-
Notifications
You must be signed in to change notification settings - Fork 122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Role does not request second certificated. #30
Comments
Hrm that is problematic. I'm open to suggestions for how people would fix. I'm super busy right now and can't think of a terribly non-dumb way to go about it, but I suspect if it was thought through it would be pretty easy. |
IMHO it is ok to let the user handle this, e.g. by adding a |
I can think of two ways:
It may make sense to start with 1. as an easy fix and look into doing 2. |
Interesting related certbot issue: certbot/certbot#3396 I have started to write an override mechanism with |
@thefinn93, maybe would be better to execute certbot for each domain separately? Something like this: - include: get_cert.yml
with_items: "{{ letsencrypt_cert_domains }}" It also step closer to usage separate webroot path for each domain, it will handy for shared hosting servers. I can create PR's if you don't see disadvantages of this way. |
I see a major disadvantage: Let's Encrypt's rate limits are based on the number of certificates issued, not the number of domains in the SAN. Doing a cert per FQDN, depending on the number of FQDNs needed, that could eat up the rate limit pretty easily. That being said, I could see an argument for defining some sort of data structure to describe how the certs should be, then having the role ensure it matches that structure. Something like: certs:
- domains:
- example.org
- www.example.org
webroot: /var/www/html/
- domains:
- anotherdomain.org
- www.anotherdomain.org
- anothersubdomain.anotherdomain.org
- whatever.net
webroot: /var/www/anotherdomain I would be open to a PR that allows this level of flexibility. |
If you use this role for creating a second certificate after creating the first, it does not work.
It does not work because after the creating of the first, ansible doesnt rul the command again:
The command is right, but its condition is not.
Here is the command:
/usr/local/share/letsencrypt/env/bin/letsencrypt --agree-tos --text -d domain1.com -d domain2.com --email [email protected] --expand -a webroot --webroot-path /opt/letsencrypt_webroot certonly
But as it only verify for the first domain, the command get skipped.
Is there any work around it? Or it will get fixed?
Thanks
The text was updated successfully, but these errors were encountered: