2021-10-30 05:29:21,248:DEBUG:urllib3.connectionpool:http://localhost:None "GET /v2/connections?snap=certbot&interface=content HTTP/1.1" 200 97 2021-10-30 05:29:21,548:DEBUG:certbot._internal.main:certbot version: 1.20.0 2021-10-30 05:29:21,549:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot/1514/bin/certbot 2021-10-30 05:29:21,549:DEBUG:certbot._internal.main:Arguments: ['--dry-run', '--preconfigured-renewal'] 2021-10-30 05:29:21,549:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#apache,PluginEntryPoint#manual,PluginEntryPoint#nginx,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2021-10-30 05:29:21,560:DEBUG:certbot._internal.log:Root logging level set at 30 2021-10-30 05:29:21,561:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/demo.saltalafila.online.conf 2021-10-30 05:29:21,583:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2021-10-30 05:29:21,584:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2021-10-30 05:29:21,584:DEBUG:certbot._internal.cli:Var server={'staging', 'dry_run'} (set by user). 2021-10-30 05:29:21,584:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2021-10-30 05:29:21,584:DEBUG:certbot._internal.cli:Var server={'staging', 'dry_run'} (set by user). 2021-10-30 05:29:21,584:DEBUG:certbot._internal.cli:Var account={'server'} (set by user). 2021-10-30 05:29:21,605:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2021-10-30 05:29:21,763:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2021-10-30 05:29:21,765:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/demo.saltalafila.online/cert1.pem is signed by the certificate's issuer. 2021-10-30 05:29:21,770:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/demo.saltalafila.online/cert1.pem is: OCSPCertStatus.GOOD 2021-10-30 05:29:21,773:INFO:certbot._internal.renewal:Certificate not due for renewal, but simulating renewal for dry run 2021-10-30 05:29:21,773:DEBUG:certbot._internal.plugins.selection:Requested authenticator nginx and installer nginx 2021-10-30 05:29:21,938:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2021-10-30 05:29:21,939:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2021-10-30 05:29:21,939:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer 2021-10-30 05:29:21,939:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx 2021-10-30 05:29:21,945:DEBUG:certbot._internal.main:Picked account: ), creation_host='parking.namesilo.com', register_to_eff=None))> 2021-10-30 05:29:21,945:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2021-10-30 05:29:21,947:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2021-10-30 05:29:22,371:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 822 2021-10-30 05:29:22,371:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:22 GMT Content-Type: application/json Content-Length: 822 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "haSXAR4ltCk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-aaron-ari/renewalInfo/", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert" } 2021-10-30 05:29:22,372:DEBUG:certbot._internal.display.obj:Notifying user: Simulating renewal of an existing certificate for demo.saltalafila.online 2021-10-30 05:29:22,411:DEBUG:acme.client:Requesting fresh nonce 2021-10-30 05:29:22,411:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce. 2021-10-30 05:29:22,552:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2021-10-30 05:29:22,552:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:22 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0001V7YdQp6TcLd2f9JnZ2o5nQisAYBNJGb2y9W8u9yZ-Wc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2021-10-30 05:29:22,553:DEBUG:acme.client:Storing nonce: 0001V7YdQp6TcLd2f9JnZ2o5nQisAYBNJGb2y9W8u9yZ-Wc 2021-10-30 05:29:22,553:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "demo.saltalafila.online"\n }\n ]\n}' 2021-10-30 05:29:22,555:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAxVjdZZFFwNlRjTGQyZjlKbloybzVuUWlzQVlCTkpHYjJ5OVc4dTl5Wi1XYyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WqG5SZ7NrZjizJ4_c9uPkAEMt35GaBeISDU_igCAFjmbXaOgX25FrzchdshYCVz75jqhJdz7dip7grZ5Yowcjpsbj0L-CAhs7JoiG1qcRVWVMdVk_aHKydSaD2YIWbyPL25U-8YtIhuqBBUU2asSPGYcIfB09_fJPAwcpRyJJTdanfToC26tZZcb8m1jy5MldnPNXX8YmE1N-5zJoYRO4kXpjiovC8sc7y64nOOTrxcjog6i70YVZ_PS13cTRkXKwgujQ5lKGj3N64d_Erqr-1xFJpL6TyXZ6eVYATecFvTYCAIY5gnxp4zGiCJTvnXcYew0laoHXJ53VkC1OycdjQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRlbW8uc2FsdGFsYWZpbGEub25saW5lIgogICAgfQogIF0KfQ" } 2021-10-30 05:29:22,714:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 355 2021-10-30 05:29:22,715:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 30 Oct 2021 05:29:22 GMT Content-Type: application/json Content-Length: 355 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/31888848/887375748 Replay-Nonce: 0002HQ6KcaVv7tDWecmpKpUJ1MyPSN3-SQ-GAePSglePzfk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "ready", "expires": "2021-11-06T05:29:22Z", "identifiers": [ { "type": "dns", "value": "demo.saltalafila.online" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817075078" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/31888848/887375748" } 2021-10-30 05:29:22,715:DEBUG:acme.client:Storing nonce: 0002HQ6KcaVv7tDWecmpKpUJ1MyPSN3-SQ-GAePSglePzfk 2021-10-30 05:29:22,715:DEBUG:acme.client:JWS payload: b'' 2021-10-30 05:29:22,716:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817075078: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAySFE2S2NhVnY3dERXZWNtcEtwVUoxTXlQU04zLVNRLUdBZVBTZ2xlUHpmayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My84MTcwNzUwNzgifQ", "signature": "Pzsyufb2cggUARCHCkLLVw1jlJvqqr_7MUQRxRcngSjt1UBIt9_EpyJpkyK9ClhJ1uXU6x3HfCBqbZlg9BZ0OiD4lkFfyXPW8u8M2p46nZvwQb20BeISit1cxABmufs_TE4-_18vTbeR8GXADHsZ_4gb8Bl-HSWRPaGR4xToX1IDTH_8BY49xY5rxhQS5oxpjJ7X5dtN5ZWEaLzbGoswXB53Um1mi_C40oGedJQFLqUUkj1fdho1P3asVGZ-tuC_O2nO5T4PiQogd6yi213JVbNSN_H1htsT2OV2yJUoYldbiqO470SeR4PWpPv2WstgORcMTBHZNIYK-KDhjTGlPA", "payload": "" } 2021-10-30 05:29:22,860:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/817075078 HTTP/1.1" 200 789 2021-10-30 05:29:22,860:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:22 GMT Content-Type: application/json Content-Length: 789 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 00026OV4YGINns4oQKRs8ywk6CtUUGbqgrzJgVUrs1iRI_4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "demo.saltalafila.online" }, "status": "valid", "expires": "2021-11-29T05:26:46Z", "challenges": [ { "type": "http-01", "status": "valid", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817075078/1gkXtQ", "token": "aJbi4IOfKyA8ipgplkX73WETo69SeUW34RN6_nbeTbs", "validationRecord": [ { "url": "http://demo.saltalafila.online/.well-known/acme-challenge/aJbi4IOfKyA8ipgplkX73WETo69SeUW34RN6_nbeTbs", "hostname": "demo.saltalafila.online", "port": "80", "addressesResolved": [ "138.68.75.248" ], "addressUsed": "138.68.75.248" } ], "validated": "2021-10-30T05:26:44Z" } ] } 2021-10-30 05:29:22,861:DEBUG:acme.client:Storing nonce: 00026OV4YGINns4oQKRs8ywk6CtUUGbqgrzJgVUrs1iRI_4 2021-10-30 05:29:22,861:DEBUG:acme.client:JWS payload: b'{\n "status": "deactivated"\n}' 2021-10-30 05:29:22,862:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817075078: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAyNk9WNFlHSU5uczRvUUtSczh5d2s2Q3RVVUdicWdyekpnVlVyczFpUklfNCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My84MTcwNzUwNzgifQ", "signature": "fzglZw-z-qx-QDWeBVeTeAt-2j33mp358JP8Fcs7l0VSISSNW9jYSMVhcevLYoTp2IBQzWnIpBtvyItAL9tyYMVmM6qaQJZOl-T8xkHZ-OGnTVste1lSpIcE75msOzYOrwizeRjFQuCkjk6Cj2dnX5Ekpozl1p3SaelU3jL-bwHbLuykthPLI5dApLo1daUMROXzeKRNIo-b-7Gyl3sIG6YNQ2WY_mdQxRbQJdLjx5JQj5kMOkAbrXnGU2XIagVMbc936oMBsTfyTbsne6sRMocqul8pvZCsI5i3WNx6XSgGlL2JHAMkA7V1egmhNpO2mSAPhVSaneB8gUMNON1Zeg", "payload": "ewogICJzdGF0dXMiOiAiZGVhY3RpdmF0ZWQiCn0" } 2021-10-30 05:29:23,791:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/817075078 HTTP/1.1" 200 795 2021-10-30 05:29:23,792:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:23 GMT Content-Type: application/json Content-Length: 795 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002ibOSJK17lbr-69uLu71GNQRvBU6DbMfoK-ry_J1fqXE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "demo.saltalafila.online" }, "status": "deactivated", "expires": "2021-11-29T05:26:46Z", "challenges": [ { "type": "http-01", "status": "valid", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817075078/1gkXtQ", "token": "aJbi4IOfKyA8ipgplkX73WETo69SeUW34RN6_nbeTbs", "validationRecord": [ { "url": "http://demo.saltalafila.online/.well-known/acme-challenge/aJbi4IOfKyA8ipgplkX73WETo69SeUW34RN6_nbeTbs", "hostname": "demo.saltalafila.online", "port": "80", "addressesResolved": [ "138.68.75.248" ], "addressUsed": "138.68.75.248" } ], "validated": "2021-10-30T05:26:44Z" } ] } 2021-10-30 05:29:23,792:DEBUG:acme.client:Storing nonce: 0002ibOSJK17lbr-69uLu71GNQRvBU6DbMfoK-ry_J1fqXE 2021-10-30 05:29:23,792:DEBUG:certbot._internal.client:Recreating order after authz deactivations 2021-10-30 05:29:23,793:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "demo.saltalafila.online"\n }\n ]\n}' 2021-10-30 05:29:23,794:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAyaWJPU0pLMTdsYnItNjl1THU3MUdOUVJ2QlU2RGJNZm9LLXJ5X0oxZnFYRSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gRD3tB4OsByR0ejJTILaokQRNXNEpxi-YoQBhtRAy1z2ubvr3-wzALxInmWmiVi1NH8o7vnXYQg3fYElot3bzxD3SL9TW6E0muC29GYN8io_WBd6d9-tAfF-cqpnOfe-DuR6aAp-iano6aKHryYXWZFaI-v6YhMo5pmdvUMMFsm4mphIOEi8sekCGxd_ZoE2R7DQ1_jcXuBrkobyKUx8y5eog-DqPxteWt1a83DayOUuJfAPL85EFvnObRX4SYq2ZnW7r5JTrljEUFUHwt_Qz2UCL1mM_4hSSgzzeyGrOuzCz6lp3cVZ5GVPrspyTIF7ChFIOmzuoGi3ToQo4tISqg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRlbW8uc2FsdGFsYWZpbGEub25saW5lIgogICAgfQogIF0KfQ" } 2021-10-30 05:29:24,553:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 357 2021-10-30 05:29:24,554:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 30 Oct 2021 05:29:24 GMT Content-Type: application/json Content-Length: 357 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/31888848/887375908 Replay-Nonce: 0001retulBbqtNIB9gg3C2cZiPvDWcUunGmRPg6VGLgxpNI X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2021-11-06T05:29:24Z", "identifiers": [ { "type": "dns", "value": "demo.saltalafila.online" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086088" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/31888848/887375908" } 2021-10-30 05:29:24,554:DEBUG:acme.client:Storing nonce: 0001retulBbqtNIB9gg3C2cZiPvDWcUunGmRPg6VGLgxpNI 2021-10-30 05:29:24,554:DEBUG:acme.client:JWS payload: b'' 2021-10-30 05:29:24,555:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086088: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAxcmV0dWxCYnF0TklCOWdnM0MyY1ppUHZEV2NVdW5HbVJQZzZWR0xneHBOSSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My84MTcwODYwODgifQ", "signature": "jsMOZMxbjwTlFEhoQGHkvB3GTUOAkrLxa5Wqg5oqe7dTNrKsSia0xD_bNtrMm-sndbsvT9nagfhwJXcgtDkLqSiN4CYGx1qATE_oiJo0DfsD9Mgj4R7FERkj7kRCKw-GA9N30MaBqsmys98T8oLMkG0u2HJLGiKatlOjHNSPv3IFPp9O7mLtQ2ke5s-kghxtVDCsafbPjcJpYcN1CS9KL9LFTbWA7SY3Ec24Y8cOXxKU9Jk47LWHP_E9wRM5hztwr3d0GnO0WSaTTNABknk40oXVif-PaDg2NDHCzomOrGiCUTk9a_vaOFcKTaGTUF_ZRbA_ztW2NaCW7EXNISI_tQ", "payload": "" } 2021-10-30 05:29:24,699:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/817086088 HTTP/1.1" 200 822 2021-10-30 05:29:24,700:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:24 GMT Content-Type: application/json Content-Length: 822 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0001MeWCa7J7BkCDNFym--QKrRQHzywgU_tBG3RpjZ9BpEk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "demo.saltalafila.online" }, "status": "pending", "expires": "2021-11-06T05:29:24Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/7NEm5A", "token": "6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/x-UOpQ", "token": "6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/eTeeYg", "token": "6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU" } ] } 2021-10-30 05:29:24,700:DEBUG:acme.client:Storing nonce: 0001MeWCa7J7BkCDNFym--QKrRQHzywgU_tBG3RpjZ9BpEk 2021-10-30 05:29:24,700:INFO:certbot._internal.auth_handler:Performing the following challenges: 2021-10-30 05:29:24,700:INFO:certbot._internal.auth_handler:http-01 challenge for demo.saltalafila.online 2021-10-30 05:29:24,716:DEBUG:certbot_nginx._internal.http_01:Generated server block: [] 2021-10-30 05:29:24,716:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-geoip2.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-mail.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/10-mod-http-ndk.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-cache-purge.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-nchan.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-image-filter.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/mod-http-passenger.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/nginx.conf 2021-10-30 05:29:24,717:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-headers-more-filter.conf 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/mime.types 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-auth-pam.conf 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-stream.conf 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-geoip.conf 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-lua.conf 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-subs-filter.conf 2021-10-30 05:29:24,718:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-xslt-filter.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-uploadprogress.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-perl.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/letsencrypt/options-ssl-nginx.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-dav-ext.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-passenger.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-fancyindex.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-echo.conf 2021-10-30 05:29:24,719:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/fidelity 2021-10-30 05:29:24,720:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/default 2021-10-30 05:29:24,720:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-upstream-fair.conf 2021-10-30 05:29:24,720:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/nginx.conf: user www-data; worker_processes auto; pid /run/nginx.pid; include /etc/nginx/modules-enabled/*.conf; events { worker_connections 768; # multi_accept on; } http { include /etc/letsencrypt/le_http_01_cert_challenge.conf; server_names_hash_bucket_size 128; ## # Basic Settings ## sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; # server_tokens off; # server_names_hash_bucket_size 64; # server_name_in_redirect off; include /etc/nginx/mime.types; default_type application/octet-stream; ## # SSL Settings ## ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3; # Dropping SSLv3, ref: POODLE ssl_prefer_server_ciphers on; ## # Logging Settings ## access_log /var/log/nginx/access.log; error_log /var/log/nginx/error.log; ## # Gzip Settings ## gzip on; # gzip_vary on; # gzip_proxied any; # gzip_comp_level 6; # gzip_buffers 16 8k; # gzip_http_version 1.1; # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; ## # Virtual Host Configs ## include /etc/nginx/conf.d/*.conf; include /etc/nginx/sites-enabled/*; } #mail { # # See sample authentication script at: # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript # # # auth_http localhost/auth.php; # # pop3_capabilities "TOP" "USER"; # # imap_capabilities "IMAP4rev1" "UIDPLUS"; # # server { # listen localhost:110; # protocol pop3; # proxy on; # } # # server { # listen localhost:143; # protocol imap; # proxy on; # } #} 2021-10-30 05:29:24,721:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/sites-enabled/default: ## # You should look at the following URL's in order to grasp a solid understanding # of Nginx configuration files in order to fully unleash the power of Nginx. # https://www.nginx.com/resources/wiki/start/ # https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ # https://wiki.debian.org/Nginx/DirectoryStructure # # In most cases, administrators will remove this file from sites-enabled/ and # leave it as reference inside of sites-available where it will continue to be # updated by the nginx packaging team. # # This file will automatically load configuration files provided by other # applications, such as Drupal or Wordpress. These applications will be made # available underneath a path with that package name, such as /drupal8. # # Please see /usr/share/doc/nginx-doc/examples/ for more detailed examples. ## # Default server configuration # server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot # SSL configuration # # listen 443 ssl default_server; # listen [::]:443 ssl default_server; # # Note: You should disable gzip for SSL traffic. # See: https://bugs.debian.org/773332 # # Read up on ssl_ciphers to ensure a secure configuration. # See: https://bugs.debian.org/765782 # # Self signed certs generated by the ssl-cert package # Don't use them in a production server! # # include snippets/snakeoil.conf; root /home/jerdvo/default; # Add index.php to the list if you are using PHP index index.html; server_name demo.saltalafila.online; location / { # First attempt to serve request as file, then # as directory, then fall back to displaying a 404. try_files $uri $uri/ =404; } # pass PHP scripts to FastCGI server # #location ~ \.php$ { # include snippets/fastcgi-php.conf; # # # With php-fpm (or other unix sockets): # fastcgi_pass unix:/var/run/php/php7.4-fpm.sock; # # With php-cgi (or other tcp sockets): # fastcgi_pass 127.0.0.1:9000; #} # deny access to .htaccess files, if Apache's document root # concurs with nginx's one # #location ~ /\.ht { # deny all; #} listen [::]:443 ssl; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/demo.saltalafila.online/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/demo.saltalafila.online/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot location = /.well-known/acme-challenge/6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU{default_type text/plain;return 200 6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU.XiHVuQ75iZqPbDJVDtU8WmgjwTOVC28rDhNP3hhd2c8;} # managed by Certbot } # Virtual Host configuration for example.com # # You can move that to a different file under sites-available/ and symlink that # to sites-enabled/ to enable it. # #server { # listen 80; # listen [::]:80; # # server_name example.com; # # root /var/www/example.com; # index index.html; # # location / { # try_files $uri $uri/ =404; # } #} server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot if ($host = demo.saltalafila.online) { return 301 https://$host$request_uri; } # managed by Certbot listen 80 default_server; listen [::]:80 default_server; server_name demo.saltalafila.online; return 404; # managed by Certbot location = /.well-known/acme-challenge/6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU{default_type text/plain;return 200 6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU.XiHVuQ75iZqPbDJVDtU8WmgjwTOVC28rDhNP3hhd2c8;} # managed by Certbot } 2021-10-30 05:29:25,749:DEBUG:acme.client:JWS payload: b'{}' 2021-10-30 05:29:25,751:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/7NEm5A: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAxTWVXQ2E3SjdCa0NETkZ5bS0tUUtyUlFIenl3Z1VfdEJHM1Jwalo5QnBFayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My84MTcwODYwODgvN05FbTVBIn0", "signature": "HF6GFFC3FlyuiAbaUs7-nC3lmnRRrP227FMbtvATanVXVW11jyCs6NY58F0nB3khwmalTBdM1oNl6JxDRlep4bcWJH-IJ4W3t-0PfQTsgwmOdpRBYJaCZJaiUKfbZNJ_SJy9A8me5eR58ThfbnAw0CSbiwBiIskSBOPJMmdPkjhNmGS9YahT9So3WoY1KHEzMMzLB3Fp65A005nPXnrywLV-T0XPHrZqd0Z8QgjG7N9vNW28UWEdRp4F4PFsUSKv2cX3fRAuYW2tbHdmXT173WycKx41h3wPJMKjL9xrxoNMAnel0GQ9vcKJdgi6y2h1-AjF2mUNAEK5khlaLgfDEA", "payload": "e30" } 2021-10-30 05:29:25,897:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/817086088/7NEm5A HTTP/1.1" 200 192 2021-10-30 05:29:25,898:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:25 GMT Content-Type: application/json Content-Length: 192 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/7NEm5A Replay-Nonce: 00010YgCJ0UUBuDgrVTdBD1esnSKqsleh-p-_aCidyX4rlE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/7NEm5A", "token": "6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU" } 2021-10-30 05:29:25,898:DEBUG:acme.client:Storing nonce: 00010YgCJ0UUBuDgrVTdBD1esnSKqsleh-p-_aCidyX4rlE 2021-10-30 05:29:25,899:INFO:certbot._internal.auth_handler:Waiting for verification... 2021-10-30 05:29:26,900:DEBUG:acme.client:JWS payload: b'' 2021-10-30 05:29:26,902:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086088: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAxMFlnQ0owVVVCdURnclZUZEJEMWVzblNLcXNsZWgtcC1fYUNpZHlYNHJsRSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My84MTcwODYwODgifQ", "signature": "rMk3l1NgiNmvsGEs9vAYolCGHOk3VZwGXQszFFwDYm3Ss1W-5xBbBJrgaq3sXenWiYss74f7z85NTeQMn7TLwq3TVBq8tc0EDCCzWJKJNIpPCX43sXOl33mmKruzmnYyHAaj4xKCkyKdFvPsdNxtWJOQIkSc4IDOtBSkCvyUGQ5u8R8DzrGo_sL3CGXnTjS4no_nKI18UgX61ZFvnN62625xb7l5jmEzYYUBT28zGMIzD0h3tgVcVdN7V9NsJfnSVAV1wH6MnMLSSmxtrPuCeeM27MIfz4dzBpxw66x4iEpmToon7JCb9gaM7EBcc0uMwTry8UntkVYE0RQ4nKmgZg", "payload": "" } 2021-10-30 05:29:27,099:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/817086088 HTTP/1.1" 200 789 2021-10-30 05:29:27,099:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:27 GMT Content-Type: application/json Content-Length: 789 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002DP_o6zP93HezKVuglwQG_TTXdO6P0KT4R4uO-gTibJo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "demo.saltalafila.online" }, "status": "valid", "expires": "2021-11-29T05:29:26Z", "challenges": [ { "type": "http-01", "status": "valid", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086088/7NEm5A", "token": "6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU", "validationRecord": [ { "url": "http://demo.saltalafila.online/.well-known/acme-challenge/6p5Hu29JPFAx0uViH-0aJaaKhkUTgR9NoFAMB7BInPU", "hostname": "demo.saltalafila.online", "port": "80", "addressesResolved": [ "138.68.75.248" ], "addressUsed": "138.68.75.248" } ], "validated": "2021-10-30T05:29:25Z" } ] } 2021-10-30 05:29:27,099:DEBUG:acme.client:Storing nonce: 0002DP_o6zP93HezKVuglwQG_TTXdO6P0KT4R4uO-gTibJo 2021-10-30 05:29:27,100:DEBUG:certbot._internal.error_handler:Calling registered functions 2021-10-30 05:29:27,100:INFO:certbot._internal.auth_handler:Cleaning up challenges 2021-10-30 05:29:28,237:DEBUG:certbot._internal.client:CSR: CSR(file=None, data=b'-----BEGIN CERTIFICATE REQUEST-----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\n5oFuFagsaDkAPjnFBD4=\n-----END CERTIFICATE REQUEST-----\n', form='pem') 2021-10-30 05:29:28,238:DEBUG:acme.client:JWS payload: b'{\n "csr": "MIICejCCAWICAQIwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKeq-ps2HPNeaIH_kzJrkp_1oFJ74sY01rsH4qind_0DVj4gMZzSQNxl8n1C15u9UeDMvfeT0KRoltY8z7ZLqoy9pQHz6UCRhkRgyElQF92t1bMAk0bKXc64-9mD58v7XqMM_-Bfm3x-_gz4Xk8K4TPEKcqxcfhNjERVbsNKm0JvF47xxKIQH3fRwzmO6cdSiLEuF7AWVeYa0VuKK4AlWhnx6SL_ThioWsZ9pNbuoAMrvH2WXliiT9QUqkTlJSOJ_6lYTM0BiIMSeMmWnXP7g2cXzX_Vk96gT7UOsW9nqoDDd7NXlrKvcneOK0nyz7sMBAymR8u0BncVZ0Yiarc347cCAwEAAaA1MDMGCSqGSIb3DQEJDjEmMCQwIgYDVR0RBBswGYIXZGVtby5zYWx0YWxhZmlsYS5vbmxpbmUwDQYJKoZIhvcNAQELBQADggEBAHXFg4LKumcugjcMGYfeN6J8Cs6Qll3owdVNmtOdxyOMJNcX5nOVyf6IaxAUI-Qo1zOQ9VeTgDxXSMUhv35O7DfZskIT6IWi6jQeA25MSi7MTSSSen3EnQGGIBXKmnJx_n1zWjyhuEl2DtOzgn5dw7h4NOXgxzG6CPIQ9597vBi4HGhBfCXQeKwxlmojSZCcT9utSCAQnAeaiBDCojgd9_-izf6r1IeUDVvkWUSTIvf1vjwHM41ieIOQ7q7GPAhEC5hOiyQD5uWIN11hb0PA0H3Ghrg82NUeo8kcPp22z7xdVbPCJLXG9D-4Z9LOMqZcdYE_5oFuFagsaDkAPjnFBD4"\n}' 2021-10-30 05:29:28,240:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/finalize/31888848/887375908: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAyRFBfbzZ6UDkzSGV6S1Z1Z2x3UUdfVFRYZE82UDBLVDRSNHVPLWdUaWJKbyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9maW5hbGl6ZS8zMTg4ODg0OC84ODczNzU5MDgifQ", "signature": "AYA8hvEFJqfKyf1IZkS6uQgMyoXorPsIzuw1WEq_kQtJfoXGMYsRRbAjU6O0SDwv5GAsBTWhySVyy6_g4t2nVe6_VgL9omemCV61ts_-sTk6tGjTMZsYJQpW7bYdmA-5tB_bCvaBjqJazcPhJyc7zwzcW-Z5-Bkwc7V3YfrCZM_NOH2qOL_-PN0lUl2osLD2sHcmdon5UlLJdZiZy7XNoxLGyQDdwUjfZdKERrcCNLWxP8NO8W2EAHYndzwdnDYeWNG3Rr1wy6BYyewNiPquDKcxQcx2ZG2uv1wUcoFngskmiICIUS15wf6udu9XBvXJ5YH5wRIfxU3NXFegPr_IpA", "payload": "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" } 2021-10-30 05:29:29,036:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/finalize/31888848/887375908 HTTP/1.1" 200 467 2021-10-30 05:29:29,036:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:28 GMT Content-Type: application/json Content-Length: 467 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/31888848/887375908 Replay-Nonce: 0002UZPyyqOsQRjR46bm7XegueTsX2n-v_aW6V-DKitvEkQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "valid", "expires": "2021-11-06T05:29:24Z", "identifiers": [ { "type": "dns", "value": "demo.saltalafila.online" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086088" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/31888848/887375908", "certificate": "https://acme-staging-v02.api.letsencrypt.org/acme/cert/fa7a22462ec0f98ce5d2978ec57ef6ac4182" } 2021-10-30 05:29:29,036:DEBUG:acme.client:Storing nonce: 0002UZPyyqOsQRjR46bm7XegueTsX2n-v_aW6V-DKitvEkQ 2021-10-30 05:29:30,038:DEBUG:acme.client:JWS payload: b'' 2021-10-30 05:29:30,039:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/order/31888848/887375908: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAyVVpQeXlxT3NRUmpSNDZibTdYZWd1ZVRzWDJuLXZfYVc2Vi1ES2l0dkVrUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9vcmRlci8zMTg4ODg0OC84ODczNzU5MDgifQ", "signature": "fN7mqioslG0X6IoOiotPjo5GfnrunJSiWf11elL38nFZmql1LZcnYfuMOIodtz0E2Dm1qkTTw1DUFHAUkHLCKOhnoAVjilZaZjo9x-jPije4S3qxdRiqbEIBtyMkeWVDN8N6rEod8qX1C0BCvRQymRlhWaUHTpSP8DWyBIy80XR6VFLScDqHORzY9z13M6QZqESeoGG23FB4QXALI_KKJG7ihupLZaaoe_oR_1fJ3bmSksJ_dx8tSEy5O0aGlqvIQV-LPdUTDpSHmq9tO6Ci7l3xpnSkqnKSyQiSVA8kmK_oXwhJJn3eaHvWPf476i-KtBLPh2QIMZXEQ9nviNbgSw", "payload": "" } 2021-10-30 05:29:30,187:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/order/31888848/887375908 HTTP/1.1" 200 467 2021-10-30 05:29:30,187:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:30 GMT Content-Type: application/json Content-Length: 467 Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002lhzXSkhzRFUrmvbXBOG0SbOALLFl5w5Kf8TMmoTY6rU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "valid", "expires": "2021-11-06T05:29:24Z", "identifiers": [ { "type": "dns", "value": "demo.saltalafila.online" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086088" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/31888848/887375908", "certificate": "https://acme-staging-v02.api.letsencrypt.org/acme/cert/fa7a22462ec0f98ce5d2978ec57ef6ac4182" } 2021-10-30 05:29:30,187:DEBUG:acme.client:Storing nonce: 0002lhzXSkhzRFUrmvbXBOG0SbOALLFl5w5Kf8TMmoTY6rU 2021-10-30 05:29:30,188:DEBUG:acme.client:JWS payload: b'' 2021-10-30 05:29:30,189:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/cert/fa7a22462ec0f98ce5d2978ec57ef6ac4182: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAybGh6WFNraHpSRlVybXZiWEJPRzBTYk9BTExGbDV3NUtmOFRNbW9UWTZyVSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jZXJ0L2ZhN2EyMjQ2MmVjMGY5OGNlNWQyOTc4ZWM1N2VmNmFjNDE4MiJ9", "signature": "J1-S0JQGtl8P0BCEiBt9W7CvDHStHMYgDoo-fWCL0hMv0CMpzlX36j_8o1Bz7e9zMx1YfJIgmaZn7eVu29R__pH_cb4FUuhAPiuG3DTY83foiFK5lQIG5q8YlCtLjo3X2EDf_3ZSiI3ZhwGv1xlKnsA8TEE_kVLbn30uyS56iUMT7W_G1ap2uH8ZPMR74pnCvoDLimBx2FBEfXvUuoEdJafsBsT0JgYWpg5J4igX9ZpRIfeQZWBDPifh_IBO8XSvcggn0u8-VIpVjTzYgFRlKuxTC3G6QyWMu-TYxJpf9k9nMiNPsNaSIj_5s1aC6okWdRnfBdY4IyYrKpv3VA1QdA", "payload": "" } 2021-10-30 05:29:30,342:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/cert/fa7a22462ec0f98ce5d2978ec57ef6ac4182 HTTP/1.1" 200 5759 2021-10-30 05:29:30,342:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:30 GMT Content-Type: application/pem-certificate-chain Content-Length: 5759 Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="alternate" Replay-Nonce: 0002HwxoFvFQL7Gk_DCu8g-Pxq7VFtUpMggqIXaammsF-1Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 -----BEGIN CERTIFICATE----- MIIFZDCCBEygAwIBAgITAPp6IkYuwPmM5dKXjsV+9qxBgjANBgkqhkiG9w0BAQsF ADBZMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXKFNUQUdJTkcpIExldCdzIEVuY3J5 cHQxKDAmBgNVBAMTHyhTVEFHSU5HKSBBcnRpZmljaWFsIEFwcmljb3QgUjMwHhcN MjExMDMwMDQyOTI4WhcNMjIwMTI4MDQyOTI3WjAiMSAwHgYDVQQDExdkZW1vLnNh bHRhbGFmaWxhLm9ubGluZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AKeq+ps2HPNeaIH/kzJrkp/1oFJ74sY01rsH4qind/0DVj4gMZzSQNxl8n1C15u9 UeDMvfeT0KRoltY8z7ZLqoy9pQHz6UCRhkRgyElQF92t1bMAk0bKXc64+9mD58v7 XqMM/+Bfm3x+/gz4Xk8K4TPEKcqxcfhNjERVbsNKm0JvF47xxKIQH3fRwzmO6cdS iLEuF7AWVeYa0VuKK4AlWhnx6SL/ThioWsZ9pNbuoAMrvH2WXliiT9QUqkTlJSOJ /6lYTM0BiIMSeMmWnXP7g2cXzX/Vk96gT7UOsW9nqoDDd7NXlrKvcneOK0nyz7sM BAymR8u0BncVZ0Yiarc347cCAwEAAaOCAlowggJWMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV HQ4EFgQUtFtRt5obm1bSapajRWnyVWI+5ZEwHwYDVR0jBBgwFoAU3nJ6SN8xw6ZQ 35+FI99XN0tdLmUwXQYIKwYBBQUHAQEEUTBPMCUGCCsGAQUFBzABhhlodHRwOi8v c3RnLXIzLm8ubGVuY3Iub3JnMCYGCCsGAQUFBzAChhpodHRwOi8vc3RnLXIzLmku bGVuY3Iub3JnLzAiBgNVHREEGzAZghdkZW1vLnNhbHRhbGFmaWxhLm9ubGluZTBM BgNVHSAERTBDMAgGBmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIB FhpodHRwOi8vY3BzLmxldHNlbmNyeXB0Lm9yZzCCAQQGCisGAQQB1nkCBAIEgfUE gfIA8AB2AN2ZNPyl5ySAyVZofYE0mQhJskn3tWnYx7yrP1zB825kAAABfM+snhwA AAQDAEcwRQIgZ1/GhshANz8Cvs5/R0MY/UA1Ne22ZmUvj4s1IFhqd+0CIQDk9Y06 5GUiWdN/hxDHBgBEyPlCvqnr1uEvTZCP5wdpcgB2ALDMg+Wl+X1rr3wJzChJBIcq x+iLEyxjULfG/SbhbGx3AAABfM+sniMAAAQDAEcwRQIhANRt8LnNfv7zU/GLSCYJ +HLyPOoB7gs5atvbX8pcQu3cAiBLiUKhh91bnusv0pEQyaVj1Bd/OiCkpf0ogRrw b0q6nDANBgkqhkiG9w0BAQsFAAOCAQEAE9tj6AHebUOD9uRaILaJhemmJ55K1hS7 LdJo5yDrYp+NVgOFL2BBHSemWYkr4i84CPNvCCgQD5I2D8+6EAxmGSryg7sP/v9+ YlwBoBPHh/yINXa+NbsKDf0OG5uj0vERxX7upxe+UVZI4gIdVZozSrXoBLgdudPq UY9tkE0dbJzvDUdy7oXvF8BFPyWgVZOZZd7IbKZhzU9l8FKoScQUANJqBLjrXhQD duZP44wY3/VhC+3m/1g/fLeAAVkXkUfh31/vuVdWVkO7/wn/O9ZwMbsRkJz4ARzp 32ak0DFPGaWNjDwFoM5QcfrDDze/Y9f6Jx9I374I3YrMsh1/+xk7Wg== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIFWzCCA0OgAwIBAgIQTfQrldHumzpMLrM7jRBd1jANBgkqhkiG9w0BAQsFADBm MQswCQYDVQQGEwJVUzEzMDEGA1UEChMqKFNUQUdJTkcpIEludGVybmV0IFNlY3Vy aXR5IFJlc2VhcmNoIEdyb3VwMSIwIAYDVQQDExkoU1RBR0lORykgUHJldGVuZCBQ ZWFyIFgxMB4XDTIwMDkwNDAwMDAwMFoXDTI1MDkxNTE2MDAwMFowWTELMAkGA1UE BhMCVVMxIDAeBgNVBAoTFyhTVEFHSU5HKSBMZXQncyBFbmNyeXB0MSgwJgYDVQQD Ex8oU1RBR0lORykgQXJ0aWZpY2lhbCBBcHJpY290IFIzMIIBIjANBgkqhkiG9w0B AQEFAAOCAQ8AMIIBCgKCAQEAu6TR8+74b46mOE1FUwBrvxzEYLck3iasmKrcQkb+ gy/z9Jy7QNIAl0B9pVKp4YU76JwxF5DOZZhi7vK7SbCkK6FbHlyU5BiDYIxbbfvO L/jVGqdsSjNaJQTg3C3XrJja/HA4WCFEMVoT2wDZm8ABC1N+IQe7Q6FEqc8NwmTS nmmRQm4TQvr06DP+zgFK/MNubxWWDSbSKKTH5im5j2fZfg+j/tM1bGaczFWw8/lS nukyn5J2L+NJYnclzkXoh9nMFnyPmVbfyDPOc4Y25aTzVoeBKXa/cZ5MM+WddjdL biWvm19f1sYn1aRaAIrkppv7kkn83vcth8XCG39qC2ZvaQIDAQABo4IBEDCCAQww DgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAS BgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTecnpI3zHDplDfn4Uj31c3S10u ZTAfBgNVHSMEGDAWgBS182Xy/rAKkh/7PH3zRKCsYyXDFDA2BggrBgEFBQcBAQQq MCgwJgYIKwYBBQUHMAKGGmh0dHA6Ly9zdGcteDEuaS5sZW5jci5vcmcvMCsGA1Ud HwQkMCIwIKAeoByGGmh0dHA6Ly9zdGcteDEuYy5sZW5jci5vcmcvMCIGA1UdIAQb MBkwCAYGZ4EMAQIBMA0GCysGAQQBgt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCN DLam9yN0EFxxn/3p+ruWO6n/9goCAM5PT6cC6fkjMs4uas6UGXJjr5j7PoTQf3C1 vuxiIGRJC6qxV7yc6U0X+w0Mj85sHI5DnQVWN5+D1er7mp13JJA0xbAbHa3Rlczn y2Q82XKui8WHuWra0gb2KLpfboYj1Ghgkhr3gau83pC/WQ8HfkwcvSwhIYqTqxoZ Uq8HIf3M82qS9aKOZE0CEmSyR1zZqQxJUT7emOUapkUN9poJ9zGc+FgRZvdro0XB yphWXDaqMYph0DxW/10ig5j4xmmNDjCRmqIKsKoWA52wBTKKXK1na2ty/lW5dhtA xkz5rVZFd4sgS4J0O+zm6d5GRkWsNJ4knotGXl8vtS3X40KXeb3A5+/3p0qaD215 Xq8oSNORfB2oI1kQuyEAJ5xvPTdfwRlyRG3lFYodrRg6poUBD/8fNTXMtzydpRgy zUQZh/18F6B/iW6cbiRN9r2Hkh05Om+q0/6w0DdZe+8YrNpfhSObr/1eVZbKGMIY qKmyZbBNu5ysENIK5MPc14mUeKmFjpN840VR5zunoU52lqpLDua/qIM8idk86xGW xx2ml43DO/Ya/tVZVok0mO0TUjzJIfPqyvr455IsIut4RlCR9Iq0EDTve2/ZwCuG hSjpTUFGSiQrR2JK2Evp+o6AETUkBCO1aw0PpQBPDQ== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIFVDCCBDygAwIBAgIRAO1dW8lt+99NPs1qSY3Rs8cwDQYJKoZIhvcNAQELBQAw cTELMAkGA1UEBhMCVVMxMzAxBgNVBAoTKihTVEFHSU5HKSBJbnRlcm5ldCBTZWN1 cml0eSBSZXNlYXJjaCBHcm91cDEtMCsGA1UEAxMkKFNUQUdJTkcpIERvY3RvcmVk IER1cmlhbiBSb290IENBIFgzMB4XDTIxMDEyMDE5MTQwM1oXDTI0MDkzMDE4MTQw M1owZjELMAkGA1UEBhMCVVMxMzAxBgNVBAoTKihTVEFHSU5HKSBJbnRlcm5ldCBT ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEiMCAGA1UEAxMZKFNUQUdJTkcpIFByZXRl bmQgUGVhciBYMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALbagEdD Ta1QgGBWSYkyMhscZXENOBaVRTMX1hceJENgsL0Ma49D3MilI4KS38mtkmdF6cPW nL++fgehT0FbRHZgjOEr8UAN4jH6omjrbTD++VZneTsMVaGamQmDdFl5g1gYaigk kmx8OiCO68a4QXg4wSyn6iDipKP8utsE+x1E28SA75HOYqpdrk4HGxuULvlr03wZ GTIf/oRt2/c+dYmDoaJhge+GOrLAEQByO7+8+vzOwpNAPEx6LW+crEEZ7eBXih6V P19sTGy3yfqK5tPtTdXXCOQMKAp+gCj/VByhmIr+0iNDC540gtvV303WpcbwnkkL YC0Ft2cYUyHtkstOfRcRO+K2cZozoSwVPyB8/J9RpcRK3jgnX9lujfwA/pAbP0J2 UPQFxmWFRQnFjaq6rkqbNEBgLy+kFL1NEsRbvFbKrRi5bYy2lNms2NJPZvdNQbT/ 2dBZKmJqxHkxCuOQFjhJQNeO+Njm1Z1iATS/3rts2yZlqXKsxQUzN6vNbD8KnXRM EeOXUYvbV4lqfCf8mS14WEbSiMy87GB5S9ucSV1XUrlTG5UGcMSZOBcEUpisRPEm QWUOTWIoDQ5FOia/GI+Ki523r2ruEmbmG37EBSBXdxIdndqrjy+QVAmCebyDx9eV EGOIpn26bW5LKerumJxa/CFBaKi4bRvmdJRLAgMBAAGjgfEwge4wDgYDVR0PAQH/ BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFLXzZfL+sAqSH/s8ffNE oKxjJcMUMB8GA1UdIwQYMBaAFAhX2onHolN5DE/d4JCPdLriJ3NEMDgGCCsGAQUF BwEBBCwwKjAoBggrBgEFBQcwAoYcaHR0cDovL3N0Zy1kc3QzLmkubGVuY3Iub3Jn LzAtBgNVHR8EJjAkMCKgIKAehhxodHRwOi8vc3RnLWRzdDMuYy5sZW5jci5vcmcv MCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQBgt8TAQEBMA0GCSqGSIb3DQEB CwUAA4IBAQB7tR8B0eIQSS6MhP5kuvGth+dN02DsIhr0yJtk2ehIcPIqSxRRmHGl 4u2c3QlvEpeRDp2w7eQdRTlI/WnNhY4JOofpMf2zwABgBWtAu0VooQcZZTpQruig F/z6xYkBk3UHkjeqxzMN3d1EqGusxJoqgdTouZ5X5QTTIee9nQ3LEhWnRSXDx7Y0 ttR1BGfcdqHopO4IBqAhbkKRjF5zj7OD8cG35omywUbZtOJnftiI0nFcRaxbXo0v oDfLD0S6+AC2R3tKpqjkNX6/91hrRFglUakyMcZU/xleqbv6+Lr3YD8PsBTub6lI oZ2lS38fL18Aon458fbc0BPHtenfhKj5 -----END CERTIFICATE----- 2021-10-30 05:29:30,343:DEBUG:acme.client:Storing nonce: 0002HwxoFvFQL7Gk_DCu8g-Pxq7VFtUpMggqIXaammsF-1Y 2021-10-30 05:29:30,343:DEBUG:certbot._internal.renewal:Dry run: skipping updating lineage at /etc/letsencrypt/live/demo.saltalafila.online 2021-10-30 05:29:30,344:DEBUG:certbot._internal.updater:Skipping updaters in dry-run mode. 2021-10-30 05:29:30,344:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/test.fidely.club.conf 2021-10-30 05:29:30,345:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2021-10-30 05:29:30,345:DEBUG:certbot._internal.cli:Var server={'staging', 'dry_run'} (set by user). 2021-10-30 05:29:30,345:DEBUG:certbot._internal.cli:Var dry_run=True (set by user). 2021-10-30 05:29:30,345:DEBUG:certbot._internal.cli:Var server={'staging', 'dry_run'} (set by user). 2021-10-30 05:29:30,345:DEBUG:certbot._internal.cli:Var account={'server'} (set by user). 2021-10-30 05:29:30,366:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2021-10-30 05:29:30,373:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2021-10-30 05:29:30,374:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/test.fidely.club/cert1.pem is signed by the certificate's issuer. 2021-10-30 05:29:30,374:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/test.fidely.club/cert1.pem is: OCSPCertStatus.GOOD 2021-10-30 05:29:30,375:INFO:certbot._internal.renewal:Certificate not due for renewal, but simulating renewal for dry run 2021-10-30 05:29:30,375:DEBUG:certbot._internal.plugins.selection:Requested authenticator nginx and installer nginx 2021-10-30 05:29:30,511:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2021-10-30 05:29:30,511:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * nginx Description: Nginx Web Server plugin Interfaces: Installer, Authenticator, Plugin Entry point: nginx = certbot_nginx._internal.configurator:NginxConfigurator Initialized: Prep: True 2021-10-30 05:29:30,511:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer 2021-10-30 05:29:30,511:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator nginx, Installer nginx 2021-10-30 05:29:30,517:DEBUG:certbot._internal.main:Picked account: ), creation_host='parking.namesilo.com', register_to_eff=None))> 2021-10-30 05:29:30,517:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2021-10-30 05:29:30,518:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2021-10-30 05:29:30,944:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 822 2021-10-30 05:29:30,946:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:30 GMT Content-Type: application/json Content-Length: 822 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "bFNxSep4W6c": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-aaron-ari/renewalInfo/", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert" } 2021-10-30 05:29:30,947:DEBUG:certbot._internal.display.obj:Notifying user: Simulating renewal of an existing certificate for test.fidely.club 2021-10-30 05:29:31,059:DEBUG:acme.client:Requesting fresh nonce 2021-10-30 05:29:31,059:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce. 2021-10-30 05:29:31,200:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2021-10-30 05:29:31,201:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0002jo8rsT_8ihZQDyF_tAgWUBpG3pGP4umgdlWetd8G5xg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2021-10-30 05:29:31,201:DEBUG:acme.client:Storing nonce: 0002jo8rsT_8ihZQDyF_tAgWUBpG3pGP4umgdlWetd8G5xg 2021-10-30 05:29:31,201:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "test.fidely.club"\n }\n ]\n}' 2021-10-30 05:29:31,203:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAyam84cnNUXzhpaFpRRHlGX3RBZ1dVQnBHM3BHUDR1bWdkbFdldGQ4RzV4ZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fmVqjyy3g43CgAghrSP9DBePXI6kIySZby-Rwex6gXPCSi0Kep6MKKMZtl2pkoKJulF_ER_dsLj-zL11zSUinYiiQ2t7Ai5fUqt1iSYRWiQJxp4rpiSMdLMOvXyZ7pcjyNWP1Zid36TXoTAYZb4yHhRhjfS3QDN5KKooPW-LyKYTGsxMqxl3NrN1_byNpuwlH_tWNraoNaL-xJIsOqDu57afAPN7XnAkjog7doZcCwXsj6yh5bi5AphPpkigZWj3-9zZE0t84YEdEkuR7RCwsYIs_u0FlHGqrJ9Kk_84KL31DFRVwD1cSRZDQveMYBA5V9doGXehsUs1i6jmrmn7VQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRlc3QuZmlkZWx5LmNsdWIiCiAgICB9CiAgXQp9" } 2021-10-30 05:29:31,367:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2021-10-30 05:29:31,368:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sat, 30 Oct 2021 05:29:31 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/31888848/887376358 Replay-Nonce: 00021tIgWET4g8FFLmeuvuFJGqhs8hqD5wYUrki1pXoIX4w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2021-11-06T05:29:31Z", "identifiers": [ { "type": "dns", "value": "test.fidely.club" } ], "authorizations": [ "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086608" ], "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/31888848/887376358" } 2021-10-30 05:29:31,368:DEBUG:acme.client:Storing nonce: 00021tIgWET4g8FFLmeuvuFJGqhs8hqD5wYUrki1pXoIX4w 2021-10-30 05:29:31,368:DEBUG:acme.client:JWS payload: b'' 2021-10-30 05:29:31,371:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/817086608: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC8zMTg4ODg0OCIsICJub25jZSI6ICIwMDAyMXRJZ1dFVDRnOEZGTG1ldXZ1RkpHcWhzOGhxRDV3WVVya2kxcFhvSVg0dyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My84MTcwODY2MDgifQ", "signature": "Sdg6un8OHUyvKmMIgzt8MMiFVDyMvT5tFrwz-xCXggyhjDafH5xffbgIwxKKpS_RZz1-evWjp1vFpQxhzmCCzuebgw8hM5ZkrCaklAYvwOeytBdXIYyzrm718cUNWzQagJktXOOJVbD0VY4iN4X4fSzMgYzuXDoKpuG62319kBnN9-T8MbOjI1xoR1B0A5tLE_H4Qw2cEgWdUkArvxH9ggRS2MBqS2Cf6x4VOJtBsOINmnMXXW9WfQl0TOTpEQ9CCyJC0xwLcBMyRaaiklz9qJ5C--Dx6EqgCvai6QnnpcMX6Ot9mROJb_rmXRB8gN6hqMg2X78xsg5Nui1vvXzIRA", "payload": "" } 2021-10-30 05:29:31,515:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/817086608 HTTP/1.1" 200 815 2021-10-30 05:29:31,515:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sat, 30 Oct 2021 05:29:31 GMT Content-Type: application/json Content-Length: 815 Connection: keep-alive Boulder-Requester: 31888848 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: 0001BkBdSWatPYDhlVb7GNIAuplp7fRSoWS4XfNpcN_riFo X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "test.fidely.club" }, "status": "pending", "expires": "2021-11-06T05:29:31Z", "challenges": [ { "type": "http-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086608/uEWLxw", "token": "gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc" }, { "type": "dns-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086608/itSN6w", "token": "gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc" }, { "type": "tls-alpn-01", "status": "pending", "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/817086608/RkHSKg", "token": "gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc" } ] } 2021-10-30 05:29:31,516:DEBUG:acme.client:Storing nonce: 0001BkBdSWatPYDhlVb7GNIAuplp7fRSoWS4XfNpcN_riFo 2021-10-30 05:29:31,516:INFO:certbot._internal.auth_handler:Performing the following challenges: 2021-10-30 05:29:31,516:INFO:certbot._internal.auth_handler:http-01 challenge for test.fidely.club 2021-10-30 05:29:31,533:DEBUG:certbot_nginx._internal.http_01:Generated server block: [] 2021-10-30 05:29:31,534:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-geoip2.conf 2021-10-30 05:29:31,534:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-mail.conf 2021-10-30 05:29:31,534:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/10-mod-http-ndk.conf 2021-10-30 05:29:31,534:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-cache-purge.conf 2021-10-30 05:29:31,534:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-nchan.conf 2021-10-30 05:29:31,535:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-image-filter.conf 2021-10-30 05:29:31,535:DEBUG:certbot.reverter:Creating backup of /etc/nginx/conf.d/mod-http-passenger.conf 2021-10-30 05:29:31,535:DEBUG:certbot.reverter:Creating backup of /etc/nginx/nginx.conf 2021-10-30 05:29:31,535:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-headers-more-filter.conf 2021-10-30 05:29:31,535:DEBUG:certbot.reverter:Creating backup of /etc/nginx/mime.types 2021-10-30 05:29:31,535:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-auth-pam.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-stream.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-geoip.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-lua.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-subs-filter.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-xslt-filter.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-uploadprogress.conf 2021-10-30 05:29:31,536:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-perl.conf 2021-10-30 05:29:31,537:DEBUG:certbot.reverter:Creating backup of /etc/letsencrypt/options-ssl-nginx.conf 2021-10-30 05:29:31,537:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-dav-ext.conf 2021-10-30 05:29:31,537:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-passenger.conf 2021-10-30 05:29:31,537:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-fancyindex.conf 2021-10-30 05:29:31,537:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-echo.conf 2021-10-30 05:29:31,537:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/fidelity 2021-10-30 05:29:31,538:DEBUG:certbot.reverter:Creating backup of /etc/nginx/sites-enabled/default 2021-10-30 05:29:31,538:DEBUG:certbot.reverter:Creating backup of /etc/nginx/modules-enabled/50-mod-http-upstream-fair.conf 2021-10-30 05:29:31,539:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/nginx.conf: user www-data; worker_processes auto; pid /run/nginx.pid; include /etc/nginx/modules-enabled/*.conf; events { worker_connections 768; # multi_accept on; } http { include /etc/letsencrypt/le_http_01_cert_challenge.conf; server_names_hash_bucket_size 128; ## # Basic Settings ## sendfile on; tcp_nopush on; tcp_nodelay on; keepalive_timeout 65; types_hash_max_size 2048; # server_tokens off; # server_names_hash_bucket_size 64; # server_name_in_redirect off; include /etc/nginx/mime.types; default_type application/octet-stream; ## # SSL Settings ## ssl_protocols TLSv1 TLSv1.1 TLSv1.2 TLSv1.3; # Dropping SSLv3, ref: POODLE ssl_prefer_server_ciphers on; ## # Logging Settings ## access_log /var/log/nginx/access.log; error_log /var/log/nginx/error.log; ## # Gzip Settings ## gzip on; # gzip_vary on; # gzip_proxied any; # gzip_comp_level 6; # gzip_buffers 16 8k; # gzip_http_version 1.1; # gzip_types text/plain text/css application/json application/javascript text/xml application/xml application/xml+rss text/javascript; ## # Virtual Host Configs ## include /etc/nginx/conf.d/*.conf; include /etc/nginx/sites-enabled/*; } #mail { # # See sample authentication script at: # # http://wiki.nginx.org/ImapAuthenticateWithApachePhpScript # # # auth_http localhost/auth.php; # # pop3_capabilities "TOP" "USER"; # # imap_capabilities "IMAP4rev1" "UIDPLUS"; # # server { # listen localhost:110; # protocol pop3; # proxy on; # } # # server { # listen localhost:143; # protocol imap; # proxy on; # } #} 2021-10-30 05:29:31,539:DEBUG:certbot_nginx._internal.parser:Writing nginx conf tree to /etc/nginx/sites-enabled/fidelity: server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot server_name test.fidely.club; root /home/jerdvo/fidelity/current/public; passenger_enabled on; passenger_app_env development; location /cable { passenger_app_group_name fidelity_websocket; passenger_force_max_concurrent_requests_per_process 0; } # Allow uploads up to 100MB in size client_max_body_size 100m; location ~ ^/(assets|packs) { expires max; gzip_static on; } listen [::]:443 ssl ipv6only=on; # managed by Certbot listen 443 ssl; # managed by Certbot ssl_certificate /etc/letsencrypt/live/test.fidely.club/fullchain.pem; # managed by Certbot ssl_certificate_key /etc/letsencrypt/live/test.fidely.club/privkey.pem; # managed by Certbot include /etc/letsencrypt/options-ssl-nginx.conf; # managed by Certbot ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; # managed by Certbot location = /.well-known/acme-challenge/gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc{default_type text/plain;return 200 gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc.XiHVuQ75iZqPbDJVDtU8WmgjwTOVC28rDhNP3hhd2c8;} # managed by Certbot } server {rewrite ^(/.well-known/acme-challenge/.*) $1 break; # managed by Certbot if ($host = test.fidely.club) { return 301 https://$host$request_uri; } # managed by Certbot listen 80; listen [::]:80; server_name test.fidely.club; return 404; # managed by Certbot location = /.well-known/acme-challenge/gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc{default_type text/plain;return 200 gIJykDLW2W7MMV3h7RvBeXsxb8HDUzYdAJ0ggaKZ4Rc.XiHVuQ75iZqPbDJVDtU8WmgjwTOVC28rDhNP3hhd2c8;} # managed by Certbot } 2021-10-30 05:29:31,561:DEBUG:certbot_nginx._internal.configurator:nginx reload failed: nginx: [alert] kill(1341, 1) failed (3: No such process) 2021-10-30 05:29:34,089:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot_nginx/_internal/configurator.py", line 1179, in perform self.restart() File "/snap/certbot/1514/lib/python3.8/site-packages/certbot_nginx/_internal/configurator.py", line 967, in restart nginx_restart(self.conf('ctl'), self.nginx_conf, self.conf('sleep-seconds')) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot_nginx/_internal/configurator.py", line 1254, in nginx_restart raise errors.MisconfigurationError( certbot.errors.MisconfigurationError: nginx restart failed: nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] still could not bind() 2021-10-30 05:29:34,090:DEBUG:certbot._internal.error_handler:Calling registered functions 2021-10-30 05:29:34,090:INFO:certbot._internal.auth_handler:Cleaning up challenges 2021-10-30 05:29:34,237:DEBUG:certbot_nginx._internal.configurator:nginx reload failed: nginx: [alert] kill(1341, 1) failed (3: No such process) 2021-10-30 05:29:36,762:ERROR:certbot._internal.error_handler:Encountered exception during recovery: certbot.errors.MisconfigurationError: nginx restart failed: nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] still could not bind() 2021-10-30 05:29:36,763:ERROR:certbot._internal.renewal:Failed to renew certificate test.fidely.club with error: nginx restart failed: nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] still could not bind() 2021-10-30 05:29:36,764:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 475, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/main.py", line 1386, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/main.py", line 122, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 335, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/client.py", line 384, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/client.py", line 434, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot_nginx/_internal/configurator.py", line 1179, in perform self.restart() File "/snap/certbot/1514/lib/python3.8/site-packages/certbot_nginx/_internal/configurator.py", line 967, in restart nginx_restart(self.conf('ctl'), self.nginx_conf, self.conf('sleep-seconds')) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot_nginx/_internal/configurator.py", line 1254, in nginx_restart raise errors.MisconfigurationError( certbot.errors.MisconfigurationError: nginx restart failed: nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:443 failed (98: Address already in use) nginx: [emerg] bind() to 0.0.0.0:80 failed (98: Address already in use) nginx: [emerg] bind() to [::]:80 failed (98: Address already in use) nginx: [emerg] still could not bind() 2021-10-30 05:29:36,764:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2021-10-30 05:29:36,764:DEBUG:certbot._internal.display.obj:Notifying user: The following simulated renewals succeeded: 2021-10-30 05:29:36,764:DEBUG:certbot._internal.display.obj:Notifying user: /etc/letsencrypt/live/demo.saltalafila.online/fullchain.pem (success) 2021-10-30 05:29:36,764:ERROR:certbot._internal.renewal:The following simulated renewals failed: 2021-10-30 05:29:36,765:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/test.fidely.club/fullchain.pem (failure) 2021-10-30 05:29:36,765:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2021-10-30 05:29:36,765:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/snap/certbot/1514/bin/certbot", line 8, in sys.exit(main()) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/main.py", line 15, in main return internal_main.main(cli_args) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/main.py", line 1574, in main return config.func(config, plugins) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/main.py", line 1460, in renew renewal.handle_renewal_request(config) File "/snap/certbot/1514/lib/python3.8/site-packages/certbot/_internal/renewal.py", line 500, in handle_renewal_request raise errors.Error("{0} renew failure(s), {1} parse failure(s)".format( certbot.errors.Error: 1 renew failure(s), 0 parse failure(s) 2021-10-30 05:29:36,765:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)