2024-06-25 10:15:31,014:DEBUG:certbot._internal.main:certbot version: 2.10.0 2024-06-25 10:15:31,015:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/local/bin/certbot 2024-06-25 10:15:31,015:DEBUG:certbot._internal.main:Arguments: ['--webroot', '--webroot-path=/usr/share/nginx/html/letsencrypt', '--email', 'najia@slc-assurances.fr', '--agree-tos', '--no-eff-email', '--staging', '-d', 'digital.slc-assurances.fr'] 2024-06-25 10:15:31,015:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-06-25 10:15:31,037:DEBUG:certbot._internal.log:Root logging level set at 30 2024-06-25 10:15:31,038:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2024-06-25 10:15:31,038:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Saves the necessary validation files to a .well-known/acme-challenge/ directory within the nominated webroot path. A seperate HTTP server must be running and serving files from the webroot path. HTTP challenge only (wildcards not supported). Interfaces: Authenticator, Plugin Entry point: EntryPoint(name='webroot', value='certbot._internal.plugins.webroot:Authenticator', group='certbot.plugins') Initialized: Prep: True 2024-06-25 10:15:31,038:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2024-06-25 10:15:31,039:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2024-06-25 10:15:31,110:DEBUG:certbot._internal.main:Picked account: ), creation_host='724f11395b0d', register_to_eff=None))> 2024-06-25 10:15:31,111:DEBUG:acme.client:Sending GET request to https://acme-staging-v02.api.letsencrypt.org/directory. 2024-06-25 10:15:31,113:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-staging-v02.api.letsencrypt.org:443 2024-06-25 10:15:33,185:DEBUG:urllib3.connectionpool:https://acme-staging-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 820 2024-06-25 10:15:33,186:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Tue, 25 Jun 2024 10:15:33 GMT Content-Type: application/json Content-Length: 820 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1P6lCYVnOtE": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-staging-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org/docs/staging-environment/" }, "newAccount": "https://acme-staging-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-staging-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-staging-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-staging-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-staging-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-06-25 10:15:33,206:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-06-25 10:15:34,164:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-06-25 10:15:34,165:DEBUG:certbot.ocsp:OCSP response for certificate /etc/letsencrypt/archive/digital.slc-assurances.fr/cert2.pem is signed by the certificate's issuer. 2024-06-25 10:15:34,166:DEBUG:certbot.ocsp:OCSP certificate status for /etc/letsencrypt/archive/digital.slc-assurances.fr/cert2.pem is: OCSPCertStatus.GOOD 2024-06-25 10:15:34,172:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-15 13:57:31 UTC. 2024-06-25 10:15:34,173:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing... 2024-06-25 10:15:34,173:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for digital.slc-assurances.fr 2024-06-25 10:15:34,174:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/local/bin/certbot", line 33, in sys.exit(load_entry_point('certbot', 'console_scripts', 'certbot')()) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/main.py", line 19, in main return internal_main.main(cli_args) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1894, in main return config.func(config, plugins) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 1600, in certonly lineage = _get_and_save_cert(le_client, config, domains, certname, lineage) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/opt/certbot/src/certbot/certbot/_internal/main.py", line 131, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/opt/certbot/src/certbot/certbot/_internal/renewal.py", line 388, in renew_cert _avoid_invalidating_lineage(config, lineage, original_server) File "/opt/certbot/src/certbot/certbot/_internal/renewal.py", line 333, in _avoid_invalidating_lineage raise errors.Error( certbot.errors.Error: You've asked to renew/replace a seemingly valid certificate with a test certificate (domains: digital.slc-assurances.fr). We will not do that unless you use the --break-my-certs flag! 2024-06-25 10:15:34,177:ERROR:certbot._internal.log:You've asked to renew/replace a seemingly valid certificate with a test certificate (domains: digital.slc-assurances.fr). We will not do that unless you use the --break-my-certs flag!