Thank you, this resolves that concern of mine (and in fact, it was an elegant
enough solution that I felt silly for not doing it that way before). :) It makes
a lot more sense to have acme-client(1) place the exceptional certificates in a
different spot, rather than modify `/etc/ssl/private` to make everything work in
one location.

On 22/12/16 11:16, Omar Polo wrote:
> Can only speak for prosody as it's the only non-base daemon I'm
> getting TLS certificates for; my strategy with it has been to generate
> a different certificate and to deliver it in a place where only
> prosody can read it.  Luckily, the prosody package installs
> /etc/prosody/certs owned by _prosody alone.
>
>       # /etc/acme-client.conf
>       domain xmpp {
>               domain name example.com
>               alternative names { room.example.com upload.example.com }
>               domain key "/etc/prosody/certs/example.com.key"
>               domain full chain certificate 
> "/etc/prosody/certs/example.net.crt"
>               sign with letsencrypt
>       }
>
> note the `domain' name is "xmpp" because I have another `domain' block
> for the same domain (but different alt names) for httpd:
>
>       # only for httpd
>       domain example.com {
>               alternative names { www.example.com }
>               ...
>       }
>
> all handled by cron as usual:
>
>       ~ * * * * acme-client example.com && rcctl reload httpd
>       ~ * * * * acme-client xmpp && rcctl restart prosody
>
> in prosody.conf.lua i have
>
>       certificates = "certs"
>
> I also have some symlinks in /etc/prosody/certs in the form:
>
>       {room,upload}.example.com.crt -> example.com.crt
>       {room,upload}.example.com.key -> example.com.key
>
> so that prosody can look up the certs by itself without extra
> configuration.  Can probably do it without the symlinks, but I was
> lazy and this worked for me.
>
> HTH

Reply via email to