Visit GCP's Compute Engine and start configuring an instance with the following:
Also allow both HTTP and HTTPS traffic to the instance
Create the instance. When it comes up, note its
external IP address. You will be using this address in subsequent steps.
Our guestbook web site requires a name so we don't have to remember the
external IP address to access it. To do so, visit a free DNS registration service and register a name containing
cs430-<OdinID> on the VM's external IP address (e.g.
cs430-wuchang-gcp). Example services include
Note that if you get a rate-limit error on Let's Encrypt via one service, you will need to use the alternate ones. This is a result of Let's Encrypt being abused by malicious actors to create web sites with valid certificates that look legitimate. (This, of course, won't be an issue with our janky web application)
(Note: omit the dash since it is not allowed).
Some services allow you to specify a name that includes an IP address that it resolves to. If you have difficulty with the sites above, then use names from the following xip-based sites.
We will now set up our guestbook web site on the Compute Engine VM and use the name from the prior step to obtain a TLS certificate.
If you are using a Compute Engine VM,
ssh into it from the Web UI
Clone the repository and change into the source directory
git clone https://github.com/wu4f/cs430-src cd cs430-src/03_nginx_uwsgi_certbot
If you have gone through the EC2 version, skip to the next section. We will now examine the code and configuration of our application.
Examine the file
app.ini. This file configures the entry point for the Python application, sets the number of processes to use for it, and specifies the domain socket that will be used by the
nginx web server to communicate with the web application.
wsgi.py. The file is called upon initialization of
uwsgi and simply Imports the app from
app.py and runs it.
The repository contains template files for configuring the server and
nginx to run the Guestbook code. These templates will generate corresponding files in
/etc, the directory where Linux configuration files are stored. The first template is
systemd is the default service manager for Ubuntu 18.04. The file configures the startup of the
uwsgi daemon and its environment. Uwsgi is executed using the app.ini configuration from the previous step. In addition, the working directory is set to
PROJECT_DIR, which will be replaced on installation with your directory. The
PATH environment variable is set to the location where the Python environment's binaries will eventually be installed via a subsequent
The other template is
etc/nginx.template which configures nginx with the server's DNS name (setup from the prior step) and the path to the root directory for the server. It also specifies that requests to the top-level path (
/) should go through the uwsgi socket and be handled by the Python application while requests to the
/static path should be served directly by nginx from the specified directory.
The script used to setup the site is
The script takes one parameter: the DNS name you set-up earlier (e.g.
The script begins by pulling out first part of the DNS name (e.g.
cs430-wuchang) and eliminating the first period and all subsequent characters. The name is used to label the
systemd service for the site.
Then, the script installs
certbot. It then creates the
virtualenv environment for the web application and installs its packages into it from
Then, the script sets up
systemd startup file for
uwsgi from its template using
sed to replace the
PROJECT_DIR with the current working directory (
PROJECT_USER with the current user (
$SUDO_USER). It will then name the systemd service using the
$SITE label above.
The script then sets up the
nginx configuration file from its template using
sed. Similar substitutions are made as well as a substitution for
PROJECT_HOST using the fully-qualified domain name (FQDN) of the site (registered earlier). It also sets up nginx to add the site (via adding config file to
/etc/nginx/sites-available and a link in
/etc/nginx/sites-enabled to it)
The script changes ownership to allow
www-data account) to create the domain socket
It then starts
systemd service for the site, enables it by default (on startup), and restarts
nginx for changes to take hold.
Finally, the script calls
certbot to obtain the TLS certificate in non-interactive mode (see TLS slides on Let's Encrypt)
Run the install script to configure your VM and obtain a certificate.
sudo ./install.sh <YourDNSNameHere>
Bring the site up in a browser and note it's valid certificate. Add an entry to the guestbook, then show a screenshot of the site along with its Let's Encrypt certificate.
Go to the web console of Compute Engine, find the VM in "VM instances" and select Delete. When prompted, confirm that you would like to delete the VM.