2025-01-29 04:19:08,054:DEBUG:certbot._internal.main:certbot version: 1.22.0 2025-01-29 04:19:08,056:DEBUG:certbot._internal.main:Location of certbot entry point: /usr/bin/certbot 2025-01-29 04:19:08,056:DEBUG:certbot._internal.main:Arguments: ['--noninteractive', '--no-random-sleep-on-renew'] 2025-01-29 04:19:08,057:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2025-01-29 04:19:08,143:DEBUG:certbot._internal.log:Root logging level set at 30 2025-01-29 04:19:08,159:DEBUG:certbot._internal.display.obj:Notifying user: Processing /etc/letsencrypt/renewal/cloud.webdesigntm.online.conf 2025-01-29 04:19:08,199:DEBUG:certbot._internal.plugins.selection:Requested authenticator and installer 2025-01-29 04:19:08,229:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-04-10 11:27:05 UTC. 2025-01-29 04:19:08,229:INFO:certbot._internal.renewal:Certificate is due for renewal, auto-renewing... 2025-01-29 04:19:08,229:DEBUG:certbot._internal.plugins.selection:Requested authenticator webroot and installer None 2025-01-29 04:19:08,232:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * webroot Description: Place files in webroot directory Interfaces: Authenticator, Plugin Entry point: webroot = certbot._internal.plugins.webroot:Authenticator Initialized: Prep: True 2025-01-29 04:19:08,234:DEBUG:certbot._internal.plugins.selection:Selected authenticator and installer None 2025-01-29 04:19:08,234:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator webroot, Installer None 2025-01-29 04:19:08,248:DEBUG:certbot._internal.main:Picked account: ), creation_host='cloud.webdesigntm.online', register_to_eff=None))> 2025-01-29 04:19:08,250:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2025-01-29 04:19:08,260:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2025-01-29 04:19:08,657:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 828 2025-01-29 04:19:08,658:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 04:19:09 GMT Content-Type: application/json Content-Length: 828 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "T86RxM5A2X8": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "profiles": { "classic": "The same profile you're accustomed to" }, "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2025-01-29 04:19:08,660:DEBUG:certbot._internal.display.obj:Notifying user: Renewing an existing certificate for cloud.webdesigntm.online 2025-01-29 04:19:08,722:DEBUG:certbot.crypto_util:Generating RSA key (2048 bits): /etc/letsencrypt/keys/0727_key-certbot.pem 2025-01-29 04:19:08,751:DEBUG:certbot.crypto_util:Creating CSR: /etc/letsencrypt/csr/0727_csr-certbot.pem 2025-01-29 04:19:08,752:DEBUG:acme.client:Requesting fresh nonce 2025-01-29 04:19:08,752:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2025-01-29 04:19:08,880:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2025-01-29 04:19:08,881:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 04:19:09 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuuXQSXxaXOV3O1AvXat3YBXBNxuDd3NSBTY2Dqw0bAcgk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2025-01-29 04:19:08,881:DEBUG:acme.client:Storing nonce: Z6auUXuuXQSXxaXOV3O1AvXat3YBXBNxuDd3NSBTY2Dqw0bAcgk 2025-01-29 04:19:08,881:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "cloud.webdesigntm.online"\n }\n ]\n}' 2025-01-29 04:19:08,885:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIlo2YXVVWHV1WFFTWHhhWE9WM08xQXZYYXQzWUJYQk54dURkM05TQlRZMkRxdzBiQWNnayIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvbmV3LW9yZGVyIn0", "signature": "fRQIL5ln-Tf992IUH6TmS5HKbv5nyLc0QC8VsbItB--aLaBdZ3-3jrQ478JHTHR1K6Jqe5R-Fl18hdlUaiLG7UM6_knZhuGDuEUPdJUVWw6cSsTUNrRxiOf_h0MnLqQjOJddYoITtXdGFPw3WSy_T-EDTKduGgDVR8H0N5z8mHmDwu3E7EQG3NVIl1o6Qd1pJmZ7mFXlGe9p6nSXnlOEhRs7TksnvoO4mqOikiVuQURGl0-FnAkOj3_ytxuSCXuRUxUewGTdtI0r40RfGN_eJcNC2PEYCrpPcX_HNR49qUlpnXdUe6X_oj4SCTOgGTHKoWCo2Er6rLGITvuzVg0N1A", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImNsb3VkLndlYmRlc2lnbnRtLm9ubGluZSIKICAgIH0KICBdCn0" } 2025-01-29 04:19:09,173:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 356 2025-01-29 04:19:09,174:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Wed, 29 Jan 2025 04:19:09 GMT Content-Type: application/json Content-Length: 356 Connection: keep-alive Boulder-Requester: 998163537 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/998163537/349070276855 Replay-Nonce: Z6auUXuurCmOcIz_VVrle4z7PT5l7IL5WZdjSPTnyaYZmQtcqOY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2025-02-05T04:19:09Z", "identifiers": [ { "type": "dns", "value": "cloud.webdesigntm.online" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz/998163537/467805850845" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/998163537/349070276855" } 2025-01-29 04:19:09,174:DEBUG:acme.client:Storing nonce: Z6auUXuurCmOcIz_VVrle4z7PT5l7IL5WZdjSPTnyaYZmQtcqOY 2025-01-29 04:19:09,175:DEBUG:acme.client:JWS payload: b'' 2025-01-29 04:19:09,177:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/467805850845: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIlo2YXVVWHV1ckNtT2NJel9WVnJsZTR6N1BUNWw3SUw1V1pkalNQVG55YVlabVF0Y3FPWSIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzQ2NzgwNTg1MDg0NSJ9", "signature": "P002YHifms3HHfueJzyFQbikm91ojeaV_Kc3O7_7RwB-bHsN_4dybfMPx4bAptrQFEtgf3nmMN4_GoLFimRxZdDdnY-cz20H1jh_lu-oE2LwNV8KaIJCfEyPkf3QFWWvByTA__Lwgxl1yRZVU8x4mp2G3i2s8yw-tTXZjeIUWRl242Jf7FRVz-LNaxet4c44WW_ih2hQqp8lWJ6DsI6ZEQFtfn7E5f9arjXn8hvH_EeGg3P7Va0YWExm1uZKoBoTWHLkpG7qusdnUc1PsZ2xZzm4sdm8HYOk9TAU8u-mrCkWrv7rOQ8OJ-xZqllIwDbjmCiOA4vHEUGhY6jKNOim2g", "payload": "" } 2025-01-29 04:19:09,322:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/467805850845 HTTP/1.1" 200 829 2025-01-29 04:19:09,326:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 04:19:10 GMT Content-Type: application/json Content-Length: 829 Connection: keep-alive Boulder-Requester: 998163537 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuurviQUwW2zl1KmQDv4gIPBc7gDMOD9NZU6nw8NL1bE28 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cloud.webdesigntm.online" }, "status": "pending", "expires": "2025-02-05T04:19:09Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/V40dxg", "status": "pending", "token": "GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/1o9fhg", "status": "pending", "token": "GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/C1HMhg", "status": "pending", "token": "GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU" } ] } 2025-01-29 04:19:09,327:DEBUG:acme.client:Storing nonce: Z6auUXuurviQUwW2zl1KmQDv4gIPBc7gDMOD9NZU6nw8NL1bE28 2025-01-29 04:19:09,328:INFO:certbot._internal.auth_handler:Performing the following challenges: 2025-01-29 04:19:09,328:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online 2025-01-29 04:19:09,328:INFO:certbot._internal.plugins.webroot:Using the webroot path /var/www/html for all unmatched domains. 2025-01-29 04:19:09,329:DEBUG:certbot._internal.plugins.webroot:Creating root challenges validation dir at /var/www/html/.well-known/acme-challenge 2025-01-29 04:19:09,338:DEBUG:certbot._internal.plugins.webroot:Attempting to save validation to /var/www/html/.well-known/acme-challenge/GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU 2025-01-29 04:19:09,357:DEBUG:acme.client:JWS payload: b'{}' 2025-01-29 04:19:09,367:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/V40dxg: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIlo2YXVVWHV1cnZpUVV3VzJ6bDFLbVFEdjRnSVBCYzdnRE1PRDlOWlU2bnc4TkwxYkUyOCIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvY2hhbGwvOTk4MTYzNTM3LzQ2NzgwNTg1MDg0NS9WNDBkeGcifQ", "signature": "ww35bzhJorzPo0qsY7ETzNlrEOp37W-Bt906rpRXYpfvefcSiIT7hP9Xm67iyGKEa26TcIlnHGTeamkD35UQ85CYQFnJ6blzB04gXj_i7UOh8RGcSjwLLIDpaoTzP-HpEvaG2RhIeerXT5WOVcWCLSYU9rT8Meh7tQsrCpjbluivougwraPDXAMlzczygWCczWU4jvsnpwa9-fyQ33-jlk1wSW29ynEsFsmJR-lMFIC6AM5qVyYyUpF5QUeMWoJ_kzuZ_wbcXX7O7df7l4OX-Tm6ehcKGgwx_6Z5zuZ_HFdCx37dN2YEJo_U9jvVb_dKvg_3Ur8JzckUkAUV42-Q7Q", "payload": "e30" } 2025-01-29 04:19:09,517:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/chall/998163537/467805850845/V40dxg HTTP/1.1" 200 194 2025-01-29 04:19:09,518:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 04:19:10 GMT Content-Type: application/json Content-Length: 194 Connection: keep-alive Boulder-Requester: 998163537 Cache-Control: public, max-age=0, no-cache Link: ;rel="index", ;rel="up" Location: https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/V40dxg Replay-Nonce: KY2mD_AjJeU5VJuh_ddRGh3N71WZ5I49v7Ls2Tpe2p3E0l-dxns X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/V40dxg", "status": "pending", "token": "GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU" } 2025-01-29 04:19:09,518:DEBUG:acme.client:Storing nonce: KY2mD_AjJeU5VJuh_ddRGh3N71WZ5I49v7Ls2Tpe2p3E0l-dxns 2025-01-29 04:19:09,519:INFO:certbot._internal.auth_handler:Waiting for verification... 2025-01-29 04:19:10,521:DEBUG:acme.client:JWS payload: b'' 2025-01-29 04:19:10,528:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz/998163537/467805850845: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTk4MTYzNTM3IiwgIm5vbmNlIjogIktZMm1EX0FqSmVVNVZKdWhfZGRSR2gzTjcxV1o1STQ5djdMczJUcGUycDNFMGwtZHhucyIsICJ1cmwiOiAiaHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2FjbWUvYXV0aHovOTk4MTYzNTM3LzQ2NzgwNTg1MDg0NSJ9", "signature": "Nma4ohwdJ1A_KOmKOVVNcIcySikkxB-IHCalZ8cfn1nUCMoXHMpkfs22rYAZ-UbkWkEwvvaPVgiwQs25xnfPcfKrs1hccwAeoJw-eQWIKg86KwV9F3dCoiLxE20IjaXb-rqFEtnFmChPgG-qBQul5ZLH68gPz85FLPLHvNac-wf591jxYkG1fCQMa_g8yAlR_w1FzZkjFiqVmXapUYHiczFDV5x5O4foZnwHLD8gku-_sleV5rt7t69rnQoO8HM_1xTLHOjMFtP-19kwA_NdGIMaVhMX8V_ZPYCiwSw6vHVmu75N7Czbx8OrMZHE8vPQOj0vu0wIZehrSGF1N9lIsw", "payload": "" } 2025-01-29 04:19:10,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz/998163537/467805850845 HTTP/1.1" 200 778 2025-01-29 04:19:10,720:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Wed, 29 Jan 2025 04:19:11 GMT Content-Type: application/json Content-Length: 778 Connection: keep-alive Boulder-Requester: 998163537 Cache-Control: public, max-age=0, no-cache Link: ;rel="index" Replay-Nonce: Z6auUXuucnLuhC1ZWg2JLADmuJI3QkbE7_tv7nnDU5xu8TFYLsg X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "cloud.webdesigntm.online" }, "status": "invalid", "expires": "2025-02-05T04:19:09Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall/998163537/467805850845/V40dxg", "status": "invalid", "validated": "2025-01-29T04:19:10Z", "error": { "type": "urn:ietf:params:acme:error:dns", "detail": "DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain", "status": 400 }, "token": "GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU" } ] } 2025-01-29 04:19:10,720:DEBUG:acme.client:Storing nonce: Z6auUXuucnLuhC1ZWg2JLADmuJI3QkbE7_tv7nnDU5xu8TFYLsg 2025-01-29 04:19:10,720:INFO:certbot._internal.auth_handler:Challenge failed for domain cloud.webdesigntm.online 2025-01-29 04:19:10,721:INFO:certbot._internal.auth_handler:http-01 challenge for cloud.webdesigntm.online 2025-01-29 04:19:10,721:DEBUG:certbot._internal.display.obj:Notifying user: Certbot failed to authenticate some domains (authenticator: webroot). The Certificate Authority reported these problems: Domain: cloud.webdesigntm.online Type: dns Detail: DNS problem: NXDOMAIN looking up A for cloud.webdesigntm.online - check that a DNS record exists for this domain; DNS problem: NXDOMAIN looking up AAAA for cloud.webdesigntm.online - check that a DNS record exists for this domain Hint: The Certificate Authority failed to download the temporary challenge files created by Certbot. Ensure that the listed domains serve their content from the provided --webroot-path/-w and that files created there can be downloaded from the internet. 2025-01-29 04:19:10,725:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2025-01-29 04:19:10,725:DEBUG:certbot._internal.error_handler:Calling registered functions 2025-01-29 04:19:10,725:INFO:certbot._internal.auth_handler:Cleaning up challenges 2025-01-29 04:19:10,726:DEBUG:certbot._internal.plugins.webroot:Removing /var/www/html/.well-known/acme-challenge/GpQiOQIXKqrPnEPz9PwhS9R9lODfuAKHznnS9ZvVqIU 2025-01-29 04:19:10,727:DEBUG:certbot._internal.plugins.webroot:All challenges cleaned up 2025-01-29 04:19:10,728:ERROR:certbot._internal.renewal:Failed to renew certificate cloud.webdesigntm.online with error: Some challenges have failed. 2025-01-29 04:19:10,750:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 485, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1441, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 127, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 345, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 424, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "/usr/lib/python3.6/site-packages/certbot/_internal/client.py", line 476, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, self.config, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 105, in handle_authorizations self._poll_authorizations(authzrs, max_retries, best_effort) File "/usr/lib/python3.6/site-packages/certbot/_internal/auth_handler.py", line 205, in _poll_authorizations raise errors.AuthorizationError('Some challenges have failed.') certbot.errors.AuthorizationError: Some challenges have failed. 2025-01-29 04:19:10,752:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2025-01-29 04:19:10,752:ERROR:certbot._internal.renewal:All renewals failed. The following certificates could not be renewed: 2025-01-29 04:19:10,752:ERROR:certbot._internal.renewal: /etc/letsencrypt/live/cloud.webdesigntm.online/fullchain.pem (failure) 2025-01-29 04:19:10,753:DEBUG:certbot._internal.display.obj:Notifying user: - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 2025-01-29 04:19:10,753:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "/usr/bin/certbot", line 11, in load_entry_point('certbot==1.22.0', 'console_scripts', 'certbot')() File "/usr/lib/python3.6/site-packages/certbot/main.py", line 19, in main return internal_main.main(cli_args) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1632, in main return config.func(config, plugins) File "/usr/lib/python3.6/site-packages/certbot/_internal/main.py", line 1518, in renew renewal.handle_renewal_request(config) File "/usr/lib/python3.6/site-packages/certbot/_internal/renewal.py", line 512, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 1 renew failure(s), 0 parse failure(s) 2025-01-29 04:19:10,755:ERROR:certbot._internal.log:1 renew failure(s), 0 parse failure(s)