添加链接
link管理
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接
rinatrix.com

I ran this command:
I'm following a tutorial to create a dockerized django-react-postgres-nginx program and putting it on an AWS EC2 instance ( Docker-Compose for Django and React with Nginx reverse-proxy and Let’s encrypt certificate | React and Django Tutorial ). The instance works and the app works. I am trying to get a certificate with

sudo ./init-letsencrypt.sh

Before all the outputs... I tried a bunch of other people suggestions from this website, including enabeling IPv6 on AWS (didn't help).

It produced this output:

## #Downloading recommended TLS parameters ...

## #Creating dummy certificate for rinatrix.com ...
/snap/docker/2343/lib/python3.6/site-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography and will be removed in a future release.
from cryptography.hazmat.backends import default_backend
Creating app_certbot_run ... done
Generating a RSA private key
.........................+++++
...+++++
writing new private key to '/etc/letsencrypt/live/rinatrix.com/privkey.pem'

## #Starting nginx ...
/snap/docker/2343/lib/python3.6/site-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography and will be removed in a future release.
from cryptography.hazmat.backends import default_backend
Recreating app_db_1 ... done
Recreating app_backend_1 ... done
Recreating app_nginx_1 ... done

## #Deleting dummy certificate for rinatrix.com ...
/snap/docker/2343/lib/python3.6/site-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography and will be removed in a future release.
from cryptography.hazmat.backends import default_backend
Creating app_certbot_run ... done

## #Requesting Let's Encrypt certificate for rinatrix.com ...
/snap/docker/2343/lib/python3.6/site-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography and will be removed in a future release.
from cryptography.hazmat.backends import default_backend
Creating app_certbot_run ... done
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator webroot, Installer None
An unexpected error occurred:
requests.exceptions.ConnectTimeout: HTTPSConnectionPool(host=' acme-staging-v02.api.letsencrypt.org ', port=443): Max retries exceeded with url: /directory (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7f3a35fcb910>, 'Connection to acme-staging-v02.api.letsencrypt.org timed out. (connect timeout=45)'))
Ask for help or search for solutions at https://community.letsencrypt.org . See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
ERROR: 1

## #Reloading nginx ...
/snap/docker/2343/lib/python3.6/site-packages/paramiko/transport.py:33: CryptographyDeprecationWarning: Python 3.6 is no longer supported by the Python core team. Therefore, support for it is deprecated in cryptography and will be removed in a future release.
from cryptography.hazmat.backends import default_backend
2023/03/01 03:53:42 [emerg] 30#30: cannot load certificate "/etc/letsencrypt/live/rinatrix.com/fullchain.pem": BIO_new_file() failed (SSL: error:02001002:system library:fopen:No such file or directory:fopen('/etc/letsencrypt/live/rinatrix.com/fullchain.pem','r') error:2006D080:BIO routines:BIO_new_file:no such file)
nginx: [emerg] cannot load certificate "/etc/letsencrypt/live/rinatrix.com/fullchain.pem": BIO_new_file() failed (SSL: error:02001002:system library:fopen:No such file or directory:fopen('/etc/letsencrypt/live/rinatrix.com/fullchain.pem','r') error:2006D080:BIO routines:BIO_new_file:no such file)

/var/log/letsencrypt/letsencrypt.log

023-03-01 03:28:14,944:DEBUG:urllib3.connectionpool: http://localhost :None "GET /v2/connections?sna>
2023-03-01 03:28:15,194:DEBUG:certbot._internal.main:certbot version: 2.3.0
2023-03-01 03:28:15,194:DEBUG:certbot._internal.main:Location of certbot entry point: /snap/certbot>
2023-03-01 03:28:15,194:DEBUG:certbot._internal.main:Arguments: ['--preconfigured-renewal']
2023-03-01 03:28:15,194:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntr>
2023-03-01 03:28:15,209:DEBUG:certbot._internal.log:Root logging level set at 30
2023-03-01 03:28:15,211:DEBUG:certbot._internal.display.obj:Notifying user: No certificates found.

nginx settings (default.conf)

server {
    listen 80;
    server_name rinatrix.com;
    server_tokens off;
    location /.well-known/acme-challenge/ {
        root /var/www/certbot;
    location / {
        return 301 https://$host$request_uri;
server {
    listen 443 ssl;
    server_name rinatrix.com;
    server_tokens off;
    ssl_certificate /etc/letsencrypt/live/rinatrix.com/fullchain.pem;
    ssl_certificate_key /etc/letsencrypt/live/rinatrix.com/privkey.pem;
    include /etc/letsencrypt/options-ssl-nginx.conf;
    ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
    client_max_body_size 20M;
    location / {
        root   /usr/share/nginx/html;
        index  index.html index.htm;
        try_files $uri $uri/ /index.html;
    location /api {
        try_files $uri @proxy_api;
    location /djangoadmin {
        try_files $uri @proxy_api;
    location /rest-auth {
        try_files $uri @proxy_api;
    location /api-auth {
        try_files $uri @proxy_api;
#     location /admin {
#         try_files $uri @proxy_api;
#     }
    location @proxy_api {
        proxy_set_header X-Forwarded-Proto https;
        proxy_set_header X-Url-Scheme $scheme;
        proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
        proxy_set_header Host $http_host;
        proxy_redirect off;
        proxy_pass   http://backend:8000;
    location /django_static/ {
        autoindex on;
        alias /app/backend/nabuconnect/django_static/;

My web server is (include version):

The operating system my web server runs on is (include version):

Ubuntu 22.04.1 LTS (GNU/Linux 5.15.0-1028-aws x86_64)

My hosting provider, if applicable, is:
This might be what I put above. Apologies.

I can login to a root shell on my machine (yes or no, or I don't know):

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):
certbot 2.3.0

a call that someone else had asked someone for before

echo | openssl s_client -connect acme-v02.api.letsencrypt.org:443 -servername acme-v02.api.letsencrypt.org | head
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = acme-v02.api.letsencrypt.org
verify return:1
CONNECTED(00000003)

Certificate chain
0 s:CN = acme-v02.api.letsencrypt.org
i:C = US, O = Let's Encrypt, CN = R3
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Dec 31 18:46:12 2022 GMT; NotAfter: Mar 31 18:46:11 2023 GMT
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256

ANother one someone asked for

curl -I https://acme-staging-v02.api.letsencrypt.org/directory 1
HTTP/2 200
server: nginx
date: Wed, 01 Mar 2023 02:51:29 GMT
content-type: application/json
content-length: 830
cache-control: public, max-age=0, no-cache
replay-nonce: 8F05dUwO77RKfWonpF1v2XMGIUEXo-yk3aJgVhFc1GK7g24
x-frame-options: DENY
strict-transport-security: max-age=604800

curl -LIv4

curl -LIv4 https://acme-v02.api.letsencrypt.org/

  • Trying 172.65.32.248:443...
  • Connected to acme-v02.api.letsencrypt.org (172.65.32.248) port 443 (#0)
  • ALPN, offering h2
  • ALPN, offering http/1.1
  • CAfile: /etc/ssl/certs/ca-certificates.crt
  • CApath: /etc/ssl/certs
  • TLSv1.0 (OUT), TLS header, Certificate Status (22):
  • TLSv1.3 (OUT), TLS handshake, Client hello (1):
  • TLSv1.2 (IN), TLS header, Certificate Status (22):
  • TLSv1.3 (IN), TLS handshake, Server hello (2):
  • TLSv1.2 (IN), TLS header, Finished (20):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.3 (IN), TLS handshake, Certificate (11):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.3 (IN), TLS handshake, CERT verify (15):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.3 (IN), TLS handshake, Finished (20):
  • TLSv1.2 (OUT), TLS header, Finished (20):
  • TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
  • TLSv1.2 (OUT), TLS header, Supplemental data (23):
  • TLSv1.3 (OUT), TLS handshake, Finished (20):
  • SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
  • ALPN, server accepted to use h2
  • Server certificate:
  • subject: CN=acme-v02.api.letsencrypt.org
  • start date: Feb 28 22:32:51 2023 GMT
  • expire date: May 29 22:32:50 2023 GMT
  • subjectAltName: host "acme-v02.api.letsencrypt.org" matched cert's "acme-v02.api.letsencrypt.org"
  • issuer: C=US; O=Let's Encrypt; CN=R3
  • SSL certificate verify ok.
  • Using HTTP2, server supports multiplexing
  • Connection state changed (HTTP/2 confirmed)
  • Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
  • TLSv1.2 (OUT), TLS header, Supplemental data (23):
  • TLSv1.2 (OUT), TLS header, Supplemental data (23):
  • TLSv1.2 (OUT), TLS header, Supplemental data (23):
  • Using Stream ID: 1 (easy handle 0x559d8434c550)
  • TLSv1.2 (OUT), TLS header, Supplemental data (23):
  • HEAD / HTTP/2
    Host: acme-v02.api.letsencrypt.org
    user-agent: curl/7.81.0
    accept: /

  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
  • old SSL session ID is stale, removing
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
  • TLSv1.2 (OUT), TLS header, Supplemental data (23):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
  • TLSv1.2 (IN), TLS header, Supplemental data (23):
    < HTTP/2 200
    HTTP/2 200
    < server: nginx
    server: nginx
    < date: Wed, 01 Mar 2023 04:47:28 GMT
    date: Wed, 01 Mar 2023 04:47:28 GMT
    < content-type: text/html
    content-type: text/html
    < content-length: 1540
    content-length: 1540
    < last-modified: Thu, 23 Jun 2022 21:25:45 GMT
    last-modified: Thu, 23 Jun 2022 21:25:45 GMT
    < etag: "62b4da59-604"
    etag: "62b4da59-604"
    < x-frame-options: DENY
    x-frame-options: DENY
    < strict-transport-security: max-age=604800
    strict-transport-security: max-age=604800
  • Connection #0 to host acme-v02.api.letsencrypt.org left intact
  • curl curl -LIv6

    curl -LIv6 https://acme-v02.api.letsencrypt.org/

  • Trying 2606:4700:60:0:f53d:5624:85c7:3a2c:443...
  • connect to 2606:4700:60:0:f53d:5624:85c7:3a2c port 443 failed: Connection timed out
  • Failed to connect to acme-v02.api.letsencrypt.org port 443 after 130939 ms: Connection timed out
  • Closing connection 0
    curl: (28) Failed to connect to acme-v02.api.letsencrypt.org port 443 after 130939 ms: Connection timed out
  • natrix:

    nginx: [emerg] cannot load certificate "/etc/letsencrypt/live/rinatrix.com/fullchain.pem":
    fopen:No such file

    Why is that in your config?:

    natrix:
        ssl_certificate /etc/letsencrypt/live/rinatrix.com/fullchain.pem;
        ssl_certificate_key /etc/letsencrypt/live/rinatrix.com/privkey.pem;
    

    Are you in the right container?
    What shows?:
    certbot certificates

    I'm starting to doubt:

    natrix:

    The instance works and the app works.

    You must have a working HTTP site before you can use HTTP-01 authentication to obtain a cert for it.

    certbot certificats says there are no certificates.

    I included those .pem because they were in the tutorial.

    You're right about the working. I realized it was on my host that it worked without an issue but not AWS. I changed it to development, removed the certbot service, and now if I curlt localhost --> it gives the homepage httml although it doesn't work in a web browser. I installed nginx outside of the contianer and it put up the nginx welcome page for rinatrix.com so the DNS appears to be ok.

    I guess I got to get this working. Any idea what might be causing this issue where it works locally on AWS but not thogh a browser?

    natrix:

    I installed nginx outside of the contianer and it put up the nginx welcome page for rinatrix.com so the DNS appears to be ok.

    I guess I got to get this working. Any idea what might be causing this issue where it works locally on AWS but not thogh a browser?

    I see none of it working:

    curl -Ii http://rinatrix.com/
    curl: (56) Recv failure: Connection reset by peer
    curl -Ii http://www.rinatrix.com/
    curl: (6) Could not resolve host: www.rinatrix.com
    

    Presently I am seeing this:

    $ nmap -Pn rinatrix.com
    Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-01 22:04 UTC
    Nmap scan report for rinatrix.com (3.138.94.177)
    Host is up (0.082s latency).
    rDNS record for 3.138.94.177: ec2-3-138-94-177.us-east-2.compute.amazonaws.com
    Not shown: 997 filtered ports
    PORT     STATE  SERVICE
    80/tcp   open   http
    443/tcp  closed https
    8000/tcp closed http-alt
    Nmap done: 1 IP address (1 host up) scanned in 9.36 seconds
    
    $ nmap -Pn www.rinatrix.com
    Starting Nmap 7.80 ( https://nmap.org ) at 2023-03-01 22:04 UTC
    Nmap scan report for www.rinatrix.com (3.138.94.177)
    Host is up (0.054s latency).
    rDNS record for 3.138.94.177: ec2-3-138-94-177.us-east-2.compute.amazonaws.com
    Not shown: 997 filtered ports
    PORT     STATE  SERVICE
    80/tcp   open   http
    443/tcp  closed https
    8000/tcp closed http-alt
    Nmap done: 1 IP address (1 host up) scanned in 8.00 seconds
    
    $ curl -Ii http://rinatrix.com/.well-known/acme-challenge/sometestfile                                               HTTP/1.1 200 OK
    Server: nginx
    Date: Wed, 01 Mar 2023 22:08:23 GMT
    Content-Type: text/html
    Content-Length: 2289
    Last-Modified: Wed, 01 Mar 2023 22:03:42 GMT
    Connection: keep-alive
    ETag: "63ffcbbe-8f1"
    Accept-Ranges: bytes
    
    $ curl -Ii http://www.rinatrix.com/.well-known/acme-challenge/sometestfile                                           HTTP/1.1 200 OK
    Server: nginx
    Date: Wed, 01 Mar 2023 22:08:28 GMT
    Content-Type: text/html
    Content-Length: 2289
    Last-Modified: Wed, 01 Mar 2023 22:03:42 GMT
    Connection: keep-alive
    ETag: "63ffcbbe-8f1"
    Accept-Ranges: bytes
                  

    Ok so now the HTTP works. The problem now is when I try to get my staging certificates, I get an error.

    My new nginx default.conf is as follows (I commented out the .pem lines as seen in a different forum here).

    server { listen 80; # listen [::]:80; server_name rinatrix.com www.rinatrix.com; server_tokens off; location /.well-known/acme-challenge/ { root /var/www/certbot; location / { return 301 https://$host$request_uri; server { listen 443 ssl; # listen [::]:443 ssl http2; server_name rinatrix.com www.rinatrix.com; server_tokens off; # ssl_certificate /etc/letsencrypt/live/rinatrix.com/fullchain.pem; # ssl_certificate_key /etc/letsencrypt/live/rinatrix.com/privkey.pem; include /etc/letsencrypt/options-ssl-nginx.conf; ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; client_max_body_size 20M; location / { root /usr/share/nginx/html; index index.html index.htm; try_files $uri $uri/ /index.html; location /api { try_files $uri @proxy_api; location /djangoadmin { try_files $uri @proxy_api; rewrite ^([^.]*[^/])$ $1/ permanent; location /rest-auth { try_files $uri @proxy_api; location /api-auth { try_files $uri @proxy_api; # location /admin { # try_files $uri @proxy_api; # } location @proxy_api { proxy_set_header X-Forwarded-Proto https; proxy_set_header X-Url-Scheme $scheme; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_pass http://backend:8000; location /django_static/ { autoindex on; alias /app/backend/nabuconnect/django_static/;

    When I run sudo ./init-letsencrypt.sh I get:

    Existing data found for rinatrix.com. Continue and replace existing certificate? (y/N) y
    ### Creating dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Generating a RSA private key
    ....+++++
    .................................................................................+++++
    writing new private key to '/etc/letsencrypt/live/rinatrix.com/privkey.pem'
    -----
    ### Starting nginx ...
    Recreating app_db_1 ... done
    Recreating app_backend_1 ... done
    Recreating app_nginx_1   ... done
    ### Deleting dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    ### Requesting Let's Encrypt certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Plugins selected: Authenticator webroot, Installer None
    Requesting a certificate for rinatrix.com and www.rinatrix.com
    Performing the following challenges:
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Using the webroot path /var/www/certbot for all unmatched domains.
    Waiting for verification...
    Challenge failed for domain rinatrix.com
    Challenge failed for domain www.rinatrix.com
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
      Domain: rinatrix.com
      Type:   unauthorized
      Detail: 3.138.94.177: Invalid response from http://rinatrix.com/.well-known/acme-challenge/6N1oPwiDwUaIYQkVNj9lT8OelXfeBv8VwJ-Nk6TzUFk: "<!doctype html><html lang=\"en\"><head><meta charset=\"utf-8\"/><link rel=\"icon\" href=\"/nabu_short.png\"/><meta name=\"viewport\" conte"
      Domain: www.rinatrix.com
      Type:   unauthorized
      Detail: 3.138.94.177: Invalid response from http://www.rinatrix.com/.well-known/acme-challenge/rxSPnWiZaMDPNbiv8Sr09mfitA8b7Qhip5fjEgqTmD8: "<!doctype html><html lang=\"en\"><head><meta charset=\"utf-8\"/><link rel=\"icon\" href=\"/nabu_short.png\"/><meta name=\"viewport\" conte"
    Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
    Cleaning up challenges
    Some challenges have failed.
    Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
    ERROR: 1
    ### Reloading nginx ...
    2023/03/02 22:31:01 [notice] 29#29: signal process started
    

    The nginx log:

    nginx_1    | 18.217.136.52 - - [02/Mar/2023:22:30:58 +0000] "GET /.well-known/acme-challenge/6N1oPwiDwUaIYQkVNj9lT8OelXfeBv8VwJ-Nk6TzUFk HTTP/1.1" 200 2289 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" "-"
    nginx_1    | 18.217.136.52 - - [02/Mar/2023:22:30:58 +0000] "GET /.well-known/acme-challenge/rxSPnWiZaMDPNbiv8Sr09mfitA8b7Qhip5fjEgqTmD8 HTTP/1.1" 200 2289 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" "-"
    nginx_1    | 34.221.246.20 - - [02/Mar/2023:22:30:58 +0000] "GET /.well-known/acme-challenge/6N1oPwiDwUaIYQkVNj9lT8OelXfeBv8VwJ-Nk6TzUFk HTTP/1.1" 200 2289 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" "-"
    nginx_1    | 23.178.112.106 - - [02/Mar/2023:22:30:58 +0000] "GET /.well-known/acme-challenge/6N1oPwiDwUaIYQkVNj9lT8OelXfeBv8VwJ-Nk6TzUFk HTTP/1.1" 200 2289 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" "-"
    nginx_1    | 23.178.112.107 - - [02/Mar/2023:22:30:58 +0000] "GET /.well-known/acme-challenge/rxSPnWiZaMDPNbiv8Sr09mfitA8b7Qhip5fjEgqTmD8 HTTP/1.1" 200 2289 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" "-"
    nginx_1    | 34.221.246.20 - - [02/Mar/2023:22:30:58 +0000] "GET /.well-known/acme-challenge/rxSPnWiZaMDPNbiv8Sr09mfitA8b7Qhip5fjEgqTmD8 HTTP/1.1" 200 2289 "-" "Mozilla/5.0 (compatible; Let's Encrypt validation server; +https://www.letsencrypt.org)" "-"
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: signal 1 (SIGHUP) received from 29, reconfiguring
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: reconfiguring
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: using the "epoll" event method
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: start worker processes
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: start worker process 35
    nginx_1    | 2023/03/02 22:31:02 [notice] 28#28: gracefully shutting down
    nginx_1    | 2023/03/02 22:31:02 [notice] 28#28: exiting
    nginx_1    | 2023/03/02 22:31:02 [notice] 28#28: exit
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: signal 17 (SIGCHLD) received from 28
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: worker process 28 exited with code 0
    nginx_1    | 2023/03/02 22:31:02 [notice] 1#1: signal 29 (SIGIO) received
    

    /var/log/letsencrypt/letsencrypt.log is empty.

    I put 'Test-File' in the container at /var/www/certbot/

    http://rinatrix.com/.well-known/acme-challenge/Test-File

    When I go to it it just shows my javascrip site.

    I have the site up in detached mode so you all can see.

    I put 'Test-File' in the container at /var/www/certbot/

    http://rinatrix.com/.well-known/acme-challenge/Test-File

    Here is what I see with curl

    $ curl -Ii http://rinatrix.com/.well-known/acme-challenge/Test-File
    HTTP/1.1 200 OK
    Server: nginx
    Date: Thu, 02 Mar 2023 22:46:30 GMT
    Content-Type: text/html
    Content-Length: 2289
    Last-Modified: Wed, 01 Mar 2023 22:03:42 GMT
    Connection: keep-alive
    ETag: "63ffcbbe-8f1"
    Accept-Ranges: bytes
    

    This nginx configuration is not the one that is actually running.

    If it was, then visiting the domain should result in a 301 redirect, right?

    Instead, we see your website:

    $ curl -i rinatrix.com
    HTTP/1.1 200 OK
    Server: nginx
    Date: Thu, 02 Mar 2023 23:42:42 GMT
    Content-Type: text/html
    Content-Length: 2289
    Last-Modified: Wed, 01 Mar 2023 22:03:42 GMT
    Connection: keep-alive
    ETag: "63ffcbbe-8f1"
    Accept-Ranges: bytes
    <!doctype html><html lang="en">...snip...
    

    So the effective nginx configuration is different to the one you've posted.

    So I see what my issue was, I was loading the wrong folder. Now it's set to use those nginx settings.

    Currently what I get is:

    ubuntu@ip-172-31-38-5:~/app$ sudo ./init-letsencrypt.sh 
    Existing data found for rinatrix.com. Continue and replace existing certificate? (y/N) y
    ### Creating dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Generating a RSA private key
    .............+++++
    ...................................+++++
    writing new private key to '/etc/letsencrypt/live/rinatrix.com/privkey.pem'
    -----
    ### Starting nginx ...
    Recreating app_db_1 ... done
    Recreating app_backend_1 ... done
    Recreating app_nginx_1   ... done
    ### Deleting dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    ### Requesting Let's Encrypt certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Plugins selected: Authenticator webroot, Installer None
    Requesting a certificate for rinatrix.com and www.rinatrix.com
    Performing the following challenges:
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Using the webroot path /var/www/certbot for all unmatched domains.
    Waiting for verification...
    Challenge failed for domain rinatrix.com
    Challenge failed for domain www.rinatrix.com
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
      Domain: rinatrix.com
      Type:   connection
      Detail: 3.138.94.177: Fetching http://rinatrix.com/.well-known/acme-challenge/UDa0ndOx0wD4DACuhn4ClBoxQi6cSMMgD7Qy1Ww44-I: Connection refused
      Domain: www.rinatrix.com
      Type:   connection
      Detail: 3.138.94.177: Fetching http://www.rinatrix.com/.well-known/acme-challenge/ggfpMVMcIFuITfPTIC3KkaEe1Lrqy_3tZ9cVR9foSYg: Connection refused
    Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
    Cleaning up challenges
    Some challenges have failed.
    Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
    ERROR: 1
    ### Reloading nginx ...
    
    nginx_1    | /docker-entrypoint.sh: /docker-entrypoint.d/ is not empty, will attempt to perform configuration
    nginx_1    | /docker-entrypoint.sh: Looking for shell scripts in /docker-entrypoint.d/
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/10-listen-on-ipv6-by-default.sh
    nginx_1    | 10-listen-on-ipv6-by-default.sh: info: Getting the checksum of /etc/nginx/conf.d/default.conf
    nginx_1    | 10-listen-on-ipv6-by-default.sh: info: /etc/nginx/conf.d/default.conf differs from the packaged version
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/20-envsubst-on-templates.sh
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/30-tune-worker-processes.sh
    nginx_1    | /docker-entrypoint.sh: Configuration complete; ready for start up
    nginx_1    | 2023/03/03 02:17:40 [emerg] 1#1: no "ssl_certificate" is defined for the "listen ... ssl" directive in /etc/nginx/conf.d/default.conf:16
    nginx_1    | nginx: [emerg] no "ssl_certificate" is defined for the "listen ... ssl" directive in /etc/nginx/conf.d/default.conf:16
    app_nginx_1 exited with code 1
    

    /var/log/letsencrypt/letsencrypt.log doesn't exist

    certbot certificates

    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    No certificates found.
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    

    Now nginx just keeps restarting becasue what appears to me, it cannot find a certificate. I honestly don't know what to do to try to fix this.

    I did just try commenting out the 443 server part and I get.

    ubuntu@ip-172-31-38-5:~/app$ curl -i rinatrix.com
    HTTP/1.1 301 Moved Permanently
    Server: nginx
    Date: Fri, 03 Mar 2023 02:30:37 GMT
    Content-Type: text/html
    Content-Length: 162
    Connection: keep-alive
    Location: https://rinatrix.com/
    <head><title>301 Moved Permanently</title></head>
    <center><h1>301 Moved Permanently</h1></center>
    <hr><center>nginx</center>
    </body>
    </html>
    

    I don't know if it helps but hopefully it can help give some pointers.

    ssl_certificate /etc/letsencrypt/live/rinatrix.com/fullchain.pem; ssl_certificate_key /etc/letsencrypt/live/rinatrix.com/privkey.pem; include /etc/letsencrypt/options-ssl-nginx.conf; ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem; client_max_body_size 20M; location / { root /usr/share/nginx/html; index index.html index.htm; try_files $uri $uri/ /index.html; location /api { try_files $uri @proxy_api; location /djangoadmin { try_files $uri @proxy_api; rewrite ^([^.]*[^/])$ $1/ permanent; location /rest-auth { try_files $uri @proxy_api; location /api-auth { try_files $uri @proxy_api; # location /admin { # try_files $uri @proxy_api; # } location @proxy_api { proxy_set_header X-Forwarded-Proto https; proxy_set_header X-Url-Scheme $scheme; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header Host $http_host; proxy_redirect off; proxy_pass http://backend:8000; location /django_static/ { autoindex on; alias /app/backend/nabuconnect/django_static/;

    Output from sudo ./init-letsencrypt.sh

    ubuntu@ip-172-31-38-5:~/app$ sudo ./init-letsencrypt.sh 
    Existing data found for rinatrix.com. Continue and replace existing certificate? (y/N) y
    ### Creating dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Generating a RSA private key
    ..+++++
    .........................+++++
    writing new private key to '/etc/letsencrypt/live/rinatrix.com/privkey.pem'
    -----
    ### Starting nginx ...
    Recreating app_db_1 ... done
    Recreating app_backend_1 ... done
    Recreating app_nginx_1   ... done
    ### Deleting dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    ### Requesting Let's Encrypt certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Plugins selected: Authenticator webroot, Installer None
    Requesting a certificate for rinatrix.com and www.rinatrix.com
    Performing the following challenges:
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Using the webroot path /var/www/certbot for all unmatched domains.
    Waiting for verification...
    Challenge failed for domain rinatrix.com
    Challenge failed for domain www.rinatrix.com
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
      Domain: rinatrix.com
      Type:   connection
      Detail: 3.138.94.177: Fetching http://rinatrix.com/.well-known/acme-challenge/vcvRRZazjfStfJtJHfZINpW9uHcvEyWVE3A2MkBVRis: Connection refused
      Domain: www.rinatrix.com
      Type:   connection
      Detail: 3.138.94.177: Fetching http://www.rinatrix.com/.well-known/acme-challenge/xT9k4h4cSqd2iX8EAHtxmR9BlsfJzRHuJcI5iJJ8I1M: Connection refused
    Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
    Cleaning up challenges
    Some challenges have failed.
    Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
    ERROR: 1
    ### Reloading nginx ...
    

    nginx output

    nginx_1    | /docker-entrypoint.sh: /docker-entrypoint.d/ is not empty, will attempt to perform configuration
    nginx_1    | /docker-entrypoint.sh: Looking for shell scripts in /docker-entrypoint.d/
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/10-listen-on-ipv6-by-default.sh
    nginx_1    | 10-listen-on-ipv6-by-default.sh: info: Getting the checksum of /etc/nginx/conf.d/default.conf
    nginx_1    | 10-listen-on-ipv6-by-default.sh: info: /etc/nginx/conf.d/default.conf differs from the packaged version
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/20-envsubst-on-templates.sh
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/30-tune-worker-processes.sh
    nginx_1    | /docker-entrypoint.sh: Configuration complete; ready for start up
    nginx_1    | 2023/03/03 02:41:18 [emerg] 1#1: open() "/etc/letsencrypt/options-ssl-nginx.conf" failed (2: No such file or directory) in /etc/nginx/conf.d/default.conf:24
    nginx_1    | nginx: [emerg] open() "/etc/letsencrypt/options-ssl-nginx.conf" failed (2: No such file or directory) in /etc/nginx/conf.d/default.conf:24
    app_nginx_1 exited with code 1
        ssl_certificate /etc/letsencrypt/live/rinatrix.com/fullchain.pem;
        ssl_certificate_key /etc/letsencrypt/live/rinatrix.com/privkey.pem;
        # include /etc/letsencrypt/options-ssl-nginx.conf;
        # ssl_dhparam /etc/letsencrypt/ssl-dhparams.pem;
        client_max_body_size 20M;
        location / {
            root   /usr/share/nginx/html;
            index  index.html index.htm;
            try_files $uri $uri/ /index.html;
        location /api {
            try_files $uri @proxy_api;
        location /djangoadmin {
            try_files $uri @proxy_api;
            rewrite ^([^.]*[^/])$ $1/ permanent;
        location /rest-auth {
            try_files $uri @proxy_api;
        location /api-auth {
            try_files $uri @proxy_api;
    #     location /admin {
    #         try_files $uri @proxy_api;
    #     }
        location @proxy_api {
            proxy_set_header X-Forwarded-Proto https;
            proxy_set_header X-Url-Scheme $scheme;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_set_header Host $http_host;
            proxy_redirect off;
            proxy_pass   http://backend:8000;
        location /django_static/ {
            autoindex on;
            alias /app/backend/nabuconnect/django_static/;
    
    nginx_1    | 10-listen-on-ipv6-by-default.sh: info: /etc/nginx/conf.d/default.conf differs from the packaged version
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/20-envsubst-on-templates.sh
    nginx_1    | /docker-entrypoint.sh: Launching /docker-entrypoint.d/30-tune-worker-processes.sh
    nginx_1    | /docker-entrypoint.sh: Configuration complete; ready for start up
    nginx_1    | 2023/03/03 02:47:44 [emerg] 1#1: cannot load certificate "/etc/letsencrypt/live/rinatrix.com/fullchain.pem": BIO_new_file() failed (SSL: error:02001002:system library:fopen:No such file or directory:fopen('/etc/letsencrypt/live/rinatrix.com/fullchain.pem','r') error:2006D080:BIO routines:BIO_new_file:no such file)
    nginx_1    | nginx: [emerg] cannot load certificate "/etc/letsencrypt/live/rinatrix.com/fullchain.pem": BIO_new_file() failed (SSL: error:02001002:system library:fopen:No such file or directory:fopen('/etc/letsencrypt/live/rinatrix.com/fullchain.pem','r') error:2006D080:BIO routines:BIO_new_file:no such file)
    app_nginx_1 exited with code 1
    
    ubuntu@ip-172-31-38-5:~/app$ sudo ./init-letsencrypt.sh 
    Existing data found for rinatrix.com. Continue and replace existing certificate? (y/N) y
    ### Creating dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Generating a RSA private key
    ..+++++
    .............+++++
    writing new private key to '/etc/letsencrypt/live/rinatrix.com/privkey.pem'
    -----
    ### Starting nginx ...
    Recreating app_db_1 ... done
    Recreating app_backend_1 ... done
    Recreating app_nginx_1   ... done
    ### Deleting dummy certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    ### Requesting Let's Encrypt certificate for rinatrix.com ...
    Creating app_certbot_run ... done
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Plugins selected: Authenticator webroot, Installer None
    Requesting a certificate for rinatrix.com and www.rinatrix.com
    Performing the following challenges:
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Using the webroot path /var/www/certbot for all unmatched domains.
    Waiting for verification...
    Challenge failed for domain rinatrix.com
    Challenge failed for domain www.rinatrix.com
    http-01 challenge for rinatrix.com
    http-01 challenge for www.rinatrix.com
    Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
      Domain: rinatrix.com
      Type:   connection
      Detail: 3.138.94.177: Fetching http://rinatrix.com/.well-known/acme-challenge/Xdz0PJ8YzAMOBABDEgG6g7YRmfPeSSEag8IIUZHDxrw: Connection refused
      Domain: www.rinatrix.com
      Type:   connection
      Detail: 3.138.94.177: Fetching http://www.rinatrix.com/.well-known/acme-challenge/_WTbBQdNE_ckLo2h9uab9iNvVQaufVC_dGHAG48c4tc: Connection refused
    Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
    Cleaning up challenges
    Some challenges have failed.
    Ask for help or search for solutions at https://community.letsencrypt.org. See the logfile /var/log/letsencrypt/letsencrypt.log or re-run Certbot with -v for more details.
    ERROR: 1
    ### Reloading nginx ...
    OCI runtime exec failed: exec failed: cannot exec in a stopped container: unknown
                  

    So I just figured out how to get into the contianer and run the command to request the certificate in staging... it failed. But now I checked the log in the container and this is what I found. Hopefully it will make sense to you.

    /opt/certbot # cat /var/log/letsencrypt/letsencrypt.log
    2023-03-03 04:24:20,465:DEBUG:certbot._internal.main:certbot version: 2.3.0
    2023-03-03 04:24:20,466:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot
    2023-03-03 04:24:20,466:DEBUG:certbot._internal.main:Arguments: ['--webroot', '-w', '/var/www/certbot', '--email', '[email protected]', '--agree-tos', '--no-eff-email', '--staging', '-d', 'rinatrix.com', '-d', 'www.rinatrix.com']
    2023-03-03 04:24:20,466:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
    2023-03-03 04:24:20,482:DEBUG:certbot._internal.log:Root logging level set at 30
    2023-03-03 04:24:20,485:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None
    2023-03-03 04:24:20,488:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot
    Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A seperate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported).
    Interfaces: Authenticator, Plugin
    Entry point: webroot = certbot._internal.plugins.webroot:Authenticator
    Initialized: <certbot._internal.plugins.webroot.Authenticator object at 0x7fb6f2d63e20>
    Prep: True
    2023-03-03 04:24:20,488:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.webroot.Authenticator object at 0x7fb6f2d63e20> and installer None
    2023-03-03 04:24:20,488:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None
    2023-03-03 04:24:21,036:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-staging-v02.api.letsencrypt.org/acme/acct/91062074', new_authzr_uri=None, terms_of_service=None), 03d4e5e03e377ee84364ff6182129902, Meta(creation_dt=datetime.datetime(2023, 3, 2, 21, 51, 58, tzinfo=<UTC>), creation_host='f0c13cf0ee90', register_to_eff=None))>
    2023-03-03 04:24:21,037:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory.
    2023-03-03 04:24:21,042:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443
    2023-03-03 04:24:21,260:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 830
    2023-03-03 04:24:21,260:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Content-Type: application/json
    Content-Length: 830
    Connection: keep-alive
    Cache-Control: public, max-age=0, no-cache
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change",
      "kq-NvzVz3yo": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
      "meta": {
        "caaIdentities": [
          "letsencrypt.org"
        "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.3-September-21-2022.pdf",
        "website": "https://letsencrypt.org/docs/staging-environment/"
      "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct",
      "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce",
      "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order",
      "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/get/draft-ietf-acme-ari-00/renewalInfo/",
      "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert"
    2023-03-03 04:24:21,261:DEBUG:certbot._internal.display.obj:Notifying user: Requesting a certificate for rinatrix.com and www.rinatrix.com
    2023-03-03 04:24:21,283:DEBUG:acme.client:Requesting fresh nonce
    2023-03-03 04:24:21,283:DEBUG:acme.client:Sending HEAD request to https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce.
    2023-03-03 04:24:21,328:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
    2023-03-03 04:24:21,329:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Connection: keep-alive
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
    Replay-Nonce: A272PvMWRNGZAi54aMYSzk-74tzJhnCudZy2GeBBFVYq-_g
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
    2023-03-03 04:24:21,329:DEBUG:acme.client:Storing nonce: A272PvMWRNGZAi54aMYSzk-74tzJhnCudZy2GeBBFVYq-_g
    2023-03-03 04:24:21,329:DEBUG:acme.client:JWS payload:
    b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "rinatrix.com"\n    },\n    {\n      "type": "dns",\n      "value": "www.rinatrix.com"\n    }\n  ]\n}'
    2023-03-03 04:24:21,344:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/new-order:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICJBMjcyUHZNV1JOR1pBaTU0YU1ZU3prLTc0dHpKaG5DdWRaeTJHZUJCRlZZcS1fZyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
      "signature": "YXPgJxSroLOwnnhvcXFKOH3Q7G7qNYeAU5qlvnwKBGN29jYkLEZt4nMwQp9hN5uUEJMM0lTVTedE4XoF_4R_XpW6L3YklVX0wUe7xPY-DeqD_4SM9yI9jX3WlT60KcgZnozK9hWusWeaw8NVzaytmbF9GChD9N2cjy9Tu4G12tLtrn4hwqexlgJaFfSCbUdIcT-25_OtZ1KXGUFMA9BtAytUlsNHQDhMp-gR3rkpO-HQj4Yj4r3qH_S7k1odSQZeA033wlW3Jlr3U8zGweXIQ_iNflh3VYHewt_80B1DGslRgL3PEWUz8YqjdZ-V1cc53vETrehYe2EDUOskdF0pmuGaR0rgC6lfoh6rOiHmU19f-i8y2jl1yH4vWZ6sjyCawoFJJN_pq4qzSh-lNARfuLSgL_JnGKgZqLwTsnY6ZpG_Vr5NELQO0ZAErYInyEGf9yRdBxLUFaRtX0KmPZLuF5nQkpa-nVMHxC3r60sDxiWOMxYap8I3Epet62RGJIGxpydGtfsF-cXwX0d2vuC8N1NzD12UCAgGAr_FVx7tdnmdOzAwpVeSJ2eJEese131WKk3INvQ2nE5GcAy6Rga3sYp4ZpNNae9fn456Apvg-Y1q9Vop-V-z4dYjCto4MGaR4iOVUpMwjc8o7PRQbTx9qyiznO0UB7glbfFXqDEB3no",
      "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInJpbmF0cml4LmNvbSIKICAgIH0sCiAgICB7CiAgICAgICJ0eXBlIjogImRucyIsCiAgICAgICJ2YWx1ZSI6ICJ3d3cucmluYXRyaXguY29tIgogICAgfQogIF0KfQ"
    2023-03-03 04:24:21,419:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 493
    2023-03-03 04:24:21,420:DEBUG:acme.client:Received response:
    HTTP 201
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Content-Type: application/json
    Content-Length: 493
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
    Location: https://acme-staging-v02.api.letsencrypt.org/acme/order/91062074/7527152074
    Replay-Nonce: B37ChrFMXV9zxLNA8_-eYQ0r-sCHab584DOz2gWwOaXP5VA
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "status": "pending",
      "expires": "2023-03-10T04:24:21Z",
      "identifiers": [
          "type": "dns",
          "value": "rinatrix.com"
          "type": "dns",
          "value": "www.rinatrix.com"
      "authorizations": [
        "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342814",
        "https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342824"
      "finalize": "https://acme-staging-v02.api.letsencrypt.org/acme/finalize/91062074/7527152074"
    2023-03-03 04:24:21,420:DEBUG:acme.client:Storing nonce: B37ChrFMXV9zxLNA8_-eYQ0r-sCHab584DOz2gWwOaXP5VA
    2023-03-03 04:24:21,420:DEBUG:acme.client:JWS payload:
    2023-03-03 04:24:21,430:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342814:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICJCMzdDaHJGTVhWOXp4TE5BOF8tZVlRMHItc0NIYWI1ODRET3oyZ1d3T2FYUDVWQSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NTc4MzQyODE0In0",
      "signature": "sTb28AqRSqP2LGVVUq9PbaMz5IOoWlJAMdwx7fms0E-Q8JKmRPqyniL0Faz1Lt_zUgImKS2J2WWYDZJB4-MN8PK2HbC3gAIsUvgUdSBP4ow5PqFkgkOF45hltBotOnrWzpD22i2ZcBYETjX37mL-6YrX0DXggJUBrg0PnXlSAU1Nnfeo7t0pURV7_U4sMvGU9KsL_iSc4gq6L6JXwUUkeTFipah54hFQ9B2FN5hNLBAfuukVOpjNCwfDl7Zlhn9z4LqfgVSwLeM9yr4OuHy7HYNOpnC2NCSA6jqtkrijN9zI93VICGAx2gZgQvhvetujFsauwBsHEfjPCh_nkTW57Q-axYYFWocZniUNuzEfdGDgjBGayaP85lcX1xJHRvSraiZFmt4zAY1-EN8hSoqJ-l1qyf-9A-ORZ8LnUPaVehYkYlPaUF_4wfn4ELJnK3cBq2m9lXIo8epcGUsxfA_1W03S70uSXqPgBLdHxRfDWZW0Rl8DK2jTYUVHA9jU9DBg8Ejr39ra_ftRUDNHuJCmxctbQVtbCw1p4VcAGdPCheIguR2KqJKmr5lFH7vCe6XXw1O-RGDJhW7ncDWq2zQIqndDpkvN3IikCS-jQivNU9dzbtrppHelzjBGw8UOdulVM408LEKSSyj_oU6FWRSdhKIZSVMca2iUNHo7GcSfJHk",
      "payload": ""
    2023-03-03 04:24:21,478:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5578342814 HTTP/1.1" 200 814
    2023-03-03 04:24:21,478:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Content-Type: application/json
    Content-Length: 814
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
    Replay-Nonce: 8F05KrLzi90ee3TXHQbWz6NQ0wl-UcRB1VbNkPWrV1Ad9VQ
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "identifier": {
        "type": "dns",
        "value": "rinatrix.com"
      "status": "pending",
      "expires": "2023-03-10T04:24:21Z",
      "challenges": [
          "type": "http-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/mO1tCg",
          "token": "PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0"
          "type": "dns-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/PZPJ5A",
          "token": "PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0"
          "type": "tls-alpn-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/_dfB9g",
          "token": "PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0"
    2023-03-03 04:24:21,479:DEBUG:acme.client:Storing nonce: 8F05KrLzi90ee3TXHQbWz6NQ0wl-UcRB1VbNkPWrV1Ad9VQ
    2023-03-03 04:24:21,479:DEBUG:acme.client:JWS payload:
    2023-03-03 04:24:21,489:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342824:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICI4RjA1S3JMemk5MGVlM1RYSFFiV3o2TlEwd2wtVWNSQjFWYk5rUFdyVjFBZDlWUSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NTc4MzQyODI0In0",
      "signature": "Oy_sxqugX_32ngVujsJxDRavZBZuZPia7kL3HGfThPv66CcaJViNp13cj3F5X4VNiPe2gEvlPzbmTnd0UZ0DsfeDLOorpd381HPvueM3XshmB25btwnNpBblzJwAW0ETXBXdGN6Hpe3YS4Ch2b6Y8yL2Xuy3M7f7uo90KioJrV3j_aXgU3fEyEOhPID4Eyua3DxgJgVXuLQAoZ2LZ2fC9ZwsdaIDItGT7-rU46VJ0hBe7-5Mmmoh_os6kn8bLGE7IulVR8yYjkTfKCe1x8e9wCOPMtlrW6bP8TnAyYTO4n61DPfRJN_q6fGuYykHkge3cdhKMxd3Mlk_PjuaXY_WoWVYMOnhjhKU_eI3Ah9ig5rExqks4D30eW6jHc-chaHvxXsac1PXZVo-VRPwXUpt1hTh3pcDyZTtyOCKxYKbfGuJmZxTCTnEVOGzdE6JmuX0nJms7XPbelXuNWRbSHD6-LjreMfTv2P-ReQMPrlIJUwRRMhun0Oks__ZIdXDDYJzcX9enE6k5PBf7yjpSLomgQNBXarvLYHy6bmdeqlOhZdgeuajeV_deQgohz6mGRAufsBNyw7b9lmEULBY8cSyZV1RsF9cXGlZ9RlbO40w9O_k_258pyczo6gCOWmhjyYI2Q8To4Y3xF3v8GkaGzKU11MthDYLCHJdE-vS6_8hQNI",
      "payload": ""
    2023-03-03 04:24:21,538:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5578342824 HTTP/1.1" 200 818
    2023-03-03 04:24:21,538:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Content-Type: application/json
    Content-Length: 818
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
    Replay-Nonce: 49942Mld3TNqE40tocC6X8QoHzDCZLyJTs6OWW1UyZSLwcs
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "identifier": {
        "type": "dns",
        "value": "www.rinatrix.com"
      "status": "pending",
      "expires": "2023-03-10T04:24:21Z",
      "challenges": [
          "type": "http-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/tj2LVQ",
          "token": "FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA"
          "type": "dns-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/OPLb2w",
          "token": "FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA"
          "type": "tls-alpn-01",
          "status": "pending",
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/0Mfl-Q",
          "token": "FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA"
    2023-03-03 04:24:21,539:DEBUG:acme.client:Storing nonce: 49942Mld3TNqE40tocC6X8QoHzDCZLyJTs6OWW1UyZSLwcs
    2023-03-03 04:24:21,539:INFO:certbot._internal.auth_handler:Performing the following challenges:
    2023-03-03 04:24:21,539:INFO:certbot._internal.auth_handler:http-01 challenge for rinatrix.com
    2023-03-03 04:24:21,539:INFO:certbot._internal.auth_handler:http-01 challenge for www.rinatrix.com
    2023-03-03 04:24:21,540:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/certbot for all unmatched domains.
    2023-03-03 04:24:21,540:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/certbot/.well-known/acme-challenge
    2023-03-03 04:24:21,541:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/certbot/.well-known/acme-challenge
    2023-03-03 04:24:21,542:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/certbot/.well-known/acme-challenge/PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0
    2023-03-03 04:24:21,543:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/certbot/.well-known/acme-challenge/FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA
    2023-03-03 04:24:21,543:DEBUG:acme.client:JWS payload:
    b'{}'
    2023-03-03 04:24:21,552:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/mO1tCg:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICI0OTk0Mk1sZDNUTnFFNDB0b2NDNlg4UW9IekRDWkx5SlRzNk9XVzFVeVpTTHdjcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My81NTc4MzQyODE0L21PMXRDZyJ9",
      "signature": "SjEuvxH_gOsvHMKO_Is1T6-nBMTcthH8-q5M09hpB3bNMuhBMqbSkxOna7bIP8gkkwGjjSDUEMeyRWoNWLygMUjnC17D9RY6aeAbiC0H5YZ65iJ7X2ItktgPIUYmhmD2_UuK35JSyYkZSMCHBBs5o7-9pBWgqFR5K0t4TD0Pqo7pwRDfSZM_U-nS9GOmQ7UbgsKBCw0I0VIcm2NO2Ev4Cs4xJoiYMIcLtUpxWyCRjnNWVZGksILeoHjWSi2BLsbNvWl1XELLx6RRYJzCLyPRTd7TQrkSmOCTDSv4Vy6lnoVCQEMi19ROYUpBj4yd03HnKJ3sYmvADVWBr4tnmA2a2hD-9JdwDRRE6Z1OiEkTLT4CyMY6PBI-uVbgoIAkwhPzlpVDeG2eNCNx-cP7CQzk46rVBATAGAtlgCFiZfBANwz_1qqqegu9nI5na54ILBcItd4NW5Za0yETMkoIXuaSJLe53fD3TwzuU6G7RkxOgW9sU-nLM1mDmXb0Fdd6SZG1UcCU9Bx0slL7qHolb0JdhufBB9jafDsUwjdRBHjH3wzpoghPBrwDVZjvfPnlpx56ukYk7_Jth4fc0SfJLv2dfDRMFn8XgsPCSGeJUnPcxdfsMhOcGJ8_wjG2v4mLej_WazcTVbwsYp5lNs0ag11Y6ZuJbyXfhPXxbq1SlMpX8jw",
      "payload": "e30"
    2023-03-03 04:24:21,603:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/5578342814/mO1tCg HTTP/1.1" 200 193
    2023-03-03 04:24:21,604:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Content-Type: application/json
    Content-Length: 193
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342814>;rel="up"
    Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/mO1tCg
    Replay-Nonce: B37CcV7xyfPyHRF8kEHf0JbSarzQCJqzaEeNzHyCfVrDSK8
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/mO1tCg",
      "token": "PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0"
    2023-03-03 04:24:21,604:DEBUG:acme.client:Storing nonce: B37CcV7xyfPyHRF8kEHf0JbSarzQCJqzaEeNzHyCfVrDSK8
    2023-03-03 04:24:21,604:DEBUG:acme.client:JWS payload:
    b'{}'
    2023-03-03 04:24:21,613:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/tj2LVQ:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICJCMzdDY1Y3eHlmUHlIUkY4a0VIZjBKYlNhcnpRQ0pxemFFZU56SHlDZlZyRFNLOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9jaGFsbC12My81NTc4MzQyODI0L3RqMkxWUSJ9",
      "signature": "D98jge0h7j5xMsmgSnT8tNeMHt69nAOnrQf8vyV9lzZN9hWKrWC-noDcxm8qx-lCEjGb-iVArTZAdO5-fnBd5kkOMTzhRVL8hASL_EQ-9Ns7SjsTrNajhqY5YX54WgXnynXSmsmlVdJFAkNY8FLNa2h2KzRaAN9mGyVVUPltFqpQtAVpZqGVlGq7yLGo6aLxj4GFulvwl3kIcXYoIklEk-aFB-Y9b1apy6wjbB0i-jUOn-0dCPS8oocQpnhHVRqlxoX0EgSyTudLKS0cqjHyxTuu31botLcFuWZwynjPinwtlGfYf6QjwOcOQAe9GDjZwBL8Ct53qYBcvdylwYzRh3uRwgZtuBwh93iU456LDEEhZHUZVy67ZpIfvm_0mpA35bAm5LtM9dmtFfCv0fgTu-8cBwBmByXXMmWb2JmcxTITIBpOZ5vmFuTpkBkA_Ugd3eXiYVlZ2tFGNSuB_N25PgCMPpA6Lkiyw_HuPJd90jh4BzBygz6mWaYbE285bjvUPHrKnnO2kZv-4gllikVEIN4ibIF26RZp1z8ST7vT7aIGc3YmCZ4iNt0dIbxfyszXJsq_RNRAouMk_WdaE4V73NJcuHCNUc0O030if8u--2ZlvbLinhhcHeTM6kfFwSmIJ5OPcRqP9ytp4k0EImHvqsZHIW8tfy6l9s75NgUJZ8w",
      "payload": "e30"
    2023-03-03 04:24:21,663:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/chall-v3/5578342824/tj2LVQ HTTP/1.1" 200 193
    2023-03-03 04:24:21,663:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:21 GMT
    Content-Type: application/json
    Content-Length: 193
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index", <https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342824>;rel="up"
    Location: https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/tj2LVQ
    Replay-Nonce: 8F0588vbl7UZRJETdxQCZ7m6EWBVR4Ad1mOSKXO6HA3PMNs
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "type": "http-01",
      "status": "pending",
      "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/tj2LVQ",
      "token": "FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA"
    2023-03-03 04:24:21,664:DEBUG:acme.client:Storing nonce: 8F0588vbl7UZRJETdxQCZ7m6EWBVR4Ad1mOSKXO6HA3PMNs
    2023-03-03 04:24:21,664:INFO:certbot._internal.auth_handler:Waiting for verification...
    2023-03-03 04:24:22,664:DEBUG:acme.client:JWS payload:
    2023-03-03 04:24:22,674:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342814:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICI4RjA1ODh2Ymw3VVpSSkVUZHhRQ1o3bTZFV0JWUjRBZDFtT1NLWE82SEEzUE1OcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NTc4MzQyODE0In0",
      "signature": "R47GzGPcC6Y7Frwa3dUo3eXj48UHn56PGkyfT6NishOKyqFugyY4MHZRiwtNFFL4vlq459e17LKD_HyEBayzM39c8hDzKu9T9PSsB1souHG4k6FnOnee-3zfZkIyw3l6_6sXEwAkQDwue-G2AsJ-Js7gmoYb6FcyxymjLyNguiz2sSG7kWWOZSZXF10j7zFLVXNfDNYnkpumj872K4YiwgG1NgFahisTWc1a2OIaS4mtToDwab6iJv3IyfXMCsxG5VptWBtmqD2vIqF0OVSDZHum7wNDSyh27MSZ-reZ6rx6hnf03p07OvvijkO49ZzyeJJhnD1TZg2HQbD8B0uZjj8B74yxywXzP6WKpgeGFSDpYd9y4uQPy4RJsKRxx3umY7_X9zJN9qLNdaETpYh8OVixe24KuZaej5SQuPsWRDksygtXCtOiOgZ0J8rs1dIoH0aKGhggsa9_qvgx-RQlyUaikuYbOiJivVGyoUyGxuW8pmczFzmXBla4HlLDFL-DreYU_HoNe_acwtvpKpioXiHGMAaUzovdCV5kgw_sG4PFDL1h3Je9A6jaWpgwm7T_Ic_Nlwd3IBYvKSQTNwK7CYxX7OJr80npmi_FMWJdSy1UZKlLYBEYWTVAsV8UgbPTe4eK9WPjToSR8DJ37VnEtCSqg5dqncFJFD5x25Y-yuE",
      "payload": ""
    2023-03-03 04:24:22,725:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5578342814 HTTP/1.1" 200 1019
    2023-03-03 04:24:22,726:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:22 GMT
    Content-Type: application/json
    Content-Length: 1019
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
    Replay-Nonce: 4994djjdvmQqAx-c0MMwmciQ1P4VoJeUb5XVVMdWUOXSMss
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "identifier": {
        "type": "dns",
        "value": "rinatrix.com"
      "status": "invalid",
      "expires": "2023-03-10T04:24:21Z",
      "challenges": [
          "type": "http-01",
          "status": "invalid",
          "error": {
            "type": "urn:ietf:params:acme:error:unauthorized",
            "detail": "3.138.94.177: Invalid response from http://rinatrix.com/.well-known/acme-challenge/PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0: 404",
            "status": 403
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342814/mO1tCg",
          "token": "PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0",
          "validationRecord": [
              "url": "http://rinatrix.com/.well-known/acme-challenge/PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0",
              "hostname": "rinatrix.com",
              "port": "80",
              "addressesResolved": [
                "3.138.94.177"
              "addressUsed": "3.138.94.177"
          "validated": "2023-03-03T04:24:21Z"
    2023-03-03 04:24:22,726:DEBUG:acme.client:Storing nonce: 4994djjdvmQqAx-c0MMwmciQ1P4VoJeUb5XVVMdWUOXSMss
    2023-03-03 04:24:22,726:DEBUG:acme.client:JWS payload:
    2023-03-03 04:24:22,735:DEBUG:acme.client:Sending POST request to https://acme-staging-v02.api.letsencrypt.org/acme/authz-v3/5578342824:
      "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS1zdGFnaW5nLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYWNjdC85MTA2MjA3NCIsICJub25jZSI6ICI0OTk0ZGpqZHZtUXFBeC1jME1Nd21jaVExUDRWb0plVWI1WFZWTWRXVU9YU01zcyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXN0YWdpbmctdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My81NTc4MzQyODI0In0",
      "signature": "soODHEDr3F_o5-Eim7IxnrBM4cUJJPTVkapOMzujCRBuduyQAYNKoOdI5GtnjEMQhFsEqx3eZPSy0FdYB1P454qwxDtCalXBZP4jfZRyrlm3OLwqsE9cYtvyhubzNPG-C4CSrkVWT0oadtI8_gmGONmpQ7tXjXikNT9NTL9xaAimTzCr0C4kZj-elIrkTuG3bNY4Xz4nhIiLlyyrVNnuhh_hvDbnDZGOWy_EOXzGBJY-niN_6OQmxlqXVgbRW2chWfgLBZEyqOTKNJl5B59jYzUpRBvV9REIS4PDEe-M0O9nMOT8OLp5MsjrnB1_fi9LW2qSBkhZhTrRkYC1f7byUnUv8w8zaDZ1DK94anP90Nf1VQegR74AQ1dcduIm-hpVxbc6YcAFLqXsj4qcmfizDnAbN8dcQ7YJ8oDvueEY9eUCjroCLf-GfGI0EhC1777nmWBFH_fCjtLh9tgdMBhmNG6RQq0DAe8DXOjmtEB3up9opApMWxRJ3zE65LPIU3b8ySftPN6JzaOowF66v_VDPXr3SX0uBDRWGnTWFAOVnwJ2-T2IahC-y4G-tKjcsKmUn-FoMLOGMZvWy39mvoK153UsT3bKp2Y57lns3K21cKIt8jGHYRpuJVrSehB9WlWGMdD427vW1fG5eOdfHH-aV5IxiIzx-s9qR9exn0yRpYU",
      "payload": ""
    2023-03-03 04:24:22,794:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/5578342824 HTTP/1.1" 200 1035
    2023-03-03 04:24:22,794:DEBUG:acme.client:Received response:
    HTTP 200
    Server: nginx
    Date: Fri, 03 Mar 2023 04:24:22 GMT
    Content-Type: application/json
    Content-Length: 1035
    Connection: keep-alive
    Boulder-Requester: 91062074
    Cache-Control: public, max-age=0, no-cache
    Link: <https://acme-staging-v02.api.letsencrypt.org/directory>;rel="index"
    Replay-Nonce: A272wzSmOsA29gD9CUo-oVAcR_D9cZzZqHZYRYBAVeVaQYs
    X-Frame-Options: DENY
    Strict-Transport-Security: max-age=604800
      "identifier": {
        "type": "dns",
        "value": "www.rinatrix.com"
      "status": "invalid",
      "expires": "2023-03-10T04:24:21Z",
      "challenges": [
          "type": "http-01",
          "status": "invalid",
          "error": {
            "type": "urn:ietf:params:acme:error:unauthorized",
            "detail": "3.138.94.177: Invalid response from http://www.rinatrix.com/.well-known/acme-challenge/FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA: 404",
            "status": 403
          "url": "https://acme-staging-v02.api.letsencrypt.org/acme/chall-v3/5578342824/tj2LVQ",
          "token": "FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA",
          "validationRecord": [
              "url": "http://www.rinatrix.com/.well-known/acme-challenge/FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA",
              "hostname": "www.rinatrix.com",
              "port": "80",
              "addressesResolved": [
                "3.138.94.177"
              "addressUsed": "3.138.94.177"
          "validated": "2023-03-03T04:24:21Z"
    2023-03-03 04:24:22,794:DEBUG:acme.client:Storing nonce: A272wzSmOsA29gD9CUo-oVAcR_D9cZzZqHZYRYBAVeVaQYs
    2023-03-03 04:24:22,795:INFO:certbot._internal.auth_handler:Challenge failed for domain rinatrix.com
    2023-03-03 04:24:22,795:INFO:certbot._internal.auth_handler:Challenge failed for domain www.rinatrix.com
    2023-03-03 04:24:22,795:INFO:certbot._internal.auth_handler:http-01 challenge for rinatrix.com
    2023-03-03 04:24:22,795:INFO:certbot._internal.auth_handler:http-01 challenge for www.rinatrix.com
    2023-03-03 04:24:22,795:DEBUG:certbot._internal.display.obj:Notifying user: 
    Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems:
      Domain: rinatrix.com
      Type:   unauthorized
      Detail: 3.138.94.177: Invalid response from http://rinatrix.com/.well-known/acme-challenge/PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0: 404
      Domain: www.rinatrix.com
      Type:   unauthorized
      Detail: 3.138.94.177: Invalid response from http://www.rinatrix.com/.well-known/acme-challenge/FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA: 404
    Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet.
    2023-03-03 04:24:22,801:DEBUG:certbot._internal.error_handler:Encountered exception:
    Traceback (most recent call last):
      File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
        self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
      File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
        raise errors.AuthorizationError('Some challenges have failed.')
    certbot.errors.AuthorizationError: Some challenges have failed.
    2023-03-03 04:24:22,801:DEBUG:certbot._internal.error_handler:Calling registered functions
    2023-03-03 04:24:22,801:INFO:certbot._internal.auth_handler:Cleaning up challenges
    2023-03-03 04:24:22,801:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/certbot/.well-known/acme-challenge/PLfQ2ztOc3fU--PtM_Nrus-KMoRxEcmZgr0ql_7bzP0
    2023-03-03 04:24:22,802:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/certbot/.well-known/acme-challenge/FENLUtlip_H6iGf4sNKvWQqL4UUcHnAy81toIj-yJeA
    2023-03-03 04:24:22,809:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up
    2023-03-03 04:24:22,809:DEBUG:certbot._internal.log:Exiting abnormally:
    Traceback (most recent call last):
      File "/usr/local/bin/certbot", line 33, in <module>
        sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')())
      File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main
        return internal_main.main(cli_args)
      File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1862, in main
        return config.func(config, plugins)
      File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1595, in certonly
        lineage = _get_and_save_cert(le_client, config, domains, certname, lineage)
      File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 140, in _get_and_save_cert
        lineage = le_client.obtain_and_enroll_certificate(domains, certname)
      File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 516, in obtain_and_enroll_certificate
        cert, chain, key, _ = self.obtain_certificate(domains)
      File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 428, in obtain_certificate
        orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
      File "/opt/certbot/src/certbot/certbot/_internal/client.py", line 496, in _get_order_and_authorizations
        authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort)
      File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 108, in handle_authorizations
        self._poll_authorizations(authzrs, max_retries, max_time_mins, best_effort)
      File "/opt/certbot/src/certbot/certbot/_internal/auth_handler.py", line 212, in _poll_authorizations
        raise errors.AuthorizationError('Some challenges have failed.')
    certbot.errors.AuthorizationError: Some challenges have failed.
    2023-03-03 04:24:22,814:ERROR:certbot._internal.log:Some challenges have failed.
                  

    your server 404ed at certificate request, certbot ordered to put token /var/www/certbot and server should be configed to pick those path: but your docker failed to run becaseu there was no cert file:
    this sound some kind of catch-22

    from init-letsencrypt.sh though it seems it makes a dummy certificate then restarts the system before requesting a certificate.

    echo "### Creating dummy certificate for $domains ..."
    path="/etc/letsencrypt/live/$domains"
    mkdir -p "$data_path/conf/live/$domains"
    docker-compose run --rm --entrypoint "\
      openssl req -x509 -nodes -newkey rsa:1024 -days 1\
        -keyout '$path/privkey.pem' \
        -out '$path/fullchain.pem' \
        -subj '/CN=localhost'" certbot