Replies: 8 comments 14 replies
-
|
Hi, The container checks for the presence of both the certificate and key file in I’ll think about how to make this behavior more flexible, but as a quick workaround I suggest creating two dummy files with the correct names and placing them in Best, |
Beta Was this translation helpful? Give feedback.
-
|
Ok let me try to replicate your issue. Can i use the above compose-file as guidance or did you change it meanwhile? |
Beta Was this translation helpful? Give feedback.
-
|
I was able to work around the entry‑point script checks by doing the following:
For reference, here is my configuration:
services:
acme-srv:
image: grindsa/acme2certifier:0.41-nginx-wsgi
secrets:
- source: acme2certifier_cert.pem
target: /etc/ssl/certs/acme2certifier_cert.pem
- source: acme2certifier_key.pem
target: /etc/ssl/private/acme2certifier_key.pem
volumes:
- type: volume
source: main_volume
target: /var/www/acme2certifier/volume/
- type: volume
source: sites_volume
target: /etc/nginx/sites-enabled
ports:
- "22280:80"
- "22443:443"
restart: always
networks:
default:
name: acme
external: true
secrets:
acme2certifier_cert.pem:
file: ./acme2certifier_cert.pem
acme2certifier_key.pem:
file: ./acme2certifier_key.pem
volumes: # Define the named volume at the top level
main_volume:
driver: local # Optional, default is local
sites_volume:
driver: local
# zone with 10mb memory which is 160k/s - 5requests per client per second
limit_req_zone $binary_remote_addr zone=ip:10m rate=5r/s;
server {
listen 80 default_server;
listen [::]:80 default_server;
# first 5 requests go trough instantly 5more requests evey 100ms
limit_req zone=ip burst=10; # delay=5;
server_name _;
location = favicon.ico { access_log off; log_not_found off; }
location / {
include uwsgi_params;
uwsgi_pass unix:/run/uwsgi/acme.sock;
if ($request_method = "HEAD" ) {
add_header Content-length 0;
# add_header Transfer-Encoding identity;
}
}
}
Please give a try on your site and let me know if it works for you. /G. |
Beta Was this translation helpful? Give feedback.
-
|
I set it up with a local bind. |
Beta Was this translation helpful? Give feedback.
-
|
After setting it up locally with local mount it seemed to work. Kind regard, |
Beta Was this translation helpful? Give feedback.
-
|
Tests with traeffik is part of our regular regression. It runs smoothly since months with the this configuration. Are you getting any error messages in the a2c log-file? |
Beta Was this translation helpful? Give feedback.
-
|
After long research and tests I figured out it won't work on Windows CA. |
Beta Was this translation helpful? Give feedback.
-
|
Hi, just out of curiosity. Can you explain why? /G. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hello grindsa,
how is it going?
I tried to set up your image :0.41-nginx-wsgi on our onprem docker swarm cluster and got stuck here:
I wanna put the cert and private key into another folder, because having it under volume and mounted on a CIFS will be accessible for to many people. I changed the paths under '/etc/nginx/sites-available/acme_srv_ssl.conf' and _'/var/www/acme2certifier/examples/nginx/nginx_acme_srv_ssl.conf', but it doesn't work. what am I missing?
Here is also my compose-file:
acme:
image: nexus.corp.itsroot.biz:9880/grindsa/acme2certifier:0.41-nginx-wsgi
ports:
- "22280:80"
- "22443:443"
environment:
- ENV_HOST=${PKI_HOST}
- ENV_USER=${PKI_USER}
- ENV_PASSWORD=${PKI_PASSWORD}
secrets:
- source: autocertcity_pki_chain.pem
target: /etc/ssl/certs/ca_bundle.pem
- source: autocertcity_cert.pem
target: /etc/ssl/certs/acme2certifier_cert.pem
- source: autocertcity_key.pem
target: /etc/ssl/private/acme2certifier_key.pem
volumes:
- type: volume
source: main_volume
target: /var/www/acme2certifier/volume
- type: volume
source: nginx_volume
target: /var/www/acme2certifier/examples/nginx
- type: volume
source: sites_volume
target: /etc/nginx/sites-available
deploy:
mode: global
placement:
constraints:
- node.role == worker
and my acme_srv.cfg:
[DEFAULT]
debug: True
[Nonce]
nonce_check_disable: False
[CAhandler]
handler_file: /var/www/acme2certifier/examples/ca_handler/mscertsrv_ca_handler.py
host_variable: ENV_HOST
user_variable: ENV_USER
password_variable: ENV_PASSWORD
ca_bundle: /etc/ssl/certs/ca_bundle.pem
verify: true
auth_method: "ntlm"
template: "..."
[DBhandler]
[Certificate]
revocation_reason_check_disable: False
[Challenge]
challenge_validation_disable: False
[Order]
tnauthlist_support: False
allowed_domainlist: ["..."]
Thanks for your help and have a good one.
Kind regards
Beta Was this translation helpful? Give feedback.
All reactions