We currently run certbot in an AWS Lambda function with an EFS volume for storage. We place an NFS mount to the Let's Encrypt config directory for any webservers that require direct access to these certificates. This is a very convenient configuration for ephemeral Docker environments.
I would like the ability to define restricted access to domain-specific directories rather than exposing the entire config folder (i.e. mount /etc/letsencrypt/config/live/<DOMAIN> instead of /etc/letsencrypt/config). Because the symlinks under the live domain directory point to ../../archive/<DOMAIN>, our containers can't follow the link to access the certificate/private key contents.
This strategy would work if I had the ability to override the default directory structure and place the archive folder in a subdirectory of the live domain folder (e.g. configure /etc/letsencrypt/config/live/<DOMAIN>/archive instead of /etc/letsencrypt/config/archive/<DOMAIN>). I noticed that the configuration files under the renewal directories specify a value for archive_dir, however there isn't a CLI flag allowing this to be passed in explicitly when issuing a new certificate.
Would it be possible to allow an optional CLI flag, --archive-dir, to override the default behavior?
Another approach is to store your renewed certs in a secret manager/vault then get your containers or VMs etc to pull from that source on startup and as regular maintenance. This means you have least privileged access to specific certs and a single point of truth which is also not subject to potentially brittle long-term connectivity.