package dns-certify

  1. Overview
  2. Docs
MirageOS let's encrypt certificate retrieval

Install

Dune Dependency

Authors

Maintainers

Sources

dns-v4.4.0.tbz
sha256=1e4d71dc34c2e01f3881f1322c157485f2cb4b8da6c2450017b875810bf9707b
sha512=f2fc524822dc3f322f9bbb05dd35ada14950b91f37e025d66ad97abb510fa1ddac6c1f8683daaa5b95737ce2abcf24020ffca4650822e79c81683b01d534b825

doc/dns-certify.mirage/Dns_certify_mirage/Make/index.html

Module Dns_certify_mirage.MakeSource

Parameters

module T : Mirage_time.S
module S : Mirage_stack.V4

Signature

Sourceval retrieve_certificate : S.t -> dns_key:string -> hostname:[ `host ] Domain_name.t -> ?additional_hostnames:[ `host ] Domain_name.t list -> ?key_seed:string -> S.TCPV4.ipaddr -> int -> (Tls.Config.own_cert, [ `Msg of string ]) result Lwt.t

retrieve_certificate stack ~dns_key ~hostname ~key_seed server_ip port generates a RSA private key (using the key_seed), a certificate signing request for the given hostname and additional_hostnames, and sends server_ip an nsupdate (DNS-TSIG with dns_key) with the csr as TLSA record, awaiting for a matching certificate as TLSA record. Requires a service that interacts with let's encrypt to transform the CSR into a signed certificate. If something fails, an exception (via Lwt.fail) is raised. This is meant for unikernels that require a valid TLS certificate before they can start their service (i.e. most web servers, mail servers).

OCaml

Innovation. Community. Security.