package dns-certify
 sectionYPositions = computeSectionYPositions($el), 10)"
  x-init="setTimeout(() => sectionYPositions = computeSectionYPositions($el), 10)"
  >
  
  
On This Page
  
  
  MirageOS let's encrypt certificate retrieval
Install
    
    dune-project
 Dependency
Authors
Maintainers
Sources
  
    
      dns-10.2.2.tbz
    
    
        
    
  
  
  
    
  
  
    
  
        sha256=5123d7167f5fb3a5ab70cf0b3ccc965089ec440dc07edeabf8c0568ee737a7f0
    
    
  sha512=4e5945435f280591c158ab03fec19dc0c807fb713d6ee68873939899c49175f39af1fbcd135517514a3ab088993356a4c303f7dce5e18d403d4630a33bad9076
    
    
  doc/dns-certify.mirage/Dns_certify_mirage/Make/index.html
Module Dns_certify_mirage.MakeSource
Parameters
module S : Tcpip.Stack.V4V6Signature
Source
val retrieve_certificate : 
  S.t ->
  ([ `raw ] Domain_name.t * Dns.Dnskey.t) ->
  hostname:[ `host ] Domain_name.t ->
  ?additional_hostnames:[ `raw ] Domain_name.t list ->
  ?key_type:X509.Key_type.t ->
  ?key_data:string ->
  ?key_seed:string ->
  ?bits:int ->
  S.TCP.ipaddr ->
  int ->
  (X509.Certificate.t list * X509.Private_key.t, [ `Msg of string ]) result
    Lwt.tretrieve_certificate stack dns_key ~hostname ~key_type ~key_data ~key_seed ~bits server_ip port generates a private key (using key_type, key_data, key_seed, and bits), a certificate signing request for the given hostname and additional_hostnames, and sends server_ip an nsupdate (DNS-TSIG with dns_key) with the csr as TLSA record, awaiting for a matching certificate as TLSA record. Requires a service that interacts with let's encrypt to transform the CSR into a signed certificate. If something fails, an exception (via Lwt.fail) is raised. This is meant for unikernels that require a valid TLS certificate before they can start their service (i.e. most web servers, mail servers).
 sectionYPositions = computeSectionYPositions($el), 10)"
  x-init="setTimeout(() => sectionYPositions = computeSectionYPositions($el), 10)"
  >
  
  
  On This Page