Skip to main content

Automated SSL certificate management for Citrix NetScaler ADC using Certbot

Project description

NetScaler Certbot Hook

License: MIT Python 3.8+

Automated SSL certificate management for Citrix NetScaler ADC. This tool seamlessly integrates with Certbot to install and renew Let's Encrypt certificates on NetScaler appliances via the NITRO API.

Perfect for automating certificate lifecycle management in combination with DNS-01 challenges for fully automated, hands-free certificate renewals.

Features

  • Automated Certificate Installation - Upload and install certificates with a single command
  • Smart Updates - Only updates certificates when serial numbers differ
  • Chain Certificate Handling - Automatic linking to intermediate certificates
  • Configuration Persistence - Automatically saves NetScaler configuration
  • Idempotent Operations - Safe to run repeatedly, only changes when needed
  • Custom Certificate Paths - Supports non-standard certificate locations
  • Comprehensive Validation - Pre-flight checks for files, credentials, and configuration
  • Detailed Error Messages - Clear feedback when something goes wrong
  • Type-Safe - Full type hints for IDE support and static analysis

Architecture

Architecture

The script connects to your NetScaler via NITRO API, compares certificate serial numbers, and performs uploads/installations only when necessary. Chain certificates are handled separately for security reasons.

Prerequisites

  • Python 3.8 or higher
  • Citrix NetScaler ADC with NITRO API access
  • Certbot (for Let's Encrypt certificate enrollment)
  • Network access to NetScaler management interface

Installation

Option 1: From PyPI (Recommended)

# Install directly from PyPI
pip install netscaler-certbot-hook

After installation, the netscaler-certbot-hook command will be available system-wide.

Option 2: From Source

# Clone the repository
git clone https://github.com/slauger/netscaler-certbot-hook.git
cd netscaler-certbot-hook

# Install in development mode
pip install -e .

Option 3: Install dependencies only

# For manual script execution
pip install -r requirements.txt

Dependencies

  • pyOpenSSL>=20.0.0 - SSL certificate handling
  • requests>=2.25.0 - NITRO API communication

Configuration

Environment Variables

The script requires the following environment variables:

Variable Required Default Description
NS_URL Yes - NetScaler management URL (e.g., https://192.168.10.10)
NS_LOGIN No nsroot NetScaler administrator username
NS_PASSWORD No nsroot NetScaler administrator password
NS_VERIFY_SSL No true Verify SSL certificate (true, false, 1, 0)

Example:

export NS_URL=https://192.168.10.10
export NS_LOGIN=nsroot
export NS_PASSWORD=your-secure-password
export NS_VERIFY_SSL=true

Command-Line Arguments

netscaler-certbot-hook --help

Note: If installed from PyPI, use netscaler-certbot-hook. If running from source, use netscaler-certbot-hook or python3 -m netscaler_certbot_hook.

Argument Required Default Description
--name Yes - Certificate object name on NetScaler
--chain No Auto-detected from CN Chain certificate object name (auto-detected from certificate CN if not specified)
--cert No /etc/letsencrypt/live/<name>/cert.pem Path to certificate file
--privkey No /etc/letsencrypt/live/<name>/privkey.pem Path to private key file
--chain-cert No /etc/letsencrypt/live/<name>/chain.pem Path to chain certificate file
--verbose No false Enable verbose output (DEBUG level)
--quiet No false Suppress all output except errors
--update-chain No false Allow updating chain certificate if serial differs
--no-domain-check No false Skip domain validation when updating certificates

Usage

Step 1: Enroll Certificate with Certbot

First, obtain a certificate from Let's Encrypt using Certbot with DNS-01 challenge:

Example with Cloudflare DNS:

certbot --text --agree-tos --non-interactive certonly \
  --cert-name 'example.com' \
  -d 'example.com' \
  -d 'www.example.com' \
  -a dns-cloudflare \
  --dns-cloudflare-credentials /etc/letsencrypt/cloudflare.ini \
  --keep-until-expiring

Example with other DNS providers:

# Route53 (AWS)
certbot certonly --dns-route53 -d example.com

# Google Cloud DNS
certbot certonly --dns-google -d example.com

# Manual DNS (for testing)
certbot certonly --manual --preferred-challenges dns -d example.com

Step 2: Install Certificate on NetScaler

Basic Usage (Default Paths):

netscaler-certbot-hook --name example.com

Custom Certificate Paths:

netscaler-certbot-hook --name example.com \
  --cert /path/to/cert.pem \
  --privkey /path/to/privkey.pem \
  --chain-cert /path/to/chain.pem

Automatic Chain Certificate Naming:

By default, the script automatically detects the chain certificate name from the Common Name (CN) in the certificate. For example, Let's Encrypt intermediate certificates like "R10", "R11", "E5", "E6" etc. are automatically detected:

# Chain name is auto-detected from the certificate CN
netscaler-certbot-hook --name example.com
# Creates/updates chain certificate with name like "R11" or "E6"

Custom Chain Certificate Name:

You can override the auto-detection and specify a custom chain certificate name:

netscaler-certbot-hook --name example.com --chain my-custom-chain

Verbose Output for Debugging:

# Enable detailed DEBUG logging
netscaler-certbot-hook --name example.com --verbose

Quiet Mode for Cron Jobs:

# Suppress all output except errors
netscaler-certbot-hook --name example.com --quiet

Update Chain Certificate:

When trust chains change (e.g., Let's Encrypt issuer switching from E8 to E7), use both --update-chain and --no-domain-check flags:

# Allow chain certificate updates when serial differs
netscaler-certbot-hook --name example.com --update-chain --no-domain-check

Note: By default, the script will refuse to update chain certificates if the serial number differs. This is a security measure to prevent unexpected trust chain changes. Use --update-chain only when you are certain the new chain certificate is valid and expected.

Why --no-domain-check is required: Chain certificates (intermediate CAs) are registered to different domains than your end-entity certificate. Without this flag, NetScaler will reject the update with the error: "Certificate is registered to a different domain; use the 'no domain check' option to force the operation".

Skip Domain Validation:

The --no-domain-check flag is useful in several scenarios:

# Update certificate with domain changes or multi-domain certificates
netscaler-certbot-hook --name example.com --no-domain-check

When to use --no-domain-check:

  • Updating chain/intermediate certificates (required)
  • Certificates with multiple SANs (Subject Alternative Names)
  • Certificates bound to multiple virtual servers
  • When domain names in the certificate have changed
  • Any scenario where NetScaler reports: "Certificate is registered to a different domain"

Technical Details: This flag passes the nodomaincheck parameter to the NetScaler NITRO API, which bypasses domain validation during certificate updates.

Step 3: Automate with Cron

Add to your crontab for automatic renewal:

# Renew certificates daily and update NetScaler
0 3 * * * certbot renew --quiet && netscaler-certbot-hook --name example.com

Or create a Certbot deploy hook:

# /etc/letsencrypt/renewal-hooks/deploy/netscaler-hook.sh
#!/bin/bash
export NS_URL=https://192.168.10.10
export NS_LOGIN=nsroot
export NS_PASSWORD=your-password

netscaler-certbot-hook --name $RENEWED_DOMAINS

Make it executable:

chmod +x /etc/letsencrypt/renewal-hooks/deploy/netscaler-hook.sh

Logging

The script uses Python's built-in logging framework for structured output. You can control the verbosity with command-line flags:

Log Levels

Flag Log Level Use Case
default INFO Standard output showing progress
--verbose DEBUG Detailed output for troubleshooting
--quiet ERROR Minimal output, only errors

Examples

Standard Output (INFO level):

netscaler-certbot-hook --name example.com

Shows all important operations and their status.

Verbose Mode (DEBUG level):

netscaler-certbot-hook --name example.com --verbose

Shows additional debugging information including:

  • Connection details
  • Configuration values
  • Detailed operation steps

Quiet Mode (ERROR level):

netscaler-certbot-hook --name example.com --quiet

Only shows errors. Perfect for cron jobs where you only want to be notified of failures.

Logging for Cron Jobs

For automated cron jobs, use --quiet to suppress normal output:

# Only log errors to file
0 3 * * * netscaler-certbot-hook --name example.com --quiet 2>> /var/log/netscaler-cert-errors.log

Or use standard output with log rotation:

# Log all output with rotation
0 3 * * * netscaler-certbot-hook --name example.com >> /var/log/netscaler-cert.log 2>&1

Example Output

Initial Setup

When running for the first time:

chain certificate letsencrypt not found
uploading chain certificate as letsencrypt-1581896753.crt
installing chain certificate with serial 13298795840390663119752826058995181320
certificate example.com not found
uploading certificate as example.com-1581896753.crt
uploading private key as example.com-1581896753.key
installing certificate with serial 409596789458967997345847308430335698529007
link certificate example.com to chain certificate letsencrypt
saving configuration

Certificate Update

When certificate has been renewed:

chain certificate letsencrypt found with serial 13298795840390663119752826058995181320
installed chain certificate matches our serial - nothing to do
certificate example.com found with serial 409596789458967997345847308430335698529007
uploading certificate as example.com-1581896812.crt
uploading private key as example.com-1581896812.key
update certificate example.com
link certificate example.com to chain certificate letsencrypt
certificate link was already present - nothing to do
saving configuration

No Changes Needed

When certificate is already up-to-date:

chain certificate letsencrypt found with serial 13298795840390663119752826058995181320
installed chain certificate matches our serial - nothing to do
certificate example.com found with serial 409596789458967997345847308430335698529007
installed certificate matches our serial - nothing to do

Security Considerations

Chain Certificate Updates

By default, the script does not automatically update chain certificates if the serial number differs. This prevents potential security issues from unexpected chain updates.

To enable chain certificate updates, use the --update-chain flag:

netscaler-certbot-hook --name example.com --update-chain

When to use --update-chain:

  • Let's Encrypt issuer rotation (e.g., switching from E8 to E7)
  • Let's Encrypt root certificate rotation
  • CA intermediate certificate updates
  • Planned trust chain migrations

Important: Chain certificate updates typically require both --update-chain (to allow the update) and --no-domain-check (to bypass domain validation). Example:

netscaler-certbot-hook --name example.com --update-chain --no-domain-check

Security Warning: Only use --update-chain when you are expecting a chain certificate change and have verified the new certificate is valid. Unexpected chain changes could indicate a security issue.

Skip Domain Validation (--no-domain-check)

The --no-domain-check flag tells NetScaler to skip domain validation when updating certificates. This is necessary in several scenarios:

Common use cases:

  • Chain certificate updates (required) - Chain certificates are registered to CA domains, not your domain
  • Multi-domain certificates - Certificates with multiple SANs may trigger domain validation errors
  • Certificate rebinding - Certificates bound to multiple virtual servers
  • Domain changes - When updating certificates with modified domain names

Error message this solves:

ERROR: Certificate is registered to a different domain; use the 'no domain check' option to force the operation

Example usage:

# Update chain certificate (both flags required)
netscaler-certbot-hook --name example.com --update-chain --no-domain-check

# Update regular certificate with domain validation issues
netscaler-certbot-hook --name example.com --no-domain-check

Technical Details: This flag passes the nodomaincheck parameter to the NetScaler NITRO API during certificate update operations.

Credential Management

Never commit credentials to version control! Use environment variables or secure credential management:

# Store in secure location
echo "export NS_PASSWORD='your-password'" > ~/.netscaler-credentials
chmod 600 ~/.netscaler-credentials

# Source when needed
source ~/.netscaler-credentials

SSL Verification

Always enable SSL verification in production:

export NS_VERIFY_SSL=true

Only disable for testing or development environments.

API Reference

The script uses the Citrix NetScaler NITRO API. For more information:

Contributing

See CONTRIBUTING.md for guidelines on contributing to this project

License

This project is licensed under the MIT License - see the LICENSE file for details.

Authors

Support

For issues, questions, or contributions, please use the GitHub issue tracker

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

netscaler_certbot_hook-2.0.0.tar.gz (32.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

netscaler_certbot_hook-2.0.0-py3-none-any.whl (18.3 kB view details)

Uploaded Python 3

File details

Details for the file netscaler_certbot_hook-2.0.0.tar.gz.

File metadata

  • Download URL: netscaler_certbot_hook-2.0.0.tar.gz
  • Upload date:
  • Size: 32.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for netscaler_certbot_hook-2.0.0.tar.gz
Algorithm Hash digest
SHA256 4a8c54bbc4560d2923f777a5a7ce2faadea32d01ff769a6a15ec6812e3a795aa
MD5 80277219a31e370de04ab1c0451e5d72
BLAKE2b-256 3b2923ac3496c3d90c8dadebddd20a832bd9a3874696edf0198dc88e9a9d93f3

See more details on using hashes here.

Provenance

The following attestation bundles were made for netscaler_certbot_hook-2.0.0.tar.gz:

Publisher: release.yml on slauger/netscaler-certbot-hook

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file netscaler_certbot_hook-2.0.0-py3-none-any.whl.

File metadata

File hashes

Hashes for netscaler_certbot_hook-2.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 e778fbc9ca79e21f29ebffc432ce5714dcf48a94dfc0bf68bcfcf7e370efb675
MD5 67e364fc3b3c4e95821ad38f04df361e
BLAKE2b-256 f34990f9b0118bff11dc805a090f053042324a5736ff173388b65597b9ab870f

See more details on using hashes here.

Provenance

The following attestation bundles were made for netscaler_certbot_hook-2.0.0-py3-none-any.whl:

Publisher: release.yml on slauger/netscaler-certbot-hook

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page