-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Allow update custom existing SSL Certificate #1618
Comments
+1 This would be a great enhancement! |
+1 as a "workaround" i managed to update the cert files within the container itself and restarted nginx. this works for my sites. only disadvantage: NPM doesn't (and can't) know the new expiration date and shows it as overdue. but: you don't have to update all your reverse proxys and services. |
I have the same issue, when my wildcard cert is expiring. A "Renew Custom Cert" would be a pretty nice feature |
Would you like to share your workaround? |
@BobWs as i wrote, i updated the cert files within the container. as the filesystem is a mounted volume (folder?) to keep everything persistent, this was quite easy. i restarted the container and it started again, now using the new certificate. as i mentioned: only the disadvantage is, that it still shows the old expiration date in the UI i think this has to do with the fact that the data is stored in a database and it is only updated when going through the UI. |
+1 This would be a great enhancement! |
I confirm that this would be of great help. I have a wildcard certificate (on a private network with no public DNS, so no Let's Encrypt possible) and I have 100+ hosts to update, it is a slow process! Thank you :) |
Same routine every 3 months. Nothing new ? |
i know this is a thread necro, but I'm curious if any progress has been made on this front. I am going to explore the solution that @spcqike has provided. but in the meantime, I'd like to give my +1 to this enhancement request. |
The @spcqike approach works for me, so I say give it try. |
The current mounting workaround is OK... but it would be beneficial to have a feature in the UI that allows for updating an existing certificate by re-uploading new certificate files without removing the existing one (associations with hosts are conserved). This enhancement would empower the less technical members of my team to update certificates independently, especially considering we have 50 hosts using the same wildcard to update individually. Big +1 |
This feature request was posted 2 years ago, so don't get your hopes up for it to change within a reasonable period! |
as its open source, everyone who can code can do so and open a pull request.
in this case i would think about a central storage location, where all hosts read the same file. or at least a script that keeps the certificate updated on every host automatically. updating 50 hosts in a webUI manually is .... not practical. |
I've got the same Problem. I solved it with the workaround from @spcqike. |
Based on @spcqike answer: After you update the CRT file. Add a dummy domain with the new CRT. Here's your edit "button" :) |
+1 for a replace feature to select either all new or only the new cert (while keeping the key). Would make custom cert updates easier. An upload/edit via textarea (input base64) would be nice as well. |
+1 |
3 similar comments
+1 |
+1 |
+1 |
A workround works form me: Using the acme.sh script to automatically install the certs file: or you can manually do it with command everything 3 month: |
I have also faced the same issue, and I managed to come up with a solution PR #4425. |
This is my solution, `sqlite3 data/database.sqlite 9 is the new certificate ID. UPDATE proxy_host SET certificate_id = 9 WHERE certificate_id = 2; |
Is your feature request related to a problem? Please describe.
Every 3 months i need to manually update all my letsencript certificates for all my domains/subdomains. After certbot renew i need to manually create a new SSL Certificate entry with the new certificates for the next 3 months and update one by one all of my proxy hosts with the new certificate entry previosly created.
This is a tedious task because i have a lot of proxy hosts entries.
Describe the solution you'd like
It would be very nice to have an option to re-upload the private key and certificate for an existing SSL Certificate like this:
Describe alternatives you've considered
Additional context
I hope this will be a good feature :)
Regards.
The text was updated successfully, but these errors were encountered: