package dns-certify

  1. Overview
  2. Docs
MirageOS let's encrypt certificate retrieval

Install

Dune Dependency

Authors

Maintainers

Sources

dns-v6.1.3.tbz
sha256=984c488f05af72f52625df67a5f53bd0aa7bb139e0f92556437d341d3e4d8647
sha512=330f28465a980ab8a2ce99bc0672ad61488767ef866aa7752e842478866bef085eaead75f49add325e3895b9f498f9aad21ef4e067c72ec5d7a442a1410e62e6

doc/dns-certify.mirage/Dns_certify_mirage/Make/index.html

Module Dns_certify_mirage.MakeSource

Parameters

module T : Mirage_time.S

Signature

Sourceval retrieve_certificate : S.t -> dns_key:string -> hostname:[ `host ] Domain_name.t -> ?additional_hostnames:[ `raw ] Domain_name.t list -> ?key_type:X509.Key_type.t -> ?key_data:string -> ?key_seed:string -> ?bits:int -> S.TCP.ipaddr -> int -> (X509.Certificate.t list * X509.Private_key.t, [ `Msg of string ]) result Lwt.t

retrieve_certificate stack ~dns_key ~hostname ~key_type ~key_data ~key_seed ~bits server_ip port generates a private key (using key_type, key_data, key_seed, and bits), a certificate signing request for the given hostname and additional_hostnames, and sends server_ip an nsupdate (DNS-TSIG with dns_key) with the csr as TLSA record, awaiting for a matching certificate as TLSA record. Requires a service that interacts with let's encrypt to transform the CSR into a signed certificate. If something fails, an exception (via Lwt.fail) is raised. This is meant for unikernels that require a valid TLS certificate before they can start their service (i.e. most web servers, mail servers).

OCaml

Innovation. Community. Security.