Issue with renewal #22
Ładowanie…
x
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Hi,
I'm trying to renew a certificate for a wildcard domain using
This creates the certificate on the folder
live/example.com
and is all good.When we try to renew, this line
[https://git.coolaj86.com/coolaj86/greenlock.js/src/branch/master/lib/core.js#L355-L366] overwrites the
domains
array and so the renewal ends on this folderlive/*.example.com
because alt names are sorted alphabetically.Maybe the IF should be something like
so you renew the full certificate if it doesn't contain the full list.
I think the reason I originally set that up was so that if people are using
approveDomains
as an array and they aren't doing anything else to actually make the renewal work as they probably want it to, that it would "do the right thing".However, I see where that's a problem.
I'm thinking the best thing I can do is probably to remove it and update the docs and examples.
I think the worst that will happen is that some people will experience more renewals than they did previously, but I don't suspect anything would break.
What are your thoughts?
In my situation when I call the library I'm sure that for every cert there is exactly 1 domain so it's not a problem as a short term solution.
However, looking further at it, if you are trying to fix the input data to renew a full cert when the domains don't corresponds to the ones on the cert, maybe the best thing to do is to get the original settings from the renewal.conf
In this way you don't mix up folders and you are sure of what the original domains are
Well, part of the problem is that the plugin that handled
renewal.conf
just needs to die. It was based on the original python certbot client and I just haven't had enough motivation to do a rewrite.I need to write something that doesn't rely on
cert.subject
, but rather should be able to use any of thecert.altnames
to correctly relate the domains to the user account, as well as wildcards.When I do I'll create a JSON store (for small devices) and a SQL store (for ephemeral cloud systems).
So in the meantime I think this code should be removed because it makes false assumptions and "corrupts" the folder structure
I'm having the same issue. Is there a way to look up what altnames are on a previously isusued cert, compare it manually, and if it's not an exact match, clear out the old cache folder to force a reissue?
@noyearzero Yes, it's on the object in the
approveDomains
callback function.I can't get that callback to trigger. I'm using greenlock.js v2.6.7