-
-
Notifications
You must be signed in to change notification settings - Fork 354
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
allow certificates to be expanded #117
Conversation
Had to fix some smaller fixes the check marked, like a conditional being |
The implementation seems great for me: it uses the Certbot CLI to get the current state (list of domains), and compare it to the intended state. Maybe one culprit: if they are multiple certificates, I'm not sure the Example n°1: one certificate The
With the string parsing
which is perfect. Example n°2: multiple certificates The
With the string parsing
which doesn't give the expected result. For this case, we could:
|
Yes, that is why I'm using the I think using your options is not a viable solution, as changing the order would result in this script trying to generate new certs, even though they are the same, see example below
and
would be regarded as different, even though they're the same... |
This pull request has been marked 'stale' due to lack of recent activity. If there is no further activity, the PR will be closed in another 30 days. Thank you for your contribution! Please read this blog post to see the reasons why I mark pull requests as stale. |
This pull request has been closed due to inactivity. If you feel this is in error, please reopen the pull request or file a new PR with the relevant details. |
@geerlingguy such a pitty IMHO that this was not merged. Would have been very useful to me multiple times already. |
You could just patch it locally and use it. That's what I'm doing. |
Is there any reason why this PR was not applied? |
In terms of the first change (addition of |
Hi @geerlingguy , thanks for your answer and thanks for your roles, they are very useful! :-) |
After being a bit disappointed that I can't append to certs with this role, I thought why not try to fix it myself.
This is the solution I came up with. It should fix multiple open issues, such as #113 and #43 (which is stale). PR #50 already proposed a solution which was rejected by @geerlingguy with the reason "I don't generally like to pollute managed directories with files to track state, and that's what this seems to be doing (maintaining a list of domains in a file in the letsencrypt directories)."
This PR works without creating any files and uses only certbot, grep and awk.
Short summary of how it works:
Tested on a NixOS host running
ansible 2.9.9
and a debian 10 client.Potential issue: This PR does not check for domains that were removed from the cert. I'm sure this is not a problem, as the function is not present anyway.