Create a template service file at /etc/systemd/system/[email protected]
. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target
#!/usr/bin/env bash | |
# Use this when Github bugs out and refuses to delete your | |
# head branches after a PR got merged, even though you | |
# have enabled that behaviour in your fork. | |
set -euo pipefail | |
source $(dirname "$0")/src/lib.sh |
#!/usr/bin/env bash | |
# | |
# Drum! | |
# | |
# Cause the repeated "docker run --rm -it" always sounds | |
# like "drumit" in my head. | |
# | |
# This script makes it easy to start a container. | |
# |
#!/usr/bin/env bash | |
set -euo pipefail | |
# This script should be placed in the root of the cloud-controller-gcp working copy. | |
cd $(dirname $0) | |
set -x | |
# re-generating the bazel output takes foreeeeeeever, so be careful when you |
module testmodule | |
go 1.21.0 | |
require github.com/getkin/kin-openapi v0.120.0 | |
require ( | |
github.com/go-openapi/jsonpointer v0.19.6 // indirect | |
github.com/go-openapi/swag v0.22.4 // indirect | |
github.com/invopop/yaml v0.2.0 // indirect |
package main | |
import ( | |
"context" | |
"flag" | |
"fmt" | |
"log" | |
"net/http" | |
"regexp" | |
"strings" |
package main | |
import ( | |
"context" | |
"fmt" | |
"log" | |
"os" | |
"os/signal" | |
"strconv" | |
"time" |
/* disable spinning effects */ | |
.flip-front, .flip-back { | |
animation: none !important; | |
} | |
/* disable constant product update notifications */ | |
#quick_help_container { | |
display: none !important; | |
} |
Create a template service file at /etc/systemd/system/[email protected]
. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target
This document details how I setup LE on my server. Firstly, install the client as described on http://letsencrypt.readthedocs.org/en/latest/using.html and make sure you can execute it. I put it in /root/letsencrypt
.
As it is not possible to change the ports used for the standalone
authenticator and I already have a nginx running on port 80/443, I opted to use the webroot
method for each of my domains (note that LE does not issue wildcard certificates by design, so you probably want to get a cert for www.example.com
and example.com
).
For this, I placed config files into etc/letsencrypt/configs
, named after <domain>.conf
. The files are simple:
I hereby claim:
To claim this, I am signing this object: