-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Update force-ssl.conf to allow for letsencrypt directories over http #2038
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Conversation
Since we have moved force-ssl.conf into the server section, it overrides the location based letsencrypt allowed over http - Make force-ssl only work if both http traffic and outside the letsencrypt directories.
This is an automated message from CI: Docker Image for build 1 is available on DockerHub as Note: ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes. |
Not the best candidate to test this since I'm using a DNS based wildcard so letsencrypt not hitting Nginx. However, I'm not seeing issues for http->https on my domains. And curl to the /.well-known/acme-challenge/1234 gives the expected 404 rather than 301 redirect and I have made no changes so have both old and new style config with force-ssl.conf in both server section and location / section. |
Just a bump, we are blocking renews. |
Another bump. I have the same problem and have to manually unforce ssl and then renew the ssl certificate. |
@jc21 I appreciate you're looking hard at 3.0, but please take a look at this pr, this is blocking renewals of newly created proxies (from those made after the force_ssl.conf move to server section) which isn't a good look for us to have in the version 2 branch. |
Bumping this, renewals are still broken as far as I can tell. |
Bump, why is this not priority, I can only assume that nobody maintains this anymore |
@maltokyo all I would ask is if you can move to using the docker image mentioned in comment 2 here. That has the fix and it would be good to see some confirmation here. You must remember to move back to :latest when this project starts moving again so you don't get stuck on an old version. |
Thank you @the1ts - I am on the latest version, so hesitate to move back to a version from May. Can I apply the fix myself, build and test this way? |
@maltokyo latest is from March, so older than the fixed one in this PR. |
Ah apologies! Will try this, thank you @the1ts |
@the1ts do I need to worry about the warning: "Note: ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes" I dont see db changes in this PR itself, but just wanted to check. Backing up will take some time for me. |
@maltokyo the only changes are to nginx file creation not DB. So change the docker tag and try and get npm to make a change to the nginx files by perhaps turning off and on the force SSL. Then renewal should be back working next time it's needed. |
ok, running it now, will leave for some time and see what happens. Unfortunately, next renewals are on 1st Jan, so might need to wait. |
@the1ts @jc21 OK I tried the version in (I did have an issue at first where I was getting an internal error but clearing the certbot lock files as per this post did the trick!) |
Great to see a new release out but would be great if this PR could be merged in so I could pick up those updates too :) |
It's really a pain right now to manually renew all certificates that have "force ssl" enabled. That's a key function of nginx proxy manager and I am considering to unuse it just because of that bug... I have 15 domains and to update all manually is a real pain! That bug is existing since a year @jc21 |
As a fix seems to be available now...when will this be added to the official release? Thank you very much. :) |
@the1ts - I have been running the version specified as above, and my certificates expire on Jan 1st 2023, and have NOT been auto-updated while running this version. They should have been by now, correct? If that is the case, I suppose this fix is not working out. |
Sorry @maltokyo I don't use NPM anymore as its not really been supported for most of a year, but I would check out issue #918 others have seen issues with lock files being left behind that stop certbot from actually running even after this fix for force ssl. You can force an update in the UI and look at both certbot logs and NPM for more info. |
IMHO the regexp in the commit needs additional escaping:
Also an alternative implementation of force-ssl.conf could be:
|
thanks @the1ts - what do you use now? maybe time to switch, cant be chasing basic stuff like this for months and months. |
Docker Image for build 7 is available on DockerHub as Note: ensure you backup your NPM instance before testing this PR image! Especially if this PR contains database changes. |
Any chance this PR could be rebased onto the current version? |
Sorry, but I need to say my enthusiasm for NPM... |
1 similar comment
I switched, to linuxserver/swag - have not looked back. The fact that this basic stuff does not get fixed/merged was too much. |
PR is now considered stale. If you want to keep it open, please comment 👍 |
Comment to keep it op. |
@github-actions PR #3121 still needs merged to resolve this. |
Since we have moved force-ssl.conf into the server section, it overrides the location based letsencrypt allowed over http