Skip to content
This repository has been archived by the owner on Dec 23, 2023. It is now read-only.

Latest commit

 

History

History
55 lines (27 loc) · 1.82 KB

README.md

File metadata and controls

55 lines (27 loc) · 1.82 KB

archived

Migrated to certbot-rfc2136 (as pdns supports it)

RFC2136 https://doc.powerdns.com/authoritative/dnsupdate.html

https://certbot-dns-rfc2136.readthedocs.io/en/stable/

.

.

.

.

.

.

.

.

.

.

Let's Encrypt + PowerDNS

How to deploy?

  • it's recommended to run the API server next to pdns, because currently it's quite chatty

  • get python3.4+, OpenSSL headers (libssl-dev), pip install the requirements

    • make sure to install libssl-dev before uwsgi install
    • if you already have uwsgi installed try unsintalling it (then deleting the pip wheel cache) and reinstalling it with pip3 install -v -I uwsgi |& grep https and make sure you see that the plugins/http/https.c gets compiled
  • make a le-config.json (see the le-config.sample.json)

  • put the client part (cronscript and letsencrypt.sh) on every node/server/host/box/VM where you need the certs renewed (you need openssl, dig, jq and curl there, but no python) into /opt/letsencrypt

  • generate new cert(s) (test the cron script(s) and the whole setup), make symlinks out of the old cert files (e.g. you used to have a /etc/ssl/private/herp.derp.key and /etc/ssl/certs/herp.derp.pem, now make them symlinks that point to /opt/letsencrypt/certs/herp.derp/privkey.pem and /opt/letsencrypt/certs/herp.derp/cert.pem)

  • secure up!

    • run.sh does this for you: on the server openssl req -x509 -newkey rsa:2048 -keyout key.pem -out cert.pem -days XXX -nodes -subj '/CN=much-crypt-such-secure'

What if I need the same file in many places?

  • Use Kong, upload the file (see) and let Kong take care of that for you