-
Notifications
You must be signed in to change notification settings - Fork 0
GitHub Enterprise Server

- need 64GB of RAM in hyper-v
- try https://github.devopsabcs.com
- will take a very long time
- again
- then
- such as
- as
- such as orgs
- standard actions source code
- in the other organization
- to connect onprem to GEC
- disks
- on azure storage
- packages will be stored here:
- on windows
- register the runner
fatal: unable to access 'https://github.devopsabcs.com/devopsabcs-ges/first-on-prem-repo/': SSL certificate problem: self-signed certificate

- as
ssh -p 122 admin@github.devopsabcs.com
- should work
- can try https://docs.github.com/en/enterprise-server@3.17/admin/configuring-settings/hardening-security-for-your-enterprise/configuring-tls
- may need to fix firewall
- request tls cert
- like with Digicert
- pipes now green
- all later runs are green
- as seen in management console
https://docs.github.com/en/enterprise-server@3.17/packages/quickstart https://community.letsencrypt.org/t/hostname-ip-does-not-match-certificates-altnames/210780
To create a Let's Encrypt wildcard certificate, you’ll need to use the DNS-01 challenge method, which proves domain ownership by adding a specific DNS record. Here's a step-by-step guide tailored to your role as a Senior Cloud Solution Architect, incorporating both internal resources and best practices from the web:
From internal documentation like Creating wildcard certificates 1, the process typically involves:
-
Using Certbot with DNS Plugins:
- For AWS Route 53, the command might look like:
sudo certbot certonly \ --server https://acme-v02.api.letsencrypt.org/directory \ --dns-route53 \ -d "*.yourdomain.com" - This command requests a wildcard certificate for
*.yourdomain.comusing the DNS-01 challenge via Route 53.
- For AWS Route 53, the command might look like:
-
Certificate Storage:
- Certificates are stored under
/etc/letsencrypt/archive/yourdomain.com/. - You can copy them out using:
sudo cp -r /etc/letsencrypt/archive/yourdomain.com ./certs
- Certificates are stored under
-
Wildcard Scope:
- Wildcard certificates only cover one subdomain level (e.g.,
*.example.comcoversapp.example.combut notapi.dev.example.com).
- Wildcard certificates only cover one subdomain level (e.g.,
According to [DigitalOcean's tutorial](https://www.digitalocean.com/community/tutorials/how-to-create-let-s-encrypt-wildcard-certificates-with-certbot) [2](https://www.digitalocean.com/community/tutorials/how-to-create-let-s-encrypt-wildcard-certificates-with-certbot):
-
DNS Setup:
- Ensure a wildcard DNS record exists:
*.example.com. 3600 IN A 203.0.113.1
- Ensure a wildcard DNS record exists:
-
Install Certbot:
- On Ubuntu:
sudo snap install core; sudo snap refresh core sudo snap install --classic certbot sudo ln -s /snap/bin/certbot /usr/bin/certbot
- On Ubuntu:
-
Run Certbot with DNS Plugin:
- For manual DNS:
sudo certbot -d "*.example.com" --manual --preferred-challenges dns certonly
- For manual DNS:
In our case what works
sudo certbot certonly --manual --preferred-challenges dns --key-type rsa -d github.devopsabcs.com -d "*.github.devopsabcs.com"
- You’ll be prompted to add a TXT record to your DNS.

-
Automation:
- For production, automate renewals using DNS plugins or scripts (e.g.,
certbot-dns-route53,certbot-dns-cloudflare, orposh-ACMEfor PowerShell).
- For production, automate renewals using DNS plugins or scripts (e.g.,
the cert

SAN with wildcard


npm notice
npm notice package: second-repo@1.0.0
npm notice Tarball Contents
npm notice 1.2kB .github/workflows/ci.yml
npm notice 797B .github/workflows/release-package.yml
npm notice 13B README.md
npm notice 31B index.js
npm notice 450B package.json
npm notice Tarball Details
npm notice name: second-repo
npm notice version: 1.0.0
npm notice filename: second-repo-1.0.0.tgz
npm notice package size: 1.3 kB
npm notice unpacked size: 2.5 kB
npm notice shasum: b461c6fd93[8](https://github.devopsabcs.com/devopsabcs-ges/second-repo/actions/runs/23/job/36#step:5:9)b5b362c295a0700faf1f788d4a9ea
npm notice integrity: sha512-PieLJoTBExHK4[...]hkDAxKURXJ/Hw==
npm notice total files: 5
npm notice
npm notice Publishing to https://npm.github.devopsabcs.com/ with tag latest and default access
npm error code E403
npm error 403 403 Forbidden - PUT https://github.devopsabcs.com/login?return_to=https%3A%2F%2Fgithub.devopsabcs.com%2Fsecond-repo
npm error 403 In most cases, you or one of your dependencies are requesting
npm error 403 a package version that is forbidden by your security policy, or
npm error 403 on a server you do not have access to.
npm error A complete log of this run can be found in: C:\WINDOWS\ServiceProfiles\NetworkService\AppData\Local\npm-cache\_logs\2025-05-20T20_23_43_[12](https://github.devopsabcs.com/devopsabcs-ges/second-repo/actions/runs/23/job/36#step:5:13)5Z-debug-0.log
Error: Process completed with exit code 1.
0s

doc can be found here: https://docs.github.com/en/enterprise-server@3.17/admin/configuring-packages/getting-started-with-github-packages-for-your-enterprise
We have it off:

- now we
npm login --scope=@devopsabcs-ges --auth-type=legacy --registry=https://github.devopsabcs.com/_registry/npm/
dotnet nuget push .\bin\Release\dotnet-project.1.0.0.nupkg --source "github"



finally see it in azure storage

Equipped with * certificate we will check


works!!

In Azure Storage!
