New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Traefik v2 format #34
Comments
for now, the dumper is not compatible with the v2 |
Looking forward to see dumper being v2 compatible. |
As a quick hack / workaround someone could use following one-liners to extract lets encrypt (wildcard) certificate and it's key from acme.json
|
because I currently cannot be bothered to look into the go code, heres a quick script while this is beeing fixed:
Produces:
|
The main difference is a new level on top - referencing which of (possibly many) certificate resolvers the certificates were issued by. For example, I have There is also a |
Fixed in the version v2.5.3 |
just tested latest v2.5.3 - still following segvault occurs?! Can anybody confirm segvault?
|
https://github.com/ldez/traefik-certs-dumper/blob/master/docs/traefik-certs-dumper_file.md#options You have to use |
or your acme.json file doesn't have any |
I made a change to allow to dump file even if the file is altered (no Note: Traefik always create the |
@ldez: Thanks! --version v2 option worked 👍 |
Hi, first of all thanks for your work and that you are sharing it. I have tried it but I cannot get it to work on my server. I'm using traefik v2.0 and the docker image ldez/traefik-certs-dumper:latest with the following command:
I'm getting the following log after the acme.json changed:
If I check the output folders they are empty. It would be kind if someone could give me a hint what I'm doing wrong. Best regards |
@rezor92 could you open another issue, thanks. |
sure? that would'n create a proper cert ( |
I'm running a small stack with traefik (v2.0b1) configured to request a wildcard cert. traefik-certs-dumper is then asked to extract these certs. However, this segfaults.
I have run this same setup without a wildcard cert, which runs just fine, so I suspect it has to do with the naming of the certs. I saw that #20 fixes this for windows, but not for linux.
The segfault in question:
Looking at #20, it would probably make sense to have the same logic apply to both windows and linux to begin with, as this now introduces different behavior depending on what type of host you are running on... it should likely also fix this issue.
The text was updated successfully, but these errors were encountered: