Skip to content

Commit bb1d443

Browse files
weltekialexellis
authored andcommitted
Remove deprecated --letsencrypt-email flag from blogs
The --letsencrypt-email flag has been removed from the inlets http server and is no longer supported. Signed-off-by: Han Verstraete (OpenFaaS Ltd) <han@openfaas.com>
1 parent d885390 commit bb1d443

11 files changed

+8
-25
lines changed

blog/_posts/2021-02-11-secure-letsencrypt-tunnel.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,6 @@ export DOMAIN="alexellis.inlets.dev"
6868

6969
inlets-pro http server \
7070
--letsencrypt-domain $DOMAIN \
71-
--letsencrypt-email webmaster@$DOMAIN \
7271
--letsencrypt-issuer prod \
7372
--token $TOKEN \
7473
--auto-tls \
@@ -78,7 +77,6 @@ inlets-pro http server \
7877
Here's what each flag does:
7978

8079
* `--letsencrypt-domain` - gets a TLS cert for each domain given, you can provide this flag multiple times
81-
* `--letsencrypt-email` - required for renewal notifications and for accepting the Let's Encrypt Terms of Service
8280
* `--letsencrypt-issuer` - use the value `prod` or `staging` to switch between the two options
8381

8482
The `--token` is used by the inlets client to authenticate to the server.
@@ -90,7 +88,6 @@ You can keep the inlets server process running by generating a systemd unit file
9088
```bash
9189
inlets-pro http server \
9290
--letsencrypt-domain $DOMAIN \
93-
--letsencrypt-email webmaster@$DOMAIN \
9491
--letsencrypt-issuer prod \
9592
--token $TOKEN \
9693
--auto-tls \

blog/_posts/2021-04-13-your-isp-wont-give-you-a-static-ip.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@ export DOMAIN=tunnel.example.com
7979

8080
inletsctl create \
8181
--letsencrypt-domain $DOMAIN \
82-
--letsencrypt-email contact@$DOMAIN \
8382
--letsencrypt-issuer prod \
8483
--provider digitalocean \
8584
--region lon1 \

blog/_posts/2021-08-08-private-tunnel.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,7 @@ inletsctl create \
4545
--region lon1 \
4646
--provider digitalocean \
4747
--access-token-file ~/digital-ocean-api-key.txt \
48-
--letsencrypt-domain blog.example.com \
49-
--letsencrypt-email webmaster@example.com
48+
--letsencrypt-domain blog.example.com
5049
```
5150

5251
A VM will be created in your account using the cheapest plan available, for DigitalOcean this costs 5 USD / mo at time of writing.
@@ -83,8 +82,7 @@ You can pass a number of sub-domains, for instance:
8382

8483
```bash
8584
--letsencrypt-domain blog.example.com \
86-
--letsencrypt-domain grafana.example.com \
87-
--letsencrypt-email webmaster@example.com
85+
--letsencrypt-domain grafana.example.com
8886
```
8987

9088
## Connect your tunnel client

blog/_posts/2021-09-09-compose-and-inlets.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,6 @@ inletsctl create \
7878
--provider linode \
7979
--region us-east \
8080
--access-token-file $HOME/linode-key.txt \
81-
--letsencrypt-email webmaster@$DOMAIN \
8281
--letsencrypt-domain $DOMAIN
8382
```
8483

blog/_posts/2022-09-02-monitor-inlets-with-grafana.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ inletsctl create \
3434
--region fra1 \
3535
--provider digitalocean \
3636
--access-token-file ~/.do/access-token \
37-
--letsencrypt-domain app.example.com \
38-
--letsencrypt-email webmaster@example.com
37+
--letsencrypt-domain app.example.com
3938
```
4039

4140
This command will create a VM in your DigitalOcean account. Once the tunnel server has been created it will print out: the ip address, the inlets token and the endpoint for inlets client to connect to.

blog/_posts/2022-11-17-automate-a-self-hosted-https-tunnel.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,6 @@ By using our open source [inletsctl](https://github.com/inlets/inletsctl) tool,
5050
inletsctl create --provider digitalocean \
5151
--region lon1 \
5252
--letsencrypt-domain blog.example.com \
53-
--letsencrypt-email webmaster@example.com \
5453
--access-token-file ~/do-token
5554
```
5655

blog/_posts/2023-01-17-expose-multiple-services-with-inlets-and-caddy.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -105,10 +105,6 @@ Both records should point to the IP address of the server you created in the ear
105105
Next create the caddy configuration file `/etc/caddy/Caddyfile`:
106106

107107
```
108-
{
109-
email email@inlets.example.com
110-
}
111-
112108
inlets.example.com {
113109
reverse_proxy localhost:8123
114110
}
@@ -121,11 +117,11 @@ inlets.example.com {
121117
}
122118
```
123119

124-
We define three blocks in the caddy configuration file. The first block on the top of the file can be used to define the email to use for the renewal notifications on the domains.
120+
We define two blocks in the caddy configuration file.
125121

126-
In the second we configure caddy to reverse proxy the control-plane for the tunnel server using the domain `inlets.example.com`. Caddy will automatically obtain a valid TLS certificate for this domain.
122+
In the first block we configure caddy to reverse proxy the control-plane for the tunnel server using the domain `inlets.example.com`. Caddy will automatically obtain a valid TLS certificate for this domain.
127123

128-
In the third block we configure a wildcard domain `*.inlets.example.com` and point it to the data-plane of the tunnel. To generate a wildcard certificate you will need to use the DNS-01 challenge type which requires using a supported DNS provider. This is defined with a `tls { }` block added below the domain definition. The configuration might be different depending on you DNS provider. You can find the specific configuration info and instructions to configure authentication for your provider in the [repo of you DNS provider plugin](https://github.com/orgs/caddy-dns/repositories?type=all).
124+
In the second block we configure a wildcard domain `*.inlets.example.com` and point it to the data-plane of the tunnel. To generate a wildcard certificate you will need to use the DNS-01 challenge type which requires using a supported DNS provider. This is defined with a `tls { }` block added below the domain definition. The configuration might be different depending on you DNS provider. You can find the specific configuration info and instructions to configure authentication for your provider in the [repo of you DNS provider plugin](https://github.com/orgs/caddy-dns/repositories?type=all).
129125

130126
Make sure to move the caddy binary you downloaded or compiled with xcaddy into your path:
131127

blog/_posts/2023-08-23-keycloak-tls.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,7 @@ inletsctl create \
5959
--region lon1 \
6060
--access-token-file $HOME/.config/doctl/access-token \
6161
--tunnel-name keycloak \
62-
--letsencrypt-domain $DOMAIN \
63-
--letsencrypt-email webmaster@$DOMAIN
62+
--letsencrypt-domain $DOMAIN
6463
```
6564

6665
I used an access token from DigitalOcean above, but you can also create tunnels on AWS, Azure, Google Cloud, Linode and others, just see the reference guide for how to create an access token for each.

blog/_posts/2023-08-31-tunnel-aws-ec2.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,7 @@ inletsctl create \
6969
--access-token-file ~/.inlets/ec2-access-key \
7070
--region eu-west-1 \
7171
--aws-key-name inlets \
72-
--letsencrypt-domain blog.example.com \
73-
--letsencrypt-email webmaster@example.com
72+
--letsencrypt-domain blog.example.com
7473
```
7574

7675
The region that you specify here, must match the region where you created your SSH Key Pair, otherwise it will not be found. The `--aws-key-name` flag is optional, but recommended.

blog/_posts/2024-06-06-tunnel-k8s-via-aws-ec2.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,6 @@ inlets-pro http server \
9393
--token-file `pwd`/token.txt \
9494
--letsencrypt-domain $DOMAIN1 \
9595
--letsencrypt-domain $DOMAIN2 \
96-
--letsencrypt-email $EMAIL \
9796
--generate=systemd > inlets-server.service
9897

9998
sudo mv inlets-server.service /etc/systemd/system/inlets-server.service

0 commit comments

Comments
 (0)