-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update cloudflare record #123
base: master
Are you sure you want to change the base?
Conversation
@SN9NV sorry, but I'm just stepping in to address some probably similar issues. I have a few questions about cloudflare's API and this patch.
Thanks! |
Hi, I'ts been a while since I had this problem, and I'm just using my fork in production. I think one of the problems was if you wanted to make a cert for And, I think, a second problem was if something went wrong and the script exists mid-way validating, and a TXT record is left over, then if you try to run the script again, instead of exiting because of an error, it would make more sense to try to update the previous record. To answer your 3 questions directly:
|
@SN9NV thanks much! On Q2, I don't believe sewer will actually request duplicates... it's just that if the certificate requests both domain.tld and *.domain.tld, there will be two different challenges that need to associate with _acme-challenge.domain.tld. And it would be very odd if cloudflare didn't permit more than one TXT record per name, though the devil, as usual, is in the details. It even makes sense if they internally collect all TXT records for one name into a single value. And that might explain the lack of error when deleting - the first deletion removes the matching value but not the existence of other TXT values. Okay, this is a mess, but it's much less opaque than before. Thanks again, and I'll pester you when I get back to this. I want to get some things cleaned up and the ACME protocol updated to what LE's staging is using since last December so we can all run real integration tests. 81057, nope, all I saw were a bunch of 1xxx codes... |
@komuw Partly, but not really the hard part. #163 gets rid of Client's habit of sticking "*." back onto the domain after the ACME server has thrown it away. The trickier, and service-specific part, is how to deal with an API like route53's, where some part of the backend keys on just the domain_name and record type. "Real" DNS servers, by which I mean ones that work like good old bind's zone record files consider TXT records distinct based on the domain, type, and the text value. NB: http-01 doesn't have an issue like this, since the filenames as well as the content are unique per challenge. |
Thank you for contributing to sewer.
Every contribution to sewer is important to us.
You may not know it, but you have just contributed to making the world a more safer and secure place.
Contributor offers to license certain software (a “Contribution” or multiple
“Contributions”) to sewer, and sewer agrees to accept said Contributions,
under the terms of the MIT License.
Contributor understands and agrees that sewer shall have the irrevocable and perpetual right to make
and distribute copies of any Contribution, as well as to create and distribute collective works and
derivative works of any Contribution, under the MIT License.
Now,
What(What have you changed?)
If you get an error from Cloudflare saying that the record already exists, try to update the record before erroring.
Why(Why did you change it?)
If you have, for example,
example.com
and*.example.com
as records for your certificate, then you will get an error that the record already exists when it tries to make the record for*.example.com
.