If you only want to download open source software Community Edition is the best choice. This distribution does not contain proprietary code. Functionally it will behave the same as Enterprise Edition without a license.
Easily initialize a brand new project and use the built-in code editor to start working on that project. Add new files and folders, and edit them directly in GitKraken. Save your files, stage and commit your changes. No more context switching!
The solution may be to reference the Plesk generated certs that don't have a problem renewing. Maybe a symbolic link to where Gitlab is looking for its certificate to where Plesk is storing its allbasic.info cert would solve the handshake issue?
I think the root of the problem was Let's Encrypt was unable to validate through the proxy and kept on trying until it exhausted cert limits.
A reverse proxy server is a type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server. A reverse proxy provides an additional level of abstraction and control to ensure the smooth flow of network traffic between clients and servers.
I also wonder why GitLab is still looking at its expired cert if Let's Encrypt is disabled? What if I rename the cert?
Only allbasic.info am I not able to create Let's Encrypt certificates for.
I've attached httpd.conf, nginx.conf and gitlab.rb files for sandbox.allbasic.info.
/var/www/vhosts/default/htdocs/.well-known/acme-challenge/
The question I have is if GitLab was able to validate its initial cert, what did the Plesk interface do to break GitLab from renewing the cert?
The only thing added to this was the proxy reverse to eliminate :8181 from the URL. It worked fine before and after this httpd.conf addition.
Maybe if I disable the proxy reverse and enable LE in GitLab, maybe it will renew when the limit expires?
This site uses HTTP Strict Transport Security (HSTS) to specify that Firefox may only connect to it securely. As a result, it is not possible to add an exception for this certificate.
QuoteThis site uses HTTP Strict Transport Security (HSTS) to specify that Firefox may only connect to it securely. As a result, it is not possible to add an exception for this certificate.
Would you know how I can make Firefox allow me to accept the certificate problem and connect to the sandbox like Chrome?
I might try to get ssh working with the sandbox for console git comands.
I might try to get ssh working with the sandbox for console git comands.
How are things going with the Mac SB version? Any luck finding a GUI library you like that would work as an extension module?
I have my own repositories for this...
Is this something you might sell like the PurliBASIC translator?
Is there an IUP example with the MBC distribution?
There was an error running gitlab-ctl reconfigure:
letsencrypt_certificate[sandbox.allbasic.info] (letsencrypt::http_authorization line 3) had an error: RuntimeError: acme_certificate[staging] (/opt/gitlab/embedded/cookbooks/cache/cookbooks/letsencrypt/resources/certificate.rb line 20) had an error: RuntimeError: [sandbox.allbasic.info] Validation failed for domain sandbox.allbasic.info
Early Holiday, John.....see attached.
You may need to edit some of this, but the hard work is done....
Prepare for the Let's Encrypt Web Root Domain Verification
In order to receive an SSL certificate from the Let's Encrypt certificate authority, we must prove that we own the domain that the certificate will be provided for. There are multiple methods of proving domain ownership, each of which require root or administrator access to the server.
GitLab contains an internally managed Nginx web server for serving the application itself. This makes the installation rather self-contained, but it does add an additional layer of complexity when attempting to modify the web server itself.
Since the embedded Nginx is currently being utilized to serve GitLab itself, the best domain validation method is the web root method. Certbot will use the existing web server to serve a known file from the server on port 80. This proves to the certificate authority that the person requesting the certificate has administrative control over the web server, which effectively proves ownership over the server and domain.
To set up web root domain validation for GitLab, our first step will be to create a dummy document root:
sudo mkdir -p /var/www/letsencrypt
This will be unused by normal Nginx operations, but will be used by Certbot for domain verification.
Next, we need to adjust GitLab's Nginx configuration to use this directory. Open up the main GitLab configuration file by typing:
sudo nano /etc/gitlab/gitlab.rb
Inside, we need to add a line that will inject a custom directive into GitLab's Nginx configuration file. It's probably best to scroll down to the GitLab Nginx section of the file, but the line can be placed anywhere.
Paste in the following line:
/etc/gitlab/gitlab.rb
. . .
nginx['custom_gitlab_server_config'] = "location ^~ /.well-known { root /var/www/letsencrypt; }"
. . .
The Let's Encrypt web root verification method places a file within a .well-known directory in a document root so that the certificate authority can validate it. This line tells Nginx to serve requests for /.well-known from the web root we created a moment ago.
When you are finished, save and close the file.
Next, apply the changes to GitLab's Nginx configuration by reconfiguring the application again:
sudo gitlab-ctl reconfigure
The server should now be set up to successfully validate your domain.
Prometheus is a powerful time-series monitoring service, providing a flexible platform for monitoring GitLab and other software products. GitLab provides out of the box monitoring with Prometheus, providing easy access to high quality time-series monitoring of GitLab services.
I may try the PHP redirect I use for sites with no home page to resolve :8181 being in the URL.