R
Runtipi8mo ago
Otar

DNS challenge and wildcard certificates

Expected behavior, generate only one wildcard cert for all apps, but instead runtipi still generates a single cert per app. Traefik .yml api: dashboard: true insecure: true providers: docker: endpoint: "unix:///var/run/docker.sock" watch: true exposedByDefault: false file: directory: /etc/traefik/dynamic watch: true entryPoints: web: address: ":80" http: redirections: entryPoint: to: websecure websecure: address: ":443" http: tls: certResolver: myresolver domains: - main: xxxx.duckdns.org sans: - *.xxxx.duckdns.org certificatesResolvers: myresolver: acme: email: xxxxxxx storage: /shared/acme.json dnsChallenge: provider: duckdns log: level: ERROR acme.json { "myresolver": { "Account": { "Email": "xxxx", "Registration": { "body": { "status": "valid", "contact": [ "mailto:xxxx" ] }, "uri": "https://acme-v02.api.letsencrypt.org/acme/acct/1920811146" }, "PrivateKey": "MIIJJwIBAAKCAgEAuO6tmc0tUn5ipSoQtNeq2AkAudkMMUKjIazmdCENdL> "KeyType": "4096" }, "Certificates": [ { "domain": { "main": "xxxx.duckdns.org" }, "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUY3akNDQk5hZ0F3S> "key": "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlKS1FJQkFBS0NBZ0V> "Store": "default" }, { "domain": { "main": "doozle.xxxx.duckdns.org" }, "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUYvRENDQk9TZ0F3S> "key": "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlKS2dJQkFBS0NBZ0V> "Store": "default" } } ] } }
41 Replies
Otar
OtarOP8mo ago
also tipi-compose.yml at user-config for the token services: runtipi-reverse-proxy: ports: - 8080:8080 environment: DUCKDNS_TOKEN: xxxxxxxx-xxxxxx-xxxxxx-xxxxxx-xxxxxxxxxx ls ok, i found the problem and the solution, but some parser in the script wont let me apply it you guys are declaring it like this on the docker-compose and it generates a cert for each domain traefik.http.routers.dashboard-secure.rule: Host(${DOMAIN}) && PathPrefix(/`) traefik.http.routers.dashboard-secure.service: dashboard traefik.http.routers.dashboard-secure.entrypoints: websecure traefik.http.routers.dashboard-secure.tls.certresolver: myresolver to generate a wildcard we need this in the compose traefik.http.routers.dashboard-secure.tls.domains[0].main: example.com traefik.http.routers.dashboard-secure.tls.domains[0].sans: *.example.com but some parser expects alphanumeric only and wont let me add *.domain
Gabriel Murk
Gabriel Murk8mo ago
Hi, I tried to replicate but I couldn't. My acme always returns null in the certificate
Gabriel Murk
Gabriel Murk8mo ago
This is how to format your text code on discord
No description
Gabriel Murk
Gabriel Murk8mo ago
#acme.json
{
"myresolver": {
"Account": {
"Email": "[email protected]",
"Registration": {
"body": {
"status": "valid",
"contact": [
]
},
"uri": "https://acme-v02.api.letsencrypt.org/acme/acct/1923463986"
},
"PrivateKey": "MIIJKAIBAAKCAgEAt...",
"KeyType": "4096"
},
"Certificates": null
}
}
{
"myresolver": {
"Account": {
"Email": "[email protected]",
"Registration": {
"body": {
"status": "valid",
"contact": [
]
},
"uri": "https://acme-v02.api.letsencrypt.org/acme/acct/1923463986"
},
"PrivateKey": "MIIJKAIBAAKCAgEAt...",
"KeyType": "4096"
},
"Certificates": null
}
}
#Traefik.yml
api:
dashboard: true
insecure: true

providers:
docker:
endpoint: "unix:///var/run/docker.sock"
watch: true
exposedByDefault: false
file:
directory: /etc/traefik/dynamic
watch: true

entryPoints:
web:
address: ":80"
http:
redirections:
entryPoint:
to: websecure
websecure:
address: ":443"
http:
tls:
certResolver: myresolver
domains:
- main: xxxx.duckdns.org
sans:
- "*.xxxx.duckdns.org"

certificatesResolvers:
myresolver:
acme:
storage: /shared/acme.json
dnsChallenge:
provider: duckdns

log:
level: ERROR
api:
dashboard: true
insecure: true

providers:
docker:
endpoint: "unix:///var/run/docker.sock"
watch: true
exposedByDefault: false
file:
directory: /etc/traefik/dynamic
watch: true

entryPoints:
web:
address: ":80"
http:
redirections:
entryPoint:
to: websecure
websecure:
address: ":443"
http:
tls:
certResolver: myresolver
domains:
- main: xxxx.duckdns.org
sans:
- "*.xxxx.duckdns.org"

certificatesResolvers:
myresolver:
acme:
storage: /shared/acme.json
dnsChallenge:
provider: duckdns

log:
level: ERROR
Otar
OtarOP8mo ago
acme.json will be auto populated i just pasted here to show that the certificates are not the same what you are missing is the custom tipi-compose.yml where you declare the duckdns token
Gabriel Murk
Gabriel Murk8mo ago
Yes, but my show null on certificates... Can you show your certificate on browser?
Gabriel Murk
Gabriel Murk8mo ago
That was my
No description
Otar
OtarOP8mo ago
did you persist your traefik config?
Gabriel Murk
Gabriel Murk8mo ago
yep My tipi-compose now is this:
services:
runtipi-reverse-proxy:
environment:
DUCKDNS_TOKEN: /root/runtipi/user-config/segredos/duckdns_api_token
DUCKDNS_HTTP_TIMEOUT: 30
DUCKDNS_POLLING_INTERVAL: 30
DUCKDNS_PROPAGATION_TIMEOUT: 180
DUCKDNS_SEQUENCE_INTERVAL: 30
DUCKDNS_TTL: 120
secrets:
- duckdns_api_token

secrets:
duckdns_api_token:
file: /root/runtipi/user-config/segredos/duckdns_api_token.txt
services:
runtipi-reverse-proxy:
environment:
DUCKDNS_TOKEN: /root/runtipi/user-config/segredos/duckdns_api_token
DUCKDNS_HTTP_TIMEOUT: 30
DUCKDNS_POLLING_INTERVAL: 30
DUCKDNS_PROPAGATION_TIMEOUT: 180
DUCKDNS_SEQUENCE_INTERVAL: 30
DUCKDNS_TTL: 120
secrets:
- duckdns_api_token

secrets:
duckdns_api_token:
file: /root/runtipi/user-config/segredos/duckdns_api_token.txt
your current ip on duckdns is your local ip?
Otar
OtarOP8mo ago
im using a redirect on adguard to my ip yes
Gabriel Murk
Gabriel Murk8mo ago
I'm talking about this configuration
Otar
OtarOP8mo ago
also yes, im running a duckdns container to update it
Gabriel Murk
Gabriel Murk8mo ago
I'm trying to make it work only locally
Gabriel Murk
Gabriel Murk8mo ago
Then I set the ip to my local tipi like 192.168.1.140
No description
Otar
OtarOP8mo ago
you have to set to your external ip, it will only work local if you dont open the ports anyway
Gabriel Murk
Gabriel Murk8mo ago
I'm on cgnat
Otar
OtarOP8mo ago
and when your dns redirects to you, it stays local too well, all i did for it to work was add the token to tipi-compose and change the traekif to dns challenge you did both, maybe delete the certs dir? let it re-create them
Gabriel Murk
Gabriel Murk8mo ago
Does your certificate appear to have been created by let's encrypt?
Otar
OtarOP8mo ago
yes
Otar
OtarOP8mo ago
No description
Gabriel Murk
Gabriel Murk8mo ago
Nice
Otar
OtarOP8mo ago
remove the ones you have at traefik/tls see if it create new ones and correct ones this time
Gabriel Murk
Gabriel Murk8mo ago
He give to you only the xxxx.duckdns.org not the *.xxxx.duckdns.org?
Otar
OtarOP8mo ago
the reason i created this help is because it creates application.xxxx.duckdns.org one for each app not a wildcard
Gabriel Murk
Gabriel Murk8mo ago
In the dashboard, did you define the domain name?
Otar
OtarOP8mo ago
yes, xxxx.duckdns.org
Gabriel Murk
Gabriel Murk8mo ago
My traefik.yml was like that:
api:
dashboard: true
insecure: true

providers:
docker:
endpoint: 'unix:///var/run/docker.sock'
watch: true
exposedByDefault: false
file:
directory: /etc/traefik/dynamic
watch: true

entryPoints:
web:
address: ':80'
websecure:
address: ':443'

certificatesResolvers:
myresolver:
acme:
caServer: 'https://acme-staging-v02.api.letsencrypt.org/directory' #staging
#caServer: 'https://acme-v02.api.letsencrypt.org/directory' #produção
email: '[email protected]' # Needed for Let's Encrypt
storage: /shared/acme.json
dnsChallenge:
provider: duckdns
delayBeforeCheck: '0'
resolvers: # Needed in case of you use an internal resolver in your network and have custom
- '1.1.1.1:53'
- '8.8.8.8:53'

log:
level: INFO
api:
dashboard: true
insecure: true

providers:
docker:
endpoint: 'unix:///var/run/docker.sock'
watch: true
exposedByDefault: false
file:
directory: /etc/traefik/dynamic
watch: true

entryPoints:
web:
address: ':80'
websecure:
address: ':443'

certificatesResolvers:
myresolver:
acme:
caServer: 'https://acme-staging-v02.api.letsencrypt.org/directory' #staging
#caServer: 'https://acme-v02.api.letsencrypt.org/directory' #produção
email: '[email protected]' # Needed for Let's Encrypt
storage: /shared/acme.json
dnsChallenge:
provider: duckdns
delayBeforeCheck: '0'
resolvers: # Needed in case of you use an internal resolver in your network and have custom
- '1.1.1.1:53'
- '8.8.8.8:53'

log:
level: INFO
Otar
OtarOP8mo ago
i didnt even use the optionals, just provider: duckdns same at the tipi-compose, no optional jus the token maybe since you are hiding the token behind the root dir, runtipi don`t have access and cant load it? i know its a better security practice, but try on clear text just to see if it works
Gabriel Murk
Gabriel Murk8mo ago
try this one
Otar
OtarOP8mo ago
and the extar declarations on entrypoints i use are not needed also, yours is cleaner
Gabriel Murk
Gabriel Murk8mo ago
I have already tried all these alternatives. I believe it is related to the IP defined in DuckDNS. As I saw a video that worked like this, set the local ip on duckdns, I tried to reproduce it in runtipi.
Gabriel Murk
Gabriel Murk8mo ago
Perkelator
YouTube
HomeLab SSL certificates for FREE with minimal effort
In this video we use Nginx Proxy Manager, DuckDNS , Let's Encrypt and our HomeLab to setup SSL certificates. We use DuckDNS to avoid the cost of a domain making this free of cost and all of the software using is FOSS. We use Docker to keep thing simple and it is mostly just copy and paste from official documentation. DuckDNS: ( https://www.duck...
Otar
OtarOP8mo ago
so you tried the token in clear text instead of a secrets file and didnt work either?
Gabriel Murk
Gabriel Murk8mo ago
Yes, I tried
Otar
OtarOP8mo ago
the only option you have is to buy a domain and use cloudflare tunnel i guess
Gabriel Murk
Gabriel Murk8mo ago
I did this once, but I'm still going to test it with this video tutorial. I believe it will work. In the case of traefik, there may be some configuration that is missing. But this is a virtual test machine that I have. I'll create another one from scratch and try again
Otar
OtarOP8mo ago
maybe if your cgnat have an ipv6 address or an open port your config is correct, the only missing link is the ip on duckdns
Gabriel Murk
Gabriel Murk8mo ago
Which Linux base do you use to install runtipi?
Otar
OtarOP8mo ago
ubuntu 24.04 the proxmox is on debian 12 im telling you 100% is your cgnat, you have to ask your operator for an ipv6 address or some port open for you to use
Gabriel Murk
Gabriel Murk8mo ago
I'll take a look at that. Thank you very much for the help.
Otar
OtarOP8mo ago
since the idea of Tipi is to run a cert per app, im closing this, i give up on a wildcard cert for the domian.

Did you find this page helpful?