augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:

I ran this command: sudo certbot --apache

It produced this output:

Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator None, Installer apache
Deploying certificate
Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
Enabling site /etc/httpd/conf/httpd-le-ssl.conf by adding Include to root configuration
Successfully deployed certificate for imber.ceotr.ca to /etc/httpd/conf/httpd-le-ssl.conf
Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
Successfully deployed certificate for imber.info to /etc/httpd/conf/httpd-le-ssl.conf
Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
Successfully deployed certificate for oldimber.ceotr.ca to /etc/httpd/conf/httpd-le-ssl.conf
Could not install certificate
An unexpected error occurred:
augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression
Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.l og or re-run Certbot with -v for more details.

My web server is (include version):

The operating system my web server runs on is (include version):CentOS Linux release 8.4.2105

My hosting provider, if applicable, is: n/a

I can login to a root shell on my machine (yes or no, or I don't know): yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel): no

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):certbot 1.16.0

Could you please share the log at /var/log/letsencrypt/letsencrypt.log and also the contents of /etc/httpd/conf/httpd.conf ?

@RTowse, I think you've found a previously-unkonwn Certbot bug, so if you can share the information @Osiris asked for, you may be able to help get it fixed!

2 Likes
[root@III ~]#  cat  /etc/httpd/conf/httpd.conf
#
# This is the main Apache HTTP server configuration file.  It contains the
# configuration directives that give the server its instructions.
# See <URL:http://httpd.apache.org/docs/2.4/> for detailed information.
# In particular, see
# <URL:http://httpd.apache.org/docs/2.4/mod/directives.html>
# for a discussion of each configuration directive.
#
# See the httpd.conf(5) man page for more information on this configuration,
# and httpd.service(8) on using and configuring the httpd service.
#
# Do NOT simply read the instructions in here without understanding
# what they do.  They're here only as hints or reminders.  If you are unsure
# consult the online docs. You have been warned.
#
# Configuration and logfile names: If the filenames you specify for many
# of the server's control files begin with "/" (or "drive:/" for Win32), the
# server will use that explicit path.  If the filenames do *not* begin
# with "/", the value of ServerRoot is prepended -- so 'log/access_log'
# with ServerRoot set to '/www' will be interpreted by the
# server as '/www/log/access_log', where as '/log/access_log' will be
# interpreted as '/log/access_log'.

#
# ServerRoot: The top of the directory tree under which the server's
# configuration, error, and log files are kept.
#
# Do not add a slash at the end of the directory path.  If you point
# ServerRoot at a non-local disk, be sure to specify a local disk on the
# Mutex directive, if file-based mutexes are used.  If you wish to share the
# same ServerRoot for multiple httpd daemons, you will need to change at
# least PidFile.
#
ServerRoot "/etc/httpd"

#
# Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, instead of the default. See also the <VirtualHost>
# directive.
#
# Change this to Listen on specific IP addresses as shown below to
# prevent Apache from glomming onto all bound IP addresses.
#
#Listen 
Listen 80

#
# Dynamic Shared Object (DSO) Support
#
# To be able to use the functionality of a module which was built as a DSO you
# have to place corresponding `LoadModule' lines at this location so the
# directives contained in it are actually available _before_ they are used.
# Statically compiled modules (those listed by `httpd -l') do not need
# to be loaded here.
#
# Example:
# LoadModule foo_module modules/mod_foo.so
#
Include conf.modules.d/*.conf

#
# If you wish httpd to run as a different user or group, you must run
# httpd as root initially and it will switch.
#
# User/Group: The name (or #number) of the user/group to run httpd as.
# It is usually good practice to create a dedicated user and group for
# running httpd, as with most system services.
#
User apache
Group apache

# 'Main' server configuration
#
# The directives in this section set up the values used by the 'main'
# server, which responds to any requests that aren't handled by a
# <VirtualHost> definition.  These values also provide defaults for
# any <VirtualHost> containers you may define later in the file.
#
# All of these directives may appear inside <VirtualHost> containers,
# in which case these default settings will be overridden for the
# virtual host being defined.
#

#
# ServerAdmin: Your address, where problems with the server should be
# e-mailed.  This address appears on some server-generated pages, such
# as error documents.  e.g. admin@your-domain.com
#
ServerAdmin root@localhost

#
# ServerName gives the name and port that the server uses to identify itself.
# This can often be determined automatically, but we recommend you specify
# it explicitly to prevent problems during startup.
#
# If your host doesn't have a registered DNS name, enter its IP address here.
#
#ServerName www.example.com:80

#
# Deny access to the entirety of your server's filesystem. You must
# explicitly permit access to web content directories in other
# <Directory> blocks below.
#
<Directory />
    AllowOverride none
    Require all denied
</Directory>

#
# Note that from this point forward you must specifically allow
# particular features to be enabled - so if something's not working as
# you might expect, make sure that you have specifically enabled it
# below.
#

#
# DocumentRoot: The directory out of which you will serve your
# documents. By default, all requests are taken from this directory, but
# symbolic links and aliases may be used to point to other locations.
#
DocumentRoot "/var/www/html"

#
# Relax access to content within /var/www.
#
<Directory "/var/www">
    AllowOverride None
    # Allow open access:
    Require all granted
</Directory>

# Further relax access to the default document root:
<Directory "/var/www/html">
    #
    # Possible values for the Options directive are "None", "All",
    # or any combination of:
    #   Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews
    #
    # Note that "MultiViews" must be named *explicitly* --- "Options All"
    # doesn't give it to you.
    #
    # The Options directive is both complicated and important.  Please see
    # http://httpd.apache.org/docs/2.4/mod/core.html#options
    # for more information.
    #
    Options Indexes FollowSymLinks

    #
    # AllowOverride controls what directives may be placed in .htaccess files.
    # It can be "All", "None", or any combination of the keywords:
    #   Options FileInfo AuthConfig Limit
    #
    AllowOverride All

    #
    # Controls who can get stuff from this server.
    #
    Require all granted
</Directory>

#
# DirectoryIndex: sets the file that Apache will serve if a directory
# is requested.
#
<IfModule dir_module>
    DirectoryIndex index.html
</IfModule>

#
# The following lines prevent .htaccess and .htpasswd files from being
# viewed by Web clients.
#
<Files ".ht*">
    Require all denied
</Files>

#
# ErrorLog: The location of the error log file.
# If you do not specify an ErrorLog directive within a <VirtualHost>
# container, error messages relating to that virtual host will be
# logged here.  If you *do* define an error logfile for a <VirtualHost>
# container, that host's errors will be logged there and not here.
#
ErrorLog "logs/error_log"

#
# LogLevel: Control the number of messages logged to the error_log.
# Possible values include: debug, info, notice, warn, error, crit,
# alert, emerg.
#
LogLevel warn

<IfModule log_config_module>
    #
    # The following directives define some format nicknames for use with
    # a CustomLog directive (see below).
    #
    LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
    LogFormat "%h %l %u %t \"%r\" %>s %b" common

    <IfModule logio_module>
      # You need to enable mod_logio.c to use %I and %O
      LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
    </IfModule>

    #
    # The location and format of the access logfile (Common Logfile Format).
    # If you do not define any access logfiles within a <VirtualHost>
    # container, they will be logged here.  Contrariwise, if you *do*
    # define per-<VirtualHost> access logfiles, transactions will be
    # logged therein and *not* in this file.
    #
    #CustomLog "logs/access_log" common

    #
    # If you prefer a logfile with access, agent, and referer information
    # (Combined Logfile Format) you can use the following directive.
    #
    CustomLog "logs/access_log" combined
</IfModule>

<IfModule alias_module>
    #
    # Redirect: Allows you to tell clients about documents that used to
    # exist in your server's namespace, but do not anymore. The client
    # will make a new request for the document at its new location.
    # Example:
    # Redirect permanent /foo http://www.example.com/bar

    #
    # Alias: Maps web paths into filesystem paths and is used to
    # access content that does not live under the DocumentRoot.
    # Example:
    # Alias /webpath /full/filesystem/path
    #
    # If you include a trailing / on /webpath then the server will
    # require it to be present in the URL.  You will also likely
    # need to provide a <Directory> section to allow access to
    # the filesystem path.

    #
    # ScriptAlias: This controls which directories contain server scripts.
    # ScriptAliases are essentially the same as Aliases, except that
    # documents in the target directory are treated as applications and
    # run by the server when requested rather than as documents sent to the
    # client.  The same rules about trailing "/" apply to ScriptAlias
    # directives as to Alias.
    #
    ScriptAlias /cgi-bin/ "/var/www/cgi-bin/"

</IfModule>

#
# "/var/www/cgi-bin" should be changed to whatever your ScriptAliased
# CGI directory exists, if you have that configured.
#
<Directory "/var/www/cgi-bin">
    AllowOverride None
    Options None
    Require all granted
</Directory>

<IfModule mime_module>
    #
    # TypesConfig points to the file containing the list of mappings from
    # filename extension to MIME-type.
    #
    TypesConfig /etc/mime.types

    #
    # AddType allows you to add to or override the MIME configuration
    # file specified in TypesConfig for specific file types.
    #
    #AddType application/x-gzip .tgz
    #
    # AddEncoding allows you to have certain browsers uncompress
    # information on the fly. Note: Not all browsers support this.
    #
    #AddEncoding x-compress .Z
    #AddEncoding x-gzip .gz .tgz
    #
    # If the AddEncoding directives above are commented-out, then you
    # probably should define those extensions to indicate media types:
    #
    AddType application/x-compress .Z
    AddType application/x-gzip .gz .tgz

    #
    # AddHandler allows you to map certain file extensions to "handlers":
    # actions unrelated to filetype. These can be either built into the server
    # or added with the Action directive (see below)
    #
    # To use CGI scripts outside of ScriptAliased directories:
    # (You will also need to add "ExecCGI" to the "Options" directive.)
    #
    #AddHandler cgi-script .cgi

    # For type maps (negotiated resources):
    #AddHandler type-map var

    #
    # Filters allow you to process content before it is sent to the client.
    #
    # To parse .shtml files for server-side includes (SSI):
    # (You will also need to add "Includes" to the "Options" directive.)
    #
    AddType text/html .shtml
    AddOutputFilter INCLUDES .shtml
</IfModule>

#
# Specify a default charset for all content served; this enables
# interpretation of all content as UTF-8 by default.  To use the
# default browser choice (ISO-8859-1), or to allow the META tags
# in HTML content to override this choice, comment out this
# directive:
#
AddDefaultCharset UTF-8

<IfModule mime_magic_module>
    #
    # The mod_mime_magic module allows the server to use various hints from the
    # contents of the file itself to determine its type.  The MIMEMagicFile
    # directive tells the module where the hint definitions are located.
    #
    MIMEMagicFile conf/magic
</IfModule>

#
# Customizable error responses come in three flavors:
# 1) plain text 2) local redirects 3) external redirects
#
# Some examples:
#ErrorDocument 500 "The server made a boo boo."
#ErrorDocument 404 /missing.html
#ErrorDocument 404 "/cgi-bin/missing_handler.pl"
#ErrorDocument 402 http://www.example.com/subscription_info.html
#

#
# EnableMMAP and EnableSendfile: On systems that support it,
# memory-mapping or the sendfile syscall may be used to deliver
# files.  This usually improves server performance, but must
# be turned off when serving from networked-mounted
# filesystems or if support for these functions is otherwise
# broken on your system.
# Defaults if commented: EnableMMAP On, EnableSendfile Off
#
#EnableMMAP off
EnableSendfile on

# Supplemental configuration
#
# Load config files in the "/etc/httpd/conf.d" directory, if any.
IncludeOptional conf.d/*.conf

<VirtualHost *:80>
    DocumentRoot /var/www/old_site/III.info/
    ServerName oldzzz
</VirtualHost>

<VirtualHost *:80>
    DocumentRoot /var/www/html
    ServerName zzz
    ServerAlias III.info www.III.info III.ca
</VirtualHost>
[root@III ~]#
[root@ZZZ ~]# cat  /var/log/letsencrypt/letsencrypt.log
2021-06-07 10:24:11,745:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:certbot version: 1.16.0
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/1201/bin/certbot
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:Arguments: ['--apache', '-v', '--preconfigured-renewal']
2021-06-07 10:24:12,032:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2021-06-07 10:24:12,045:DEBUG:certbot._internal.log:Root logging level set at 20
2021-06-07 10:24:12,046:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2021-06-07 10:24:12,192:DEBUG:certbot_apache._internal.configurator:Apache version is 2.4.37
2021-06-07 10:24:12,581:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * apache
Description: Apache Web Server plugin
Interfaces: IAuthenticator, IInstaller, IPlugin
Entry point: apache = certbot_apache._internal.entrypoint:ENTRYPOINT
Initialized: <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7efcf7282f10>
Prep: True
2021-06-07 10:24:12,582:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7efcf7282f10> and installer <certbot_apache._internal.override_centos.CentOSConfigurator object at 0x7efcf7282f10>
2021-06-07 10:24:12,582:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator apache, Installer apache
2021-06-07 10:24:12,590:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/125950347', new_authzr_uri=None, terms_of_service=None), 0af083edb8a9f184c91586879d3ce54a, Meta(creation_dt=datetime.datetime(2021, 6, 4, 12, 52, 9, tzinfo=<UTC>), creation_host='ZZZ.OOOO.ca', register_to_eff=None))>
2021-06-07 10:24:12,591:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2021-06-07 10:24:12,593:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2021-06-07 10:24:12,871:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 658
2021-06-07 10:24:12,872:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:12 GMT
Content-Type: application/json
Content-Length: 658
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "j5b8VYx95js": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2021-06-07 10:24:16,593:DEBUG:certbot._internal.plugins.selection:Requested authenticator apache and installer apache
2021-06-07 10:24:21,199:DEBUG:certbot.display.util:Notifying user: Renewing an existing certificate for ZZZ.CCCC.ca and 4 more domains
2021-06-07 10:24:21,305:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0003_key-certbot.pem
2021-06-07 10:24:21,307:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0003_csr-certbot.pem
2021-06-07 10:24:21,307:DEBUG:acme.client:Requesting fresh nonce
2021-06-07 10:24:21,307:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2021-06-07 10:24:21,367:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2021-06-07 10:24:21,368:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 010s
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2021-06-07 10:24:21,368:DEBUG:acme.client:Storing nonce: 0104N1h1ZHMcdQdB4h87PbAubo9ULm-y5uonp_crr-qWens
2021-06-07 10:24:21,368:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ZZZ.CCCC.ca"\n    },\n    {\n      "type": "dns",\n      "value": "oldZZZ.CCCC.ca"\n    },\n    {\n      "type": "dns",\n      "value": "ZZZ.OOOO.ca"\n    },\n    {\n      "type": "dns",\n      "value": "ZZZ.info"\n    },\n    {\n      "type": "dns",\n      "value": "www.ZZZ.info"\n    }\n  ]\n}'
2021-06-07 10:24:21,370:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eydQ",
  "signature": "yZn7wOwA",
  "payload": "ewo"
}
2021-06-07 10:24:21,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 884
2021-06-07 10:24:21,476:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 884
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/125950347/10234344673
Replay-Nonce: 0103GDhFDcAjjSgy1k2snXZC9Uu6hqLz8pkL2Mslt0tnqFc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2021-06-14T13:24:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ZZZ.CCCC.ca"
    },
    {
      "type": "dns",
      "value": "ZZZ.info"
    },
    {
      "type": "dns",
      "value": "ZZZ.OOOO.ca"
    },
    {
      "type": "dns",
      "value": "oldZZZ.CCCC.ca"
    },
    {
      "type": "dns",
      "value": "www.ZZZ.info"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113505",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113511",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113512",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113514",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/125950347/10234344673"
}
2021-06-07 10:24:21,476:DEBUG:acme.client:Storing nonce: 010c
2021-06-07 10:24:21,476:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113505:
{
  "protected": "ey9",
  "signature": "UgB5BQ",
  "payload": ""
}
2021-06-07 10:24:21,541:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113505 HTTP/1.1" 200 758
2021-06-07 10:24:21,542:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0104Jc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ZZZ.CCCC.ca"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113505/3XdMfg",
      "token": "Mh25AA",
      "validationRecord": [
        {
          "url": "http://ZZZ.CCCC.ca/.well-known/acme-challenge/Mh25ZnHmDCNwjQnbrgHbJJuwvjc1r5330SeGpaguoAA",
          "hostname": "ZZZ.CCCC.ca",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:21,542:DEBUG:acme.client:Storing nonce: 0104AJc
2021-06-07 10:24:21,542:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,544:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113511:
{
  "protected": "eVy",
  "signature": "oEREw",
  "payload": ""
}
2021-06-07 10:24:21,607:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113511 HTTP/1.1" 200 746
2021-06-07 10:24:21,607:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 010
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ZZZ.info"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113511/2UDmDQ",
      "token": "w",
      "validationRecord": [
        {
          "url": "http://ZZZ.info/.well-known/acme-challenge/HGDO",
          "hostname": "ZZZ.info",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:21,607:DEBUG:acme.client:Storing nonce: 0103roKS4oszKGTyz43ro1moSkJYMlYtFWNJg7Lla1h7m3w
2021-06-07 10:24:21,608:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,609:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113512:
{
  "protected": "eyJ9",
  "signature": "vBMtjQ",
  "payload": ""
}
2021-06-07 10:24:21,671:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113512 HTTP/1.1" 200 767
2021-06-07 10:24:21,672:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 767
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 018
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "oldZZZ.CCCC.ca"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113512/bRLu5w",
      "token": "cre4",
      "validationRecord": [
        {
          "url": "http://oldZZZ.CCCC.ca/.well-known/acme-challenge/crSgshI3BN6e3xOf-RdnxRGrZGnnk3aHW1LCPJVLHe4",
          "hostname": "oldZZZ.CCCC.ca",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:21,672:DEBUG:acme.client:Storing nonce: 0103yoXvYQDEu0nIxY64Fdz84P3v5fKLOEyGzEvuCeJ3048
2021-06-07 10:24:21,673:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,674:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113514:
{
  "protected": "ee",
  "signature": "YjPw",
  "payload": ""
}
2021-06-07 10:24:21,736:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113514 HTTP/1.1" 200 758
2021-06-07 10:24:21,736:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "www.ZZZ.info"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113514/Bbh-OQ",
      "token": "9ncc",
      "validationRecord": [
        {
          "url": "http://www.ZZZ.info/.well-known/acme-challenge/9nc-tpgvHKverKw0o5xJQzKvQplHfgRJNRTwWIeorBc",
          "hostname": "www.ZZZ.info",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:21,737:DEBUG:acme.client:Storing nonce: 0103DlGwt_C3-vVQRJ1KKIBbTR7vq8aYZ1itcyOJLZuZ8_8
2021-06-07 10:24:21,737:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:21,738:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009:
{
  "protected": "e",
  "signature": "yg",
  "payload": ""
}
2021-06-07 10:24:21,803:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13783812009 HTTP/1.1" 200 799
2021-06-07 10:24:21,803:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:21 GMT
Content-Type: application/json
Content-Length: 799
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 01035HE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ZZZ.OOOO.ca"
  },
  "status": "pending",
  "expires": "2021-06-14T13:24:21Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw",
      "token": "lrfRQ"
    },
    {
      "type": "dns-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/Mb7z4g",
      "token": "lrfRQ"
    },
    {
      "type": "tls-alpn-01",
      "status": "pending",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/RCv9Bg",
      "token": "lrfRQ"
    }
  ]
}
2021-06-07 10:24:21,803:DEBUG:acme.client:Storing nonce: 010sHE
2021-06-07 10:24:21,804:INFO:certbot._internal.auth_handler:Performing the following challenges:
2021-06-07 10:24:21,804:INFO:certbot._internal.auth_handler:http-01 challenge for ZZZ.OOOO.ca
2021-06-07 10:24:21,808:DEBUG:certbot_apache._internal.http_01:Adding a temporary challenge validation Include for name: ZZZ.CCCC.ca in: /etc/httpd/conf/httpd.conf
2021-06-07 10:24:21,808:DEBUG:certbot_apache._internal.http_01:writing a pre config file with text:
         RewriteEngine on
        RewriteRule ^/\.well-known/acme-challenge/([A-Za-z0-9-_=]+)$ /var/lib/letsencrypt/http_challenges/$1 [END]

2021-06-07 10:24:21,808:DEBUG:certbot_apache._internal.http_01:writing a post config file with text:
         <Directory /var/lib/letsencrypt/http_challenges>
            Require all granted
        </Directory>
        <Location /.well-known/acme-challenge>
            Require all granted
        </Location>

2021-06-07 10:24:21,852:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd.conf
2021-06-07 10:24:25,189:DEBUG:acme.client:JWS payload:
b'{}'
2021-06-07 10:24:25,191:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw:
{
  "protected": "eyQ",
  "signature": "yWw",
  "payload": "e30"
}
2021-06-07 10:24:25,256:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/13783812009/7cXosw HTTP/1.1" 200 186
2021-06-07 10:24:25,257:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:25 GMT
Content-Type: application/json
Content-Length: 186
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009>;rel="up"
Location: https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw
Replay-Nonce: 0104TiGG6arueQ13aIMlDEa3u7ysVlSKLwK_WGLg9aXrH70
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "type": "http-01",
  "status": "pending",
  "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw",
  "token": "Q"
}
2021-06-07 10:24:25,257:DEBUG:acme.client:Storing nonce: 0104TiGG6arueQ13aIMlDEa3u7ysVlSKLwK_WGLg9aXrH70
2021-06-07 10:24:25,257:INFO:certbot._internal.auth_handler:Waiting for verification...
2021-06-07 10:24:26,259:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,261:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113505:
{
  "protected": "ey9",
  "signature": "qA",
  "payload": ""
}
2021-06-07 10:24:26,324:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113505 HTTP/1.1" 200 758
2021-06-07 10:24:26,324:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ZZZ.CCCC.ca"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113505/3XdMfg",
      "token": "M",
      "validationRecord": [
        {
          "url": "http://ZZZ.CCCC.ca/.well-known/acme-challenge/Mh25ZnHmDCNwjQnbrgHbJJuwvjc1r5330SeGpaguoAA",
          "hostname": "ZZZ.CCCC.ca",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:26,324:DEBUG:acme.client:Storing nonce: 01Y
2021-06-07 10:24:26,325:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,326:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113511:
{
  "protected": "eyJ9",
  "signature": "nWsw",
  "payload": ""
}
2021-06-07 10:24:26,408:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113511 HTTP/1.1" 200 746
2021-06-07 10:24:26,409:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 01
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ZZZ.info"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113511/2UDmDQ",
      "token": "H",
      "validationRecord": [
        {
          "url": "http://ZZZ.info/.well-known/acme-challenge/HG,
          "hostname": "ZZZ.info",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:26,409:DEBUG:acme.client:Storing nonce: 01
2021-06-07 10:24:26,409:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,411:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113512:
{
  "protected": "ey9",
  "signature": "uZ",
  "payload": ""
}
2021-06-07 10:24:26,475:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113512 HTTP/1.1" 200 767
2021-06-07 10:24:26,476:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 767
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "oldZZZ.CCCC.ca"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113512/bRLu5w",
      "token": "c",
      "validationRecord": [
        {
          "url": "http://oldZZZ.CCCC.ca/.well-known/acme-challenge/crSgshI3BN6e3xOf-RdnxRGrZGnnk3aHW1LCPJVLHe4",
          "hostname": "oldZZZ.CCCC.ca",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:26,476:DEBUG:acme.client:Storing nonce: 010go0
2021-06-07 10:24:26,476:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,477:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13702113514:
{
  "protected": "ey",
  "signature": "qQ",
  "payload": ""
}
2021-06-07 10:24:26,542:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13702113514 HTTP/1.1" 200 758
2021-06-07 10:24:26,543:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 758
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "www.ZZZ.info"
  },
  "status": "valid",
  "expires": "2021-07-04T12:53:40Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13702113514/Bbh-OQ",
      "token": "9nBc",
      "validationRecord": [
        {
          "url": "http://www.ZZZ.info/.well-known/acme-challenge/9nc-tpgvHKverKw0o5xJQzKvQplHfgRJNRTwWIeorBc",
          "hostname": "www.ZZZ.info",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-04T12:53:40Z"
    }
  ]
}
2021-06-07 10:24:26,543:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:26,543:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:26,544:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/13783812009:
{
  "protected": "ey9",
  "signature": "Tw",
  "payload": ""
}
2021-06-07 10:24:26,615:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/13783812009 HTTP/1.1" 200 770
2021-06-07 10:24:26,615:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:26 GMT
Content-Type: application/json
Content-Length: 770
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ZZZ.OOOO.ca"
  },
  "status": "valid",
  "expires": "2021-07-07T13:24:25Z",
  "challenges": [
    {
      "type": "http-01",
      "status": "valid",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/13783812009/7cXosw",
      "token": "lrfGHX2zkL6t3JB0DEivD6dA84guKoD6vd8nQ1dL9RQ",
      "validationRecord": [
        {
          "url": "http://ZZZ.OOOO.ca/.well-known/acme-challenge/lrfGHX2zkL6t3JB0DEivD6dA84guKoD6vd8nQ1dL9RQ",
          "hostname": "ZZZ.OOOO.ca",
          "port": "80",
          "addressesResolved": [
            "129.173.20.173"
          ],
          "addressUsed": "129.173.20.173"
        }
      ],
      "validated": "2021-06-07T13:24:25Z"
    }
  ]
}
2021-06-07 10:24:26,615:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:26,616:DEBUG:certbot._internal.error_handler:Calling registered functions
2021-06-07 10:24:26,616:INFO:certbot._internal.auth_handler:Cleaning up challenges
2021-06-07 10:24:26,963:DEBUG:certbot._internal.client:CSR: CSR(file='/etc/letsencrypt/csr/0003_csr-certbot.pem', data=b'-----BEGIN CERTIFICATE REQUEST-----\nMI/9d/\n-----END CERTIFICATE REQUEST-----\n', form='pem')
2021-06-07 10:24:26,964:DEBUG:acme.client:JWS payload:
b'{\n  "csr": "M"\n}'
2021-06-07 10:24:26,966:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/finalize/1
{
  "protected": "",
  "signature": "",
  "payload": ""
}
2021-06-07 10:24:28,151:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/finalize/125950347/10234344673 HTTP/1.1" 200 986
2021-06-07 10:24:28,151:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:28 GMT
Content-Type: application/json
Content-Length: 986
Connection: keep-alive
Boulder-Requester: 125950347
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/1
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "valid",
  "expires": "2021-06-14T13:24:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ZZZ.CCCC.ca"
    },
    {
      "type": "dns",
      "value": "ZZZ.info"
    },
    {
      "type": "dns",
      "value": "ZZZ.OOOO.ca"
    },
    {
      "type": "dns",
      "value": "oldZZZ.CCCC.ca"
    },
    {
      "type": "dns",
      "value": "www.ZZZ.info"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/15",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/1",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/4",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/9"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1",
  "certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/0"
}
2021-06-07 10:24:28,152:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:29,153:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:29,154:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/order/qqq:
{
  "protected": "Q",
  "signature": "a",
  "payload": ""
}
2021-06-07 10:24:29,228:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/order/ HTTP/1.1" 200 986
2021-06-07 10:24:29,229:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:29 GMT
Content-Type: application/json
Content-Length: 986
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: 0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "valid",
  "expires": "2021-06-14T13:24:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ZZZ.CCCC.ca"
    },
    {
      "type": "dns",
      "value": "ZZZ.info"
    },
    {
      "type": "dns",
      "value": "ZZZ.OOOO.ca"
    },
    {
      "type": "dns",
      "value": "oldZZZ.CCCC.ca"
    },
    {
      "type": "dns",
      "value": "www.ZZZ.info"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/5",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/1",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/2",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/4",
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/9"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/1",
  "certificate": "https://acme-v02.api.letsencrypt.org/acme/cert/0"
}
2021-06-07 10:24:29,229:DEBUG:acme.client:Storing nonce: 0
2021-06-07 10:24:29,229:DEBUG:acme.client:JWS payload:
b''
2021-06-07 10:24:29,231:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/cert/0zzzzzzzzzzzzzzzzzzzzzzzzzzz:
{
  "protected": "aaaa",
  "signature": "sss",
  "payload": ""
}
2021-06-07 10:24:29,293:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/cert/zzzzzzzzzzzzzzzzzzzzzzzzz HTTP/1.1" 200 5682
2021-06-07 10:24:29,293:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Mon, 07 Jun 2021 13:24:29 GMT
Content-Type: application/pem-certificate-chain
Content-Length: 5682
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-v02.api.letsencrypt.org/acme/cert/zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz>;rel="alternate"
Replay-Nonce: zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

-----BEGIN CERTIFICATE-----
QQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQQ
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
QQQQQQQQQQQQQQQQQQQQQQQQQQQQQ
-----END CERTIFICATE-----

-----BEGIN CERTIFICATE-----
qqqqqqqqqqqqqqqqqqqqqqqqq
-----END CERTIFICATE-----

2021-06-07 10:24:29,293:DEBUG:acme.client:Storing nonce: 0103E_vE
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing new private key to /etc/letsencrypt/archive/ZZZ.CCCC.ca/privkey4.pem.
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing certificate to /etc/letsencrypt/archive/ZZZ.CCCC.ca/cert4.pem.
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing chain to /etc/letsencrypt/archive/ZZZ.CCCC.ca/chain4.pem.
2021-06-07 10:24:29,296:DEBUG:certbot._internal.storage:Writing full chain to /etc/letsencrypt/archive/ZZZ.CCCC.ca/fullchain4.pem.
2021-06-07 10:24:29,314:DEBUG:certbot._internal.cli:Var authenticator=apache (set by user).
2021-06-07 10:24:29,314:DEBUG:certbot._internal.cli:Var installer=apache (set by user).
2021-06-07 10:24:29,315:DEBUG:certbot._internal.storage:Writing new config /etc/letsencrypt/renewal/ZZZ.CCCC.ca.conf.new.
2021-06-07 10:24:29,347:DEBUG:certbot.display.util:Notifying user:
Successfully received certificate.
Certificate is saved at: /etc/letsencrypt/live/ZZZ.CCCC.ca/fullchain.pem
Key is saved at:         /etc/letsencrypt/live/ZZZ.CCCC.ca/privkey.pem
This certificate expires on 2021-09-05.
These files will be updated when the certificate renews.
Certbot has set up a scheduled task to automatically renew this certificate in the background.

2021-06-07 10:24:29,347:DEBUG:certbot.display.util:Notifying user: Deploying certificate
2021-06-07 10:24:29,376:INFO:certbot_apache._internal.configurator:Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,385:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,437:INFO:certbot_apache._internal.configurator:Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,437:INFO:certbot_apache._internal.configurator:Enabling site /etc/httpd/conf/httpd-le-ssl.conf by adding Include to root configuration
2021-06-07 10:24:29,468:DEBUG:certbot_apache._internal.parser:Adding Include /etc/httpd/conf/httpd-le-ssl.conf to /files/etc/httpd/conf/httpd.conf
2021-06-07 10:24:29,468:DEBUG:certbot.display.util:Notifying user: Successfully deployed certificate for ZZZ.CCCC.ca to /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,510:DEBUG:certbot.reverter:Creating backup of /etc/httpd/conf/httpd.conf
2021-06-07 10:24:29,592:INFO:certbot_apache._internal.configurator:Created an SSL vhost at /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,654:INFO:certbot_apache._internal.configurator:Deploying Certificate to VirtualHost /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,655:DEBUG:certbot.display.util:Notifying user: Successfully deployed certificate for oldZZZ.CCCC.ca to /etc/httpd/conf/httpd-le-ssl.conf
2021-06-07 10:24:29,685:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/client.py", line 542, in deploy_certificate
    self.installer.deploy_cert(
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 518, in deploy_cert
    self._deploy_cert(vhost, cert_path, key_path, chain_path, fullchain_path)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/override_centos.py", line 91, in _deploy_cert
    super()._deploy_cert(*args, **kwargs)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 640, in _deploy_cert
    self._add_dummy_ssl_directives(vhost.path)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 1689, in _add_dummy_ssl_directives
    self.parser.add_dir(vh_path, "SSLCertificateFile",
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/parser.py", line 426, in add_dir
    self.aug.set(aug_conf_path + "/directive[last() + 1]", directive)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 263, in set
    self._raise_error(AugeasValueError, "Augeas.set() failed")
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 154, in _raise_error
    raise errorclass(ec, fullmessage, msg, minor, details)
augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression

2021-06-07 10:24:29,685:DEBUG:certbot._internal.error_handler:Calling registered functions
2021-06-07 10:24:29,717:DEBUG:certbot.display.util:Notifying user: Could not install certificate
2021-06-07 10:24:29,717:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "/snap/certbot/1201/bin/certbot", line 8, in <module>
    sys.exit(main())
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/main.py", line 15, in main
    return internal_main.main(cli_args)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 1552, in main
    return config.func(config, plugins)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 1282, in run
    _install_cert(config, le_client, domains, new_lineage)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/main.py", line 909, in _install_cert
    le_client.deploy_certificate(domains, path_provider.key_path, path_provider.cert_path,
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot/_internal/client.py", line 542, in deploy_certificate
    self.installer.deploy_cert(
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 518, in deploy_cert
    self._deploy_cert(vhost, cert_path, key_path, chain_path, fullchain_path)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/override_centos.py", line 91, in _deploy_cert
    super()._deploy_cert(*args, **kwargs)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 640, in _deploy_cert
    self._add_dummy_ssl_directives(vhost.path)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/configurator.py", line 1689, in _add_dummy_ssl_directives
    self.parser.add_dir(vh_path, "SSLCertificateFile",
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/certbot_apache/_internal/parser.py", line 426, in add_dir
    self.aug.set(aug_conf_path + "/directive[last() + 1]", directive)
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 263, in set
    self._raise_error(AugeasValueError, "Augeas.set() failed")
  File "/var/lib/snapd/snap/certbot/1201/lib/python3.8/site-packages/augeas/__init__.py", line 154, in _raise_error
    raise errorclass(ec, fullmessage, msg, minor, details)
augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression
2021-06-07 10:24:29,718:ERROR:certbot._internal.log:An unexpected error occurred:
2021-06-07 10:24:29,718:ERROR:certbot._internal.log:augeas.AugeasValueError: Augeas.set() failed: Too many matches for path expression

@_az, would you be willing to take a look at this? It is possible to make Augeas crash outright in a recent Certbot.

@RTowse one thing I noticed is that you seem to be missing </VirtualHost> tags at the end of your virtual hosts at the bottom. For example, you have

<VirtualHost *:80>
DocumentRoot /var/www/old_site/III.info/
ServerName oldzzz

rather than the expected

<VirtualHost *:80>
DocumentRoot /var/www/old_site/III.info/
ServerName oldzzz
</VirtualHost>

and similarly for the other one. This technically makes your Apache configuration invalid, although @rg305 has pointed out that Apache itself can be much too forgiving of such errors, and on the other hand Certbot should give a more helpful error message in this situation. :slight_smile:

1 Like

I think Discourse ate them. If you open "Edit" on @RTowse's post, they're in the right place.

Thankfully Apache would refuse to run with the config as it appears in the post :smiley: .

2 Likes

"fixed" them

1 Like

@RTowse could you please post the contents of:

/etc/httpd/conf/httpd-le-ssl.conf
1 Like

Whoops! I'm glad it's not quite as "at all costs" here as in other cases that Rudy sometimes comes across. :smiley:

1 Like

/etc/httpd/conf/httpd-le-ssl.conf
No such file or directory

[ httpd]# find . -name *.conf
./conf.d/autoindex.conf
./conf.d/userdir.conf
./conf.d/welcome.conf
./conf.d/php.conf
./conf.d/ssl.conf
./conf.modules.d/10-h2.conf
./conf.modules.d/10-proxy_h2.conf
./conf.modules.d/00-base.conf
./conf.modules.d/00-dav.conf
./conf.modules.d/00-lua.conf
./conf.modules.d/00-mpm.conf
./conf.modules.d/00-optional.conf
./conf.modules.d/00-proxy.conf
./conf.modules.d/00-systemd.conf
./conf.modules.d/01-cgi.conf
./conf.modules.d/15-php.conf
./conf.modules.d/00-ssl.conf
./conf/httpd.conf

PS: the tags are in the httpd.conf file. Not sure why they didn't show here

I tried for a while, but I can't figure out how to get Apache and Certbot into this state.

If your Certbot crashes every time you run the comand, even now, I'd appreciate it if you could zip up the entire /etc/httpd directory and email it to az@letsdebug.net.

Otherwise what I can suggest is to keep your virtual hosts in a dedicated file within /etc/httpd/conf.d/ rather than directly inside the /etc/httpd/conf/httpd.conf file. No idea whether that's related to your problem, but it's one thing to try.

2 Likes
  1. So remove the virtual host tags/from etc/httpd/conf/httpd.conf
  2. create a new conf file for each Virtual Host in /etc/httpd/conf.d

Will that get a single certificate for all or 1 for each virtual host

Also I'm not sure about the format of the /etc/httpd/conf.d/abc.com.conf file:

  • particularly what is the purpose of the Document Root and Directory, I do not want to stomp on existing content
  • also ErrorLog seems to be a shared file /var/log/httpd/error_log
  • same with the CustomLog
  • is the combined "flag" for custom log just if the site has an alias?. In this case mine does not

vi /etc/httpd/conf.d/oldimber.ceotr.ca.conf

<VirtualHost *:80>
  ServerName oldimber.ceotr.ca
  DocumentRoot /var/www/oldimber.ceotr.ca
  
  <Directory  /var/www/oldimber.ceotr.ca>
      Options -Indexes +FollowSymLinks
      AllowOverride All
  </Directory>

  ErrorLog /var/log/httpd/oldimber.ceotr.ca-error.log
  CustomLog /var/log/httpd/oldimber.ceotr.ca.log combined
</VirtualHost>

vi /etc/httpd/conf.d/imber.ceotr.ca.conf

<VirtualHost *:80>
  ServerName imber.ceotr.ca
  ServerAlias imber.info www.imber.info imber.ocean.dal.ca
  DocumentRoot  /var/www/imber.ceotr.ca
  
  <Directory /var/www/imber.ceotr.ca>
      Options -Indexes +FollowSymLinks
      AllowOverride All
  </Directory>

  ErrorLog /var/log/httpd/imber.ceotr.ca-error.log
  CustomLog /var/log/httpd/imber.ceotr.ca-access.log combined
</VirtualHost>

That is a choice you must make - both options are possible

The Document Root is the location from where the web service will serve content that matches its' server_name.

They can all use the same file, or you can send each config to its' own (separate) log - your choice.

The "combined" flag tells the logging service with which fields/format to write these logs.
["combined" should be defined somewhere in the main config section]

So , I implemented the afore mentioned and created /etc/httpd/conf.d/oldimber.ceotr.ca.conf and /etc/httpd/conf.d/imber.ceotr.ca.conf and removed the virtual host tags from /etc/httpd/httpd.conf and certbot ran successfully. But now both http and https sites cannot be found

Never Mind, turned out I had some bad paths for DocumentRoot and Directory in the dedicated conf files. All is good now, SSL implemented on sites successfully.

Thanks kindly for all the help.
Ray

1 Like