The generated cert works well for arbitrary server names including the »obvious« https://www.goik.sdi.hdm-stuttgart.cloud. However I'd like to add zone apex support for https://goik.sdi.hdm-stuttgart.cloud as well:
$ terraform apply
...
acme_certificate.certificate: Creating...
acme_certificate.certificate: Still creating... [10s elapsed]
...
acme_certificate.certificate: Still creating... [1m30s elapsed]
╷
│ Error: error creating certificate: error: one or more domains had a problem:
│ [*.goik.sdi.hdm-stuttgart.cloud] propagation: time limit exceeded: last error: NS ns1.goik.sdi.hdm-stuttgart.cloud. did not return the expected TXT record [fqdn: _acme-challenge.goik.sdi.hdm-stuttgart.cloud., value: jHdDGst_5S_ne4MzJz0uusRmcvFFKif5zOb7QPeoN_k]: OlOLUcYzCo-BIfb6a0odfAiIlpCPnpIcvnii7b_KogM
Last line's ending shows two expected TXT challenge values jHdDGst_5S_ne4MzJz0uusRmcvFFKif5zOb7QPeoN_k and OlOLUcYzCo-BIfb6a0odfAiIlpCPnpIcvnii7b_KogM. However the Bind 9 DNS server's log during this very terraform execution reveals:
Jun 14 11:57:16 sdiservice named[27800]: client @0x7f4b64c99f68 217.245.243.187#51557/key goik.key: updating zone 'goik.sdi.hdm-stuttgart.cloud/IN': deleting rrset at '_acme-challenge.goik.sdi.hdm-stuttgart.cloud' TXT
Jun 14 11:57:16 sdiservice named[27800]: client @0x7f4b64c99f68 217.245.243.187#51557/key goik.key: updating zone 'goik.sdi.hdm-stuttgart.cloud/IN': adding an RR at '_acme-challenge.goik.sdi.hdm-stuttgart.cloud' TXT "jHdDGst_5S_ne4MzJz0uusRmcvFFKif5zOb7QPeoN_k"
Jun 14 11:57:16 sdiservice named[27800]: client @0x7f4b64c99f68 217.245.243.187#59117/key goik.key: updating zone 'goik.sdi.hdm-stuttgart.cloud/IN': deleting rrset at '_acme-challenge.goik.sdi.hdm-stuttgart.cloud' TXT
Jun 14 11:57:16 sdiservice named[27800]: client @0x7f4b64c99f68 217.245.243.187#59117/key goik.key: updating zone 'goik.sdi.hdm-stuttgart.cloud/IN': adding an RR at '_acme-challenge.goik.sdi.hdm-stuttgart.cloud' TXT "OlOLUcYzCo-BIfb6a0odfAiIlpCPnpIcvnii7b_KogM"
Thus the first token jHdDGst_5S_ne4MzJz0uusRmcvFFKif5zOb7QPeoN_k is being destroyed instantly after creation. Only the second token survives:
On contrary without subject_alternative_names the DNS server's log shows just one challenge txt value. This is then being deleted after successful cert creation as expected.
Following acme_certificate I'm creating a wildcard cert for a zone
goik.sdi.hdm-stuttgart.cloud
:The generated cert works well for arbitrary server names including the »obvious«
https://www.goik.sdi.hdm-stuttgart.cloud
. However I'd like to add zone apex support forhttps://goik.sdi.hdm-stuttgart.cloud
as well:This fails:
Last line's ending shows two expected TXT challenge values
jHdDGst_5S_ne4MzJz0uusRmcvFFKif5zOb7QPeoN_k
andOlOLUcYzCo-BIfb6a0odfAiIlpCPnpIcvnii7b_KogM
. However the Bind 9 DNS server's log during this very terraform execution reveals:Thus the first token
jHdDGst_5S_ne4MzJz0uusRmcvFFKif5zOb7QPeoN_k
is being destroyed instantly after creation. Only the second token survives:On contrary without
subject_alternative_names
the DNS server's log shows just one challenge txt value. This is then being deleted after successful cert creation as expected.