Automatic Certificate Management Environment (ACME) through Consul service tags #3
Labels
No labels
bug
duplicate
enhancement
help wanted
invalid
question
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: Deuxfleurs/diplonat#3
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Diplonat could be in charge of generating TLS certificates for services, since it already knows how to read services' configuration through Consul service tags; and it's a diplomat's job, to edit certificates, isn't it?
Let us consider a fake DNS service with a web front-end we would like to access through HTTPS:
Upon reading the
acme
tag, diplonat would generate a TLS certificate through an ACME provider (e.g. Let's Encrypt), and add it to the Consul KV store (or to Vault KV store, ideally).Then, a reverse proxy (e.g. nginx) could use Nomad's
template
stanza to populate its service configuration with the generated certificate.The ACME configuration will require a configuration file for Diplonat (several pieces of information are needed, e.g. domain holder's e-mail address, TLS renewal interval etc.). See #2.