Server IP : 80.241.246.6 / Your IP : 216.73.216.129 Web Server : Apache/2.4.25 (Debian) System : Linux kharagauli 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64 User : www-data ( 33) PHP Version : 7.0.33-0+deb9u12 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/local/letsencrypt/certbot-dns-route53/ |
Upload File : |
## Route53 plugin for Let's Encrypt client ### Before you start It's expected that the root hosted zone for the domain in question already exists in your account. ### Setup 1. Create a virtual environment 2. Update its pip and setuptools (`VENV/bin/pip install -U setuptools pip`) to avoid problems with cryptography's dependency on setuptools>=11.3. 3. Make sure you have libssl-dev and libffi (or your regional equivalents) installed. You might have to set compiler flags to pick things up (I have to use `CPPFLAGS=-I/usr/local/opt/openssl/include LDFLAGS=-L/usr/local/opt/openssl/lib` on my macOS to pick up brew's openssl, for example). 4. Install this package. ### How to use it Make sure you have access to AWS's Route53 service, either through IAM roles or via `.aws/credentials`. Check out [sample-aws-policy.json](examples/sample-aws-policy.json) for the necessary permissions. To generate a certificate: ``` certbot certonly \ -n --agree-tos --email DEVOPS@COMPANY.COM \ --dns-route53 \ -d MY.DOMAIN.NAME ```