Skip to main content

Infomaniak DNS Authenticator plugin for Certbot

Project description

Infomaniak DNS Authenticator plugin for certbot

This plugin enables usage of Infomaniak public API to complete dns-01 challenges.

Issue a token

At your Infomaniak manager dashboard, to to the API section and generate a token with “Domain” scope

Installation

pip install certbot-dns-infomaniak

Usage

Via environment variable

export INFOMANIAK_API_TOKEN=xxx
certbot certonly \
  --authenticator dns-infomaniak \
  --server https://acme-v02.api.letsencrypt.org/directory \
  --agree-tos \
  --rsa-key-size 4096 \
  -d 'death.star'

If certbot requires elevated rights, the following command must be used instead:

export INFOMANIAK_API_TOKEN=xxx
sudo --preserve-env=INFOMANIAK_API_TOKEN certbot certonly \
  --authenticator dns-infomaniak \
  --server https://acme-v02.api.letsencrypt.org/directory \
  --agree-tos \
  --rsa-key-size 4096 \
  -d 'death.star'

Via INI file

Certbot will emit a warning if it detects that the credentials file can be accessed by other users on your system. The warning reads “Unsafe permissions on credentials configuration file”, followed by the path to the credentials file. This warning will be emitted each time Certbot uses the credentials file, including for renewal, and cannot be silenced except by addressing the issue (e.g., by using a command like chmod 600 to restrict access to the file).

--authenticator dns-infomaniak

select the authenticator plugin (Required)

--dns-infomaniak-credentials

Infomaniak Token credentials INI file. (Required)

An example credentials.ini file:

dns_infomaniak_token = XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

To start using DNS authentication for Infomaniak, pass the following arguments on certbot’s command line:

certbot certonly \
  --authenticator dns-infomaniak \
  --dns-infomaniak-credentials <path to file> \
  --server https://acme-v02.api.letsencrypt.org/directory \
  --agree-tos \
  --rsa-key-size 4096 \
  -d 'death.star'

Automatic renewal

By default, certbot installs a service that periodically renews its certificates automatically. In order to do this, the command must know the API key, otherwise it will fail silently.

In order to enable automatic renewal for your wildcard certificates, you will need to edit /lib/systemd/system/certbot.service. In there, add the following line in Service, with <YOUR_API_TOKEN> replaced with your actual token:

Environment="INFOMANIAK_API_TOKEN=<YOUR_API_TOKEN>"

Local Development

Usage of uv to manage virtual environments and dependencies as defined in pyproject.toml is strongly recommended.

Simply run uv sync to automatically create or update the .venv. Usual activation is not required as all tools can simply be run within the project’s environment through uv run..., (eg. uv run ruff check, uv run pytest), eliminating the need for manual requirements management.

Acknowledgments

Based on certbot-dns-ispconfig plugin at https://github.com/m42e/certbot-dns-ispconfig/

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

certbot_dns_infomaniak-0.2.4.tar.gz (6.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

certbot_dns_infomaniak-0.2.4-py3-none-any.whl (8.2 kB view details)

Uploaded Python 3

File details

Details for the file certbot_dns_infomaniak-0.2.4.tar.gz.

File metadata

File hashes

Hashes for certbot_dns_infomaniak-0.2.4.tar.gz
Algorithm Hash digest
SHA256 6a3d2103174d5b59bdb9f704061c53d04817ce3c71155a40798d43bb7983e7ba
MD5 f6f5b09e6e8793458373cac527c02a05
BLAKE2b-256 4aed290ad719761bb79617f8809da7b9d9837637f7c1600f0ec8c7fe8754f3cf

See more details on using hashes here.

File details

Details for the file certbot_dns_infomaniak-0.2.4-py3-none-any.whl.

File metadata

File hashes

Hashes for certbot_dns_infomaniak-0.2.4-py3-none-any.whl
Algorithm Hash digest
SHA256 45c2c8c49b7346dc66c7b59bfed46b07543e963d4bb028614cefd7337b171462
MD5 0b59bc7b2bd69163c9bd1145d73ed966
BLAKE2b-256 d9019f541695a9c4d4866bc999f16c1255e7421092c1ad8748e9d803f6999960

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page