mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[GH-ISSUE #238] Remove certbot random delay for manual renew #210
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#210
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @sarbian on GitHub (Nov 12, 2019).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/238
When "Renew Now" is used the certificate can take a few minutes to be issued. The cert bot log has a line with "INFO:certbot.renewal:Non-interactive renewal: random delay of xxx seconds"
This can be frustrating since the UI display a timeout error and there is not way of know what is going on without looking in the log. The cert is actually issued after the random delay but it seems nginx is not reloaded and you need to enable/disable the site.
Certbot has a --no-random-sleep-on-renew option to disable that random delay and it should be used at least for renew from the interface.
@jc21 commented on GitHub (Nov 13, 2019):
I didn't even know this was a problem. All my cert renewals have been immediate - but I guess it might have something to do with the dns verification, which I don't use yet.
@joshbenner commented on GitHub (Jun 20, 2020):
Certbot will randomly wait on renewals when running in non-interactive mode. This is intended to avoid a massive rush of crons assaulting Let's Encrypt's servers all at the same time. This is appropriate when running scheduled renewals, but when running manually, specifying
--no-random-sleep-on-renewis appropriate.