mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 09:25:55 +03:00
[GH-ISSUE #3518] Allow custom ACME servers for certificate generation #2343
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#2343
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Nathanwoodburn on GitHub (Feb 1, 2024).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/3518
Is your feature request related to a problem? Please describe.
It would be really nice to be able to add custom ACME servers to the certificate generation.
For example I have an acme server that generates internal signed certificates and I currently need to upload them every time I update them.
Describe the solution you'd like
Either allow acme servers added via the web interface or maybe a config file?
Describe alternatives you've considered
Additional context
@Ro-meo commented on GitHub (Feb 22, 2024):
Maybe as an addition :
documentation how to do this manually ?
@demonbane commented on GitHub (Mar 1, 2024):
I'd love to see this as well. I was able to connect to the console of the npm container and manually create certificates using
certbotwith my custom ACME server like this:But actually using them is kind of a nightmare. I have to get the files out of the container and onto my local machine just to then reupload them through the web UI. I had hoped to at least symlink the certs directly from
/etc/letsencryptto/data/custom_sslbut it looks like the web UI stores the certificates in the database and only writes them out to disk so that nginx can access them so I'm not sure that that would survive a restart. (and even if it did it would still require manually uploading a dummy cert for every domain)@demonbane commented on GitHub (Mar 1, 2024):
Looking at the code, it looks like npm creates
/etc/letsencrypt.iniby default and it turns out you can just add the config in there and it works! I just added:and then tried using the UI to generate a new certificate and it worked perfectly! I'd still love to see an option added to the UI to manage this, but this actually works right now which is great.
@Nathanwoodburn commented on GitHub (Mar 1, 2024):
Does that allow multiple? For this case I have internal domains (not on a valid tld), and regular public domains. So can I set 2 acme servers?
@demonbane commented on GitHub (Mar 1, 2024):
You would have to modify it each time (or just create two copies and swap them out between invocations). Fortunately, once the certificate is created, there's a cert-specific
.conffile created in/etc/letsencrypt/renewalwhich does store the server name, so renewals should continue to work even if you've changed the server in the config each time.@fbender commented on GitHub (Mar 12, 2024):
See #1054:
Originally posted by @jc21 in https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1054#issuecomment-870213956
@github-actions[bot] commented on GitHub (Oct 29, 2024):
Issue is now considered stale. If you want to keep it open, please comment 👍
@vshaev commented on GitHub (Oct 29, 2024):
+1
@mikeleord commented on GitHub (Nov 6, 2024):
+1
@potatoru commented on GitHub (Nov 12, 2024):
+1
@68656c6c commented on GitHub (Dec 15, 2024):
+1
@littlejackal commented on GitHub (Jan 7, 2025):
+1
@reyist commented on GitHub (Jan 28, 2025):
+1
@N-Hertstein commented on GitHub (Jan 31, 2025):
what did you do in the gui? did you use a dns challenge? Which one?
@cgfm commented on GitHub (Mar 1, 2025):
Would be awesome. Additionaly it would be great to define some bash for post processing to copy the received certificate to an other location (in my case a container volume)
@robinmalik commented on GitHub (Mar 10, 2025):
The workaround for me was to register the provider within the nginx-proxy-manager container (of course you could build this into your deployment processes with env variables). After this, requesting certs via the UI worked just fine with the default options.
Example syntax:
certbot register --email email@domain.com --server https://acme.provider.com --eab-kid kid --eab-hmac-key key@BulldozerPete commented on GitHub (Nov 28, 2025):
+1
@Ro-meo commented on GitHub (Dec 1, 2025):
+1
@BulldozerPete commented on GitHub (Dec 2, 2025):
Can you please share a simple how-to guide please?
I still don’t know what to configure in my docket compose file. Afterwards I don’t know where to finde the certificates and how to integrate them into NPM.
Thank you
@kuandai commented on GitHub (Feb 19, 2026):
+1