2
0
mirror of https://github.com/pikvm/pikvm synced 2024-11-10 13:10:37 +00:00

Update letsencrypt.md (#768)

Added AWS Route53-specific instructions for enabling automatic certificate renewal.
This commit is contained in:
brokebit 2022-07-03 23:38:47 -05:00 committed by GitHub
parent 53af0816d1
commit 2632726680
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -152,8 +152,8 @@ This example shows that PiKVM may not be accessible from the internet, but you c
4. Obtain the certificate:
```
# export AWS_SHARED_CREDENTIALS_FILE="/var/lib/kvmd/pst/data/certbot/runroot/.route53.auth"
# kvmd-certbot certonly \
export AWS_SHARED_CREDENTIALS_FILE="/var/lib/kvmd/pst/data/certbot/runroot/.route53.auth"
kvmd-certbot certonly \
--dns-route53 \
--agree-tos \
-n \
@ -161,4 +161,14 @@ This example shows that PiKVM may not be accessible from the internet, but you c
-d pikvm.example.com
```
4. Next follow the basic guide.
4. Enable automatic certificate renewal:
Create the file: */etc/conf.d/kvmd-certbot* with the following contents so the renewall service can find the authentication file containing the AWS credentials:
```
AWS_SHARED_CREDENTIALS_FILE="/var/lib/kvmd/pst/data/certbot/runroot/.route53.auth"
```
Now enable the renewal service:
```
systemctl enable --now kvmd-certbot.timer
```