Skip to content

Commit 3b5d63b

Browse files
jeayetimabbott
authored andcommitted
setup: Add certbot support.
The task is to generate a self-signed cert so Zulip can be started, then to wait until Zulip is up before using certbot to generate new certs. Zulip needs to be up so it can meet certbot's challenge. Using a deploy hook, certs are persisted in the data directory. The same applies to renewal. Tweaked by tabbott mostly to edit comments remove an unnecessary setting before merging. Fixes #120.
1 parent e8526c2 commit 3b5d63b

File tree

4 files changed

+77
-10
lines changed

4 files changed

+77
-10
lines changed

Dockerfile

+1
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,7 @@ RUN apt-get -q dist-upgrade -y && \
8484
rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
8585

8686
COPY entrypoint.sh /sbin/entrypoint.sh
87+
COPY certbot-deploy-hook /sbin/certbot-deploy-hook
8788

8889
VOLUME ["$DATA_DIR"]
8990
EXPOSE 80 443

README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -168,11 +168,11 @@ which you need to encode in the YAML file. For example,
168168
comma-separated list of the backend names
169169
(E.g. `"EmailAuthBackend,GitHubAuthBackend"`).
170170

171-
**SSL Certificates**. By default, the image will generate a
172-
self-signed cert. We
173-
[will soon also support certbot](https://github.com/zulip/docker-zulip/issues/120)
174-
for this, just like we do in normal Zulip installations
175-
(contributions welcome!).
171+
**SSL Certificates**. By default, the image will generate a self-signed cert.
172+
You can set `SSL_CERTIFICATE_GENERATION: "certbot"` within `docker-compose.yml`
173+
to enable automatically-renewed Let's Encrypt certificates. By using certbot
174+
here, you are agreeing to the [Let's Encrypt
175+
ToS](https://community.letsencrypt.org/tos).
176176

177177
You can also provide an SSL certificate for your Zulip server by
178178
putting it in `/opt/docker/zulip/zulip/certs/` (by default, the

certbot-deploy-hook

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
#!/usr/bin/env bash
2+
3+
set -euo pipefail
4+
5+
backup() {
6+
if [ -e "$1" ]; then
7+
# If the user is setting up our automatic certbot-management on a
8+
# system that already has certs for Zulip, use some extra caution
9+
# to keep the old certs available. This naming is consistent with Zulip's
10+
# own setup-certbot backups.
11+
mv -f --backup=numbered "$1" "$1".setup-certbot || true
12+
fi
13+
}
14+
15+
source_cert_dir=/etc/letsencrypt/live/"$SETTING_EXTERNAL_HOST"
16+
dest_cert_dir="$DATA_DIR"/certs
17+
18+
# Persist the certs to the data directory.
19+
backup "$dest_cert_dir"/zulip.key
20+
backup "$dest_cert_dir"/zulip.combined-chain.crt
21+
cp -f "$source_cert_dir"/privkey.pem "$dest_cert_dir"/zulip.key
22+
cp -f "$source_cert_dir"/fullchain.pem "$dest_cert_dir"/zulip.combined-chain.crt
23+
24+
# Ensure nginx can find them.
25+
ln -nsf "$dest_cert_dir"/zulip.key /etc/ssl/private/zulip.key
26+
ln -nsf "$dest_cert_dir"/zulip.combined-chain.crt /etc/ssl/certs/zulip.combined-chain.crt
27+
28+
# Restart various services so the new certs can be used.
29+
supervisorctl restart nginx

entrypoint.sh

+42-5
Original file line numberDiff line numberDiff line change
@@ -168,12 +168,18 @@ configureCerts() {
168168
;;
169169
esac
170170
if [ ! -e "$DATA_DIR/certs/zulip.key" ] && [ ! -e "$DATA_DIR/certs/zulip.combined-chain.crt" ]; then
171+
171172
if [ "$GENERATE_CERTBOT_CERT" = "True" ]; then
172-
echo "Certbot not yet supported"
173-
exit 1
174-
# TODO: Run setup-certbot and move /etc/letsencrypt to the data dir?
175-
# /home/zulip/deployments/current/setup/setup-certbot "$SETTING_EXTERNAL_HOST"
176-
elif [ "$GENERATE_SELF_SIGNED_CERT" = "True" ]; then
173+
# Zulip isn't yet running, so the certbot's challenge can't be met.
174+
# We'll schedule this for later.
175+
echo "Scheduling LetsEncrypt cert generation ..."
176+
GENERATE_CERTBOT_CERT_SCHEDULED=True
177+
178+
# Generate self-signed certs just to get Zulip going.
179+
GENERATE_SELF_SIGNED_CERT=True
180+
fi
181+
182+
if [ "$GENERATE_SELF_SIGNED_CERT" = "True" ]; then
177183
echo "Generating self-signed certificates ..."
178184
mkdir -p "$DATA_DIR/certs"
179185
/home/zulip/deployments/current/scripts/setup/generate-self-signed-cert "$SETTING_EXTERNAL_HOST"
@@ -407,12 +413,43 @@ runPostSetupScripts() {
407413
set -e
408414
echo "Post setup scripts execution succeeded."
409415
}
416+
function runCertbotAsNeeded() {
417+
if [ ! "$GENERATE_CERTBOT_CERT_SCHEDULED" = "True" ]; then
418+
echo "Certbot is not scheduled to run."
419+
return
420+
fi
421+
422+
echo "Waiting for nginx to come online before generating certbot certificate ..."
423+
while ! curl -sk "$SETTING_EXTERNAL_HOST" >/dev/null 2>&1; do
424+
sleep 1;
425+
done
426+
427+
echo "Generating LetsEncrypt/certbot certificate ..."
428+
429+
# Remove the self-signed certs which were only needed to get Zulip going.
430+
rm -f "$DATA_DIR"/certs/zulip.key "$DATA_DIR"/certs/zulip.combined-chain.crt
431+
432+
ZULIP_CERTBOT_DEPLOY_HOOK="/sbin/certbot-deploy-hook"
433+
434+
# Accept the terms of service automatically.
435+
/home/zulip/deployments/current/scripts/setup/setup-certbot \
436+
--agree-tos \
437+
--hostname="$SETTING_EXTERNAL_HOST" \
438+
--email="$SETTING_ZULIP_ADMINISTRATOR" \
439+
--deploy-hook "$ZULIP_CERTBOT_DEPLOY_HOOK"
440+
441+
echo "LetsEncrypt cert generated."
442+
}
410443
bootstrappingEnvironment() {
411444
echo "=== Begin Bootstrap Phase ==="
412445
waitingForDatabase
413446
zulipFirstStartInit
414447
zulipMigration
415448
runPostSetupScripts
449+
# Hack: We run this in the background, since we need nginx to be
450+
# started before we can create the certificate. See #142 for
451+
# details on how we can clean this up.
452+
runCertbotAsNeeded &
416453
echo "=== End Bootstrap Phase ==="
417454
}
418455
# END appRun functions

0 commit comments

Comments
 (0)