-
-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Valid ssl certificate for trusted.ci.jenkins.io
#3091
Comments
That make sense! @daniel-beck asked the same a few months ago, but the infra team never took the time. Givent that this machine is not directly reachable from the internet, the proposal is to use a Letsencrypt DNS validation, either with:
Long term: migrating trusted.ci.jenkins in the private Kubernetes (once #2844 is done) will solve this easily (like release.ci). |
Can't this be used to automate? |
Oooh that would be the easier way for this particular machine (private machine only reachable through tunnels by a specific set of persons) so the DNS credentials are ok to be stored on the same machine (under a different account than We can also do the same for cert.ci.jenkins.io (cc for info. @Wadeck @daniel-beck ). Please note that, technically we could do the same to ci.jenkins.io but we won't given the nature of this service. |
there's 2 options for restricting further access to the DNS records:
|
I was thinking implictly on the second (e.g. a technical user restricted to only the |
generally there's a sub record for the validation something like |
cc @lemeurherve as this service runs in AWS: the Route53 DNS delegation could help for this |
Worklog after #3328 and the pairing session with @lemeurherve:
|
First challenge: the certbot plugins --text
An unexpected error occurred:
pkg_resources.VersionConflict: (certbot 2.2.0 (/snap/certbot/2683/lib/python3.8/site-packages), Requirement.parse('certbot<2.0,>=1.18.0'))
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /tmp/certbot-log-xl7x0e7w/log or re-run Certbot with -v for more details. I'm currently playing around with a docker run --rm certbot certbot plugins --text
Saving debug log to /var/log/letsencrypt/letsencrypt.log
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
* dns-azure
Description: Obtain certificates using a DNS TXT record (if you are using Azure
for DNS).
Interfaces: Authenticator, Plugin
Entry point: dns-azure = certbot_dns_azure._internal.dns_azure:Authenticator
* standalone
Description: Spin up a temporary webserver
Interfaces: Authenticator, Plugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
* webroot
Description: Place files in webroot directory
Interfaces: Authenticator, Plugin
Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
=> I'm defering the " |
Second step: after manually (e.g. locally) creating (with Terraform) the Azure resources for the child zone (+SP + role association scoped to the child zone only), I was able to successfully generate a staging LE certificate. A few notes:
Incoming PRs... |
You can track certbot's |
(edit after a lot of changes in Terraform)
(We do not details ALL the time spent and the die & retries of course...) (https://twitter.com/fredkisss/status/1614384130908643330?s=20 ) |
Next step: jenkins-infra/jenkins-infra#2587 (to avoid dealing with |
Why create a custom role instead of using User Access Administrator? |
As I understand https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#user-access-administrator, the permissions associated to the built-in role are far too extended for the |
That built-in role is designed for delegation of access. The two permissions on it as far as I understand are creating of roles and assigning of roles. (Support tickets is standard on the majority of built-in roles) For larger scale places at least I would also suggest better names and descriptions for the role.
|
Yes, which is not what we want for the Good thing, thanks to your pointers and questions I know start to better understand the permissions model \o/
👍 make sense, gotta update it (I'll ask you for review in the terraform PR). Thanks for all the tips! |
Service(s)
trusted.ci.jenkins.io
Summary
Relates to #2059
For the second time something has set
hsts
for the jenkins.io domain preventing me from accessing trusted.ci without clearing the flag on the domainHSTS settings
It would be good to have a valid cert on there, (I wasn't able to find an existing issue for this but there may be one)
Reproduction steps
No response
The text was updated successfully, but these errors were encountered: