-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
KeyError: 'newAccount' when attempting to generate ACME certificate #126
Comments
First of all, removing the whole PKI realm directory is a good way to reset the realm, role will not modify an existing realm. You cannot modify a signed certificate anyhow, so deleting the whole directory and letting The errors you see are due to the I would suggest that you switch to the monorepo version of DebOps, it already has numerous bugs fixed (check the Changelog) and should work mostly the same with DebOps for WordPress. Switching to the monorepo should be easy - uninstall the current |
Brilliant, thanks. After updating the pip package (it was already up to date) then running Thanks for your reply. FWIW I can confirm that this issue is fixed in latest monorepo. |
Glad to know ti works for you. :-) DebOps is updated pretty frequently, you might want to keep an eye on the repository. I plan to release a new version in a few days, it should finally have the proper support for playbooks and roles in the Python package, so there will be a way to have a stable version. |
FYI, the content of this repo seems to be different than then content on the debops/debops repo. |
@xeroc Yes, the code from various DebOps repositories was merged some time ago to make development and project management easier. Since Ansible Galaxy team is planning to introduce support for multiple roles in a single repository, I'm waiting for them to do so before messing with the old role repositories to allow existing users to continue using the old versions. Switching to the monorepo is however preferred if you want to get the latest updates. |
I love debops and I even saw ACME work once, but I have to say it is super hard to get it working. I've never had this kind of difficulty with other letsencrypt tools or ansible roles.
I've tried to piece it together from the official docs, the debops-wordpress project and a few issues documented here, but I'm really not having much joy.
I'm currently stuck on this error, in
/etc/pki/realms/mydomain.com/acme/error.log
So apparently it is failing when it attempts to send the signed CSR request to letsencrypt. I can't tell much more than that by looking at the code.
Is there any way to get more verbose output to actually see what the problem is? I assume there is something wrong with my CSR request, but really not sure where to look next.
This is in my host inventory (though I've tried a bunch of other permutations, with and without www, with and without subdomain settings):
In
group_vars/all
I have(Note this is a different domain than the website domain I'm trying to get working.)
Then I have an nginx site (which is working great otherwise)
The DNS for the root and www domain resolve correctly to the IP address of the host. The fqdn of the host (gamma.mycompany.com) is not the same as the website (and is on a different domain, if that makes a difference).
The internal certificate is working correctly, and is used when viewing the site in https. Obviously this generates warnings due to the untrusted CA.
Basically my approach is to try something, then delete
/etc/pki/realms/mydomain.com
on the managed host (and sometimes need to delete/ansible/secret/pki/realms/by-host/gamma.mycompany.com/mydomain.com
on the controller host) then try something else and run again - is there a more graceful way (or other things I need to delete before a new run)?The only time I've had ACME work was when I finally got the configuration right, and then started from scratch on a new server. So I suspect maybe I'm just not cleaning up enough debris from my trial and error.
At this point I'm thinking it may be best to disable debops.pki and try a different tool for managing letsencrypt certificates. But I would love to get this working. Apparently it is possible.
What am I doing wrong / or where should I be looking to get more insight?
The text was updated successfully, but these errors were encountered: