table of contents
dehydrated(1) | The dehydrated ACME client | dehydrated(1) |
NAME¶
dehydrated - ACME client implemented in Bash
DESCRIPTION¶
dehydrated is a client for signing certificates with an ACME-server implemented as a relatively simple Bash script. It can be used with the Let’s Encrypt certificate authority (letsencrypt.org).
OPTIONS¶
Usage: dehydrated [-h] [command [argument]] [parameter [argument]] [parameter [argument]] ...
Default command: help
Commands:
--register Register account key
--cron (-c) Sign/renew non-existant/changed/expiring certificates.
--signcsr (-s) path/to/csr.pem Sign a given CSR, output CRT on stdout
(advanced usage)
--revoke (-r) path/to/cert.pem Revoke specified certificate
--cleanup (-gc) Move unused certificate files to archive directory
--help (-h) Show help text
--env (-e) Output configuration variables for use in other scripts
Parameters:
--accept-terms Accept CAs terms of service
--full-chain (-fc) Print full chain when using --signcsr
--ipv4 (-4) Resolve names to IPv4 addresses only
--ipv6 (-6) Resolve names to IPv6 addresses only
--domain (-d) domain.tld Use specified domain name(s) instead of domains.txt
entry (one certificate!)
--keep-going (-g) Keep going after encountering an error while
creating/renewing multiple certificates in cron mode
--force (-x) Force renew of certificate even if it is longer valid than value
in RENEW_DAYS
--no-lock (-n) Don't use lockfile (potentially dangerous!)
--lock-suffix example.com Suffix lockfile name with a string (useful for with
-d)
--ocsp Sets option in CSR indicating OCSP stapling to be mandatory
--privkey (-p) path/to/key.pem Use specified private key instead of account
key (useful for revocation)
--config (-f) path/to/config Use specified config file
--hook (-k) path/to/hook.sh Use specified script for hooks
--out (-o) certs/directory Output certificates into the specified directory
--challenge (-t) http-01|dns-01 Which challenge should be used? Currently
http-01 and dns-01 are supported
--algo (-a) rsa|prime256v1|secp384r1 Which public key algorithm should be
used? Supported: rsa, prime256v1 and secp384r1
2017-02-12 | 0.4.0 |