Skip to main content

A tool to manage your DNS-challenged TLS certificates

Project description

version python_support docker ci coverage spectrum

Features

DNSroboCert is designed to manage Let’s Encrypt SSL certificates based on DNS challenges.

  • Let’s Encrypt wildcard and regular certificates generation by Certbot using DNS challenges,

  • Integrated automated renewal of almost expired certificates,

  • Standardized API through Lexicon library to insert the DNS challenge with various DNS providers,

  • Centralized YAML configuration file to maintain several certificates and several DNS providers with configuration validity control,

  • Modification of container configuration without restart,

  • Flexible hooks upon certificate creation/renewal including containers restart, commands in containers or custom hooks,

  • Support for DNS alias mode (see the follow_cnames option in the certificate section),

  • Linux, Mac OS X and Windows support, with a particular care for Docker services,

  • Delivered as a standalone application and a Docker image.

Why use DNSroboCert

If you are reading these lines, you certainly want to secure all your services using Let’s Encrypt SSL certificates, which are free and accepted everywhere.

If you want to secure Web services through HTTPS, there is already plenty of great tools. In the Docker world, one can check Traefik, or nginx-proxy + letsencrypt-nginx-proxy-companion. Basically, theses tools will allow automated and dynamic generation/renewal of SSL certificates, based on TLS or HTTP challenges, on top of a reverse proxy to encrypt everything through HTTPS.

So far so good, but you may fall in one of the following categories:

  1. You are in a firewalled network, and your HTTP/80 and HTTPS/443 ports are not opened to the outside world.

  2. You want to secure non-Web services (like LDAP, IMAP, POP, etc.) were the HTTPS protocol is of no use.

  3. You want to generate a wildcard certificate, valid for any sub-domain of a given domain.

For the first case, ACME servers need to be able to access your website through HTTP (for HTTP challenges) or HTTPS (for TLS challenges) in order to validate the certificate. With a firewall these two challenges - which are widely used in HTTP proxy approaches - will not be usable: you need to ask a DNS challenge. Please note that traefik embed DNS challenges, but only for few DNS providers.

For the second case, there is no website to use TLS or HTTP challenges, and you should ask a DNS challenge. Of course you could create a “fake” website to validate the domain using a HTTP challenge, and reuse the certificate on the “real” service. But it is a workaround, and you have to implement a logic to propagate the certificate, including during its renewal. Indeed, most of the non-Web services will need to be restarted each time the certificate is renewed.

For the last case, the use of a DNS challenge is mandatory. Then the problems concerning certificates propagation that have been discussed in the second case will also occur.

The solution is a dedicated and specialized tool which handles the creation/renewal of Let’s Encrypt certificates, and ensure their propagation in the relevant services. It is the purpose of this project.

Documentation

Online documentation (user guide, configuration reference) is available in the DNSroboCert documentation.

For a quick start, please have a look in particular at the User guide and the Lexicon provider configuration.

Support

Do not hesitate to join the DNSroboCert community on Spectrum if you need help to use or develop DNSroboCert!

Contributing

If you want to help in the DNSroboCert development, you are welcome! Please have a look at the Developer guide page to know how to start.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dnsrobocert-3.16.0.tar.gz (20.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dnsrobocert-3.16.0-py3-none-any.whl (21.2 kB view details)

Uploaded Python 3

File details

Details for the file dnsrobocert-3.16.0.tar.gz.

File metadata

  • Download URL: dnsrobocert-3.16.0.tar.gz
  • Upload date:
  • Size: 20.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.0 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9

File hashes

Hashes for dnsrobocert-3.16.0.tar.gz
Algorithm Hash digest
SHA256 dda644677bde60036c145f1a5f22fee065d34ed3bb3dc8c8bbe3fc570b01a36c
MD5 c5281223792e0fc0d6b7071f1347f0f8
BLAKE2b-256 04bd166fb9b5d4d90501ac3491d6975c80495706508602da1a97fdf658de8c5b

See more details on using hashes here.

File details

Details for the file dnsrobocert-3.16.0-py3-none-any.whl.

File metadata

  • Download URL: dnsrobocert-3.16.0-py3-none-any.whl
  • Upload date:
  • Size: 21.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.0 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9

File hashes

Hashes for dnsrobocert-3.16.0-py3-none-any.whl
Algorithm Hash digest
SHA256 553befc54cf75334165f0ef88bd944fabdd3e1d2facd5eace0c841fcdfaea1c6
MD5 e97347dac1c0886ad721b48ed574b7b1
BLAKE2b-256 8112ff804ab069070148f10457c84210cb06e9f64badd7c29b76bb630db91b86

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page