Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[enhancement]: Support Google Trust Services ACME provider #379

Open
1 task done
hozansahin opened this issue Apr 24, 2024 · 4 comments
Open
1 task done

[enhancement]: Support Google Trust Services ACME provider #379

hozansahin opened this issue Apr 24, 2024 · 4 comments
Labels
enhancement New feature or request

Comments

@hozansahin
Copy link

hozansahin commented Apr 24, 2024

Which feature or improvement would you like to request?

I'd like to see this feature:
TLS-DNS-01 support had already arrived. and letsencrypt ACME provider is currently only available, I suggest adding Google Google Trust Services as an alternative

some sources:
https://pki.goog/
https://pki.goog/repository/
https://cloud.google.com/certificate-manager/docs/public-ca-tutorial

Is your feature request related to a problem?

not really a problem, but it would be good to add them as alternatives

Code of Conduct

  • I agree to follow this project's Code of Conduct
@hozansahin hozansahin added the enhancement New feature or request label Apr 24, 2024
@mdecimus
Copy link
Member

Stalwart supports any providers that implement ACME, this could be either Let's Encrypt or ZeroSSL for instance.
Have you tried using Google Trust Services with Stalwart? You just need to enter their directory URL and if they support ACME it should work.

@hozansahin
Copy link
Author

Stalwart supports any providers that implement ACME, this could be either Let's Encrypt or ZeroSSL for instance. Have you tried using Google Trust Services with Stalwart? You just need to enter their directory URL and if they support ACME it should work.

Actually, I wanted to try it, but I didn't use it because it doesn't have a structure suitable for this, that is, I don't know where to put the following
environment variables.

EAB_KID: the EAB key ID
EAB_HMAC_KEY: the EAB HMAC key

@williamdes
Copy link

williamdes commented Apr 24, 2024

I agree with the reporter, for ZeroSSL the two envs are required. That said I am unsure if it's more about adding another provider or not
AWS DNS would also require credentials

@mdecimus
Copy link
Member

It won't be necessary to add a new provider type, only support for EAB is required.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants