-
Hey all, I just recently came across step(-ca) and believe it's the solution I'm looking for to get trusted certs on a private network. I tried following the getting started guide on docker and hit a snag on this particular line where you have to bootstrap the step client
In my use case, I needed this (everything involving step(-ca)) to be fully self contained in that if an end user has docker installed it's possible to configure the Dockerfiles, config files etc and the docker-compose.yml in a way that allows everything to be launched with For context, I have a webapp and db containers that are fully self contained and launched together via docker-compose. Right now I'm using a self-signed cert and wanted to integrate step(-ca) with my app to get rid of the browser warning. For me, self contained means the only thing that an end user needs to do is install docker and use the docker-compose up command giving them zero overhead/any tedious configurations to do. Is it possible for me to package step(-ca) in a way that allows it to be run from docker-compose without having to install anything else on the host machine? So far the docs read like setting up step on the host is a prerequisite even though I also read it as simply being a client that interacts with the step-ca server. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 1 reply
-
@se316 If you look at the entrypoint.sh used by step-ca Dockerfile, you can define a some environment variables, I don't think we have an example for your case, but we have an example here that uses a previously initialized PKI. |
Beta Was this translation helpful? Give feedback.
-
Thank you for your response! Spent about an hour reading the docs initially and looked through the code today, making this all self-provision is a bit beyond me at the moment so I'll need to look into other containerized PKI options that are a bit better documented or have tutorials/examples floating around online. Seeing "PKI" was definitely a nudge in the right direction. |
Beta Was this translation helpful? Give feedback.
@se316 If you look at the entrypoint.sh used by step-ca Dockerfile, you can define a some environment variables,
DOCKER_STEPCA_INIT_NAME
,DOCKER_STEPCA_INIT_DNS_NAMES
and optionallyDOCKER_STEPCA_INIT_PROVISIONER_NAME
,DOCKER_STEPCA_INIT_PASSWORD
andDOCKER_STEPCA_INIT_SSH
to automatically initialize step-ca. You can define the ones you need indocker-compose.yaml
and if the PKI hasn't been initialized, it will create a new one.I don't think we have an example for your case, but we have an example here that uses a previously initialized PKI.