Skip to content
Snippets Groups Projects
Verified Commit c742ed76 authored by anarcat's avatar anarcat
Browse files

clarify the design section

split each step more clearly
parent d994a178
No related branches found
No related tags found
No related merge requests found
......@@ -83,10 +83,11 @@ Then run Puppet on all affected hosts, for example the static mirrors:
How is this built anyways?
When you push to the git repository:
When you push to the git repository on the `git-rw.torproject.org`
server (currently `cupani`):
1. a per-repository hook gets called in
`/srv/git.torproject.org/git-helpers/post-receive-per-repo.d/`
`/srv/git.torproject.org/git-helpers/post-receive-per-repo.d/admin\%letsencrypt-domains/trigger-letsencrypt-server`
2. this hooks hits the DNS master over SSH (`letsencrypt@nevii`) and
there the `authorized_keys` file hardcodes the command to
......@@ -100,27 +101,29 @@ When you push to the git repository:
points dehydrated at our configuration, in
`etc/dehydrated-config`, again in the same directory
Through that special configure, the dehydrated command is configured
to call a custom hook (`bin/le-hook`) which implements logic around
the DNS-01 authentication challenge, notably adding challenges,
bumping serial numbers in the primary nameserver, and waiting for
secondaries to sync.
Note that there's a configuration file for that hook in
`/etc/dsa/le-hook.conf`.
The `le-hook` also pushes the changes around. The hook calls the
`bin/deploy` file which installs the certificates files in
`var/result`. It also generates a Public Key Pin (PKP) hash with the
`bin/get-pin` command and appends Diffie-Hellman paramets
(`dh-$size.pem`) to the certificate chain. It finally calls the
`bin/push` command which runs `rsync` to the Puppet server, which in
turns hardcodes the place where those files are dumped (in
`pauli:/srv/puppet.torproject.org/from-letsencrypt`) through its
`authorized_keys` file.
Finally, those certificates are collected by Puppet through the `ssl`
module. Pay close attention to how the
`tor-puppet/modules/apache2/templates/ssl-key-pins.erb` template
works: it will not deploy key pinning if the backup `.pin` file is
missing.
5. Through that special configuration, the dehydrated command is
configured to call a custom hook (`bin/le-hook`) which implements
logic around the DNS-01 authentication challenge, notably adding
challenges, bumping serial numbers in the primary nameserver, and
waiting for secondaries to sync. Note that there's a configuration
file for that hook in `/etc/dsa/le-hook.conf`.
6. The `le-hook` also pushes the changes around. The hook calls the
`bin/deploy` file which installs the certificates files in
`var/result`.
7. It also generates a Public Key Pin (PKP) hash with the
`bin/get-pin` command and appends Diffie-Hellman paramets
(`dh-$size.pem`) to the certificate chain.
8. It finally calls the `bin/push` command which runs `rsync` to the
Puppet server, which in turns hardcodes the place where those
files are dumped (in
`pauli:/srv/puppet.torproject.org/from-letsencrypt`) through its
`authorized_keys` file.
9. Finally, those certificates are collected by Puppet through the
`ssl` module. Pay close attention to how the
`tor-puppet/modules/apache2/templates/ssl-key-pins.erb` template
works: it will not deploy key pinning if the backup `.pin` file is
missing.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment