summaryrefslogtreecommitdiff
path: root/spec/lib/gitlab/lets_encrypt
Commit message (Collapse)AuthorAgeFilesLines
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2022-01-181-1/+1
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2021-11-181-2/+2
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-06-243-3/+3
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2020-03-301-0/+19
|
* Add latest changes from gitlab-org/gitlab@masterGitLab Bot2019-12-121-0/+2
|
* Use project depended feature flag for pages sslpages-ssl-project-aware-feature-flagVladimir Shushlin2019-06-251-36/+0
| | | | | Also add ::Gitlab::LetsEncrypt.enabled? shortcut and simplify it a lot
* Add pages domains acme ordersVladimir Shushlin2019-06-062-33/+23
| | | | | | | | | | | | | | | | | | | | | | | Extract acme double to helper Create ACME challanges for pages domains * Create order & challange through API * save them to database * request challenge validation We're saving order and challenge as one entity, that wouldn't be correct if we would order certificates for several domains simultaneously, but we always order certificate per domain Add controller for processing acme challenges redirected from pages Don't save acme challenge url - we don't use it Validate acme challenge attributes Encrypt private_key in acme orders
* Generate lets_encrypt_private_key on the flyVladimir Shushlin2019-05-311-3/+43
| | | | | | | | | Remove migration generating lets encrypt key Don't generate private_key if database is readonly For reference: This reverts commit 988a7f70489b99383b95e9f271a2caf6bb5b3a44. This reverts commit 21acbe531592d55caf0e5b8716a3b551dafd6233.
* Store Let's Encrypt private key in settingsVladimir Shushlin2019-05-281-1/+3
| | | | | | | | | | | | | | | | Storing this key in secrets.yml was a bad idea, it would require users using HA setups to manually replicate secrets across nodes during update, it also needed support from omnibus package * Revert "Generate Let's Encrypt private key" This reverts commit 444959bfa0b79e827a2a1a7a314acac19390f976. * Add Let's Encrypt private key to settings as encrypted attribute * Generate Let's Encrypt private key in database migration
* Add Let's Encrypt clientVladimir Shushlin2019-05-163-0/+188
Part of adding Let's Encrypt certificates for pages domains Add acme-client gem Client is being initialized by private key stored in secrets.yml Let's Encrypt account is being created lazily. If it's already created, Acme::Client just gets account_kid by calling new_account method Make Let's Encrypt client an instance Wrap order and challenge classes