|     certbot-dns-linode \ |     certbot-dns-linode \ | ||||||
|     certbot-dns-luadns \ |     certbot-dns-luadns \ | ||||||
|     certbot-dns-netcup \ |     certbot-dns-netcup \ | ||||||
|   | |||||||
| @@ -208,7 +208,7 @@ Container images are configured using parameters passed at runtime (such as thos | |||||||
| | `-e SUBDOMAINS=www,` | Subdomains you'd like the cert to cover (comma separated, no spaces) ie. `www,ftp,cloud`. For a wildcard cert, set this _exactly_ to `wildcard` (wildcard cert is available via `dns` and `duckdns` validation only) | | | `-e SUBDOMAINS=www,` | Subdomains you'd like the cert to cover (comma separated, no spaces) ie. `www,ftp,cloud`. For a wildcard cert, set this _exactly_ to `wildcard` (wildcard cert is available via `dns` and `duckdns` validation only) | | ||||||
| | `-e VALIDATION=http` | Certbot validation method to use, options are `http`, `dns` or `duckdns` (`dns` method also requires `DNSPLUGIN` variable set) (`duckdns` method requires `DUCKDNSTOKEN` variable set, and the `SUBDOMAINS` variable must be either empty or set to `wildcard`). | | | `-e VALIDATION=http` | Certbot validation method to use, options are `http`, `dns` or `duckdns` (`dns` method also requires `DNSPLUGIN` variable set) (`duckdns` method requires `DUCKDNSTOKEN` variable set, and the `SUBDOMAINS` variable must be either empty or set to `wildcard`). | | ||||||
| | `-e CERTPROVIDER=` | Optionally define the cert provider. Set to `zerossl` for ZeroSSL certs (requires existing [ZeroSSL account](https://app.zerossl.com/signup) and the e-mail address entered in `EMAIL` env var). Otherwise defaults to Let's Encrypt. | | | `-e CERTPROVIDER=` | Optionally define the cert provider. Set to `zerossl` for ZeroSSL certs (requires existing [ZeroSSL account](https://app.zerossl.com/signup) and the e-mail address entered in `EMAIL` env var). Otherwise defaults to Let's Encrypt. | | ||||||
| | `-e DNSPLUGIN=cloudflare` | Required if `VALIDATION` is set to `dns`. Options are `aliyun`, `cloudflare`, `cloudxns`, `cpanel`, `digitalocean`, `directadmin`, `dnsimple`, `dnsmadeeasy`, `domeneshop`, `gandi`, `gehirn`, `google`, `hetzner`, `inwx`, `linode`, `luadns`, `netcup`, `njalla`, `nsone`, `ovh`, `rfc2136`, `route53`, `sakuracloud`, `transip` and `vultr`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`. | | | `-e DNSPLUGIN=cloudflare` | Required if `VALIDATION` is set to `dns`. Options are `aliyun`, `cloudflare`, `cloudxns`, `cpanel`, `digitalocean`, `directadmin`, `dnsimple`, `dnsmadeeasy`, `domeneshop`, `gandi`, `gehirn`, `google`, `hetzner`, `inwx`, `ionos`, `linode`, `luadns`, `netcup`, `njalla`, `nsone`, `ovh`, `rfc2136`, `route53`, `sakuracloud`, `transip` and `vultr`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`. | | ||||||
| | `-e PROPAGATION=` | Optionally override (in seconds) the default propagation time for the dns plugins. | | | `-e PROPAGATION=` | Optionally override (in seconds) the default propagation time for the dns plugins. | | ||||||
| | `-e DUCKDNSTOKEN=` | Required if `VALIDATION` is set to `duckdns`. Retrieve your token from https://www.duckdns.org | | | `-e DUCKDNSTOKEN=` | Required if `VALIDATION` is set to `duckdns`. Retrieve your token from https://www.duckdns.org | | ||||||
| | `-e EMAIL=` | Optional e-mail address used for cert expiration notifications (Required for ZeroSSL). | | | `-e EMAIL=` | Optional e-mail address used for cert expiration notifications (Required for ZeroSSL). | | ||||||
| @@ -327,6 +327,7 @@ Once registered you can define the dockerfile to use with `-f Dockerfile.aarch64 | |||||||
|  |  | ||||||
| ## Versions | ## Versions | ||||||
|  |  | ||||||
|  | * **01.08.21:** - Add support for ionos dns validation. | ||||||
| * **15.07.21:** - Fix libmaxminddb issue due to upstream change. | * **15.07.21:** - Fix libmaxminddb issue due to upstream change. | ||||||
| * **07.07.21:** - Rebase to alpine 3.14. | * **07.07.21:** - Rebase to alpine 3.14. | ||||||
| * **24.06.21:** - Update default nginx conf folder. | * **24.06.21:** - Update default nginx conf folder. | ||||||
|   | |||||||
| @@ -51,7 +51,7 @@ cap_add_param_vars: | |||||||
| opt_param_usage_include_env: true | opt_param_usage_include_env: true | ||||||
| opt_param_env_vars: | opt_param_env_vars: | ||||||
|   - { env_var: "CERTPROVIDER", env_value: "", desc: "Optionally define the cert provider. Set to `zerossl` for ZeroSSL certs (requires existing [ZeroSSL account](https://app.zerossl.com/signup) and the e-mail address entered in `EMAIL` env var). Otherwise defaults to Let's Encrypt." } |   - { env_var: "CERTPROVIDER", env_value: "", desc: "Optionally define the cert provider. Set to `zerossl` for ZeroSSL certs (requires existing [ZeroSSL account](https://app.zerossl.com/signup) and the e-mail address entered in `EMAIL` env var). Otherwise defaults to Let's Encrypt." } | ||||||
|   - { env_var: "DNSPLUGIN", env_value: "cloudflare", desc: "Required if `VALIDATION` is set to `dns`. Options are `aliyun`, `cloudflare`, `cloudxns`, `cpanel`, `digitalocean`, `directadmin`, `dnsimple`, `dnsmadeeasy`, `domeneshop`, `gandi`, `gehirn`, `google`, `hetzner`, `inwx`, `linode`, `luadns`, `netcup`, `njalla`, `nsone`, `ovh`, `rfc2136`, `route53`, `sakuracloud`, `transip` and `vultr`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`." } |   - { env_var: "DNSPLUGIN", env_value: "cloudflare", desc: "Required if `VALIDATION` is set to `dns`. Options are `aliyun`, `cloudflare`, `cloudxns`, `cpanel`, `digitalocean`, `directadmin`, `dnsimple`, `dnsmadeeasy`, `domeneshop`, `gandi`, `gehirn`, `google`, `hetzner`, `inwx`, `ionos`, `linode`, `luadns`, `netcup`, `njalla`, `nsone`, `ovh`, `rfc2136`, `route53`, `sakuracloud`, `transip` and `vultr`. Also need to enter the credentials into the corresponding ini (or json for some plugins) file under `/config/dns-conf`." } | ||||||
|   - { env_var: "PROPAGATION", env_value: "", desc: "Optionally override (in seconds) the default propagation time for the dns plugins." } |   - { env_var: "PROPAGATION", env_value: "", desc: "Optionally override (in seconds) the default propagation time for the dns plugins." } | ||||||
|   - { env_var: "DUCKDNSTOKEN", env_value: "", desc: "Required if `VALIDATION` is set to `duckdns`. Retrieve your token from https://www.duckdns.org" } |   - { env_var: "DUCKDNSTOKEN", env_value: "", desc: "Required if `VALIDATION` is set to `duckdns`. Retrieve your token from https://www.duckdns.org" } | ||||||
|   - { env_var: "EMAIL", env_value: "", desc: "Optional e-mail address used for cert expiration notifications (Required for ZeroSSL)." } |   - { env_var: "EMAIL", env_value: "", desc: "Optional e-mail address used for cert expiration notifications (Required for ZeroSSL)." } | ||||||
| @@ -151,6 +151,7 @@ app_setup_nginx_reverse_proxy_block: "" | |||||||
|  |  | ||||||
| # changelog | # changelog | ||||||
| changelogs: | changelogs: | ||||||
|  |   - { date: "01.08.21:", desc: "Add support for ionos dns validation." } | ||||||
|   - { date: "15.07.21:", desc: "Fix libmaxminddb issue due to upstream change." } |   - { date: "15.07.21:", desc: "Fix libmaxminddb issue due to upstream change." } | ||||||
|   - { date: "07.07.21:", desc: "Rebase to alpine 3.14." } |   - { date: "07.07.21:", desc: "Rebase to alpine 3.14." } | ||||||
|   - { date: "24.06.21:", desc: "Update default nginx conf folder." } |   - { date: "24.06.21:", desc: "Update default nginx conf folder." } | ||||||
|   | |||||||
							
								
								
									
										5
									
								
								root/defaults/dns-conf/ionos.ini
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								root/defaults/dns-conf/ionos.ini
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,5 @@ | |||||||
|  | # Instructions: https://github.com/helgeerbe/certbot-dns-ionos | ||||||
|  | # Replace with your values | ||||||
|  | dns_ionos_prefix = myapikeyprefix | ||||||
|  | dns_ionos_secret = verysecureapikeysecret | ||||||
|  | dns_ionos_endpoint = https://api.hosting.ionos.com | ||||||
| @@ -122,7 +122,7 @@ if ! grep -q 'PARAMETERS' "/config/nginx/dhparams.pem"; then | |||||||
| fi | fi | ||||||
|  |  | ||||||
| # check to make sure DNSPLUGIN is selected if dns validation is used | # check to make sure DNSPLUGIN is selected if dns validation is used | ||||||
| [[ "$VALIDATION" = "dns" ]] && [[ ! "$DNSPLUGIN" =~ ^(aliyun|cloudflare|cloudxns|cpanel|digitalocean|directadmin|dnsimple|dnsmadeeasy|domeneshop|gandi|gehirn|google|hetzner|inwx|linode|luadns|netcup|njalla|nsone|ovh|rfc2136|route53|sakuracloud|transip|vultr)$ ]] && \ | [[ "$VALIDATION" = "dns" ]] && [[ ! "$DNSPLUGIN" =~ ^(aliyun|cloudflare|cloudxns|cpanel|digitalocean|directadmin|dnsimple|dnsmadeeasy|domeneshop|gandi|gehirn|google|hetzner|inwx|ionos|linode|luadns|netcup|njalla|nsone|ovh|rfc2136|route53|sakuracloud|transip|vultr)$ ]] && \ | ||||||
|     echo "Please set the DNSPLUGIN variable to a valid plugin name. See docker info for more details." && \ |     echo "Please set the DNSPLUGIN variable to a valid plugin name. See docker info for more details." && \ | ||||||
|     sleep infinity |     sleep infinity | ||||||
|  |  | ||||||
| @@ -236,7 +236,7 @@ if [ "$VALIDATION" = "dns" ]; then | |||||||
|     elif [[ "$DNSPLUGIN" =~ ^(google)$ ]]; then |     elif [[ "$DNSPLUGIN" =~ ^(google)$ ]]; then | ||||||
|         if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi |         if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi | ||||||
|         PREFCHAL="--dns-${DNSPLUGIN} --dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.json ${PROPAGATIONPARAM}" |         PREFCHAL="--dns-${DNSPLUGIN} --dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.json ${PROPAGATIONPARAM}" | ||||||
|     elif [[ "$DNSPLUGIN" =~ ^(aliyun|domeneshop|hetzner|inwx|netcup|njalla|transip|vultr)$ ]]; then |     elif [[ "$DNSPLUGIN" =~ ^(aliyun|domeneshop|hetzner|inwx|ionos|netcup|njalla|transip|vultr)$ ]]; then | ||||||
|         if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi |         if [ -n "$PROPAGATION" ];then PROPAGATIONPARAM="--dns-${DNSPLUGIN}-propagation-seconds ${PROPAGATION}"; fi | ||||||
|         PREFCHAL="-a dns-${DNSPLUGIN} --dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.ini ${PROPAGATIONPARAM}" |         PREFCHAL="-a dns-${DNSPLUGIN} --dns-${DNSPLUGIN}-credentials /config/dns-conf/${DNSPLUGIN}.ini ${PROPAGATIONPARAM}" | ||||||
|     elif [[ "$DNSPLUGIN" =~ ^(directadmin)$ ]]; then |     elif [[ "$DNSPLUGIN" =~ ^(directadmin)$ ]]; then | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user