-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Certificate Not Connected? #29
Comments
Sorry, for not answering earlier. Can you please confirm, that there is a certificate in your route:
This should include the certificate and private key. Does it? |
No. It has neither. I double checked and the letsencrypt serviceaccount has been bound to the edit role. However, when I check On a separate note, I'm curious if this project truly requires 512 MiB for each container. Could I safely scale each container back to the minimum of 255 MiB? |
Hi, I am sure, it does not need 512MiB in total ;). You can surely grant it only the minimum. Regarding your route not getting updated can you please check that the letsencrypt service account can patch routes?
If this does not include the letsencrypt service account, can you double check, that you granted it in the right namespace? |
For now, I only have 1 namespace. I need to create more, but I want to get 1 working first. I did confirm that |
Is there no log entry after "Running exit_hook"? Does the pod exit ungracefully? (What does |
Nothing after "Running exit_hook". Pod is running fine. The describe is very long but essentially says that watcher, cron, and nginx are all running. |
Is there no indication of any containers having restarted?
|
Nope. I was getting that when the insecureEdgeTerminationPolicy was set to Redirect rather than Allow. At that time, the cron container kept restarting, which occasionally forced a restart of the entire pod. However, since changing the policy to Allow it all stays up and running nicely. |
Can you please rsh to the cron container, and delete contents below /var/lib/letsencrypt-container:
And see, whether it changes anything? |
Now I'm getting this when requesting the certificate: `
|
Unfortunately yes. Please do comment, Wien it works again. Alternatively you might switch to the test acme server.
|
I created a new subdomain for testing. Now I get this:
As before, attempting to access XXX.com complains because the certificate has the wrong name. |
That's an error I did not encounter before. Can you try to patch the route manually? Please don't delete the pod (so the certificate is still in the filesystem). I will write instructions Monday, if you don't know how to generate the patch and apply it manually (See common.sh for the source). |
I'm familiar with starting a new build, but that creates a new deployment/pod. So I may need to be pointed in the right direction for how to patch the pod directly. I know linux so if the patch is applied via ssh, it should be easy enough. |
Sorry, that was a little terse. I will write tomorrow if time permits, but in short, you don't have to change the deployment (or stop the running pod) at all. To add the certificate to the route, openshift-letsencrypt patches the route (see common.sh). I wanted to do that manually, so we can see explicitly what's wrong.
|
Same here. Would be glad to help out. |
It has been a busy week. I'm just getting back to this today. After reviewing common.sh, I ran common.sh then manually called I edited common.sh to echo the data parameter passed to patch_route. I then attempted to manually edit my route to add that data and received errors that spec.tls.certificate and spec.tls.key are immutable. I am using OpenShift Online Pro (not Starter) so I should be able to specify certificates. I therefore tried deleting and recreating my route using the key and certificate info from the data parameter and got this error: I notice that the data actually includes 2 certificates within the value for spec.tls.certificate. They have the line |
#26 is IMO also related to this, which makes me believe that origin 3.6 introduces an API change. I will dig deeper into this and keep you informed about any progress I make. |
Note, that I won't be able to take care of any support requests for at least a month starting tomorrow. I am sorry. |
can confirm that's related to #openshift/origin#18397. It's a right issue |
I initially had a similar issue to #21. I was able to get past that by changing the insecureEdgeTerminationPolicy from Redirect to Allow.
Now I get the following:
`watching routes with selector butter.sh/letsencrypt-managed=yes
| Processing route /oapi/v1/namespaces/XXX/routes/XXX.com with domain XXX.com.
| unable to load certificate
| 140546834421664:error:0906D06C:PEM routines:PEM_read_bio:no start line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE
| Getting new certificate for XXX.com
| Adding well-known route.
| calling dehydrated with domain name 'XXX.com'
| # INFO: Using main config file /usr/share/letsencrypt-container/config
| Using private key /etc/openshift-letsencrypt/account-key instead of account key
| Processing XXX.com
| + Signing domains...
| + Generating private key...
| + Generating signing request...
| + Requesting challenge for XXX.com...
| + Already validated!
| + Requesting certificate...
| + Checking certificate...
| + Done!
| + Creating fullchain.pem...
| Defer deploying certificate for routes.
| + Done!
| Running exit_hook
`
However, when I access https://XXX.com I still receive either an insecure website warning or a mismatched certificate notification depending on which browser I am using. What am I missing?
The text was updated successfully, but these errors were encountered: