2015-06-13 02:45:04 +00:00
# lego
2018-05-31 00:03:08 +00:00
2015-10-19 17:58:04 +00:00
Let's Encrypt client and ACME library written in Go
2015-06-13 02:45:04 +00:00
2018-10-18 20:32:00 +00:00
[![GoDoc ](https://godoc.org/github.com/xenolf/lego?status.svg )](https://godoc.org/github.com/xenolf/lego/acme)
2015-06-13 19:23:27 +00:00
[![Build Status ](https://travis-ci.org/xenolf/lego.svg?branch=master )](https://travis-ci.org/xenolf/lego)
2018-10-18 20:32:00 +00:00
[![Docker Pulls ](https://img.shields.io/docker/pulls/xenolf/lego.svg )](https://hub.docker.com/r/xenolf/lego/)
2015-12-23 22:23:21 +00:00
[![Dev Chat ](https://img.shields.io/badge/dev%20chat-gitter-blue.svg?label=dev+chat )](https://gitter.im/xenolf/lego)
2017-07-17 20:54:51 +00:00
[![Beerpay ](https://beerpay.io/xenolf/lego/badge.svg )](https://beerpay.io/xenolf/lego)
2015-06-13 19:23:27 +00:00
2018-05-31 00:03:08 +00:00
## Installation
2015-06-13 02:45:04 +00:00
2018-11-05 14:14:30 +00:00
### Binaries
2015-12-15 21:27:41 +00:00
To get the binary just download the latest release for your OS/Arch from [the release page ](https://github.com/xenolf/lego/releases )
and put the binary somewhere convenient. lego does not assume anything about the location you run it from.
2018-11-05 14:14:30 +00:00
### From Docker
2018-05-31 00:03:08 +00:00
```bash
2018-11-05 14:14:30 +00:00
docker run xenolf/lego -h
2015-12-15 21:27:41 +00:00
```
2015-10-20 20:55:00 +00:00
2018-11-05 14:14:30 +00:00
### From the package manager
2018-05-31 00:03:08 +00:00
2018-11-05 14:14:30 +00:00
- [ArchLinux (AUR) ](https://aur.archlinux.org/packages/lego-git ):
2018-05-31 00:03:08 +00:00
2018-05-30 12:01:23 +00:00
```bash
2018-11-05 14:14:30 +00:00
yaourt -S lego-git
2018-05-30 12:01:23 +00:00
```
2018-11-05 14:14:30 +00:00
### From source
2018-05-31 00:03:08 +00:00
2018-11-05 14:14:30 +00:00
To install from source, just run:
2018-05-31 00:03:08 +00:00
2018-11-05 14:14:30 +00:00
```bash
2018-12-06 21:50:17 +00:00
go get -u github.com/xenolf/lego/cmd/lego
2018-11-05 14:14:30 +00:00
```
2018-05-31 00:03:08 +00:00
## Features
2016-03-23 18:12:47 +00:00
- Register with CA
2016-02-12 01:08:36 +00:00
- Obtain certificates, both from scratch or with an existing CSR
2016-03-23 18:12:47 +00:00
- Renew certificates
- Revoke certificates
- Robust implementation of all ACME challenges
- HTTP (http-01)
- DNS (dns-01)
2018-06-13 23:20:56 +00:00
- TLS (tls-alpn-01)
2016-03-23 18:12:47 +00:00
- SAN certificate support
- Comes with multiple optional [DNS providers ](https://github.com/xenolf/lego/tree/master/providers/dns )
- [Custom challenge solvers ](https://github.com/xenolf/lego/wiki/Writing-a-Challenge-Solver )
- Certificate bundling
- OCSP helper function
2015-06-13 02:45:04 +00:00
Please keep in mind that CLI switches and APIs are still subject to change.
2016-01-08 22:43:36 +00:00
When using the standard `--path` option, all certificates and account configurations are saved to a folder *.lego* in the current working directory.
2015-06-13 02:45:04 +00:00
2018-05-31 00:03:08 +00:00
## Usage
2015-06-13 02:45:04 +00:00
2018-05-31 00:03:08 +00:00
```text
2015-06-13 02:45:04 +00:00
NAME:
2016-03-23 18:12:47 +00:00
lego - Let's Encrypt client written in Go
2015-06-13 02:45:04 +00:00
USAGE:
2016-03-24 18:55:15 +00:00
lego [global options] command [command options] [arguments...]
2017-07-13 01:17:00 +00:00
2015-06-13 02:45:04 +00:00
COMMANDS:
2017-07-13 01:17:00 +00:00
run Register an account, then create and install a certificate
revoke Revoke a certificate
renew Renew a certificate
dnshelp Shows additional help for the --dns global option
2018-12-06 21:50:17 +00:00
list Display certificates and accounts information.
2017-07-13 01:17:00 +00:00
help, h Shows a list of commands or help for one command
2015-06-13 02:45:04 +00:00
GLOBAL OPTIONS:
2017-09-25 20:29:31 +00:00
--domains value, -d value Add a domain to the process. Can be specified multiple times.
2018-05-31 17:39:33 +00:00
--server value, -s value CA hostname (and optionally :port). The server certificate must be trusted in order to avoid further modifications to the client. (default: "https://acme-v02.api.letsencrypt.org/directory")
2017-07-13 01:17:00 +00:00
--accept-tos, -a By setting this flag to true you indicate that you accept the current Let's Encrypt terms of service.
2018-12-06 21:50:17 +00:00
--email value, -m value Email used for registration and recovery contact.
--csr value, -c value Certificate signing request filename, if an external CSR is to be used
2018-06-13 23:20:56 +00:00
--eab Use External Account Binding for account registration. Requires --kid and --hmac.
--kid value Key identifier from External CA. Used for External Account Binding.
--hmac value MAC key from External CA. Should be in Base64 URL Encoding without padding format. Used for External Account Binding.
2017-07-13 01:17:00 +00:00
--key-type value, -k value Key type to use for private keys. Supported: rsa2048, rsa4096, rsa8192, ec256, ec384 (default: "rsa2048")
2018-12-06 21:50:17 +00:00
--filename value Filename of the generated certificate
2018-06-13 23:20:56 +00:00
--path value Directory to use for storing the data (default: "./.lego")
--exclude value, -x value Explicitly disallow solvers by name from being used. Solvers: "http-01", "dns-01", "tls-alpn-01".
2018-12-06 21:50:17 +00:00
--http-timeout value Set the HTTP timeout value to a specific value in seconds. The default is 10 seconds. (default: 0)
2017-07-13 01:17:00 +00:00
--webroot value Set the webroot folder to use for HTTP based challenges to write directly in a file in .well-known/acme-challenge
--memcached-host value Set the memcached host(s) to use for HTTP based challenges. Challenges will be written to all specified hosts.
--http value Set the port and interface to use for HTTP based challenges to listen on. Supported: interface:port or :port
2018-06-13 23:20:56 +00:00
--tls value Set the port and interface to use for TLS based challenges to listen on. Supported: interface:port or :port
2017-07-13 01:17:00 +00:00
--dns value Solve a DNS challenge using the specified provider. Disables all other challenges. Run 'lego dnshelp' for help on usage.
2018-12-06 21:50:17 +00:00
--dns-disable-cp By setting this flag to true, disables the need to wait the propagation of the TXT record to all authoritative name servers.
2018-05-30 17:53:04 +00:00
--dns-resolvers value Set the resolvers to use for performing recursive DNS queries. Supported: host:port. The default is to use the system resolvers, or Google's DNS resolvers if the system's cannot be determined.
2018-12-06 21:50:17 +00:00
--dns-timeout value Set the DNS timeout value to a specific value in seconds. Used only when performing authoritative name servers queries. The default is 10 seconds. (default: 0)
2018-10-16 23:38:57 +00:00
--pem Generate a .pem file by concatenating the .key and .crt files together.
2017-07-13 01:17:00 +00:00
--help, -h show help
--version, -v print the version
2015-06-13 02:45:04 +00:00
```
2015-10-17 21:02:52 +00:00
2018-05-31 00:03:08 +00:00
### Sudo
The CLI does not require root permissions but needs to bind to port 80 and 443 for certain challenges.
To run the CLI without sudo, you have four options:
- Use setcap 'cap_net_bind_service=+ep' /path/to/program
- Pass the `--http` or/and the `--tls` option and specify a custom port to bind to. In this case you have to forward port 80/443 to these custom ports (see [Port Usage ](#port-usage )).
- Pass the `--webroot` option and specify the path to your webroot folder. In this case the challenge will be written in a file in `.well-known/acme-challenge/` inside your webroot.
- Pass the `--dns` option and specify a DNS provider.
### Port Usage
By default lego assumes it is able to bind to ports 80 and 443 to solve challenges.
If this is not possible in your environment, you can use the `--http` and `--tls` options to instruct
lego to listen on that interface:port for any incoming challenges.
If you are using this option, make sure you proxy all of the following traffic to these ports.
HTTP Port:
- All plaintext HTTP requests to port 80 which begin with a request path of `/.well-known/acme-challenge/` for the HTTP challenge.
TLS Port:
2018-06-13 23:20:56 +00:00
- All TLS handshakes on port 443 for the TLS-ALPN challenge.
2018-05-31 00:03:08 +00:00
This traffic redirection is only needed as long as lego solves challenges. As soon as you have received your certificates you can deactivate the forwarding.
### CLI Example
2015-12-08 02:33:40 +00:00
Assumes the `lego` binary has permission to bind to ports 80 and 443. You can get a pre-built binary from the [releases ](https://github.com/xenolf/lego/releases ) page.
2015-12-15 21:27:41 +00:00
If your environment does not allow you to bind to these ports, please read [Port Usage ](#port-usage ).
2015-12-08 02:33:40 +00:00
Obtain a certificate:
```bash
2018-05-31 00:03:08 +00:00
lego --email="foo@bar.com" --domains="example.com" run
2015-12-08 02:33:40 +00:00
```
(Find your certificate in the `.lego` folder of current working directory.)
To renew the certificate:
```bash
2018-05-31 00:03:08 +00:00
lego --email="foo@bar.com" --domains="example.com" renew
2015-12-08 02:33:40 +00:00
```
2015-10-17 21:02:52 +00:00
2018-09-24 10:05:55 +00:00
To renew the certificate only if it expires within 30 days
2017-05-05 14:12:59 +00:00
```bash
2018-05-31 00:03:08 +00:00
lego --email="foo@bar.com" --domains="example.com" renew --days 30
2017-05-05 14:12:59 +00:00
```
2016-02-05 10:40:41 +00:00
Obtain a certificate using the DNS challenge and AWS Route 53:
```bash
2018-05-31 00:03:08 +00:00
AWS_REGION=us-east-1 AWS_ACCESS_KEY_ID=my_id AWS_SECRET_ACCESS_KEY=my_key lego --email="foo@bar.com" --domains="example.com" --dns="route53" run
2016-02-05 10:40:41 +00:00
```
2018-05-30 17:53:04 +00:00
Note that `--dns=foo` implies `--exclude=http-01` . lego will not attempt other challenges if you've told it to use DNS instead.
2016-02-14 00:23:50 +00:00
2016-02-12 01:08:36 +00:00
Obtain a certificate given a certificate signing request (CSR) generated by something else:
```bash
2018-05-31 00:03:08 +00:00
lego --email="foo@bar.com" --csr=/path/to/csr.pem run
2016-02-12 01:08:36 +00:00
```
(lego will infer the domains to be validated based on the contents of the CSR, so make sure the CSR's Common Name and optional SubjectAltNames are set correctly.)
2016-02-08 21:27:06 +00:00
lego defaults to communicating with the production Let's Encrypt ACME server. If you'd like to test something without issuing real certificates, consider using the staging endpoint instead:
```bash
2018-07-01 21:54:35 +00:00
lego --server=https://acme-staging-v02.api.letsencrypt.org/directory …
2016-02-08 21:27:06 +00:00
```
2018-05-31 00:03:08 +00:00
## ACME Library Usage
2015-10-17 21:02:52 +00:00
A valid, but bare-bones example use of the acme package:
```go
2018-12-06 21:50:17 +00:00
package main
import (
"crypto"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"fmt"
"log"
"github.com/xenolf/lego/certcrypto"
"github.com/xenolf/lego/certificate"
"github.com/xenolf/lego/lego"
"github.com/xenolf/lego/registration"
)
2015-10-17 21:02:52 +00:00
// You'll need a user or account type that implements acme.User
type MyUser struct {
Email string
2018-12-06 21:50:17 +00:00
Registration *registration.Resource
2016-03-24 22:26:49 +00:00
key crypto.PrivateKey
2015-10-17 21:02:52 +00:00
}
2018-12-06 21:50:17 +00:00
func (u *MyUser) GetEmail() string {
2015-10-17 21:02:52 +00:00
return u.Email
}
2018-12-06 21:50:17 +00:00
func (u MyUser) GetRegistration() *registration.Resource {
2015-10-17 21:02:52 +00:00
return u.Registration
}
2018-12-06 21:50:17 +00:00
func (u *MyUser) GetPrivateKey() crypto.PrivateKey {
2015-10-17 21:02:52 +00:00
return u.key
}
2018-12-06 21:50:17 +00:00
func main() {
// Create a user. New accounts need an email and private key to start.
privateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
log.Fatal(err)
}
myUser := MyUser{
Email: "you@yours.com",
key: privateKey,
}
config := lego.NewConfig(& myUser)
// This CA URL is configured for a local dev instance of Boulder running in Docker in a VM.
config.CADirURL = "http://192.168.99.100:4000/directory"
config.KeyType = certcrypto.RSA2048
// A client facilitates communication with the CA server.
client, err := lego.NewClient(config)
if err != nil {
log.Fatal(err)
}
// We specify an http port of 5002 and an tls port of 5001 on all interfaces
// because we aren't running as root and can't bind a listener to port 80 and 443
// (used later when we attempt to pass challenges). Keep in mind that you still
// need to proxy challenge traffic to port 5002 and 5001.
if err = client.Challenge.SetHTTP01Address(":5002"); err != nil {
log.Fatal(err)
}
if err = client.Challenge.SetTLSALPN01Address(":5001"); err != nil {
log.Fatal(err)
}
// New users will need to register
reg, err := client.Registration.Register(registration.RegisterOptions{TermsOfServiceAgreed: true})
if err != nil {
log.Fatal(err)
}
myUser.Registration = reg
request := certificate.ObtainRequest{
Domains: []string{"mydomain.com"},
Bundle: true,
}
certificates, err := client.Certificate.Obtain(request)
if err != nil {
log.Fatal(err)
}
// Each certificate comes back with the cert bytes, the bytes of the client's
// private key, and a certificate URL. SAVE THESE TO DISK.
fmt.Printf("%#v\n", certificates)
// ... all done.
2015-10-27 23:00:42 +00:00
}
2018-12-06 21:50:17 +00:00
```
2015-10-17 21:02:52 +00:00
2018-12-06 21:50:17 +00:00
## DNS Challenge API Details
2015-10-17 21:02:52 +00:00
2018-12-06 21:50:17 +00:00
### AWS Route 53
2016-03-23 18:12:47 +00:00
2018-12-06 21:50:17 +00:00
The following AWS IAM policy document describes the permissions required for lego to complete the DNS challenge.
2015-10-17 21:02:52 +00:00
2018-12-06 21:50:17 +00:00
```json
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "",
"Effect": "Allow",
"Action": [
"route53:GetChange",
"route53:ChangeResourceRecordSets",
"route53:ListResourceRecordSets"
],
"Resource": [
"arn:aws:route53:::hostedzone/*",
"arn:aws:route53:::change/*"
]
},
{
"Sid": "",
"Effect": "Allow",
"Action": "route53:ListHostedZonesByName",
"Resource": "*"
}
]
2015-10-17 21:02:52 +00:00
}
```
2018-05-31 00:03:08 +00:00
## ACME v1
2018-07-01 21:54:35 +00:00
lego introduced support for ACME v2 in [v1.0.0 ](https://github.com/xenolf/lego/releases/tag/v1.0.0 ), if you still need to utilize ACME v1, you can do so by using the [v0.5.0 ](https://github.com/xenolf/lego/releases/tag/v0.5.0 ) version.