Open RetributionByRevenue opened 4 weeks ago
for example something like in the config would be a pretty intuitive way to do this i think:
# Global ACME settings. Unless specified, ACME is disabled. [experimental.acme] dir_url = "https://localhost:14000/dir" # optional. default is "https://acme-v02.api.letsencrypt.org/directory" enable_http-challenge_falback = true email = "test@example.com" registry_path = "./acme_registry"
because the create you are already using supports this type of challenge already
Hi @RetributionByRevenue
Sorry for my delayed reply. Thank you for your proposal and relevant information.
I think falling back to HTTP-01 sounds maybe reasonable, I did never faced such a situation although. Honestly I did not get convinced that TLS-ALPN-01 is insufficient and rpxy
should handle a kind of misconfiguration of docker.
I also think that it is a bit tricky to be integrated with the current mechanism. So we should carefully consider how the internal component of rpxy
should be if we decide to append this brand-new feature that might be a braking change.
In a scenario where you are trying to renew a new certificate or failing the TLS-ALPN-01 challenge for the first time (human error in config, networking in docker container non-standard, etc), it would be nice and advantageous in production environments fall back on HTTP-01 Challenge.
TLS-ALPN-01 challenge is different from the HTTP-01 challenge in the way it verifies domain ownership. While both challenges are part of the ACME (Automatic Certificate Management Environment) protocol, they work in distinct ways:
I'm a big fan. this project saved my ass and surprisingly works on an old Alpine linux server.