-
Notifications
You must be signed in to change notification settings - Fork 70
Ensure Container is available at Domain Name before proceeding to Let's Encrypt Checks #19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Come to think of it, even better if you could guard against the issue. Before starting the Let's Encrypt process:
The second check needs to be optional as it's theoretically possible that the container won't be able to initiate outbound connections. |
If the server can't make an outbound connection, it might not be able to check a DNS name either. I think both of these are very rare -- I just try to anticipate the worst case. |
im having a similar issue! and hitting lets encrypt rate limits without wanting to |
To further refine my suggestion, this thread says Lets Encrypt uses Google's DNS servers and this thread says they don't cache the requests.
|
…eding to let's encrypt verification (see issue DanielDent#19)
…eding to let's encrypt verification (to avoid rate limits, see issue DanielDent#19). Note that `dns-servers` flag would be ideal but is not available.
Uh oh!
There was an error while loading. Please reload this page.
Your image is perfect for Amazon's Elastic Container Service (ECS) because it requires no local bindings/files. Unfortunately, it's hard to provision a static IP on ECS unless you use (and pay for) a load balancer.
I don't need/want to pay for a load balancer so I must manually update my DNS (+time to propagate) each time I deploy a new container. As a result, I'm running afoul of Let's Encrypt's rate limits, specifically a Failed Validation limit of 5 failures per account, per hostname, per hour.
Given that hard cap, I'd like to suggest adjusting the retry interval to something like minute 0, 1, 5, 15, (and every 15 minutes after that i.e. 30, 45, 60, 75). In theory, min 45 (and probably 60) will rate limit, but this provides a simple rule-of-thumb that is otherwise rate-friendly.EDIT: Per the discussion in #23, the long-term goal is to simulate the acme check:
PR #23 (merged) is a first step in this direction, providing a simple check that a server (but not necessarily this one) responds with 200 to a call to the domain name. This issue has been left open to track potential improvements.
The text was updated successfully, but these errors were encountered: