<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Development on Täschnix Blog</title>
    <link>https://blog.taeschnix.de/categories/development/</link>
    <description>Recent content in Development on Täschnix Blog</description>
    <generator>Hugo</generator>
    <language>de-DE</language>
    <lastBuildDate>Sat, 11 Jan 2020 18:36:31 +0100</lastBuildDate>
    <atom:link href="https://blog.taeschnix.de/categories/development/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>moving existing CA into Hashicorp Vault</title>
      <link>https://blog.taeschnix.de/posts/vaultpki/</link>
      <pubDate>Sat, 11 Jan 2020 18:36:31 +0100</pubDate>
      <guid>https://blog.taeschnix.de/posts/vaultpki/</guid>
      <description>&lt;h2 id=&#34;vault-is-much-more-then-a-simple-keyvalue-store-for-user-credentials&#34;&gt;Vault is much more then a simple key/value store for user credentials&lt;/h2&gt;&#xA;&lt;p&gt;In my last post I setup up a HashiCorp Vault to store credentials like Google API-keys, username/password combinations and also my private and public key for my SSL certification authority.&lt;/p&gt;&#xA;&lt;p&gt;The SSL certificates are stored in vault so that they can be used within the CI/CD pipeline. They were stored as simple strings in the kv backend, which is in no way optimal.&lt;/p&gt;</description>
    </item>
    <item>
      <title>trouble with selfsigned SSL certificates</title>
      <link>https://blog.taeschnix.de/posts/ssltrouble/</link>
      <pubDate>Sun, 22 Dec 2019 21:24:31 +0100</pubDate>
      <guid>https://blog.taeschnix.de/posts/ssltrouble/</guid>
      <description>&lt;h2 id=&#34;what-changed-since-my-last-post-on-certificates&#34;&gt;What changed since my last post on certificates&lt;/h2&gt;&#xA;&lt;p&gt;Since my last post almost two years ago I updated my homeserver significantly with new hardware. With this new hardware I am able to run a lot more services and thus grew the wish to access them by their own DNS name.&#xA;With the wildcard certificate it was no problem to securely access them from any browser.&lt;/p&gt;&#xA;&lt;p&gt;Things changed when I started integrating these into the Jenkins pipelines. I got the following error message:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Setting an HashiCorp Vault</title>
      <link>https://blog.taeschnix.de/posts/setupvault/</link>
      <pubDate>Thu, 28 Nov 2019 18:18:14 +0100</pubDate>
      <guid>https://blog.taeschnix.de/posts/setupvault/</guid>
      <description>&lt;h2 id=&#34;why-do-you-want-your-own-vault-for-your-devops-pipeline&#34;&gt;Why do you want your own Vault for your DevOps Pipeline&lt;/h2&gt;&#xA;&lt;p&gt;Todo: Add some motivational stuff here&lt;/p&gt;&#xA;&lt;h2 id=&#34;setup-using-docker-on-my-server-without-ready-the-docs-first&#34;&gt;Setup using Docker on my server &lt;em&gt;without ready the docs first&lt;/em&gt;&lt;/h2&gt;&#xA;&lt;p&gt;As usual I setup all of the required tools as docker containers. Luckily HashiCorp provides a ready image which just needs to be started as then the UI is readily accessable on port 8200 for your HTTP-Requests.&#xA;Due to some other maintenance on the server I had to reboot the server, but this is no issue as the docker container can be configured to restart automatically.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Implementing my own CA</title>
      <link>https://blog.taeschnix.de/posts/implement_own_ca/</link>
      <pubDate>Sun, 25 Feb 2018 18:19:31 +0100</pubDate>
      <guid>https://blog.taeschnix.de/posts/implement_own_ca/</guid>
      <description>&lt;h2 id=&#34;intention-and-original-situation&#34;&gt;Intention and original situation&lt;/h2&gt;&#xA;&lt;p&gt;The move to encryption everywhere is inevitable. Soon browsers (starting with Chrome) will be blocked unencrypted HTTP requests. Google announced this in a recent &lt;a href=&#34;https://blog.chromium.org/2018/02/a-secure-web-is-here-to-stay.html&#34;&gt;blog post&lt;/a&gt;.  So in order to prepare for this, my own home server installation needs a proper CA and certificates.&lt;/p&gt;&#xA;&lt;h2 id=&#34;creating-the-certification-authority&#34;&gt;Creating the certification authority&lt;/h2&gt;&#xA;&lt;p&gt;I chose to use my NAS as the host for the CA for now as openssl was already installed. For the CA I followed the excellent instructions from Jamie Nguyen &lt;a href=&#34;https://jamielinux.com/docs/openssl-certificate-authority/&#34;&gt;(link)&lt;/a&gt;.&#xA;The detailed instructions I used to create the Root CA are detailed &lt;a href=&#34;https://jamielinux.com/docs/openssl-certificate-authority/create-the-root-pair.html&#34;&gt;here:&lt;/a&gt;.&#xA;Only the Root CA will be used so I chose the less strict policy and used&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
