Metadata-Version: 2.1
Name: sztpd
Version: 0.0.4
Summary: Secure Zero Touch Provisioning Daemon (SZTPD)
Home-page: https://watsen.net/products/sztpd
Author: Watsen Networks
Author-email: info@watsen.net
License: Non Production License
Project-URL: Documentation, https://watsen.net/docs/sztpd
Project-URL: License, https://watsen.net/sales/non-production-use.html
Description: # Secure Zero Touch Provisioning Daemon (SZTPD)
        
        ## Installation
        
          `pip install sztpd`
        
        ## Overview
        
        SZTPD implements the [Bootstrap Server](https://tools.ietf.org/html/rfc8572#section-4.4)
        defined in [RFC 8572: Secure Zero Touch Provisioning (SZTP)](https://tools.ietf.org/html/rfc8572).
        
          * [RESTCONF](https://tools.ietf.org/html/rfc8040)-based interface for programmatic administrative control.
          * Plugins and webhooks enable policy-driven dynamic responses.
          * Single-tenant and multi-tenant deployment modes.
          * A variety of databases backends for flexibility
          * In-memory database supported for ephemeral use-cases (e.g., SDN)
        
        ## Usage
        
        ```
        $ sztpd --help
        usage: sztpd [-h] [-v] [-C CACERT] [-c CERT] [-k KEY] database-url    
                                                                               
        SZTPD implements the "bootstrap server" defined in RFC 8572.                                                                                   
                                                                                                                                                       
        positional arguments:                                                  
          database-url          see below for details.                                                                                                 
        
        optional arguments:
          -h, --help            show this help message and exit
          -v, --version         show version number and exit.
          -C CACERT, --cacert CACERT
                                path to certificates used to authenticate the database
                                (see below for details).
          -c CERT, --cert CERT  path to cert used to authenticate SZTPD to the
                                database (see below for details).
          -k KEY, --key KEY     path to key used to authenticate SZTPD to the database
                                (see below for details).
        
        Exit status code: 0 on success, non-0 on error.  Error output goes to stderr.
        
        The "cacert" argument is a filepath to a PEM file that contains one or more X.509
        CA certificates used to authenticate the RDBMS's TLS certificate.
        
        The "key" and "cert" arguments are each a filepath to a PEM file that contains
        the key and certificate that SZTPD should use to authenticate itself to the
        RDBMS.  These parameters must be specified together, and must be specified
        in conjunction with the "cacert" parameter.
        
        The "database-url" argument has the form "<dialect>:<dialect-specific-path>".
        Three dialects are supported: "sqlite", "postgresql", and "mysql+pymysql".
        The <dialect-specific-path> for each of these is described below.
        
        For the "sqlite" dialect, <dialect-specific-path> follows the format
        "///<sqlite-path>", where <sqlite-path> can be one of:
        
          :memory:    - an in-memory database (only useful for testing)
          <filepath>  - an OS-specific filepath to a persisted database file
        
          Examples:
        
            $ sztpd sqlite:///:memory:                      (memory)
            $ sztpd sqlite:///relative/path/to/sztpd.db     (unix)
            $ sztpd sqlite:////absolute/path/to/sztpd.db    (unix)
            $ sztpd sqlite:///C:\path\to\sztpd.db           (windows)
        
        For both the "postgresql" and "mysql+pymysql" dialects, <dialect-specific-path>
        follows the format "//<user>[:<passwd>]@<host>:<port>/<database-name>".
        
          Examples:
        
            The following two examples assume the database is called "sztpd" and
            that the database server listens on the loopback address with no TLS.
        
              $ sztpd postgresql://user:pass@localhost:5432/sztpd
              $ sztpd mysql+pymysql://user:pass@localhost:3306/sztpd
        
        Please see the documentation for more information.
        ```
        
        
Keywords: IETF,SZTP,RFC 8572,secure,zerotouch,zero touch,provisioning,ztp
Platform: UNKNOWN
Classifier: Development Status :: 3 - Alpha
Classifier: Environment :: Console
Classifier: Intended Audience :: Information Technology
Classifier: Intended Audience :: System Administrators
Classifier: Intended Audience :: Telecommunications Industry
Classifier: License :: Other/Proprietary License
Classifier: Natural Language :: English
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Topic :: Communications
Classifier: Topic :: Internet
Classifier: Topic :: Security
Requires-Python: >=3.7.*, <4
Description-Content-Type: text/markdown
