You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
lego --domains example.com --email [email protected] --dns azuredns run
@@ -61,14 +58,30 @@ Link:
61
58
62
59
### Environment variables
63
60
61
+
#### Service Discovery
62
+
63
+
Lego automatically finds all visible Azure (private) DNS zones using [Azure ResourceGraph query](https://learn.microsoft.com/en-us/azure/governance/resource-graph/).
64
+
This can be limited by specifying environment variable `AZURE_SUBSCRIPTION_ID` and/or `AZURE_RESOURCE_GROUP` which limits the
65
+
DNS zones to only a subscription or to one resourceGroup.
66
+
67
+
Additionally environment variable `AZURE_SERVICEDISCOVERY_FILTER` can be used to filter DNS zones with an addition Kusto filter eg:
68
+
69
+
```
70
+
resources
71
+
| where type =~ "microsoft.network/dnszones"
72
+
| ${AZURE_SERVICEDISCOVERY_FILTER}
73
+
| project subscriptionId, resourceGroup, name
74
+
```
75
+
76
+
64
77
#### Client secret
65
78
66
79
The Azure Credentials can be configured using the following environment variables:
67
80
* AZURE_CLIENT_ID = "Client ID"
68
81
* AZURE_CLIENT_SECRET = "Client secret"
69
82
* AZURE_TENANT_ID = "Tenant ID"
70
83
71
-
This authentication method can be specificaly used by setting the `AZURE_AUTH_METHOD` environment variable to `env`.
84
+
This authentication method can be specifically used by setting the `AZURE_AUTH_METHOD` environment variable to `env`.
72
85
73
86
#### Client certificate
74
87
@@ -77,7 +90,7 @@ The Azure Credentials can be configured using the following environment variable
This authentication method can be specificaly used by setting the `AZURE_AUTH_METHOD` environment variable to `env`.
93
+
This authentication method can be specifically used by setting the `AZURE_AUTH_METHOD` environment variable to `env`.
81
94
82
95
### Workload identity
83
96
@@ -88,12 +101,12 @@ This must be configured in kubernetes workload deployment in one hand and on the
88
101
Here is a summary of the steps to follow to use it :
89
102
* create a `ServiceAccount` resource, add following annotations to reference the targeted Azure AD application registration : `azure.workload.identity/client-id` and `azure.workload.identity/tenant-id`.
90
103
* on the `Deployment` resource you must reference the previous `ServiceAccount` and add the following label : `azure.workload.identity/use: "true"`.
91
-
* create a fedreated credentials of type `Kubernetes accessing Azure resources`, add the cluster issuer URL and add the namespace and name of your kubernetes service account.
104
+
* create a federated credentials of type `Kubernetes accessing Azure resources`, add the cluster issuer URL and add the namespace and name of your kubernetes service account.
92
105
93
106
Link :
94
107
- [Azure AD Workload identity](https://azure.github.io/azure-workload-identity/docs/topics/service-account-labels-and-annotations.html)
95
108
96
-
This authentication method can be specificaly used by setting the `AZURE_AUTH_METHOD` environment variable to `wli`.
109
+
This authentication method can be specifically used by setting the `AZURE_AUTH_METHOD` environment variable to `wli`.
97
110
98
111
### Azure Managed Identity
99
112
@@ -128,9 +141,9 @@ az role assignment create \
128
141
```
129
142
130
143
A timeout wrapper is configured for this authentication method.
131
-
The duraction can be configured by setting the `AZURE_AUTH_MSI_TIMEOUT`.
144
+
The duration can be configured by setting the `AZURE_AUTH_MSI_TIMEOUT`.
132
145
The default timeout is 2 seconds.
133
-
This authentication method can be specificaly used by setting the `AZURE_AUTH_METHOD` environment variable to `msi`.
146
+
This authentication method can be specifically used by setting the `AZURE_AUTH_METHOD` environment variable to `msi`.
134
147
135
148
#### Azure Managed Identity (with Azure Arc)
136
149
@@ -144,17 +157,17 @@ you may need to set the environment variables:
Copy file name to clipboardExpand all lines: internal/cert/config/pdns.toml
+3-1Lines changed: 3 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -18,18 +18,20 @@ Tested and confirmed to work with PowerDNS authoritative server 3.4.8 and 4.0.1.
18
18
PowerDNS Notes:
19
19
- PowerDNS API does not currently support SSL, therefore you should take care to ensure that traffic between lego and the PowerDNS API is over a trusted network, VPN etc.
20
20
- In order to have the SOA serial automatically increment each time the `_acme-challenge` record is added/modified via the API, set `SOA-EDIT-API` to `INCEPTION-INCREMENT` for the zone in the `domainmetadata` table
21
+
- Some PowerDNS servers doesn't have root API endpoints enabled and API version autodetection will not work. In that case version number can be defined using `PDNS_API_VERSION`.
21
22
'''
22
23
23
24
[Configuration]
24
25
[Configuration.Credentials]
25
26
PDNS_API_KEY = "API key"
26
27
PDNS_API_URL = "API URL"
27
28
[Configuration.Additional]
29
+
PDNS_SERVER_NAME = "Name of the server in the URL, 'localhost' by default"
30
+
PDNS_API_VERSION = "Skip API version autodetection and use the provided version number."
28
31
PDNS_POLLING_INTERVAL = "Time between DNS propagation check"
29
32
PDNS_PROPAGATION_TIMEOUT = "Maximum waiting time for DNS propagation"
30
33
PDNS_TTL = "The TTL of the TXT record used for the DNS challenge"
31
34
PDNS_HTTP_TIMEOUT = "API request timeout"
32
-
PDNS_SERVER_NAME = "Name of the server in the URL, 'localhost' by default"
33
35
34
36
[Links]
35
37
API = "https://doc.powerdns.com/md/httpapi/README/"
lego --email [email protected] --dns webnames --domains my.example.org run
10
+
'''
11
+
12
+
Additional = '''
13
+
## API Key
14
+
15
+
To obtain the key, you need to change the DNS server to `*.nameself.com`: Personal account / My domains and services / Select the required domain / DNS servers
16
+
17
+
The API key can be found: Personal account / My domains and services / Select the required domain / Zone management / acme.sh or certbot settings
18
+
'''
19
+
20
+
[Configuration]
21
+
[Configuration.Credentials]
22
+
WEBNAMES_API_KEY = "Domain API key"
23
+
[Configuration.Additional]
24
+
WEBNAMES_POLLING_INTERVAL = "Time between DNS propagation check"
25
+
WEBNAMES_PROPAGATION_TIMEOUT = "Maximum waiting time for DNS propagation"
26
+
WEBNAMES_TTL = "The TTL of the TXT record used for the DNS challenge"
27
+
WEBNAMES_HTTP_TIMEOUT = "API request timeout"
28
+
29
+
[Links]
30
+
API = "https://github.com/regtime-ltd/certbot-dns-webnames"
0 commit comments