Created
February 12, 2017 17:31
-
-
Save MichaelF25/9096ee4ec895a240d42e2b50607570dd to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# make sure your router does port forwarding for TCP 80 to your NAS | |
# download and extract acmetool binary | |
wget https://github.com/hlandau/acme/releases/download/v0.0.58/acmetool-v0.0.58-linux_arm.tar.gz | |
tar -zxf acmetool-v0.0.58-linux_arm.tar.gz | |
# setup acmetool - choose let's encrypt live and WEBROOT option with path '/share/Web/.well-known/acme-challenge' | |
cd acmetool-v0.0.58-linux_arm | |
./bin/acmetool quickstart | |
# request certificate for <hostname> | |
./bin/acmetool want <hostname> | |
# print certificate, copy it and paste it into qnap control panel -> system settings -> security -> certificate & private key | |
cat /var/lib/acme/live/<hostname>/cert | |
# print private key, copy it and paste it into qnap control panel -> system settings -> security -> certificate & private key | |
cat /var/lib/acme/live/<hostname>/privkey | |
# print intermediate certificate, copy it and paste it into qnap control panel -> system settings -> security -> certificate & private key | |
cat /var/lib/acme/live/<hostname>/chain |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment