pixelated / puppet-pixelated

Puppet Module to setup the Pixelated User Agent

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Document letsencrypt cert installation

varac opened this issue · comments

commented

We should document how to use Let's Encrypt certificates for LEAP and Pixelated.
Best place for this would be the LEAP Keys and Certificates doc.

commented

here's the documentation draft i started: https://pad.riseup.net/p/letsencrypt

please update staging's certificate to qa this
https://staging.pixelated-project.org/

@varac

- Certificate: `/etc/letsencrypt/live/DOMAIN/cert.pem` from the server to `files/cert/dev.pixelated-project.org.crt` in your provider config
- Private key: `/etc/letsencrypt/live/DOMAIN/privkey.pem` from the server to `files/cert/DOMAIN.key` in your provider config
- CA Chain cert: `/etc/letsencrypt/live/DOMAIN/fullchain.pem` `files/cert/commercial_ca.crt` in your provider config

Does explanation above this means something like this:

cd pixelated-platform-environments/pixelated-project.org/files/cert
scp user@unstable.pixelated-project.org:/etc/letsencrypt/live/unstable.pixelated-project.org .
mv cert.pem unstable.pixelated-project.org.crt
mv privkey.pem unstable.pixelated-project.org.key
mv fullchain.pem commercial_ca.crt

Because is there a file called "commercial_ca.crt in the path "files/cert/". I'm not sure if I can override the file or not.

Where the file "unstable.pixelated-project.org.csr" in "file/cert" come from? Should I replace it with other file?

❤️

commented

@deniscostadsc i updated the howto, please have a look if it is better now.

Where the file "unstable.pixelated-project.org.csr" in "file/cert" come from? Should I replace it with other file?

No, this is the cert signing request needed for a commercial cert, see https://leap.se/en/docs/platform/guide/keys-and-certificates#commercial-certificates
With let's encrypt, we don't need a csr file anymore (it could get removed).

We tested the steps on pad and we automated the process on staging.
Everything worked fine. 🎉 🎉

The is the file we put the steps required to generate the certificates on staging: https://github.com/pixelated/thoughtworks-ci-config/blob/master/pixelated-platform/bin/rename-to-staging.sh

Hey guys, we were trying to deploy to staging one more time and we reached the letsencrypt rate limit [1].

With that in mind, if we generate the certificates on every deploy, we are going to definitely reach the limit again. Given that, maybe we need to save the certificates to deploy them later. How can we do that? Maybe save them to thoughtworks-ci-config?

[1] - https://community.letsencrypt.org/t/quick-start-guide/1631/6

commented

good idea, lets check how protected the thoughtworks-ci-config repo is and if it's not publicly cloneable, lets use this one. Are you moving this back to development ?

commented

@deniscostadsc @tuliocasagrande while you're on it, nagios is complaining about unstable+dev certs expiring soon (see https://github.com/pixelated/project-issues/issues/256). Do you mind updating those as well ?

@varac We are going to solve this problem on this issue: https://github.com/pixelated/project-issues/issues/258