On Thu, Apr 14, 2016 at 03:32:48PM -0600, Warren Young wrote:
> STEP 1: Split your “server” configurations

I don't think this is necessary at all.

> STEP 2: Prepare for the Let’s Encrypt challenge/response sequence

This part can just statically go into the same server block, no need for
a separate file.

> STEP 3: Write the wrapper script

Personally, I would recomment just using the SSH FUSE binding and doing
the dance from a separate machine. No need to have letsencrypt and all
dependencies running on a server.

> STEP 5: Create the base SSL/TLS configuration
> ------
> 
> We extracted the site configuration from our server { } blocks above because 
> we now need to create a second such block for each site that nginx serves.
> 
>     server {
>         include local/ssl;
>         include local/site;
>     }
> 
> That is, instead of including the letsencrypt-challenge file — since we only 
> serve the Let’s Encrypt challenge/response sequence via HTTP — we include the 
> following SSL configuration file:
> 
>     listen 443 ssl;
> 
>     ssl on;

No need for "ssl on" in combination with the ssl on the listen line --
means all the config can be shared with plain HTTP.

> Let’s Encrypt certs only last for 90 days, which means it’s an ongoing
> task to keep this up-to-date.  Until Let’s Encrypt learns about safe
> nginx configuration file modification, it’s a manual process.  (With
> Apache, letsencrypt-auto sets up a background auto-renewal process so
> you can’t forget to renew.  You could script this manually for nginx,
> if you wanted.)

Given that it is *not* supposed to change the configuration on renewal
at all, that's a non-issue.

Joerg
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to