WHM API.
https://api.docs.cpanel.net/_mock/specifications/whm.openapi/
https://{host}:{port}/json-api/
- Mock server
https://api.docs.cpanel.net/_mock/specifications/whm.openapi/remove_autossl_user_excluded_domains
- A server running WHM.
https://whm-server.tld:2087/json-api/remove_autossl_user_excluded_domains
- curl
- JavaScript
- Node.js
- Python
- Java
- C#
- PHP
- Go
- Ruby
- R
- Payload
curl -i -X GET \
-u <username>:<password> \
'https://api.docs.cpanel.net/_mock/specifications/whm.openapi/remove_autossl_user_excluded_domains?domain=cpcalendars.example.com&username=username'{ "metadata": { "command": "remove_autossl_user_excluded_domains", "reason": "OK", "result": 1, "version": 1 } }
Additional parameters which you wish to pass to the AutoSSL provider.
Note:
These additional parameters begin with the x_ prefix. For example, the Let's Encrypt provider accepts the x_terms_of_service_accepted parameter, to which you would pass the URL of the terms of service that you accept.
- Mock server
https://api.docs.cpanel.net/_mock/specifications/whm.openapi/reset_autossl_provider
- A server running WHM.
https://whm-server.tld:2087/json-api/reset_autossl_provider
- curl
- JavaScript
- Node.js
- Python
- Java
- C#
- PHP
- Go
- Ruby
- R
- Payload
curl -i -X GET \
-u <username>:<password> \
'https://api.docs.cpanel.net/_mock/specifications/whm.openapi/reset_autossl_provider?provider=cPanel&x_*=%28varies%29'{ "metadata": { "command": "reset_autossl_provider", "reason": "OK", "result": 1, "version": 1 } }
Request
This function sets values for AutoSSL's metadata keys. This allows you to replace certificates that AutoSSL did not issue and toggle other AutoSSL notifications.
Note:
We recommend that you use the WHM API 1 set_autossl_metadata_key function instead.
Information:
- You can enter more than one key and value pair in the
metadata_jsonJSON hash. - Any keys that you do not explicitly define will adopt the system's default value.
JSON-encoded object of metadata keys and values that control AutoSSL's behavior.
Whether to allow AutoSSL to replace certificates that none of this system’s AutoSSL modules issued. When you enable this option, AutoSSL will install certificates that replace users’ Certificate Authority (CA) issued certificates if they are invalid or expire within three days.
1- Replace certificates not issued by the AutoSSL system.0- Only replace certificates issued by the AutoSSL system.
Whether to send a notification when an AutoSSL certificate expires. This occurs when AutoSSL cannot request a new certificate.
1- Send a notification.0- Do not send a notification.
Notes:
This can happen if all of a website’s domains fail Domain Control Validation (DCV), or if the AutoSSL provider has not issued a certificate in response to a request.
Whether to send a notification if at least one currently-secured domain will lose coverage when the certificate renews.
1- Send a notification.0- Do not send a notification.
Whether to send a notification if at least one of a user's currently-secured domains will lose coverage when the certificate renews.
1- Send a notification.0- Do not send a notification.
Whether to send a notification when a user's AutoSSL certificate expires. This occurs when AutoSSL cannot request a new certificate for a user.
1- Send a notification.0- Do not send a notification.
Whether to send a notification when AutoSSL successfully renews a certificate.
1- Send a notification.0- Do not send a notification.
Whether to send a notification if a currently-secured domain fails DCV and the certificate has not reached its renewal period.
1- Send a notification.0- Do not send a notification.
Whether to send a notification when AutoSSL has renewed a certificate and the new certificate lacks at least one domain that the previous certificate secured.
1- Send a notification.0- Do not send a notification.
Whether to send a notification when AutoSSL has renewed a certificate for a user and the new certificate lacks at least one domain that the previous certificate secured.
1- Send a notification.0- Do not send a notification.
Whether to send a notification if a currently-secured domain fails DCV and the certificate has not reached its renewal period.
1- Send a notification.0- Do not send a notification.
Whether to send a notification when AutoSSL has renewed a certificate and the new certificate lacks one or more of the website’s domains.
1- Send a notification.0- Do not send a notification.
Whether to send a notification when AutoSSL has renewed a certificate for a user and the new certificate lacks one or more of the website’s domains.
1- Send a notification.0- Do not send a notification.
- Mock server
https://api.docs.cpanel.net/_mock/specifications/whm.openapi/set_autossl_metadata
- A server running WHM.
https://whm-server.tld:2087/json-api/set_autossl_metadata
- curl
- JavaScript
- Node.js
- Python
- Java
- C#
- PHP
- Go
- Ruby
- R
- Payload
curl -i -X GET \
-u <username>:<password> \
'https://api.docs.cpanel.net/_mock/specifications/whm.openapi/set_autossl_metadata?metadata_json={%22clobber_externally_signed%22%3A1%2C%22notify_autossl_expiry%22%3A1%2C%22notify_autossl_expiry_coverage%22%3A1%2C%22notify_autossl_expiry_coverage_user%22%3A1%2C%22notify_autossl_expiry_user%22%3A1%2C%22notify_autossl_renewal%22%3A1%2C%22notify_autossl_renewal_coverage%22%3A1%2C%22notify_autossl_renewal_coverage_reduced%22%3A1%2C%22notify_autossl_renewal_coverage_reduced_user%22%3A1%2C%22notify_autossl_renewal_coverage_user%22%3A1%2C%22notify_autossl_renewal_uncovered_domains%22%3A1%2C%22notify_autossl_renewal_uncovered_domains_user%22%3A1%2C%22notify_autossl_renewal_user%22%3A1}'{ "metadata": { "command": "set_autossl_metadata", "reason": "OK", "result": 1, "version": 1 } }