cert-manager and Kubernetes
I'm trying to use the ACMEv2 test endpoint with cert-manager for Kubernetes (standard Helm deployment using HTTP-01 issuing). I created an issue on GitHub https://github.com/jetstack/cert-manager/issues/1375
Getting the following error:
'Failed to create new order: acme: urn:ietf:params:acme:error:malformed:
The registration request doesn''t contain terms acceptance field: termsOfServiceAgreed,
set to true'
Any input from you guys on how to correctly configure cert-manager?
Got a similar observation from at Jetstack developer on my GitHub issue: https://github.com/jetstack/cert-manager/issues/1375
He suggests that the problem may be to server differences between your implementation and the "reference" Let's Encrypt implementation.
Are you able to help us identify which properties in the challenge request that causes the problem from the server/supplier side?Reply
Got hit by this bug as well with cert-manager. Keep in mind that cert-manager is one of the most widespread ways of obtaining ACME supported certificates in an Kubernetes environment so complying to the ACME protocol in order to support all of the ACME clients is key in order to for wide spread adoption. Please fix this!Reply