Skip to content

Commit 03d7057

Browse files
authored
doc: notes on updating certificates and restarting. (#2067)
The first paragraph is lifted from #1122 Closes #1122.
1 parent 427cf58 commit 03d7057

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

docs/TLS-Certificates.rst

+29
Original file line numberDiff line numberDiff line change
@@ -488,3 +488,32 @@ fit your system .. this works for Ubuntu):
488488
Verify return code: 0 (ok)
489489
---
490490
^C
491+
492+
Updating Certificates
493+
=====================
494+
495+
After updating Crossbar.io TLS server certificates and/or keys, you must restart
496+
Crossbar.io for the new certificates/keys to take effect. The certificates/keys
497+
are cached when loading the first time, and hence without restarting
498+
Crossbar.io, the old certificates/keys would still be used despite the new ones
499+
already being stored on disk.
500+
501+
Updating LetsEncrypt with certbot
502+
---------------------------------
503+
504+
Once you have configured LetsEncrypt, you can periodically run `certbot
505+
<https://certbot.eff.org/>`_ to update your certificates. You may wish to
506+
restart Crossbar.io if a new certificate is generated. Certbot has a
507+
`--deploy-hook` which is run once for every generated certificate, with the
508+
domains in `$RENEWED_DOMAINS`. Thus you can create something like
509+
510+
.. code:: bash
511+
512+
#!/bin/bash
513+
if [[ "$RENEWED_DOMAINS" =~ "wamp.my.domain" ]]; then
514+
systemctl restart crossbar # or however your router is run
515+
echo "restarted server" > /tmp/log
516+
fi
517+
518+
And then pass it to certbot, e.g. by running `systemctl edit certbot` and adding
519+
`--deploy-hook=/path/to/restart.sh`.

0 commit comments

Comments
 (0)