Skip to content

Infomaniak/certbot-dns-infomaniak

Repository files navigation

certbot-dns-infomaniak

Infomaniak DNS Authenticator plugin for certbot

This plugin enables usage of Infomaniak public API to complete dns-01 challenges.

Issue a token

At your Infomaniak manager dashboard, to to the API section and generate a token with "Domain" scope

Installation

pip install certbot-dns-infomaniak

Usage

Via environment variable

export INFOMANIAK_API_TOKEN=xxx
certbot certonly \
  --authenticator dns-infomaniak \
  --server https://acme-v02.api.letsencrypt.org/directory \
  --agree-tos \
  --rsa-key-size 4096 \
  -d 'death.star'

If certbot requires elevated rights, the following command must be used instead:

export INFOMANIAK_API_TOKEN=xxx
sudo --preserve-env=INFOMANIAK_API_TOKEN certbot certonly \
  --authenticator dns-infomaniak \
  --server https://acme-v02.api.letsencrypt.org/directory \
  --agree-tos \
  --rsa-key-size 4096 \
  -d 'death.star'

Via INI file

Certbot will emit a warning if it detects that the credentials file can be accessed by other users on your system. The warning reads "Unsafe permissions on credentials configuration file", followed by the path to the credentials file. This warning will be emitted each time Certbot uses the credentials file, including for renewal, and cannot be silenced except by addressing the issue (e.g., by using a command like chmod 600 to restrict access to the file).

--authenticator dns-infomaniak select the authenticator plugin (Required)
--dns-infomaniak-credentials Infomaniak Token credentials INI file. (Required)

An example credentials.ini file:

dns_infomaniak_token = XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX

To start using DNS authentication for Infomaniak, pass the following arguments on certbot's command line:

certbot certonly \
  --authenticator dns-infomaniak \
  --dns-infomaniak-credentials <path to file> \
  --server https://acme-v02.api.letsencrypt.org/directory \
  --agree-tos \
  --rsa-key-size 4096 \
  -d 'death.star'

Automatic renewal

By default, certbot installs a service that periodically renews its certificates automatically. In order to do this, the command must know the API key, otherwise it will fail silently.

In order to enable automatic renewal for your wildcard certificates, you will need to edit /lib/systemd/system/certbot.service. In there, add the following line in Service, with <YOUR_API_TOKEN> replaced with your actual token:

Environment="INFOMANIAK_API_TOKEN=<YOUR_API_TOKEN>"

Acknowledgments

Based on certbot-dns-ispconfig plugin at https://github.com/m42e/certbot-dns-ispconfig/