The certbot-dns-dnspod-109
plugin automates the process of
completing a dns-01
challenge (~acme.challenges.DNS01
)
by creating, and subsequently removing, TXT records using the
Dnspod API (Tencent Cloud API 3.0).
If you are using Dnspod (Tencent Cloud) as your DNS provider, then this is your plugin.
Tested on
- Certbot 3.0.1
pip install certbot-dns-dnspod-109
or
pip install git+https://github.com/10935336/certbot-dns-dnspod-109.git
snap install certbot-dns-dnspod-10935336
snap set certbot trust-plugin-with-root=ok
snap connect certbot:plugin certbot-dns-dnspod-10935336
- Visit https://console.cloud.tencent.com/cam to create a sub-user
- Select "Programmatic access" for the sub-user access method
- Grant the sub-user QcloudDNSPodFullAccess (Cloud DNS full read and write access rights) permission
- Record SecretId and SecretKey
foobar.ini:
dns_dnspod_109_secret_id=foo
dns_dnspod_109_secret_key=bar
To acquire a certificate for example.com
certbot certonly \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
-d example.com
To acquire a single certificate for both example.com and www.example.com
certbot certonly \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
-d example.com \
-d www.example.com
To acquire a certificate for example.com, waiting 60 seconds for DNS propagation
certbot certonly \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
--dns-dnspod-109-propagation-seconds 60 \
-d example.com
Test run
certbot certonly \
--register-unsafely-without-email \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
--dns-dnspod-109-propagation-seconds 60 \
-v \
--dry-run
--dns-dnspod-109-credentials <path>
points to the credentials file. (Required)
--dns-dnspod-109-propagation-seconds
The number of seconds to wait for DNS propagation before asking the ACME server to verify DNS records. If DNS records appear to be added successfully but verification fails, try increasing this value. (Default: 10)
certbot-dns-dnspod-109
插件通过使用 Dnspod API(腾讯云 API 3.0)创建并随后删除 TXT 记录,自动完成dns-01
质询(~acme.challenges.DNS01
)。
如果你使用 Dnspod (腾讯云) 作为你的域名解析服务提供商,那么这就是你的插件。
在以下版本中测试通过
- Certbot 3.0.1
pip install certbot-dns-dnspod-109
或者
pip install git+https://github.com/10935336/certbot-dns-dnspod-109.git
snap install certbot-dns-dnspod-10935336
snap set certbot trust-plugin-with-root=ok
snap connect certbot:plugin certbot-dns-dnspod-10935336
- 访问 https://console.cloud.tencent.com/cam 创建子用户
- 子用户访问方式选择“编程访问”
- 授予子用户 QcloudDNSPodFullAccess(Cloud DNS 完全读写访问权限)权限
- 记录 SecretId 和 SecretKey
foobar.ini:
dns_dnspod_109_secret_id=foo
dns_dnspod_109_secret_key=bar
获取 example.com
的证书
certbot certonly \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
-d example.com
获取同时有 example.com
和 www.example.com
的单个证书
certbot certonly \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
-d example.com \
-d www.example.com
获取 example.com
的证书,但设置等待 60 秒(等待 DNS 传播)
certbot certonly \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
--dns-dnspod-109-propagation-seconds 60 \
-d example.com
测试运行
certbot certonly \
--register-unsafely-without-email \
-a dns-dnspod-109 \
--dns-dnspod-109-credentials ~/.secrets/certbot/dnspod-109.ini \
--dns-dnspod-109-propagation-seconds 60 \
-v \
--dry-run
--dns-dnspod-109-credentials <路径>
指向凭证文件。(必需)
--dns-dnspod-109-propagation-seconds
在要求 ACME 服务器验证 DNS 记录之前等待 DNS 传播的秒数。如果显示 DNS 记录添加成功但验证失败,则尝试增加此值 。 (默认值:10)