The broker needs access to sensitive values such as DNS provider API tokens used to complete ACME dns-01 challenges. Rather than embedding these values directly inDocumentation Index
Fetch the complete documentation index at: https://certplane.kippel.org/llms.txt
Use this file to discover all available pages before exploring further.
broker.yml, Certplane supports four pluggable secrets providers that you configure under the secrets section of the broker config. Each provider resolves a secret by name at runtime, keeping credentials out of your configuration files and version control.
The
env provider is the default and the simplest way to get started. It
requires no additional configuration beyond setting environment variables
before you start the broker.Secret references
Wherever Certplane expects a sensitive value (such as a DNS provider credential), you supply a secret reference — a name that the active provider resolves at runtime. The meaning of the name depends on which provider is configured:| Provider | Name means |
|---|---|
env | Environment variable name |
file | Absolute file path |
vault | Vault secret path |
openbao | OpenBao secret path |
Configuring a provider
Setsecrets.provider in broker.yml to choose a provider. Only one
provider is active at a time.
- env
- file
- vault
- openbao
The For example, if a DNS credential reference uses the name
No additional fields under
env provider (default) resolves secret names as environment
variable names. The broker reads the named variable from its process
environment at the point the secret is needed.CLOUDFLARE_DNS_API_TOKEN, the broker reads the value of the
$CLOUDFLARE_DNS_API_TOKEN environment variable. Set that variable
before starting the broker:secrets are required for this provider.