Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
PyPI

dnsrobocert 3.26.1

pip install dnsrobocert

Latest version

Released:

A tool to manage your DNS-challenged TLS certificates

Verified details

These details have beenverified by PyPI
Maintainers
Avatar for adferrand from gravatar.comadferrand

Unverified details

These details havenot been verified by PyPI
Project links
Meta

Project description

versionpython_supportdockercicoverage

Features

DNSroboCert is designed to manageLet’s Encrypt SSL certificates based onDNS challenges.

  • Let’s Encrypt wildcard and regular certificates generation byCertbot using DNS challenges,

  • Integrated automated renewal of almost expired certificates,

  • Standardized API throughLexicon library to insert the DNS challenge with various DNS providers,

  • Centralized YAML configuration file to maintain several certificates and several DNS providerswith configuration validity control,

  • Modification of container configuration without restart,

  • Flexible hooks upon certificate creation/renewal including containers restart, commands in containersor custom hooks,

  • Support forDNS alias mode (see thefollow_cnames option in thecertificate section),

  • Linux, Mac OS X and Windows support, with a particular care for Docker services,

  • Delivered as a standalone application and a Docker image.

Why use DNSroboCert

If you are reading these lines, you certainly want to secure all your services using Let’s Encrypt SSLcertificates, which are free and accepted everywhere.

If you want to secure Web services through HTTPS, there is already plenty of great tools. In the Dockerworld, one can checkTraefik, ornginx-proxy +letsencrypt-nginx-proxy-companion. Basically, theses toolswill allow automated and dynamic generation/renewal of SSL certificates, based on TLS or HTTP challenges,on top of a reverse proxy to encrypt everything through HTTPS.

So far so good, but you may fall in one of the following categories:

  1. You are in a firewalled network, and your HTTP/80 and HTTPS/443 ports are not opened to the outside world.

  2. You want to secure non-Web services (like LDAP, IMAP, POP, etc.) were the HTTPS protocol is of no use.

  3. You want to generate a wildcard certificate, valid for any sub-domain of a given domain.

For the first case, ACME servers need to be able to access your website through HTTP (for HTTP challenges)or HTTPS (for TLS challenges) in order to validate the certificate. With a firewall these two challenges -which are widely used in HTTP proxy approaches - will not be usable: you need to ask a DNS challenge.Please note that traefik embed DNS challenges, but only for few DNS providers.

For the second case, there is no website to use TLS or HTTP challenges, and you should ask a DNS challenge.Of course you could create a “fake” website to validate the domain using a HTTP challenge, and reuse thecertificate on the “real” service. But it is a workaround, and you have to implement a logic to propagatethe certificate, including during its renewal. Indeed, most of the non-Web services will need to berestarted each time the certificate is renewed.

For the last case, the use of a DNS challenge is mandatory. Then the problems concerning certificatespropagation that have been discussed in the second case will also occur.

The solution is a dedicated and specialized tool which handles the creation/renewal of Let’s Encryptcertificates, and ensure their propagation in the relevant services. It is the purpose ofthis project.

Documentation

Online documentation (user guide, configuration reference) is available in theDNSroboCert documentation.

For a quick start, please have a look in particular at theUser guide and theLexicon provider configuration.

Support

Do not hesitate to join theDNSroboCert community on Github Discussions if you need help to use or develop DNSroboCert!

Contributing

If you want to help in the DNSroboCert development, you are welcome!Please have a look at theDeveloper guide page to know how to start.

Project details

Verified details

These details have beenverified by PyPI
Maintainers
Avatar for adferrand from gravatar.comadferrand

Unverified details

These details havenot been verified by PyPI
Project links
Meta

Release historyRelease notifications |RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more aboutinstalling packages.

Source Distribution

dnsrobocert-3.26.1.tar.gz (154.5 kBview details)

UploadedSource

Built Distribution

Filter files by name, interpreter, ABI, and platform.

If you're not sure about the file name format, learn more aboutwheel file names.

Copy a direct link to the current filters

dnsrobocert-3.26.1-py3-none-any.whl (21.6 kBview details)

UploadedPython 3

File details

Details for the filednsrobocert-3.26.1.tar.gz.

File metadata

  • Download URL:dnsrobocert-3.26.1.tar.gz
  • Upload date:
  • Size: 154.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.6.14

File hashes

Hashes for dnsrobocert-3.26.1.tar.gz
AlgorithmHash digest
SHA256b4f49ce4ff6db7e845e46597e99d9d464d1ddb15bea3e9dee729643a0092a911
MD52aa9727882757568cfb599feefe26fb1
BLAKE2b-2565f19e8d64f9edb462c060c3fc95cae1410d7263fe8d66f80ff4a0253d7201758

See more details on using hashes here.

File details

Details for the filednsrobocert-3.26.1-py3-none-any.whl.

File metadata

File hashes

Hashes for dnsrobocert-3.26.1-py3-none-any.whl
AlgorithmHash digest
SHA256a937fb5e33199ae2ba1b42d513bcaf2bc9d37389e7049bfa15f7cbb222f0dd48
MD5939b55574e08d532fb9873ea7a577020
BLAKE2b-256082726faa0f44a5622727c2f752b37dd77e312d8573369968b78add2caa09416

See more details on using hashes here.

Supported by

AWS Cloud computing and Security SponsorDatadog MonitoringDepot Continuous IntegrationFastly CDNGoogle Download AnalyticsPingdom MonitoringSentry Error loggingStatusPage Status page

[8]ページ先頭

©2009-2025 Movatter.jp