(although I think this is obsolete now, the output:
You must not have the backports repo enabled. What is the output of: grep backports /etc/apt/sources.list.d/*
(although I think this is obsolete now, the output:
You must not have the backports repo enabled. What is the output of: grep backports /etc/apt/sources.list.d/*
You must not have the backports repo enabled.
Exactly. I didn't know about the jessie-backports repo until yesterday.
I did add a .list and therefore are now able to install backport packages.
The thing is: If I want to install certbot, it tells me it depends on python-certbot. If I want to install that, it tells me it depends on python-acme, python-cryptography and python-openssl.....
Is this an endless thing? I read somewhere that it's not advised to install too many packages from the backports, but only those necessary... therefore I would like to keep the list rather short (also I have had experiences breaking my whole system by installing a new package.. so, minimal installation seems the safe route for me).
I tried with the command apt-get install certbot -t jessie-backports, is this limiting the install to this specific package? (Is apt-get normally supposed to download dependencies with the package it should install or not? If not, I have to get to the bottom of this myself, right?)
Is this an endless thing? I read somewhere that it's not advised to install too many packages from the backports, but only those necessary... therefore I would like to keep the list rather short (also I have had experiences breaking my whole system by installing a new package.. so, minimal installation seems the safe route for me).
Nope, it isn't endless and this is why omv-extras pins the proper packages (see here). If you want letsencrypt, there is no way around it with jessie/OMV 3.x. Most of the time, installing python packages (not python itself) from backports is minimal risk. Make a backup before doing this though...
I tried with the command apt-get install certbot -t jessie-backports, is this limiting the install to this specific package? (Is apt-get normally supposed to download dependencies with the package it should install or not? If not, I have to get to the bottom of this myself, right?)
Once the backports repo is enabled, do an apt clean from the web interface and you should be able to install the plugin from the web interface.
Display MoreHey there,
I just found out that my OMV does not generate the certificate for a second given domain.
In the plugin section I defined: "a.mydomain.com,b.mydomain.com" (without quotes) as domains.
After Pressing "Generate Certificates" I only receive a.mydomain.com in my "live" folder from LetsEncrypt.
Do you know this issue?
Best regards
Benedikt
I've got exactly he same issue. read above. Really wants a second certifite for my second domain. More people?
Once the backports repo is enabled, do an apt clean from the web interface and you should be able to install the plugin from the web interface.
I am not sure if it is... is adding the deb for the backports as a .list all I have to do to enable the repo?
because I added it to the omv-extra.list and the install from the plugin web interface still gives me the same error after the apt clean.
is adding the deb for the backports as a .list all I have to do to enable the repo?
and then run apt-get update.
because I added it to the omv-extra.list and the install from the plugin web interface still gives me the same error after the apt clean.
That file gets overwritten whenever you doing anything in omv-extras. Put it in its own file. I still don't understand why you don't have the backports file since OMV 3 started adding it.
Put it in its own file.
Did that, but then it didn't work so I thought I might have to put it somewhere else for testing.
But putting it back in its own .list file hasn't changed a lot, neither works in the GUI, nor in a terminal.
You must have a conflict with another package already being installed then. What is the output of:
so, this is what I get:
# apt-get install python3-msgpack certbot python-acme python-certbot python-cffi python-cffi-backend \
> python-chardet python-configargparse python-configobj python-cryptography python-dialog python-enum34 \
Is there anything you see in here that can help me?
I guess I didn't realize this was an armhf system. That usually makes things a pain in the ass since they don't always have the same packages as i386/amd64 (especially in backports). What is the output of:
apt-cache policy python-cffi python-cffi-backend python python-cryptography python-openssl
If things don't look right in that output, you may have to wait until you can put omv 4.x on the system.
I guess I didn't realize this was an armhf system. That usually makes things a pain in the ass since they don't always have the same packages as i386/amd64 (especially in backports).
Sorry, I should have clarified the armhf thing. The output of the policy check is:
I hope I don't have to wait for OMV 4.x ... is there another way to get SSL working on an armhf system?
So.... I googled around a bit and found out that apparently some dependencies are not available as needed in jessie-backports.
I found them in the stretch repo and installed them seperately from the rest:
after that I used that command you gave me (without those 3 packages I installed from stretch already):
You must have a conflict with another package already being installed then. What is the output of:
and after all that went quite well, I tried installing the plugin from the webGUI and that worked as well (although it gave out about a hundred errors in the end, after telling me the following:)
And now the plugin is there and it seems to work, but I have to get up early tomorrow and will probably test all the functionality tomorrow afternoon (and see if it broke anything else on the way...)
good night!
So, it seems to have worked. Everything works properly for the moment. =)
by the way, can enybody change the pluginconfiguration for a 4096 RSA key?
here are a link for the issue on github:
https://github.com/OpenMediaVa…ault-letsencrypt/issues/4
by the way, can enybody change the pluginconfiguration for a 4096 RSA key?
I commented on your issue.
My letsencrypt-cert checks for monthly renewal, but the job says no
renewal is needed, even 5 days before cert will expire. I receive Email
from letsencrypt saying I have to check my cert.
When I push a creation of a new cert manually, a new cert is created,
but it does not replace the old one, it will be placed as second cer which I have to asign manually to nginx.
(I use my cert with nginx for nextcloud)
How can I resolve this issue?
My letsencrypt-cert checks for monthly renewal, but the job says no
renewal is needed, even 5 days before cert will expire. I receive Email
from letsencrypt saying I have to check my cert.
To start, a lot has changed in this plugin and was tested (not by me since I don't use it). If the plugin is doing something wrong, someone needs to help me make changes.
When I push a creation of a new cert manually, a new cert is created,
but it does not replace the old one, it will be placed as second cer which I have to asign manually to nginx.
I think this is the proper way to do it. You shouldn't have to generate new certs very often, should you?
How can I resolve this issue?
Pull requests on github would be best.
Display MoreMy letsencrypt-cert checks for monthly renewal, but the job says no
renewal is needed, even 5 days before cert will expire. I receive Email
from letsencrypt saying I have to check my cert.
When I push a creation of a new cert manually, a new cert is created,
but it does not replace the old one, it will be placed as second cer which I have to asign manually to nginx.
(I use my cert with nginx for nextcloud)
How can I resolve this issue?
Do you have your OMV web UI configured to force all connections via SSL? I had this same problem with the plugin, but temporarily disabling the "force SSL" setting worked around this.
I'm having an issue with this plugin:
2017-10-17 11:11:47,766:DEBUG:certbot.main:Arguments: ['--webroot', '-w', '/var/www/openmediavault/', '--text', '--keep-until-expiring', '--agree-tos', '--expand', '--email', 'master@ricardoamaral.net', '-d', 'atlasbox.amaral.home']
2017-10-17 11:11:47,766:DEBUG:certbot.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2017-10-17 11:11:47,799:DEBUG:certbot.plugins.selection:Requested authenticator webroot and installer None
2017-10-17 11:11:47,807:DEBUG:certbot.plugins.selection:Selected authenticator <certbot.plugins.webroot.Authenticator object at 0x2af7350> and installer None
2017-10-17 11:11:47,807:INFO:certbot.plugins.selection:Plugins selected: Authenticator webroot, Installer None
2017-10-17 11:11:47,813:DEBUG:certbot.main:Picked account: <Account(RegistrationResource(body=Registration(status=None, contact=(u'mailto:master@ricardoamaral.net',), agreement=u'https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf', key=JWKRSA(key=<ComparableRSAKey(<cryptography.hazmat.backends.openssl.rsa._RSAPublicKey object at 0x30baed0>)>)), uri=u'https://acme-v01.api.letsencrypt.org/acme/reg/22845338', new_authzr_uri=u'https://acme-v01.api.letsencrypt.org/acme/new-authz', terms_of_service=u'https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf'), 9757e0b49273b37eb1130015d5afafb4, Meta(creation_host=u'ATLASBOX.AMARAL.HOME', creation_dt=datetime.datetime(2017, 10, 17, 11, 5, 37, tzinfo=<UTC>)))>
2017-10-17 11:11:47,814:DEBUG:acme.client:Sending GET request to https://acme-v01.api.letsencrypt.org/directory.
2017-10-17 11:11:47,823:DEBUG:requests.packages.urllib3.connectionpool:Starting new HTTPS connection (1): acme-v01.api.letsencrypt.org
2017-10-17 11:11:48,242:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 561
2017-10-17 11:11:48,247:DEBUG:acme.client:Sending HEAD request to https://acme-v01.api.letsencrypt.org/acme/new-authz.
2017-10-17 11:11:48,452:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "HEAD /acme/new-authz HTTP/1.1" 405 0
2017-10-17 11:11:48,455:DEBUG:acme.client:Storing nonce: tF3PBL3gB_8BGGo1F7KFmuGjd_NSH1thMjj8OVvM3Xs
2017-10-17 11:11:48,468:DEBUG:acme.client:Sending POST request to https://acme-v01.api.letsencrypt.org/acme/new-authz:
"protected": "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",
"payload": "ewogICJpZGVudGlmaWVyIjogewogICAgInR5cGUiOiAiZG5zIiwgCiAgICAidmFsdWUiOiAiYXRsYXNib3guYW1hcmFsLmhvbWUiCiAgfSwgCiAgInJlc291cmNlIjogIm5ldy1hdXRoeiIKfQ",
"signature": "l8nM-XERjZwxN2JDcyusFgYwG4Vy59Fv4KLylmD61J5c8d_5CMrpwgMvRPKqx-ApTpBF7T9UdWQKEUgBc1ybi40yGwLqZUsPsomMr2IaM8qroOjaMUt8d1G_LVqqzXrX4NPkLrf0hgZ9ioj7EieF8EEV210f7qFQ7JH3bYg1IYGnEqGTXjPRyPD57v6KSOCz8y2HMvjzlLdsK6C9CdAsXao_iUj6uCHBrlqDzthNwb6HoN0FEUj1avspCkG1SyH3KX4RA0VJSFHrkMOzy9qXAZ8u0-FfJvQTvLVvqf3osRB1r1K0DN0a8Mq24Kf5cF30mQhB_9E6J6wGhJtgl9RxCw"
2017-10-17 11:11:48,708:DEBUG:requests.packages.urllib3.connectionpool:https://acme-v01.api.letsencrypt.org:443 "POST /acme/new-authz HTTP/1.1" 400 137
2017-10-17 11:11:48,711:DEBUG:acme.client:Storing nonce: 8qG8BzX5fSIsYp5_yan6JkqO-Sfl9tMsIjEXh9wCQW8
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/certbot/main.py", line 861, in main
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/certbot/main.py", line 786, in certonly
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/certbot/main.py", line 85, in _get_and_save_cert
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/certbot/client.py", line 357, in obtain_and_enroll_certificate
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/certbot/client.py", line 318, in obtain_certificate
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/certbot/auth_handler.py", line 66, in get_authorizations
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/acme/client.py", line 212, in request_domain_challenges
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/acme/client.py", line 191, in request_challenges
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/acme/client.py", line 682, in post
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/acme/client.py", line 695, in _post_once
File "/opt/eff.org/certbot/venv/local/lib/python2.7/site-packages/acme/client.py", line 582, in _check_response
Is the "home" suffix somehow not recognized/allowed? Why? Or is this a different issue?
QuoteDo you have your OMV web UI configured to force all connections via SSL?
No I don't, since I do not use the cert for my Weblogin but for Nextcloud. So does not bring me any further. Same setting within nginx: No ForceSSL
Other suggestions?
Don’t have an account yet? Register yourself now and be a part of our community!