1
0
Fork 0

cert-manager: Switch to acme-dns

Using the local name server as the authoritative server for ACME
challenge records turned out to be quite problematic.  For some reason,
both Google and Cloudflare kept returning SERVFAIL responses for the
*_acme-challenge* TXT queries.  I suspect this may have had something to
do with how BIND was configured to be the authoritative server for the
*o-ak4p9kqlmt5uuc.com* while also being a recusive resolver for clients
on the local network.

Using *acme-dns.io* resolves these issues, but it does bring a few of
its own.  Notably, each unique domain and subdomain must have its own
set of credentials (specified in the `acme-dns.json`) file.  This makes
adding new certificates rather cumbersome.
dch-webhooks-secrets
Dustin 2023-04-24 22:22:52 -05:00
parent 7a27855e51
commit a507fe1090
3 changed files with 13 additions and 7 deletions

View File

@ -1,3 +1,4 @@
acme-dns.json
cert-exporter.pem cert-exporter.pem
cert-manager.key cert-manager.key
zerossl.secret zerossl.secret

View File

@ -17,10 +17,8 @@ spec:
solvers: solvers:
- dns01: - dns01:
cnameStrategy: Follow cnameStrategy: Follow
rfc2136: acmeDNS:
nameserver: 172.30.0.1 host: https://auth.acme-dns.io/
tsigKeyName: cert-manager accountSecretRef:
tsigAlgorithm: HMACSHA512 name: acme-dns
tsigSecretSecretRef: key: acme-dns.json
name: cert-manager-tsig
key: cert-manager.key

View File

@ -28,3 +28,10 @@ secretGenerator:
- cert-exporter.pem - cert-exporter.pem
options: options:
disableNameSuffixHash: true disableNameSuffixHash: true
- name: acme-dns
namespace: cert-manager
files:
- acme-dns.json
options:
disableNameSuffixHash: true