1
0
mirror of https://github.com/containous/traefik.git synced 2024-12-23 17:34:13 +03:00
traefik/integration/fixtures/acme
SALLEYRON Julien 9ebe3c38b2 New rule syntax
Co-authored-by: jbdoumenjou <jb.doumenjou@gmail.com>
2019-01-30 16:24:07 +01:00
..
ssl ACME TLS ALPN 2018-07-03 12:44:04 +02:00
acme_base.toml New rule syntax 2019-01-30 16:24:07 +01:00
acme_http01_web_path.toml New rule syntax 2019-01-30 16:24:07 +01:00
acme_tls_dynamic.toml Remove old global config and use new static config 2018-11-27 17:42:04 +01:00
acme_tls_multiple_entrypoints.toml Remove old global config and use new static config 2018-11-27 17:42:04 +01:00
acme_tls.toml New rule syntax 2019-01-30 16:24:07 +01:00
certificates.toml New rule syntax 2019-01-30 16:24:07 +01:00
README.md Fix whitespaces 2017-09-07 12:02:03 +02:00

How to generate the self-signed wildcard certificate

#!/usr/bin/env bash

# Specify where we will install
# the wildcard certificate
SSL_DIR="./ssl"

# Set the wildcarded domain
# we want to use
DOMAIN="*.acme.wtf"

# A blank passphrase
PASSPHRASE=""

# Set our CSR variables
SUBJ="
C=FR
ST=MP
O=
localityName=Toulouse
commonName=$DOMAIN
organizationalUnitName=Traefik
emailAddress=
"

# Create our SSL directory
# in case it doesn't exist
sudo mkdir -p "$SSL_DIR"

# Generate our Private Key, CSR and Certificate
sudo openssl genrsa -out "$SSL_DIR/wildcard.key" 2048
sudo openssl req -new -subj "$(echo -n "$SUBJ" | tr "\n" "/")" -key "$SSL_DIR/wildcard.key" -out "$SSL_DIR/wildcard.csr" -passin pass:$PASSPHRASE
sudo openssl x509 -req -days 3650 -in "$SSL_DIR/wildcard.csr" -signkey "$SSL_DIR/wildcard.key" -out "$SSL_DIR/wildcard.crt"
sudo rm -f "$SSL_DIR/wildcard.csr"