mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 18:05:54 +03:00
[GH-ISSUE #613] letsencrypt wildcard certificates (without Cloudflare) #516
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#516
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @rt87 on GitHub (Sep 24, 2020).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/613
I would like to be able to use letsencrypt wildcard certificates without being limited to Cloudflare.
@Kipjr commented on GitHub (Sep 25, 2020):
A temporary workaround is requesting a normal certificate domain.tld, then after a successful certificate, login to docker (docker exec -it {id} /bin/bash and do following:
certbot --manual -d domain.tld -d *.domain.tld --preferred-challenges=DNSFollow the instructions, it will replace your certificate with the wildcard. An automatic way is not yet possible due to the lacking support of numerous DNS APIs. This is what I'm doing every now and then..
@hugalafutro commented on GitHub (Oct 3, 2020):
I'm succesfully using wildcard host on noip.com with nginx-proxy-manager. I.e. on noip.com I have registered wildcard domain *.something.ddns.net, then in nginx-proxy-manager I have 11 proxy hosts using hostname.something.ddns.net and "it just works" (tm).
@rt87 commented on GitHub (Oct 4, 2020):
Thanks, good to know that this would work (and how to do it). But, to be clear: You would have to repeat this every now and then? The automatic renewal of this "manual wildcard certificate" would not work?
@rt87 commented on GitHub (Oct 4, 2020):
Well... it really shouldn't! The UI doesn't even let you go for wildcards unless you checked the cloudflare option. Also, both providers, cloudflare and noip, charge for wildcards afaik, so thats something Im not too thrilled about either. And the free noip does not seem to support IPv6, which I would like to use since it "is time" and I do not have to give too much thought to portforwarding and such.
@Kipjr commented on GitHub (Oct 4, 2020):
Yes, automatic renewal would require an API to your DNS and there are too many to support /implement this, I think.
I would like the output from the console on the webpage so I don't have to do this there. Then you only need to update your TXT record. Or just have a log page on the manager webpage.
@chaptergy commented on GitHub (Nov 6, 2020):
@jc21 Implemented by PR #635, can be closed.
@rt87 To request wildcard certificates you need to request them via DNS challenge. If your DNS provider is not in the list of available DNS providers but you are sure they offer an API for this please open a new ticket.
@krouter commented on GitHub (Nov 12, 2020):
Can you give a GUI option to request a manual DNS challenge?
Google domains doesn't allow DNS via api updates.
@chaptergy commented on GitHub (Nov 12, 2020):
I don't think LetsEncrypt / Certbot is meant to issue certificates with a DNS challenge in a non-automated way. See the DNS challenge documentation, the second paragraph.
@jakern commented on GitHub (May 7, 2021):
I think it would still be better to have a manual UI and the cert to accidentally expire than to not have SSL at all because you can't switch to a provider with an api
@chaptergy commented on GitHub (May 10, 2021):
@jakern this is a little off topic for this issue, please see the following issue concerning the manual dns challenge: https://github.com/jc21/nginx-proxy-manager/issues/813
@bryanhunwardsen commented on GitHub (Nov 16, 2023):
@hugalafutro
Were you able to use a wildcard cert for all the subdomains/proxy hosts?
I have what you indicate working, but each subdomain is requireing its own certificate as npm does not list no-ip as a dns challenge provider???
@hugalafutro commented on GitHub (Nov 16, 2023):
@bryanhunwardsen yes. Each whatever.something.ddns.net site has its own cert which npm renews whenever needed. Honestly I am a bit of a newb so I don't even understand the dns challenge stuff or it's advantage as it works just fine without.