Unrecognized DNS provider: Zonomi

Hi all

according to Traefik Let's Encrypt Documentation - Traefik and Zonomi :: Let’s Encrypt client and ACME library written in Go. Zonomi should be a valid DNS-Provider.

Unfortunately the output of lego dnshelp says

Credentials for DNS providers must be passed through environment variables.

To display the documentation for a DNS providers:

All DNS codes:
  acme-dns, alidns, auroradns, autodns, azure, bindman, bluecat, cloudflare, cloudns, cloudxns, conoha, designate, digitalocean, dnsimple, dnsmadeeasy, dnspod, dode, dreamhost, duckdns, dyn, easydns, exec, exoscale, fastdns, gandi, gandiv5, gcloud, glesys, godaddy, hostingde, httpreq, iij, inwx, joker, lightsail, linode, linodev4, liquidweb, manual, mydnsjp, namecheap, namedotcom, namesilo, netcup, nifcloud, ns1, oraclecloud, otc, ovh, pdns, rackspace, rfc2136, route53, sakuracloud, selectel, stackpath, transip, vegadns, versio, vscale, vultr, zoneee

and lego dnshelp -c zonomi says
2024/04/01 16:33:10 "zonomi" is not yet supported

I´m trying to use traefik with docker-compose

Docker version 26.0.0, build 2ae903e
Traefik haves the version 2.11.0
Nothing should be outdated?

Where I can get a reliable list?

Thanks

Are you calling lego inside the Traefik container? Which version is it?

Yes, lego inside traefik:

docker logs traefik 
time="2024-04-01T16:19:08+02:00" level=info msg="Configuration loaded from file: /traefik.yml"
time="2024-04-01T16:19:08+02:00" level=info msg="Traefik version 2.11.0 built on 2024-02-12T15:26:45Z"
time="2024-04-01T16:19:08+02:00" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{\"redirections\":{\"entryPoint\":{\"to\":\"https\",\"scheme\":\"https\",\"permanent\":true,\"priority\":2147483646}}},\"http2\":{\"maxConcurrentStreams\":250},\"udp\":{\"timeout\":\"3s\"}},\"https\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{},\"http2\":{\"maxConcurrentStreams\":250},\"udp\":{\"timeout\":\"3s\"}}},\"providers\":{\"providersThrottleDuration\":\"2s\",\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":\"15s\"},\"file\":{\"watch\":true,\"filename\":\"./dynamic_conf.yml\"}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"debug\",\"format\":\"common\"},\"certificatesResolvers\":{\"ipv64\":{\"acme\":{\"email\":\"post@mydomain.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"./acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"ipv64\",\"delayBeforeCheck\":\"1m30s\",\"resolvers\":[\"1.1.1.1:53\",\"8.8.8.8:53\",\"ns1.ipv64.net:53\",\"ns2.ipv64.net:53\"]}}},\"zonomi\":{\"acme\":{\"email\":\"post@mydomain.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"./acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"zonomi\",\"delayBeforeCheck\":\"1m30s\",\"resolvers\":[\"1.1.1.1:53\",\"8.8.8.8:53\",\"ns1.zonomi.com.:53\",\"ns3.zonomi.com.:53\"]}}}}}"
time="2024-04-01T16:19:08+02:00" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://doc.traefik.io/traefik/contributing/data-collection/\n"
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider aggregator aggregator.ProviderAggregator"
time="2024-04-01T16:19:08+02:00" level=debug msg="Starting TCP Server" entryPointName=https
time="2024-04-01T16:19:08+02:00" level=debug msg="Starting TCP Server" entryPointName=http
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider *file.Provider"
time="2024-04-01T16:19:08+02:00" level=debug msg="*file.Provider provider configuration: {\"watch\":true,\"filename\":\"./dynamic_conf.yml\"}"
time="2024-04-01T16:19:08+02:00" level=debug msg="add watcher on: ."
time="2024-04-01T16:19:08+02:00" level=debug msg="add watcher on: ./dynamic_conf.yml"
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider *traefik.Provider"
time="2024-04-01T16:19:08+02:00" level=debug msg="*traefik.Provider provider configuration: {}"
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider *docker.Provider"
time="2024-04-01T16:19:08+02:00" level=debug msg="*docker.Provider provider configuration: {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":\"15s\"}"
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider *acme.ChallengeTLSALPN"
time="2024-04-01T16:19:08+02:00" level=debug msg="*acme.ChallengeTLSALPN provider configuration: {}"
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider *acme.Provider"
time="2024-04-01T16:19:08+02:00" level=debug msg="*acme.Provider provider configuration: {\"email\":\"post@mydomain.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"./acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"ipv64\",\"delayBeforeCheck\":\"1m30s\",\"resolvers\":[\"1.1.1.1:53\",\"8.8.8.8:53\",\"ns1.ipv64.net:53\",\"ns2.ipv64.net:53\"]},\"ResolverName\":\"ipv64\",\"store\":{},\"TLSChallengeProvider\":{},\"HTTPChallengeProvider\":{}}"
time="2024-04-01T16:19:08+02:00" level=debug msg="Attempt to renew certificates \"720h0m0s\" before expiry and check every \"24h0m0s\"" providerName=ipv64.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-01T16:19:08+02:00" level=info msg="Testing certificate renew..." providerName=ipv64.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-01T16:19:08+02:00" level=info msg="Starting provider *acme.Provider"
time="2024-04-01T16:19:08+02:00" level=debug msg="*acme.Provider provider configuration: {\"email\":\"post@mydomain.com\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"./acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"zonomi\",\"delayBeforeCheck\":\"1m30s\",\"resolvers\":[\"1.1.1.1:53\",\"8.8.8.8:53\",\"ns1.zonomi.com.:53\",\"ns3.zonomi.com.:53\"]},\"ResolverName\":\"zonomi\",\"store\":{},\"TLSChallengeProvider\":{},\"HTTPChallengeProvider\":{}}"
time="2024-04-01T16:19:08+02:00" level=debug msg="Attempt to renew certificates \"720h0m0s\" before expiry and check every \"24h0m0s\"" providerName=zonomi.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-01T16:19:08+02:00" level=info msg="Testing certificate renew..." ACME CA="https://acme-v02.api.letsencrypt.org/directory" providerName=zonomi.acme
time="2024-04-01T16:19:08+02:00" level=debug msg="Configuration received: {\"http\":{\"middlewares\":{\"secHeaders\":{\"headers\":{\"sslRedirect\":true,\"stsSeconds\":31536000,\"stsIncludeSubdomains\":true,\"stsPreload\":true,\"frameDeny\":true,\"customFrameOptionsValue\":\"SAMEORIGIN\",\"contentTypeNosniff\":true,\"browserXssFilter\":true}}}},\"tcp\":{},\"udp\":{},\"tls\":{\"options\":{\"default\":{\"minVersion\":\"VersionTLS12\",\"cipherSuites\":[\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\",\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\",\"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\",\"TLS_AES_128_GCM_SHA256\",\"TLS_AES_256_GCM_SHA384\",\"TLS_CHACHA20_POLY1305_SHA256\"],\"curvePreferences\":[\"CurveP521\",\"CurveP384\"],\"clientAuth\":{},\"alpnProtocols\":[\"h2\",\"http/1.1\",\"acme-tls/1\"]}}}}" providerName=file
time="2024-04-01T16:19:08+02:00" level=debug msg="Configuration received: {\"http\":{\"routers\":{\"http-to-https\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-http-to-https\"],\"service\":\"noop@internal\",\"rule\":\"HostRegexp(`{host:.+}`)\",\"priority\":2147483646}},\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}},\"middlewares\":{\"redirect-http-to-https\":{\"redirectScheme\":{\"scheme\":\"https\",\"port\":\"443\",\"permanent\":true}}},\"serversTransports\":{\"default\":{\"maxIdleConnsPerHost\":200}}},\"tcp\":{},\"udp\":{},\"tls\":{}}" providerName=internal
time="2024-04-01T16:19:08+02:00" level=debug msg="Configuration received: {\"http\":{},\"tcp\":{},\"udp\":{},\"tls\":{}}" providerName=ipv64.acme
time="2024-04-01T16:19:08+02:00" level=debug msg="Configuration received: {\"http\":{},\"tcp\":{},\"udp\":{},\"tls\":{}}" providerName=zonomi.acme
time="2024-04-01T16:19:08+02:00" level=debug msg="Adding certificate for domain(s) *.mydomain.home64.de,mydomain.home64.de"
time="2024-04-01T16:19:08+02:00" level=debug msg="Provider connection established with docker 26.0.0 (API 1.45)" providerName=docker

Yes, at this time I have two URLs and two providers active.

lego is als installed as package:

lego --version
lego version dev linux/amd64
dpkg -l | grep -i lego
ii  lego                                  3.2.0-3.1+b5                         amd64        Let's Encrypt client

I will update lego and try again
Is the installed package the same wich is used by traffic?

I run Traefik in Docker and it has the necessary acme-go LetsEncrypt libraries included. Never had to change or update anything manually.

Share your full Traefik static and dynamic config, and docker-compose.yml if used.

Hi bluepuma77

of course - sorry for the delay, I was quite busy at work today...

However:

docker_compose:

cat docker-compose.yml
version: '3'
services:
  traefik:
    image: traefik:latest
    container_name: traefik
    restart: unless-stopped
    security_opt:
      - no-new-privileges:true
    networks:
      - nextcloud_default
      - traefik_web
    ports:
      - 80:80
      - 443:443
    volumes:
      - /etc/localtime:/etc/localtime:ro
      - /var/run/docker.sock:/var/run/docker.sock:ro
      - ./data/traefik.yml:/traefik.yml:ro
      - ./data/acme.json:/acme.json
      - ./data/dynamic_conf.yml:/dynamic_conf.yml
    environment:
      - ZONOMI_API_KEY=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
      - ZONOMI_HTTP_TIMEOUT=600
      - ZONOMI_PROPAGATION_TIMEOUT=600
      - ZONOMI_TTL=3600
      - ZONOMI_POLLING_INTERVAL=60
    labels:
      - "traefik.enable=true"
      - "traefik.http.routers.traefik.entrypoints=https"
      - "traefik.http.routers.traefik.rule=Host(`traefik.mydomain`)"
      - "traefik.http.routers.traefik.middlewares=traefik-https-redirect"
      - "traefik.http.routers.traefik-secure.entrypoints=https"
      - "traefik.http.routers.traefik-secure.tls=true"
      - "traefik.http.routers.traefik-secure.rule=Host(`traefik.mydomain`)"
      - "traefik.http.routers.traefik-secure.tls.certresolver=zonomi"
      - "traefik.http.routers.traefik-secure.tls.domains[0].main=mydomain"
      - "traefik.http.routers.traefik-secure.tls.domains[0].sans=*.mydomain"
      - "traefik.http.routers.traefik-secure.service=api@internal"
      - "traefik.http.routers.traefik-secure.middlewares=secHeaders@file,traefik-auth"
      - "traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme=https"
      - "traefik.http.middlewares.traefik-auth.basicauth.users=xxxxx:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
      - "providers.file.filename=/dynamic_conf.yml"
networks:
  nextcloud_default:
#    external: true
  traefik_web:
    external: true

traefik.yml

cat data/traefik.yml
api:
  dashboard: true
log:
  level: debug
entryPoints:
  http:
    address: :80
#Redirect all from http to https
    http:
      redirections:
        entryPoint:
          to: https
          scheme: https
  https:
    address: :443
providers:
  docker:
    endpoint: "unix:///var/run/docker.sock"
    exposedByDefault: false
  file:
    filename: "./dynamic_conf.yml"
http:
  routers:
    http-catchall:
      rule: hostregexp(`{host:.+}`)
      entrypoints:
        - http
      middlewares:
        - redirect-to-https
  middlewares:
    redirect-to-https:
      redirectScheme:
        scheme: https
        permanent: false

certificatesResolvers:
  zonomi:
    acme:
      email: xxxx@mydomain
      storage: ./acme.json
      dnsChallenge:
        provider: zonomi
        delayBeforeCheck: 90
        resolvers:
          - "1.1.1.1:53"
          - "8.8.8.8:53"
          - "ns1.zonomi.com.:53"
          - "ns3.zonomi.com.:53"

and finally the actual log:

docker logs -f traefik 
time="2024-04-02T21:06:14+02:00" level=info msg="Configuration loaded from file: /traefik.yml"
time="2024-04-02T21:06:14+02:00" level=info msg="Traefik version 2.11.0 built on 2024-02-12T15:26:45Z"
time="2024-04-02T21:06:14+02:00" level=debug msg="Static configuration loaded {\"global\":{\"checkNewVersion\":true},\"serversTransport\":{\"maxIdleConnsPerHost\":200},\"entryPoints\":{\"http\":{\"address\":\":80\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{\"redirections\":{\"entryPoint\":{\"to\":\"https\",\"scheme\":\"https\",\"permanent\":true,\"priority\":2147483646}}},\"http2\":{\"maxConcurrentStreams\":250},\"udp\":{\"timeout\":\"3s\"}},\"https\":{\"address\":\":443\",\"transport\":{\"lifeCycle\":{\"graceTimeOut\":\"10s\"},\"respondingTimeouts\":{\"idleTimeout\":\"3m0s\"}},\"forwardedHeaders\":{},\"http\":{},\"http2\":{\"maxConcurrentStreams\":250},\"udp\":{\"timeout\":\"3s\"}}},\"providers\":{\"providersThrottleDuration\":\"2s\",\"docker\":{\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":\"15s\"},\"file\":{\"watch\":true,\"filename\":\"./dynamic_conf.yml\"}},\"api\":{\"dashboard\":true},\"log\":{\"level\":\"debug\",\"format\":\"common\"},\"certificatesResolvers\":{\"zonomi\":{\"acme\":{\"email\":\"post@mydomain\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"./acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"zonomi\",\"delayBeforeCheck\":\"1m30s\",\"resolvers\":[\"1.1.1.1:53\",\"8.8.8.8:53\",\"ns1.zonomi.com.:53\",\"ns3.zonomi.com.:53\"]}}}}}"
time="2024-04-02T21:06:14+02:00" level=info msg="\nStats collection is disabled.\nHelp us improve Traefik by turning this feature on :)\nMore details on: https://doc.traefik.io/traefik/contributing/data-collection/\n"
time="2024-04-02T21:06:14+02:00" level=info msg="Starting provider aggregator aggregator.ProviderAggregator"
time="2024-04-02T21:06:14+02:00" level=debug msg="Starting TCP Server" entryPointName=https
time="2024-04-02T21:06:14+02:00" level=debug msg="Starting TCP Server" entryPointName=http
time="2024-04-02T21:06:14+02:00" level=info msg="Starting provider *file.Provider"
time="2024-04-02T21:06:14+02:00" level=debug msg="*file.Provider provider configuration: {\"watch\":true,\"filename\":\"./dynamic_conf.yml\"}"
time="2024-04-02T21:06:14+02:00" level=debug msg="add watcher on: ."
time="2024-04-02T21:06:14+02:00" level=debug msg="add watcher on: ./dynamic_conf.yml"
time="2024-04-02T21:06:14+02:00" level=info msg="Starting provider *traefik.Provider"
time="2024-04-02T21:06:14+02:00" level=debug msg="*traefik.Provider provider configuration: {}"
time="2024-04-02T21:06:14+02:00" level=info msg="Starting provider *acme.ChallengeTLSALPN"
time="2024-04-02T21:06:14+02:00" level=info msg="Starting provider *docker.Provider"
time="2024-04-02T21:06:14+02:00" level=debug msg="*docker.Provider provider configuration: {\"watch\":true,\"endpoint\":\"unix:///var/run/docker.sock\",\"defaultRule\":\"Host(`{{ normalize .Name }}`)\",\"swarmModeRefreshSeconds\":\"15s\"}"
time="2024-04-02T21:06:14+02:00" level=info msg="Starting provider *acme.Provider"
time="2024-04-02T21:06:14+02:00" level=debug msg="*acme.Provider provider configuration: {\"email\":\"post@mydomain\",\"caServer\":\"https://acme-v02.api.letsencrypt.org/directory\",\"storage\":\"./acme.json\",\"keyType\":\"RSA4096\",\"certificatesDuration\":2160,\"dnsChallenge\":{\"provider\":\"zonomi\",\"delayBeforeCheck\":\"1m30s\",\"resolvers\":[\"1.1.1.1:53\",\"8.8.8.8:53\",\"ns1.zonomi.com.:53\",\"ns3.zonomi.com.:53\"]},\"ResolverName\":\"zonomi\",\"store\":{},\"TLSChallengeProvider\":{},\"HTTPChallengeProvider\":{}}"
time="2024-04-02T21:06:14+02:00" level=debug msg="*acme.ChallengeTLSALPN provider configuration: {}"
time="2024-04-02T21:06:14+02:00" level=debug msg="Attempt to renew certificates \"720h0m0s\" before expiry and check every \"24h0m0s\"" providerName=zonomi.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-02T21:06:14+02:00" level=info msg="Testing certificate renew..." providerName=zonomi.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-02T21:06:14+02:00" level=debug msg="Configuration received: {\"http\":{\"middlewares\":{\"secHeaders\":{\"headers\":{\"sslRedirect\":true,\"stsSeconds\":31536000,\"stsIncludeSubdomains\":true,\"stsPreload\":true,\"frameDeny\":true,\"customFrameOptionsValue\":\"SAMEORIGIN\",\"contentTypeNosniff\":true,\"browserXssFilter\":true}}}},\"tcp\":{},\"udp\":{},\"tls\":{\"options\":{\"default\":{\"minVersion\":\"VersionTLS12\",\"cipherSuites\":[\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\",\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\",\"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305\",\"TLS_AES_128_GCM_SHA256\",\"TLS_AES_256_GCM_SHA384\",\"TLS_CHACHA20_POLY1305_SHA256\"],\"curvePreferences\":[\"CurveP521\",\"CurveP384\"],\"clientAuth\":{},\"alpnProtocols\":[\"h2\",\"http/1.1\",\"acme-tls/1\"]}}}}" providerName=file
time="2024-04-02T21:06:14+02:00" level=debug msg="Configuration received: {\"http\":{\"routers\":{\"http-to-https\":{\"entryPoints\":[\"http\"],\"middlewares\":[\"redirect-http-to-https\"],\"service\":\"noop@internal\",\"rule\":\"HostRegexp(`{host:.+}`)\",\"priority\":2147483646}},\"services\":{\"api\":{},\"dashboard\":{},\"noop\":{}},\"middlewares\":{\"redirect-http-to-https\":{\"redirectScheme\":{\"scheme\":\"https\",\"port\":\"443\",\"permanent\":true}}},\"serversTransports\":{\"default\":{\"maxIdleConnsPerHost\":200}}},\"tcp\":{},\"udp\":{},\"tls\":{}}" providerName=internal
time="2024-04-02T21:06:14+02:00" level=debug msg="Configuration received: {\"http\":{},\"tcp\":{},\"udp\":{},\"tls\":{}}" providerName=zonomi.acme
time="2024-04-02T21:06:14+02:00" level=debug msg="Provider connection established with docker 26.0.0 (API 1.45)" providerName=docker
time="2024-04-02T21:06:14+02:00" level=debug msg="Configuration received: {\"http\":{\"routers\":{\"traefik\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"traefik-https-redirect\"],\"service\":\"traefik-traefik\",\"rule\":\"Host(`traefik.mydomain`)\"},\"traefik-secure\":{\"entryPoints\":[\"https\"],\"middlewares\":[\"secHeaders@file\",\"traefik-auth\"],\"service\":\"api@internal\",\"rule\":\"Host(`traefik.mydomain`)\",\"tls\":{\"certResolver\":\"zonomi\",\"domains\":[{\"main\":\"mydomain\",\"sans\":[\"*.mydomain\"]}]}}},\"services\":{\"traefik-traefik\":{\"loadBalancer\":{\"servers\":[{\"url\":\"http://192.168.48.2:80\"}],\"passHostHeader\":true}}},\"middlewares\":{\"traefik-auth\":{\"basicAuth\":{\"users\":[\"chriss:$apr1$zTrHIT1A$nyzo8g4ARh7CG3Ld9fK271\"]}},\"traefik-https-redirect\":{\"redirectScheme\":{\"scheme\":\"https\"}}}},\"tcp\":{},\"udp\":{}}" providerName=docker
time="2024-04-02T21:06:14+02:00" level=debug msg="No default certificate, fallback to the internal generated certificate" tlsStoreName=default
time="2024-04-02T21:06:14+02:00" level=debug msg="Added outgoing tracing middleware noop@internal" middlewareType=TracingForwarder entryPointName=http routerName=http-to-https@internal middlewareName=tracing
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme
time="2024-04-02T21:06:14+02:00" level=debug msg="Setting up redirection to https 443" middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme entryPointName=http routerName=http-to-https@internal
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2024-04-02T21:06:14+02:00" level=debug msg="No default certificate, fallback to the internal generated certificate" tlsStoreName=default
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=https serviceName=traefik-traefik middlewareName=pipelining middlewareType=Pipelining routerName=traefik@docker
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating load-balancer" serviceName=traefik-traefik routerName=traefik@docker entryPointName=https
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating server 0 http://192.168.48.2:80" routerName=traefik@docker entryPointName=https serviceName=traefik-traefik serverName=0
time="2024-04-02T21:06:14+02:00" level=debug msg="child http://192.168.48.2:80 now UP"
time="2024-04-02T21:06:14+02:00" level=debug msg="Propagating new UP status"
time="2024-04-02T21:06:14+02:00" level=debug msg="Added outgoing tracing middleware traefik-traefik" routerName=traefik@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik@docker middlewareName=traefik-https-redirect@docker middlewareType=RedirectScheme
time="2024-04-02T21:06:14+02:00" level=debug msg="Setting up redirection to https " middlewareName=traefik-https-redirect@docker middlewareType=RedirectScheme entryPointName=https routerName=traefik@docker
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" middlewareType=Recovery entryPointName=https middlewareName=traefik-internal-recovery
time="2024-04-02T21:06:14+02:00" level=debug msg="Added outgoing tracing middleware noop@internal" entryPointName=http routerName=http-to-https@internal middlewareName=tracing middlewareType=TracingForwarder
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=http routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme
time="2024-04-02T21:06:14+02:00" level=debug msg="Setting up redirection to https 443" routerName=http-to-https@internal middlewareName=redirect-http-to-https@internal middlewareType=RedirectScheme entryPointName=http
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=http middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2024-04-02T21:06:14+02:00" level=debug msg="Added outgoing tracing middleware api@internal" routerName=traefik-secure@docker middlewareName=tracing middlewareType=TracingForwarder entryPointName=https
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker middlewareType=BasicAuth
time="2024-04-02T21:06:14+02:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=traefik-auth@docker
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=https routerName=traefik-secure@docker middlewareType=Headers middlewareName=secHeaders@file
time="2024-04-02T21:06:14+02:00" level=warning msg="SSLRedirect is deprecated, please use entrypoint redirection instead." entryPointName=https routerName=traefik-secure@docker middlewareType=Headers middlewareName=secHeaders@file
time="2024-04-02T21:06:14+02:00" level=debug msg="Setting up secureHeaders from {map[] map[] false [] [] [] [] [] 0 false [] [] true false  map[] false 31536000 true true false true SAMEORIGIN true true       false}" routerName=traefik-secure@docker middlewareType=Headers middlewareName=secHeaders@file entryPointName=https
time="2024-04-02T21:06:14+02:00" level=debug msg="Adding tracing to middleware" entryPointName=https routerName=traefik-secure@docker middlewareName=secHeaders@file
time="2024-04-02T21:06:14+02:00" level=debug msg="Creating middleware" entryPointName=https middlewareName=traefik-internal-recovery middlewareType=Recovery
time="2024-04-02T21:06:14+02:00" level=debug msg="Adding route for traefik.mydomain with TLS options default" entryPointName=https
time="2024-04-02T21:06:14+02:00" level=debug msg="Looking for provided certificate(s) to validate [\"mydomain\" \"*.mydomain\"]..." providerName=zonomi.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-02T21:06:14+02:00" level=debug msg="Domains [\"mydomain\" \"*.mydomain\"] need ACME certificates generation for domains \"mydomain,*.mydomain\"." ACME CA="https://acme-v02.api.letsencrypt.org/directory" providerName=zonomi.acme
time="2024-04-02T21:06:14+02:00" level=debug msg="Loading ACME certificates [mydomain *.mydomain]..." providerName=zonomi.acme ACME CA="https://acme-v02.api.letsencrypt.org/directory"
time="2024-04-02T21:06:14+02:00" level=debug msg="Building ACME client..." providerName=zonomi.acme
time="2024-04-02T21:06:14+02:00" level=debug msg="https://acme-v02.api.letsencrypt.org/directory" providerName=zonomi.acme
time="2024-04-02T21:06:15+02:00" level=debug msg="Using DNS Challenge provider: zonomi" providerName=zonomi.acme
time="2024-04-02T21:06:15+02:00" level=debug msg="legolog: [INFO] [mydomain, *.mydomain] acme: Obtaining bundled SAN certificate"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [*.mydomain] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/333766996467"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [mydomain] AuthURL: https://acme-v02.api.letsencrypt.org/acme/authz-v3/333766996477"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [*.mydomain] acme: use dns-01 solver"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [mydomain] acme: Could not find solver for: tls-alpn-01"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [mydomain] acme: Could not find solver for: http-01"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [mydomain] acme: use dns-01 solver"
time="2024-04-02T21:06:16+02:00" level=debug msg="legolog: [INFO] [*.mydomain] acme: Preparing to solve DNS-01"
time="2024-04-02T21:06:17+02:00" level=debug msg="legolog: [INFO] [mydomain] acme: Preparing to solve DNS-01"
time="2024-04-02T21:06:18+02:00" level=debug msg="legolog: [INFO] [*.mydomain] acme: Trying to solve DNS-01"
time="2024-04-02T21:06:18+02:00" level=debug msg="legolog: [INFO] [*.mydomain] acme: Checking DNS record propagation using [1.1.1.1:53 8.8.8.8:53 ns1.zonomi.com.:53 ns3.zonomi.com.:53]"
time="2024-04-02T21:07:18+02:00" level=debug msg="legolog: [INFO] Wait for propagation [timeout: 10m0s, interval: 1m0s]"
time="2024-04-02T21:07:18+02:00" level=debug msg="Delaying 90000000000 rather than validating DNS propagation now." providerName=zonomi.acme
time="2024-04-02T21:08:49+02:00" level=debug msg="legolog: [INFO] [*.mydomain] acme: Waiting for DNS record propagation."
time="2024-04-02T21:09:49+02:00" level=debug msg="Delaying 90000000000 rather than validating DNS propagation now." providerName=zonomi.acme

Remark: I removed my domainname, api key and my real email :wink:

Root elements http.routers and http.middlewares belong into dynamic config file.