Compare commits

...

18 Commits

Author SHA1 Message Date
5b0c349edb Add missing packaged files
All checks were successful
Continuous Integration / env (push) Successful in 0s
2026-01-18 12:53:15 +01:00
f811e72e64 Add certbot renew service
All checks were successful
Continuous Integration / env (push) Successful in 0s
2026-01-18 12:42:37 +01:00
8e13e2004a Add workflow
All checks were successful
Continuous Integration / env (push) Successful in 1s
2026-01-06 12:48:19 +01:00
c9253b5d08 Fix format 2026-01-02 22:14:00 +01:00
1770301a87 Add requirement augeas-libs 2026-01-01 22:45:25 +01:00
33754a20fc Add dh params size 2026-01-01 21:02:12 +01:00
9e8290b7df Add certonly non interactive options 2026-01-01 20:39:58 +01:00
9f16b7e8db Use certbot to create cert only 2026-01-01 20:36:46 +01:00
af2b40516f Add nginx security conf 2026-01-01 15:40:05 +01:00
1ee9c0402d Use certbot --installer option 2026-01-01 14:30:11 +01:00
76855cfa05 Use certbot with --nginx 2026-01-01 14:25:16 +01:00
206795e072 Rename variables in ovh.ini 2026-01-01 14:10:50 +01:00
2b9b190d9a Add ghost to certbot cli 2026-01-01 12:08:50 +01:00
558ef17e2a Rename ovh.ini to ovh.ini.tpl 2026-01-01 12:06:29 +01:00
51098b4aee Use ghost directive 2026-01-01 12:05:15 +01:00
2397c7ab41 Refacto to remove netoik-rp service 2026-01-01 11:08:41 +01:00
2dd07a703f Add ln --force option for certbot cli 2025-12-31 17:33:04 +01:00
554e032bd6 Fix certbot arguments for non intercative mode 2025-12-31 17:29:37 +01:00
11 changed files with 123 additions and 109 deletions

13
.gitea/workflows/ci.yaml Normal file
View File

@@ -0,0 +1,13 @@
name: Continuous Integration
on:
push:
branches:
- main
jobs:
env:
runs-on: linux
steps:
- name: Show env
run: env | sort

View File

@@ -28,11 +28,7 @@ tarball: $(RPM_TARBALL_PATH)
.PHONY: install .PHONY: install
install: install:
install --directory $(DESTDIR)$(RPM_SYSCONFDIR)/netoik-rp install --directory $(DESTDIR)$(RPM_SYSCONFDIR)/nginx/conf.d $(DESTDIR)$(RPM_SYSCONFDIR)/certbot $(DESTDIR)$(RPM_UNITDIR)
install --target-directory=$(DESTDIR)$(RPM_SYSCONFDIR)/netoik-rp/ conf/netoik-rp.conf install --target-directory=$(DESTDIR)$(RPM_SYSCONFDIR)/nginx/conf.d conf/nginx/0_security.conf conf/nginx/default.conf
install --target-directory=$(DESTDIR)$(RPM_SYSCONFDIR)/netoik-rp/ conf/ovh.ini install --target-directory=$(DESTDIR)$(RPM_SYSCONFDIR)/certbot conf/certbot/ovh.ini
install --directory $(DESTDIR)$(RPM_UNITDIR) install --target-directory=$(DESTDIR)$(RPM_UNITDIR) conf/systemd/certbot-renew.service conf/systemd/certbot-renew.timer
install --target-directory=$(DESTDIR)$(RPM_UNITDIR)/ services/netoik-rp.service
install --directory $(DESTDIR)/opt/certbot
install --directory $(DESTDIR)$(RPM_SBINDIR)
touch $(DESTDIR)$(RPM_SBINDIR)/certbot

9
conf/certbot/ovh.ini Normal file
View File

@@ -0,0 +1,9 @@
# OVH API credentials used by Certbot
# To generate a new token, go to: https://www.ovh.com/auth/api/createToken
dns_ovh_endpoint = "$OVH_ENDPOINT"
dns_ovh_application_name = "$OVH_APPLICATION_NAME"
dns_ovh_application_description = "$OVH_APPLICATION_DESCRIPTION"
dns_ovh_application_key = "$OVH_APPLICATION_KEY"
dns_ovh_application_secret = "$OVH_APPLICATION_SECRET"
dns_ovh_consumer_key = "$OVH_CONSUMER_KEY"

View File

@@ -1,61 +0,0 @@
# For more information on configuration
# See: http://nginx.org/en/docs/
# Configure core
# See: https://nginx.org/en/docs/ngx_core_module.html
user nginx;
worker_processes auto;
error_log /var/log/nginx/error.log;
pid /run/nginx.pid;
# Load dynamic modules
# See: /usr/share/doc/nginx/README.dynamic.
include /usr/share/nginx/modules/*.conf;
events {
worker_connections 1024;
}
http {
# Configure logs
# See: https://nginx.org/en/docs/http/ngx_http_log_module.html
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
# Configure core
# See: https://nginx.org/en/docs/ngx_core_module.html
include /etc/nginx/mime.types;
default_type text/html;
sendfile on;
tcp_nopush on;
tcp_nodelay on;
keepalive_timeout 65;
types_hash_max_size 4096;
# Configure ssl module
# See: https://nginx.org/en/docs/http/ngx_http_ssl_module.html
include /etc/letsencrypt/options-ssl-nginx.conf;
ssl_certificate /etc/letsencrypt/live/netoik.io/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/netoik.io/privkey.pem;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
ssl_session_cache shared:SSL:1m;
ssl_prefer_server_ciphers on;
# Configure headers
# See: https://nginx.org/en/docs/http/ngx_http_headers_module.html
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload;" always;
# Configure http2
# See: https://nginx.org/en/docs/http/ngx_http_v2_module.html
http2 on;
# Configure http3
# See: https://nginx.org/en/docs/http/ngx_http_v3_module.html
http3 on;
# Load modular configuration files from the /etc/nginx/conf.d directory.
# See: http://nginx.org/en/docs/ngx_core_module.html#include
include /etc/nginx/conf.d/*.conf;
}

View File

@@ -0,0 +1,27 @@
# Configure secure access with letsencrypt
ssl_certificate /etc/letsencrypt/live/netoik.io/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/netoik.io/privkey.pem;
ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
# Add some ssl settings from Mozilla
# see: https://ssl-config.mozilla.org
ssl_protocols TLSv1.3;
ssl_ecdh_curve X25519:prime256v1:secp384r1;
ssl_prefer_server_ciphers off;
ssl_stapling on;
ssl_stapling_verify on;
resolver 127.0.0.1;
# Add some basic security headers from OWASP
# see: https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Headers_Cheat_Sheet.html
add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload;" always;
add_header X-Frame-Options "DENY" always;
add_header X-XSS-Protection "0" always;
add_header X-Content-Type-Options "nosniff" always;
add_header Referrer-Policy "strict-origin-when-cross-origin" always;
add_header Content-Security-Policy "default-src 'self'; frame-ancestors 'self'; form-action 'self';" always;
add_header Cross-Origin-Opener-Policy "same-origin" always;
add_header Cross-Origin-Resource-Policy "same-site" always;
add_header Permissions-Policy "geolocation=(), camera=(), microphone=()" always;
add_header Server "webserver" always;
add_header X-Robots-Tag "noindex, nofollow" always;

13
conf/nginx/default.conf Normal file
View File

@@ -0,0 +1,13 @@
server {
listen 443 default_server;
server_name _;
return 404;
}
server {
listen 80 default_server;
server_name _;
return 301 https://$host$request_uri;
}

View File

@@ -1,6 +0,0 @@
# OVH API credentials used by Certbot
# Name referenced in OVH: rasp.netoik.io
dns_ovh_endpoint = $DNS_OVH_ENDPOINT
dns_ovh_application_key = $DNS_OVH_APPLICATION_KEY
dns_ovh_application_secret = $DNS_OVH_APPLICATION_SECRET
dns_ovh_consumer_key = $DNS_OVH_CONSUMER_KEY

View File

@@ -0,0 +1,5 @@
[Unit]
Description=Renew certbot certificates
[Service]
ExecStart=sleep $RANDOM && /opt/certbot/bin/pip install --upgrade certbot certbot-nginx certbot-dns-ovh && certbot renew

View File

@@ -0,0 +1,8 @@
[Unit]
Description=Daily renew certbot certificates
[Timer]
OnCalendar=Daily
[Install]
WantedBy=multi-user.target

View File

@@ -10,7 +10,7 @@ URL: https://git.netoik.io/samuel/netoik-rp
Source0: %{name}-%{version}.tar.gz Source0: %{name}-%{version}.tar.gz
Buildarch: noarch Buildarch: noarch
BuildRequires: make BuildRequires: make
Requires: nginx,python3,python-devel,augeas-devel,gcc Requires: nginx python3 python-devel (augeas-devel or augeas-libs) gcc openssl
%description %description
Install the reverse proxy called nginx with a predefined configuration and with TLS certificates attached to netoik.io Install the reverse proxy called nginx with a predefined configuration and with TLS certificates attached to netoik.io
@@ -22,30 +22,54 @@ Install the reverse proxy called nginx with a predefined configuration and with
%make_install %make_install
%post %post
# After install
if [ $1 == 1 ]; then if [ $1 == 1 ]; then
# Replace secrets in ovh.ini # Replace secrets in ovh.ini
%{_bindir}/env envsubst < %{_sysconfdir}/%{name}/ovh.ini > %{_sysconfdir}/%{name}/ovh.ini.tmp %{_bindir}/env envsubst < %{_sysconfdir}/certbot/ovh.ini > %{_sysconfdir}/certbot/.ovh.ini.swp
%{_bindir}/env mv %{_sysconfdir}/%{name}/ovh.ini.tmp %{_sysconfdir}/%{name}/ovh.ini %{_bindir}/env mv %{_sysconfdir}/certbot/.ovh.ini.swp %{_sysconfdir}/certbot/ovh.ini
%{_bindir}/env chmod 600 %{_sysconfdir}/certbot/ovh.ini
# Create virutal env with certbot cli
%{_bindir}/env python3 -m venv /opt/certbot # Create virutal env with certbot
/opt/certbot/bin/pip install --upgrade pip certbot certbot-dns-ovh %{_bindir}/env python3 -m venv /opt/certbot
/opt/certbot/bin/pip install --upgrade pip certbot certbot-nginx certbot-dns-ovh
%{_bindir}/env ln --symbolic --force --target-directory %{_sbindir} /opt/certbot/bin/certbot %{_bindir}/env ln --symbolic --force --target-directory %{_sbindir} /opt/certbot/bin/certbot
%{_bindir}/env certbot certonly --dns-ovh --dns-ovh-credentials "%{_sysconfdir}/%{name}/ovh.ini" -d "*.netoik.io" -d "*.samuel-campos.fr"
%{_bindir}/env printf "\nAutomatic certbot renew\n0 12 * * * root sleep $((RANDOM % 3600)) && certbot renew -q\n" >> %{_sysconfdir}/crontab # Create certificate with certbot
%{_bindir}/env certbot certonly --non-interactive --agree-tos --email "samuel.campos@netoik.io" --dns-ovh --dns-ovh-credentials "%{_sysconfdir}/certbot/ovh.ini" -d "*.netoik.io" -d "*.samuel-campos.fr"
# Create ssl dh params
%{_bindir}/env openssl dhparam -out %{_sysconfdir}/letsencrypt/ssl-dhparams.pem 2048
# Stop services to be sure changes are taken in account
%{_bindir}/env systemctl stop nginx certbot-renew
fi
# Start services
%{_bindir}/env systemctl daemon-reload
%{_bindir}/env systemctl enable --now nginx certbot-renew
%postun
# After uninstall
if [ $1 == 0 ]; then
%{_bindir}/env rm --recursive --force /opt/certbot
%{_bindir}/env rm --recursive --force %{_sysconfdir}/certbot
%{_bindir}/env rm --recursive --force %{_sysconfdir}/letsencrypt
fi fi
%{_bindir}/env systemctl disable nginx
%{_bindir}/env systemctl stop nginx
%{_bindir}/env systemctl enable %{name}
%{_bindir}/env systemctl start %{name}
%files %files
%attr(755, root, root) %dir %{_sysconfdir}/%{name} %attr(644, root, root) %{_sysconfdir}/nginx/conf.d/0_security.conf
%attr(600, root, root) %config %{_sysconfdir}/%{name}/ovh.ini %attr(644, root, root) %{_sysconfdir}/nginx/conf.d/default.conf
%attr(644, root, root) %config %{_sysconfdir}/%{name}/netoik-rp.conf
%attr(644, root, root) %config %{_unitdir}/%{name}.service %attr(755, root, root) %dir %{_sysconfdir}/certbot
%attr(755, root, root) %dir /opt/certbot %attr(600, root, root) %{_sysconfdir}/certbot/ovh.ini
%attr(755, root, root) %{_sbindir}/certbot
%attr(644, root, root) %{_unitdir}/certbot-renew.timer
%attr(644, root, root) %{_unitdir}/certbot-renew.service
%ghost %attr(755, root, root) %dir /opt/certbot
%ghost %attr(755, root, root) %{_sbindir}/certbot
%ghost %attr(755, root, root) %dir %{_sysconfdir}/letsencrypt
%ghost %attr(644, root, root) %{_sysconfdir}/letsencrypt/ssl-dhparams.pem
%changelog %changelog
%autochangelog %autochangelog

View File

@@ -1,14 +0,0 @@
[Service]
Type=forking
PIDFile=/run/netoik-rp.pid
ExecStartPre=/usr/bin/env rm -f /run/netoik-rp.pid
ExecStartPre=/usr/bin/env nginx -t -c /etc/netoik-rp/netoik-rp.conf
ExecStart=/usr/bin/env nginx -c /etc/netoik-rp/netoik-rp.conf
ExecReload=/usr/bin/env nginx -s reload -c /etc/netoik-rp/netoik-rp.conf
KillSignal=SIGQUIT
TimeoutStopSec=5
KillMode=mixed
PrivateTmp=true
[Install]
WantedBy=multi-user.target