From 1fa53881b04047bd781185f9ca9751a6c12c6e9f Mon Sep 17 00:00:00 2001 From: Maxim Devaev Date: Mon, 4 Jul 2022 07:40:15 +0300 Subject: [PATCH] Update letsencrypt.md --- docs/letsencrypt.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/docs/letsencrypt.md b/docs/letsencrypt.md index 44152d4f..4d464238 100644 --- a/docs/letsencrypt.md +++ b/docs/letsencrypt.md @@ -147,13 +147,13 @@ This example shows that PiKVM may not be accessible from the internet, but you c Update permissions: ``` - kvmd-pstrun -- chmod 600 /var/lib/kvmd/pst/data/certbot/runroot/.route53.auth + # kvmd-pstrun -- chmod 600 /var/lib/kvmd/pst/data/certbot/runroot/.route53.auth ``` 4. Obtain the certificate: ``` - export AWS_SHARED_CREDENTIALS_FILE="/var/lib/kvmd/pst/data/certbot/runroot/.route53.auth" - kvmd-certbot certonly \ + # export AWS_SHARED_CREDENTIALS_FILE="/var/lib/kvmd/pst/data/certbot/runroot/.route53.auth" + # kvmd-certbot certonly \ --dns-route53 \ --agree-tos \ -n \ @@ -163,12 +163,12 @@ This example shows that PiKVM may not be accessible from the internet, but you c 4. Enable automatic certificate renewal: - Create the file: */etc/conf.d/kvmd-certbot* with the following contents so the renewall service can find the authentication file containing the AWS credentials: + Create the file: `/etc/conf.d/kvmd-certbot` with the following contents so the renewall service can find the authentication file containing the AWS credentials: ``` AWS_SHARED_CREDENTIALS_FILE="/var/lib/kvmd/pst/data/certbot/runroot/.route53.auth" ``` Now enable the renewal service: ``` - systemctl enable --now kvmd-certbot.timer + # systemctl enable --now kvmd-certbot.timer ```