bzed-letsencrypt is deprecated! Please use bzed-dehydrated instead!
- Overview
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with letsencrypt
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
Centralized CSR signing using Let’s Encrypt™ - keeping your keys safe on the host they belong to.
bzed-letsencrypy creates private keys and CSRs, transfers the CSR to a puppetmaster where it is signed using the well known dehydrated https://github.com/lukas2511/dehydrated
Signed certificates are shipped back to the appropriate host.
You need to provide an appropriate hook script for letsencryt.sh, The default is to use the DNS-01 challenge, but if you hook supports it you could also create the necessary files for http-01.
Let’s Encrypt is a trademark of the Internet Security Research Group. All rights reserved.
- dehydrated is running at the puppetmaster host as it is easier to read and work with certificate files stored directly on the puppet master. Retrieving them using facter is unnecessarily complicated.
You need to ensure that exported ressources are working and pluginsync is enabled.
In the best case: add the letsencrypt class and override $domains with a list of domains you want to get certificates for.
On a puppet node where you need your certificates:
class { 'letsencrypt' :
domains => [ 'foo.example.com', 'fuzz.example.com' ],
}
Key and CSR will be generated on your node and the CSR is shipped to your puppetmaster for signing - the puppetmaster needs a public interface and the cert is put on your node after some time.
Additionally to or instead of specifying the domains as parameter to the letsencrypt class, it is possible to call the letsencrypt::certificate define directly:
::letsencrypt::certificate { 'foo.example.com' :
}
Requesting SAN certificates is also possible. To do so pass a space seperated list of domainnames into the domains array. The first domainname in each list is used as the base domain for the request. For example:
class { 'letsencrypt' :
domains => [
'foo.example.com bar.example.com good.example.com',
'fuzz.example.com'
],
}
And/or:
::letsencrypt::certificate { 'foo.example.com bar.example.com good.example.com' :
}
What you need to prepare is a hook you want to use with dehydrated as you need to deploy the challenges somehow. Various examples for valid DNS-01 hooks are listed on https://github.com/lukas2511/dehydrated/wiki/Examples-for-DNS-01-hooks
class { 'letsencrypt' :
hook_source => 'puppet:///modules/mymodule/dehydrated_hook'
}
CSRs are collected and signed, and the resulting certificates and CA chain files are shipped back to your node.
For testing purposes you want to use the staging CA, otherwise you'll hit rate limits pretty soon. To do s set the letsencrypt_ca option:
class { 'letsencrypt' :
hook_source => 'puppet:///modules/mymodule/dehydrated_hook',
letsencrypt_ca => 'staging',
}
Using the camptocamp-postfix module:
require ::letsencrypt::params
$myhostname = $::fqdn
$base_dir = $::letsencrypt::params::base_dir
$crt_dir = $::letsencrypt::params::crt_dir
$key_dir = $::letsencrypt::params::key_dir
$postfix_chroot = '/var/spool/postfix'
$tls_key = "${key_dir}/${myhostname}.key"
$tls_cert = "${crt_dir}/${myhostname}_fullchain.pem"
::letsencrypt::certificate { $myhostname :
notify => Service['postfix'],
}
::postfix::config { 'smtpd_tls_cert_file' :
value => $tls_cert,
require => Letsencrypt::Certificate[$myhostname]
}
::postfix::config { 'smtpd_tls_key_file' :
value => $tls_key,
require => Letsencrypt::Certificate[$myhostname]
}
::postfix::config { 'smtpd_use_tls' :
value => 'yes'
}
::postfix::config { 'smtpd_tls_session_cache_database' :
value => "btree:\${data_directory}/smtpd_scache",
}
::postfix::config { 'smtp_tls_session_cache_database' :
value => "btree:\${data_directory}/smtp_scache",
}
::postfix::config { 'smtp_tls_security_level' :
value => 'may',
}
file { [
"${postfix_chroot}/${base_dir}",
"${postfix_chroot}/${crt_dir}",
] :
ensure => directory,
owner => 'root',
group => 'root',
mode => '0755',
}
file { "${postfix_chroot}/${key_dir}" :
ensure => directory,
owner => 'root',
group => 'root',
mode => '0750',
}
file { "${postfix_chroot}/${tls_key}" :
ensure => file,
owner => 'root',
group => 'root',
mode => '0640',
source => $tls_key,
subscribe => Letsencrypt::Certificate[$myhostname],
notify => Service['postfix'],
}
file { "${postfix_chroot}/${tls_cert}" :
ensure => file,
owner => 'root',
group => 'root',
mode => '0644',
source => $tls_cert,
subscribe => Letsencrypt::Certificate[$myhostname],
notify => Service['postfix'],
}
Classes:
- letsencrypt
- letsencrypt::params
- letsencrypt::request::handler
Defines:
- letsencrypt::csr
- letsencrypt::deploy
- letsencrypt::deploy::crt
- letsencrypt::request
- letsencrypt::request::crt
Facts:
- letsencrypt_csrs
- letsencrypt_csr_*
- letsencrypt_crts
Not really well tested yet, documentation missing, no spec tests....
Patches are very welcome! Please send your pull requests on github!