ACME-based enrollment
Follow these steps to get certificates from DigiCert® Trust Lifecycle Manager into your Puppet environment using the ACMEv2 protocol to generate requests and download the resulting certificates.
Before you begin
In Trust Lifecycle Manager, you need a certificate profile with the 3rd-party ACME client
enrollment method. The profile defines the general certificate properties and provides the required ACME URL and external account binding (EAB) credentials:
ACME Directory URL: The ACME server URL to request certificates from Trust Lifecycle Manager.
Key identifier (KID): Identifies the certificate profile in your Trust Lifecycle Manager account.
HMAC key: Used to encrypt and authenticate your account key during certificate requests.
Integration workflow
To begin the process of ACME-based certificate enrollment using Puppet, you’ll need to download and extract the provided sample files, then move them into the appropriate Puppet environment directory. This setup ensures that Puppet can properly find and use the configuration files and modules.
Importante
The integration package linked below contains a site.pp
file that uses a wildcard (default
) node block. This means the certbot
class is applied to all nodes by default. See Optional: Custom server and agent configuration to download an alternate package that has modified site.pp
and init.pp
files.
Download the Puppet integration package to get the following environment files:
production/data/certbot.yaml
: Contains key-value pairs for Certbot configuration, such as email, domain, and ACME server details, used by Hiera for data lookups.production/environment.conf
: Defines environment-specific settings, such as module paths and manifest locations, for the production environment.production/hiera.yaml
: Configures Hiera, Puppet’s hierarchical data lookup tool, specifying the data sources and hierarchy for resolving configuration data.production/manifests/site.pp
: The main manifest file for the production environment, defining node-specific configurations and including the necessary classes.production/modules/certbot/manifests/init.pp
: Contains the definition of the Certbot class, including resource declarations and configurations for managing Certbot installations and certificates.
Copy the package contents to your Puppet environment directory.
sudo -u puppet cp -r puppet-acme-integration/production/* /etc/puppetlabs/code/environments/production/
Avviso
Copying the files as the
puppet
user ensures the files have the correct ownership and permissions.If the files were not copied as the
puppet
user, copy as root (sudo
), and then adjust the ownership to ensure proper access:sudo chown -R puppet:puppet /etc/puppetlabs/code/environments/production/
In this step, you will configure the necessary Puppet manifests and hiera data to set up the environment for requesting and managing SSL/TLS certificates using Certbot.
Navigate to the Puppet environment directory.
cd /etc/puppetlabs/code/environments/production
Update the
hiera.yaml
file to specifycertbot.yaml
as the data file. The modifiedhiera.yaml
should look like this:version: 5 defaults: datadir: data data_hash: yaml_data hierarchy: - name: "Certbot" path: "certbot.yaml"
In the data directory, open the
certbot.yaml
file and update the following key/value pairs:certbot::certbot_email
: Your contact email for receiving certificate notifications.certbot::certbot_domain
: The domain name for which you want to issue the certificates.certbot::certbot_http_port
: The HTTP port to use for the ACME challenge (commonly port 80).certbot::certbot_eab_kid
: The Key ID (KID) for External Account Binding (EAB), provided by your ACME provider.certbot::certbot_eab_hmac_key
: The HMAC key for EAB.certbot::certbot_server
: The directory URL for the ACME provider (e.g., Let’s Encrypt).certbot::certbot_rsa_key_size
: The desired RSA key size for the certificates.
To request a certificate from Trust Lifecycle Manager on a Puppet server, run the following command:
sudo /opt/puppetlabs/bin/puppet apply /etc/puppetlabs/code/environments/production/manifests/site.pp
This command performs the following actions:
Reads the
site.pp
manifest, which includes thecertbot
class.Applies the configurations defined in the
certbot
class frominit.pp
, including installing necessary packages, configuring Certbot, and requesting a certificate.Downloads PEM-formatted certificates to
/etc/letsencrypt/live/<certbot_domain>/
.
In certain environments, you may need to apply different configurations for Puppet server and agent nodes, particularly if they have distinct roles or require separate handling. To specify different configurations for Puppet server and agent nodes, you can modify the site.pp
file to include distinct classes or configurations for each node type.
Download the alternate Puppet integration package, which contains a modified
site.pp
andinit.pp
files.Open
site.pp
located in themanifests
directory and specify your Puppet server and agent nodes by including the appropriate classes. For example:node 'puppet-server.example.com' { include certbot::server } node 'puppet-agent.example.com' { include certbot::agent }
Nota
Replace
puppet-server.example.com
andpuppet-agent.example.com
with the actual hostnames of your server and agent nodesContinue with the steps above, starting from 2. Copy the package contents to your Puppet environment directory.
What's next?
Verify that the certificate files fullchain.pem
and privkey.pem
are located in the Certbot certificate directory.
ls /etc/letsencrypt/live/<certbot_domain>/
The certificate also appears in the Trust Lifecycle Manager Inventory view so you can monitor it and set up notifications.
Avviso
Certbot automatically attempts to renew certificates before they expire. Ensure that the necessary cron jobs or systemd timers are set up to handle automatic renewals. This is typically handled by Certbot’s default installation but verify that it is configured properly.