-
Notifications
You must be signed in to change notification settings - Fork 98
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: certificate issues #289
Conversation
f9d834d
to
9955110
Compare
1363274
to
82ac755
Compare
7de3015
to
9608d0d
Compare
Thanks @alejandroEsc! It looks like I'm seeing a root certificate being generated even if I specify This is causing a failed Certificate to be generated that is looking for an Issuer called
|
I'm now able to get TLS working with Let's Encrypt and a custom domain 🎉 thanks @alejandroEsc ! This isn't a blocker, but I still get this disused root Certificate being created: #289 (comment) |
5ec2c95
to
172e15f
Compare
What I am seeing is what I was hoping not to see, so we may have to change a few things about certs but when i compute the values file from what you are doing, and even when i use my own values file, i get the following:
This is why the default cert is created. Ill investigate this a bit further. |
This is a breaking change and I think it's still broken if someone uses a different issuer for the admin cert. We need to find a way to test this with different issuers. |
0f542c6
to
921a441
Compare
6c737c8
to
f50d23d
Compare
f50d23d
to
1bfcfd4
Compare
1bfcfd4
to
0cda002
Compare
Closing this PR. This will fix the issues we see when trying to use certs meant for external clients internally. |
Here I am fixing a few issues I have found so far that may be causing @JakeSCahill from being able to properly create a certificate with ACME.
Part of #203