Infomaniak DNS Authenticator plugin for certbot
This plugin enables usage of Infomaniak public API to complete dns-01
challenges.
At your Infomaniak manager dashboard, to to the API section and generate a token with "Domain" scope
pip install certbot-dns-infomaniak
export INFOMANIAK_API_TOKEN=xxx
certbot certonly \
--authenticator certbot-dns-infomaniak:dns-infomaniak \
--server https://acme-v02.api.letsencrypt.org/directory \
--agree-tos \
--rsa-key-size 4096 \
-d 'death.star'
If certbot requires elevated rights, the following command must be used instead:
export INFOMANIAK_API_TOKEN=xxx
sudo --preserve-env=INFOMANIAK_API_TOKEN certbot certonly \
--authenticator certbot-dns-infomaniak:dns-infomaniak \
--server https://acme-v02.api.letsencrypt.org/directory \
--agree-tos \
--rsa-key-size 4096 \
-d 'death.star'
Certbot will emit a warning if it detects that the credentials file can be
accessed by other users on your system. The warning reads "Unsafe permissions
on credentials configuration file", followed by the path to the credentials
file. This warning will be emitted each time Certbot uses the credentials file,
including for renewal, and cannot be silenced except by addressing the issue
(e.g., by using a command like chmod 600
to restrict access to the file).
--authenticator certbot-dns-infomaniak:dns-infomaniak |
select the authenticator plugin (Required) |
--certbot-dns-infomaniak:dns-infomaniak-credentials |
Infomaniak Token credentials INI file. (Required) |
An example credentials.ini
file:
certbot_dns_infomaniak:dns_infomaniak_token = XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
To start using DNS authentication for Infomaniak, pass the following arguments on certbot's command line:
certbot certonly \
--authenticator certbot-dns-infomaniak:dns-infomaniak \
--certbot-dns-infomaniak:dns-infomaniak-credentials <path to file> \
--server https://acme-v02.api.letsencrypt.org/directory \
--agree-tos \
--rsa-key-size 4096 \
-d 'death.star'
By default, certbot installs a service that periodically renews its certificates automatically. In order to do this, the command must know the API key, otherwise it will fail silently.
In order to enable automatic renewal for your wildcard certificates, you will
need to edit /lib/systemd/system/certbot.service
. In there, add the
following line in Service
, with <YOUR_API_TOKEN> replaced with your actual
token:
Environment="INFOMANIAK_API_TOKEN=<YOUR_API_TOKEN>"
Based on certbot-dns-ispconfig plugin at https://github.com/m42e/certbot-dns-ispconfig/