项目作者: pixielabs

项目描述 :
Automatic LetsEncrypt SSL certificates in your Rails app on Heroku.
高级语言: Ruby
项目地址: git://github.com/pixielabs/letsencrypt-rails-heroku.git
创建时间: 2016-08-01T12:31:13Z
项目社区:https://github.com/pixielabs/letsencrypt-rails-heroku

开源协议:MIT License

下载


LetsEncrypt & Rails & Heroku

WATCH OUT! This gem is deprecated

Since this gem was created, Heroku have added support for free automated SSL certificates for paid dynos (ACM). You should use ACM instead of this gem unless your situation is covered by the known limitations of ACM, e.g. your app runs in Heroku Private Spaces. When we’ve had issues with ACM, we’ve had success with the Expedited WAF addon, and you might too.


Gem Version

This gem is a complete solution for securing your Ruby on Rails application
on Heroku using their free SNI-based SSL and LetsEncrypt. It will automatically
handle renewals and keeping your certificate up to date.

With some extra steps, this gem can also be used with Sinatra. For an example
of how to do this, see the
letsencrypt-rails-heroku-sinatra-example
repository.

Requirements

Installation

Add the gem to your Gemfile:

  1. gem 'letsencrypt-rails-heroku', group: 'production'

And add it as middleware in your config/environments/production.rb:

  1. Rails.application.configure do
  2. <...>
  3. config.middleware.use Letsencrypt::Middleware
  4. <...>
  5. end

If you have configured your app to enforce SSL with the configuration option
config.force_ssl = true you will need to insert the middleware in front of
the middleware performing that enforcement instead, as LetsEncrypt do not allow
redirects on their verification requests:

  1. Rails.application.configure do
  2. # <...>
  3. config.middleware.insert_before ActionDispatch::SSL, Letsencrypt::Middleware
  4. # <...>
  5. end

Configuring

By default the gem will try to use the following set of configuration
variables. You must set:

  • ACME_EMAIL: Your email address, should be valid.
  • ACME_TERMS_AGREED: Existence of this environment variable represents your
    agreement to Let’s Encrypt’s terms of service.
  • HEROKU_TOKEN: An API token for this app. See below
  • HEROKU_APP: Name of Heroku app e.g. bottomless-cavern-7173

You can also set:

  • ACME_DOMAIN: Comma separated list of domains for which you want
    certificates, e.g. example.com,www.example.com. Your Heroku app should be
    configured to answer to all these domains, because Let’s Encrypt will make a
    request to verify ownership.

    If you leave this blank, the gem will try and use the Heroku API to get a
    list of configured domains for your app, and verify all of them.

  • SSL_TYPE: Optional: One of sni or endpoint, defaults to sni.
    endpoint requires your app to have an
    SSL endpoint addon configured.

The gem itself will temporarily create additional environment variables during
the challenge / validation process:

  • ACME_CHALLENGE_FILENAME: The path of the file LetsEncrypt will request.
  • ACME_CHALLENGE_FILE_CONTENT: The content of that challenge file.

It will also create two permanent environment variables after the first run:

  • ACME_PRIVATE_KEY: Private key used to create requests for certificates.
  • ACME_KEY_ID: Key ID assigned to your private key by Let’s Encrypt.

If you remove these, a new account will be created and new environment
variables will be set.

Creating a Heroku token

Use the heroku-oauth toolbelt plugin to generate an access token suitable
for accessing the Heroku API to update the certificates. From within your
project directory:

  1. > heroku plugins:install heroku-cli-oauth
  2. > heroku authorizations:create -d "LetsEncrypt"
  3. Created OAuth authorization.
  4. ID: <heroku-client-id>
  5. Description: LetsEncrypt
  6. Scope: global
  7. Token: <heroku-token>

Use the output of that to set the token (HEROKU_TOKEN).

Using for the first time

After deploying, run heroku run rake letsencrypt:renew. Ensure that the
output looks good:

  1. $ heroku run rake letsencrypt:renew
  2. Running rake letsencrypt:renew on yourapp... connecting, run.1234
  3. Creating account key...Done!
  4. Registering with LetsEncrypt...Done!
  5. Setting config vars on Heroku...Done!
  6. Giving config vars time to change...Done!
  7. Testing filename works (to bring up app)...done!
  8. Adding new certificate...Done!
  9. $

If this is the first time you have used an SNI-based SSL certificate on your
app, you may need to alter your DNS configuration as per
Heroku’s instructions.

You can see these details by typing heroku domains.

Adding a scheduled task

You should add a scheduled task on Heroku to renew the certificate. If you
are unfamiliar with how to do this, take a look at Heroku’s documentation
on their scheduler addon
.

The scheduled task should be configured to run rake letsencrypt:renew as
often as you want to renew your certificate. Letsencrypt certificates are valid
for 90 days, but there’s no harm renewing them more frequently than that.

Heroku Scheduler only lets you run a task as infrequently as once a day, but
you don’t want to renew your SSL certificate every day (you will hit
the rate limit). You can make it
run less frequently using a shell control statement. For example to renew your
certificate on the 1st day of every month:

  1. if [ "$(date +%d)" = 01 ]; then bundle exec rake letsencrypt:renew; fi

Source: blog.dbrgn.ch

Security considerations

Suggestions and pull requests are welcome in improving the situation with the
following security considerations:

  • When configuring this gem you must add a non-expiring Heroku API token into
    your application environment. Your collaborators could use this token to
    impersonate the account it was created with when accessing the Heroku API.
    This is important if your account has access to other apps that your
    collaborators don’t. Additionally, if your application environment was
    leaked this would give the attacker access to the Heroku API as your user
    account.
    More information about Heroku’s API and oAuth.

    You should create the API token from a suitably locked-down account.

  • This gem uses two environment variables (ACME_CHALLENGE_FILENAME and
    ACME_CHALLENGE_FILE_CONTENT) to construct routes and responses in your
    app. These environment variables could be manipulated to spoof URLs on your
    application.

    The gem performs some cursory checks to make sure the filename is roughly
    what is expected to try and mitigate this.

Troubleshooting

Common name invalid errors (security certificate is from *.herokuapp.com)

Your domain is still configured as a CNAME or ALIAS to
your-app.herokuapp.com. Check the output of heroku domains matches your DNS
configuration. When you add an SNI cert to an app for the first time
the DNS target changes.

To-do list

  • Persist account key, or at least give the option of using an existing one, so
    we don’t register with LetsEncrypt over and over.

  • Provide instructions for running the gem decoupled from the app it is
    securing, for the paranoid.

Contributing

  • Check out the latest master to make sure the feature hasn’t been implemented
    or the bug hasn’t been fixed yet.
  • Check out the issue tracker to make sure someone already hasn’t requested it
    and/or contributed it.
  • Fork the project.
  • Start a feature/bugfix branch.
  • Commit and push until you are happy with your contribution.
  • Make sure to add tests for it. This is important so I don’t break it in a
    future version unintentionally.
  • Please try not to mess with the Rakefile, version, or history. If you want to
    have your own version, or is otherwise necessary, that is fine, but please
    isolate to its own commit so I can cherry-pick around it.

Generating a new release

  1. Bump the version: rake version:bump:{major,minor,patch}.
  2. Update CHANGELOG.md & commit.
  3. Use rake release to regenerate gemspec, push a tag to git, and push a new
    .gem to rubygems.org.