Konstantin, 
Ok, no objections from my side. I need some times for read documentation. I
hope we will finished in two weeks. 

http://reviews.ignite.apache.org - will setup for ssl using too.



Konstantin Boudnik-2 wrote
> I have never heard about this provider, and it is great they are donating
> their resources to the FOSS. I quick glance on their site has reveiled a
> couple of issues:
> - the page for the "Standard Agreement" returns 404 [1]. I won't be
> willing to
>   agree to something I cannot read upfront.
> - the process seems to be manual.
> 
> The reason I like [2] is because it's backed by EFF and has a huge user
> base
> (over 100 millions certificates to date) [3]
> 
> The process has been debugged already for other Apache projects, so I
> don't
> really see why we need to go to someone else?
> 
> [1]
> https://www.globalsign.com/en/repository/globalsign-subscriber-agreement-digital-certificates-and-services.pdf
> [2] https://letsencrypt.org/
> [3]
> https://www.eff.org/deeplinks/2017/06/lets-encrypt-has-issued-100-million-certificates
> 
> Thanks,
>   Cos
> 
> On Wed, Jul 19, 2017 at 09:41PM, Aleksey Chetaev wrote:
>> Hi,
>> 
>> A know GlobalSing support open source projects for
>> free(https://www.globalsign.com/en/ssl/ssl-open-source/).
>> We can request certificates from them, it will be more easy for me. Any
>> objection?
>> 
>> 
>> Denis Magda-2 wrote
>> > Hi Cos,
>> > 
>> > Alexey Chetaev, please join the conversation and share your thoughts on
>> > this.
>> > 
>> > —
>> > Denis
>> > 
>> >> On Jul 19, 2017, at 9:44 AM, Konstantin Boudnik <
>> 
>> > cos@
>> 
>> > > wrote:
>> >> 
>> >> Hey guys.
>> >> 
>> >> I've noticed that https://ci.ignite.apache.org/ has two issues:
>> >> - it has the invalid certificate
>> >> - the CI server isn't responding on the https port (there's only
>> ngnix)
>> >> 
>> >> I don't about the rest of the group here, but all my browsers are
>> >> enforcing
>> >> HTTPS connections for the obvious reasons. I have to add an exception
>> >> for the CI server to get in, which is a minor inconvenience compared
>> to
>> >> the
>> >> security risks. I suggest we fix both issues. 
>> >> 1. Getting a valid certificate is easy and doesn't cost a dime
>> nowadays.
>> >>   Here's the very details set of instructions on how we do it for
>> Apache
>> >>   Bigtop. They are easily applicable in Ignite CI's case [1]. I'd be
>> >> happy to
>> >>   help with this.
>> >> 2. Reconfiguring the server to respond only on HTTPS port. That's
>> another
>> >> easy
>> >>   thing to do for anyone with the access to the box. I don't have
>> this,
>> >> so
>> >>   it'd be someone else.
>> >> 
>> >> Thoughts?
>> >>  Cos
>> >> 
>> >> [1]
>> >>
>> https://cwiki.apache.org/confluence/display/BIGTOP/Bigtop+CI+Setup+Guide#BigtopCISetupGuide-Advancedpart:SetupaSSLsecuredJenkinsmaster
>> >>
>> 
>> 
>> 
>> 
>> 
>> --
>> View this message in context:
>> http://apache-ignite-developers.2346864.n4.nabble.com/SSL-certificate-for-the-CI-server-tp19830p19840.html
>> Sent from the Apache Ignite Developers mailing list archive at
>> Nabble.com.
> 
> 
> signature.asc (237 bytes)
> <http://apache-ignite-developers.2346864.n4.nabble.com/attachment/19933/0/signature.asc>





--
View this message in context: 
http://apache-ignite-developers.2346864.n4.nabble.com/SSL-certificate-for-the-CI-server-tp19830p20066.html
Sent from the Apache Ignite Developers mailing list archive at Nabble.com.

Reply via email to