Skip to content

Conversation

tariq1890
Copy link
Contributor

@tariq1890 tariq1890 commented May 16, 2019

As per the readme over here, it's recommended to use acme/autocerts.

closes #2915

@GordonTheTurtle
Copy link

Please sign your commits following these rules:
https://github.com/moby/moby/blob/master/CONTRIBUTING.md#sign-your-work
The easiest way to do this is to amend the last commit:

$ git clone -b "no_rsc" [email protected]:tariq1890/distribution.git somewhere
$ cd somewhere
$ git commit --amend -s --no-edit
$ git push -f

Amending updates the existing PR. You DO NOT need to open a new one.

@tariq1890
Copy link
Contributor Author

requesting your review @caervs

@codecov
Copy link

codecov bot commented May 16, 2019

Codecov Report

Merging #2926 into master will increase coverage by 0.01%.
The diff coverage is 0%.

Impacted file tree graph

@@            Coverage Diff             @@
##           master    #2926      +/-   ##
==========================================
+ Coverage   60.45%   60.47%   +0.01%     
==========================================
  Files         102      102              
  Lines        8001     7999       -2     
==========================================
  Hits         4837     4837              
+ Misses       2517     2515       -2     
  Partials      647      647
Flag Coverage Δ
#linux 60.47% <0%> (+0.01%) ⬆️
Impacted Files Coverage Δ
registry/registry.go 32.28% <0%> (+0.28%) ⬆️

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update 3226863...8f9c809. Read the comment docs.

@caervs
Copy link
Contributor

caervs commented May 16, 2019

@dmcgowan @thaJeztah any opinions on this vs #2915? From where I stand reducing our dependencies is always a win and as @tariq1890 points out this is recommended in the letsencrypt readme.

@tariq1890
Copy link
Contributor Author

Also want to state that this PR will lay down the path for go mod migration :). I'll have that up once this is merged.

@mrueg
Copy link

mrueg commented May 20, 2019

See also: #2530

@thaJeztah
Copy link
Member

any opinions on this vs #2915?

I'm definitely not attached to #2915 - it was just to get rid of the fork, but (as Derek commented on that PR); that code needed replacing, so if this one does the job, I'm all in favour of that.

@tariq1890
Copy link
Contributor Author

It looks like this PR is a duplicate of #2530 which was filed more than a year ago. It would be really great to see this merged. I am happy to get the PR review process going for this in case we are unable to revive the thread in #2530.

@jdolitsky
Copy link
Contributor

+1 this would be really nice to have. Currently dealing with some dependency hell related to needing to use the @dmcgowan fork of rsc.io/letsencrypt

Copy link
Contributor

@caervs caervs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM pending one e2e runthrough which I will try to get in tomorrow

@caervs caervs requested a review from manishtomar May 24, 2019 01:54
@thaJeztah
Copy link
Member

Are documentation changes needed for this change?

@tariq1890
Copy link
Contributor Author

I don't believe so. This PR intended to preserve any previous behaviour.

@tariq1890
Copy link
Contributor Author

@caervs Did the e2e tests pass for this one?

@tariq1890
Copy link
Contributor Author

Can I please get some response on this?

@caervs
Copy link
Contributor

caervs commented Jun 4, 2019

@tariq1890 yes turns out this change needs a few edits to work properly. Please:

  • Add Prompt: autocert.AcceptTOS, to the manager as it requires a prompt function
  • Set tlsConf.NextProtos = append(tlsConf.NextProtos, acme.ALPNProto) (required for verification with letsencrypt)
  • Add a note to the config docs that the ca-certificates package is required when using letsencrypt to trust the letsencrypt cert

In the meantime we really need a second review to get this in. @manishtomar ptal. Thanks.

@tariq1890 tariq1890 force-pushed the no_rsc branch 3 times, most recently from c914a20 to 745026d Compare June 4, 2019 18:49
@tariq1890
Copy link
Contributor Author

@caervs Thanks for your review comments. This is ready for another round of review.

Copy link
Contributor

@caervs caervs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perfect. Thanks.

Copy link
Contributor

@manishtomar manishtomar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code LGTM. Since I've not written this piece and never personally setup Lets Encrypt it will be nice if two things can be verified before merging this:

  • Existing cache continues to work
  • New setup works
    @caervs Do we have tests to verify this?

@caervs
Copy link
Contributor

caervs commented Jun 5, 2019

@caervs Do we have tests to verify this?

@manishtomar I have manually tested with no cache in place and restarting with existing cache. I have not tested with existing cache from letsencrypt fork carrying over into new cache, but I think that'd be overkill. Worst case the workaround is either to remove the cache or change the cache directory.

Copy link
Contributor

@manishtomar manishtomar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR @tariq1890. I just have one question about vendor version. Otherwise LGTM.

Copy link
Contributor

@manishtomar manishtomar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants