boxboat/lego

Name: lego

Owner: boxboat

Description: Let's Encrypt client and ACME library written in Go

Created: 2017-05-11 21:34:47.0

Updated: 2017-05-11 21:34:49.0

Pushed: 2017-05-12 15:51:49.0

Homepage:

Size: 691

Language: Go

GitHub Committers

UserMost Recent Commit# Commits

Other Committers

UserEmailMost Recent Commit# Commits

README

lego

Let's Encrypt client and ACME library written in Go

GoDoc Build Status Dev Chat

General

This is a work in progress. Please do NOT run this on a production server and please report any bugs you find!

Installation

lego supports both binary installs and install from source.

To get the binary just download the latest release for your OS/Arch from the release page and put the binary somewhere convenient. lego does not assume anything about the location you run it from.

To install from source, just run

et -u github.com/xenolf/lego

To build lego inside a Docker container, just run

er build -t lego .
From the package manager

Please keep in mind that CLI switches and APIs are still subject to change.

When using the standard --path option, all certificates and account configurations are saved to a folder .lego in the current working directory.

Sudo

The CLI does not require root permissions but needs to bind to port 80 and 443 for certain challenges. To run the CLI without sudo, you have four options:

Port Usage

By default lego assumes it is able to bind to ports 80 and 443 to solve challenges. If this is not possible in your environment, you can use the --http and --tls options to instruct lego to listen on that interface:port for any incoming challenges.

If you are using this option, make sure you proxy all of the following traffic to these ports.

HTTP Port:

TLS Port:

This traffic redirection is only needed as long as lego solves challenges. As soon as you have received your certificates you can deactivate the forwarding.

Usage
:
ego - Let's Encrypt client written in Go

E:
ego [global options] command [command options] [arguments...]

ION:
.3.1

ANDS:
un      Register an account, then create and install a certificate
evoke   Revoke a certificate
enew    Renew a certificate
nshelp  Shows additional help for the --dns global option
elp, h  Shows a list of commands or help for one command

AL OPTIONS:
-domains, -d [--domains option --domains option]            Add domains to the process
-csr, -c                Certificate signing request filename, if an external CSR is to be used
-server, -s "https://acme-v01.api.letsencrypt.org/directory"    CA hostname (and optionally :port). The server certificate must be trusted in order to avoid further modifications to the client.
-email, -m                              Email used for registration and recovery contact.
-accept-tos, -a                         By setting this flag to true you indicate that you accept the current Let's Encrypt terms of service.
-key-type, -k "rsa2048"                     Key type to use for private keys. Supported: rsa2048, rsa4096, rsa8192, ec256, ec384
-path "${CWD}/.lego"    Directory to use for storing the data
-exclude, -x [--exclude option --exclude option]            Explicitly disallow solvers by name from being used. Solvers: "http-01", "tls-sni-01".
-webroot                                Set the webroot folder to use for HTTP based challenges to write directly in a file in .well-known/acme-challenge
-http                               Set the port and interface to use for HTTP based challenges to listen on. Supported: interface:port or :port
-tls                                Set the port and interface to use for TLS based challenges to listen on. Supported: interface:port or :port
-dns                                Solve a DNS challenge using the specified provider. Disables all other challenges. Run 'lego dnshelp' for help on usage.
-help, -h                               show help
-version, -v                            print the version
CLI Example

Assumes the lego binary has permission to bind to ports 80 and 443. You can get a pre-built binary from the releases page. If your environment does not allow you to bind to these ports, please read Port Usage.

Obtain a certificate:

go --email="foo@bar.com" --domains="example.com" run

(Find your certificate in the .lego folder of current working directory.)

To renew the certificate:

go --email="foo@bar.com" --domains="example.com" renew

To renew the certificate only if it's older than 30 days

go --email="foo@bar.com" --domains="example.com" renew --days 30

Obtain a certificate using the DNS challenge and AWS Route 53:

S_REGION=us-east-1 AWS_ACCESS_KEY_ID=my_id AWS_SECRET_ACCESS_KEY=my_key lego --email="foo@bar.com" --domains="example.com" --dns="route53" run

Note that --dns=foo implies --exclude=http-01 and --exclude=tls-sni-01. lego will not attempt other challenges if you've told it to use DNS instead.

Obtain a certificate given a certificate signing request (CSR) generated by something else:

go --email="foo@bar.com" --csr=/path/to/csr.pem run

(lego will infer the domains to be validated based on the contents of the CSR, so make sure the CSR's Common Name and optional SubjectAltNames are set correctly.)

lego defaults to communicating with the production Let's Encrypt ACME server. If you'd like to test something without issuing real certificates, consider using the staging endpoint instead:

go --server=https://acme-staging.api.letsencrypt.org/directory ?
DNS Challenge API Details AWS Route 53

The following AWS IAM policy document describes the permissions required for lego to complete the DNS challenge. Replace <INSERT_YOUR_HOSTED_ZONE_ID_HERE> with the Route 53 zone ID of the domain you are authorizing.


"Version": "2012-10-17",
"Statement": [
    {
        "Effect": "Allow",
        "Action": [
            "route53:GetChange",
            "route53:ListHostedZonesByName"
        ],
        "Resource": [
            "*"
        ]
    },
    {
        "Effect": "Allow",
        "Action": [
            "route53:ChangeResourceRecordSets"
        ],
        "Resource": [
            "arn:aws:route53:::hostedzone/<INSERT_YOUR_HOSTED_ZONE_ID_HERE>"
        ]
    }
]

ACME Library Usage

A valid, but bare-bones example use of the acme package:

ou'll need a user or account type that implements acme.User
 MyUser struct {
Email        string
Registration *acme.RegistrationResource
key          crypto.PrivateKey

 (u MyUser) GetEmail() string {
return u.Email

 (u MyUser) GetRegistration() *acme.RegistrationResource {
return u.Registration

 (u MyUser) GetPrivateKey() crypto.PrivateKey {
return u.key


reate a user. New accounts need an email and private key to start.
t rsaKeySize = 2048
ateKey, err := rsa.GenerateKey(rand.Reader, rsaKeySize)
rr != nil {
log.Fatal(err)

er := MyUser{
Email: "you@yours.com",
key: privateKey,


 client facilitates communication with the CA server. This CA URL is
onfigured for a local dev instance of Boulder running in Docker in a VM.
nt, err := acme.NewClient("http://192.168.99.100:4000", &myUser, acme.RSA2048)
rr != nil {
g.Fatal(err)


e specify an http port of 5002 and an tls port of 5001 on all interfaces
ecause we aren't running as root and can't bind a listener to port 80 and 443 
used later when we attempt to pass challenges). Keep in mind that we still
eed to proxy challenge traffic to port 5002 and 5001.
nt.SetHTTPAddress(":5002")
nt.SetTLSAddress(":5001")

ew users will need to register
 err := client.Register()
rr != nil {
log.Fatal(err)

er.Registration = reg

AVE THE USER.

he client has a URL to the current Let's Encrypt Subscriber
greement. The user will need to agree to it.
= client.AgreeToTOS()
rr != nil {
log.Fatal(err)


he acme library takes care of completing the challenges to obtain the certificate(s).
he domains must resolve to this machine or you have to use the DNS challenge.
le := false
ificates, failures := client.ObtainCertificate([]string{"mydomain.com"}, bundle, nil, false)
en(failures) > 0 {
log.Fatal(failures)


ach certificate comes back with the cert bytes, the bytes of the client's
rivate key, and a certificate URL. SAVE THESE TO DISK.
Printf("%#v\n", certificates)

.. all done.

This work is supported by the National Institutes of Health's National Center for Advancing Translational Sciences, Grant Number U24TR002306. This work is solely the responsibility of the creators and does not necessarily represent the official views of the National Institutes of Health.