mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[GH-ISSUE #2151] Automate the DNS Challenge configuration process to generate SSL #1541
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#1541
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Tacioandrade on GitHub (Jul 8, 2022).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/2151
Good afternoon everyone! I installed the nginx proxy manager to replace in my environment a shellscript that I use to generate my reverse proxies in environments that I don't have or pfSense (where I use the haproxy package).
I really liked the NPM interface, but I'm facing a small problem, I use the DNS challenge because in some of my clients, ports 80 and 443 are blocked by the internet providers, since they are broadband and non-dedicated links.
So far, so good, I was able to use the DNS Challenge option to generate the certificate, but every time I generate a different certificate, I have to:
In this case, I would like to request that in future versions, think about the option of creating a customized option in SSL Certificate such as: "Request a new SSL Certificate - Provider name", where when selecting this option, it automatically fills in the data DNS Provider, Token, etc.
That way, it would make the process of creating a new certificate much easier for environments like mine that have multiple https certificates for the same domain.
@github-actions[bot] commented on GitHub (Feb 13, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@github-actions[bot] commented on GitHub (Mar 29, 2025):
Issue was closed due to inactivity.