Commit fc4fcfd3 authored by Mathieu Giraud's avatar Mathieu Giraud

Apply 1 suggestion(s) to 1 file(s)

parent b9102d3b
Pipeline #159750 failed with stages
in 2 minutes and 36 seconds
...@@ -173,7 +173,8 @@ You can achieve this with the following steps: ...@@ -173,7 +173,8 @@ You can achieve this with the following steps:
- A better option is to use other certificates, for example by configuring free [Let's Encrypt](https://letsencrypt.org/) certificates. - A better option is to use other certificates, for example by configuring free [Let's Encrypt](https://letsencrypt.org/) certificates.
One solution is to use `certbot` on the host to generate the certificates and to copy them in the right directory so that the container One solution is to use `certbot` on the host to generate the certificates and to copy them in the right directory so that the container
can access it. can access it.
However to check the integrity of the host, `certbot` needs to set up a challenge. See [Nginx and Let’s Encrypt with Docker](https://medium.com/@pentacent/nginx-and-lets-encrypt-with-docker-in-less-than-5-minutes-b4b8a60d3a71).
To check the integrity of the host, `certbot` needs to set up a challenge.
Thus, Nginx needs to provide specific files that are generated by `certbot`. Thus, Nginx needs to provide specific files that are generated by `certbot`.
To do so, you should tell `certbot` to put those files in the `/opt/vidjil/certs` To do so, you should tell `certbot` to put those files in the `/opt/vidjil/certs`
directory (this can be changed in the `docker-compose.yml` file. directory (this can be changed in the `docker-compose.yml` file.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment