-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Could not look up a certificate for server name 'domain' #774
Comments
Hello, We have made some improvements to the certificate part on the branch I will try to reproduce your issue on the main branch as well. |
Hey, after trying branch |
Thank you! Sounds interesting, I will take a look at it. |
Hello, |
Hello, and btw thanks for the excellent work on this project |
still happening on 0.15.3 - makes the program unusable. no rhyme or reason to it either, seems to happen randomly to different clusters upon restarting the daemon |
so, the issue is in the CertificateResolver in tls.rs. If I have a wildcard certificate for *.domain.tld, and I have say, three defined clusters with an domain.tld subdomain frontend each, for example, a.domain.tld, b.domain.tld and c.domain.tld, add_certificate will not end up associating two of the three domain names with that certificate (randomly at startup, based on whichever thread ends up calling the function first) because the add_certificate function bails out once it finds the already present fingerprint of the wildcard certificate...
This makes domain_lookup fail for those frontends. I have no clue how this design issue has gone unnoticed so far, seems like some test should have caught it |
removing that code snippet above fixes the issue and doesn't break any test. seems like it was just faulty logic that has been present since that bit of code was rewritten in a7952a1 |
Hello to you all and thanks for the precise reporting. However, the best thing would be to add an e2e test. What do you think @Wonshtrum ? |
I will note that I've observed that querying sozu for information about
certificates via the cli fails to list all domains associated (through
clusters) with a cert fingerprint. Instead it seems to just list one, not
sure if randomly or just the first one or last one (not that it matters)
…On Mon, Sep 11, 2023, 5:43 PM Emmanuel Bosquet ***@***.***> wrote:
Hello to you all and thanks for the precise reporting.
As of today's 0.15.3 version of Sōzu, removing this code doesn't seem to
affect the tests. I pushed a branch and opened this pull request: #988
<#988>
However, the best thing would be to add an e2e test. What do you think
@Wonshtrum <https://github.com/Wonshtrum> ?
—
Reply to this email directly, view it on GitHub
<#774 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AABVHKBN5TZTAHKXJNCEWFTXZ4WQJANCNFSM53OEEC6A>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
We merged the #988 pull request that removes this code snippet. It would be great for you people to test that Sōzu's behaviour works for you with subdomain certificates. About the CLI behaviour, it would be awesome if you created a new issue with the issued commands and related bugs. I am responsible for the CLI rework. |
I just installed sozu and setup my config as follows:
But when I access my domain from the browser I get the following error:
The text was updated successfully, but these errors were encountered: