LetsEncrypt setup in a dockerized and automated infrastructure #43418
Replies: 4 comments 13 replies
-
Uploading acquired certificates over a secure management port connection, with the authentication constraint, can make sense. |
Beta Was this translation helpful? Give feedback.
-
Let's avoid all these dismissive arguments, some of which are not relevant to the issue of the automatic certificate renewal.
It is totally not relevant and in fact straightforward to complete. In any case, we are not talking about pros and cons of doing bare metal. So let's stay focused.
How is this argument relevant to the statement that we want to help bare metal users, it is either automatically renewed or not with Let's Encrypt irrespective of the deployment environment ? We don't want the renewal going automatically by default right now, we'd like users, developers, be in |
Beta Was this translation helpful? Give feedback.
-
In fact, packaging it with the application does not look secure to me and it fails when the user wants to get a new key pair for the account. Either way, we appreciate the feedback, I suggest that you look closer at the code and do enhancement requests, PRs |
Beta Was this translation helpful? Give feedback.
-
@pragmasoft-ua We have opened an enhancement request at #43461, following this discussion, thanks for initiating it. It is obvious you have a lot of experience in the related area so your input to #43461 will be appreciated. Please look at the code and work with us on making Quarkus Let's Encrypt feature stand out, thanks ! |
Beta Was this translation helpful? Give feedback.
-
I have a question about the recently added LetsEncrypt certificate management https://quarkus.io/guides/tls-registry-reference#lets-encrypt
From the documentation it looks like the quarkus application should be launched from the project directory (containing quarkus cli and tls plugin) and at the same time served from the externally accessible dns name.
Though in real life it is seldom a case - public server application is running from the binary distribution which does not contain quarkus cli, or often from a container, whereas project directory with quarkus cli is only available on the dev machine without even public ip. The only real possibility of running this setup is with ngrok, but free version of ngrok does not allow to configure the domain name yet.
The question is actually how it is supposed to work with a dockerized application or public server? Should we mount .letsencrypt folder as a volume on a public server and run quarkus tls extension on the development machine, accessing public server's management interface?
From the documentation it looks like quarkus tls extension only stores letsencrypt certificates locally and doesn't transfer them via the management interface. This then requires to somehow manually copy certificates to the .letsencrypt folder of the public server, which is rather bad DX in my opinion. Alternatively, you need to rebuild the image with the new certs and do this every time you renew certificates, which is even worse DX, as letsencrypt certs are short lived, not even close to the advertised automatic certificate management.
Another question is how all this is supposed to be deployed in an automated deployment environment.
Beta Was this translation helpful? Give feedback.
All reactions