All Projects → sorah → Acmesmith

sorah / Acmesmith

Licence: mit
An effective ACME v2 client: Manage keys on the cloud (e.g. S3)

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Acmesmith

Dehydrated
letsencrypt/acme client implemented as a shell-script – just add water
Stars: ✭ 5,261 (+4726.61%)
Mutual labels:  letsencrypt, acme
Greenlock
Automatic SSL renewal for NodeJS
Stars: ✭ 30 (-72.48%)
Mutual labels:  letsencrypt, acme
Website
Let's Encrypt Website and Documentation
Stars: ✭ 629 (+477.06%)
Mutual labels:  letsencrypt, acme
Lego
Let's Encrypt client and ACME library written in Go
Stars: ✭ 4,978 (+4466.97%)
Mutual labels:  letsencrypt, acme
Acme client
Java ACME Client application
Stars: ✭ 77 (-29.36%)
Mutual labels:  letsencrypt, acme
Acme.sh
A pure Unix shell script implementing ACME client protocol
Stars: ✭ 24,723 (+22581.65%)
Mutual labels:  letsencrypt, acme
Certbot
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
Stars: ✭ 28,541 (+26084.4%)
Mutual labels:  letsencrypt, acme
Ubnt Letsencrypt
Let's Encrypt setup instructions for Ubiquiti EdgeRouter
Stars: ✭ 341 (+212.84%)
Mutual labels:  letsencrypt, acme
Intercert
Use Let's Encrypt on private (LAN) servers using DNS validation
Stars: ✭ 68 (-37.61%)
Mutual labels:  letsencrypt, acme
Openshift Letsencrypt
Stars: ✭ 66 (-39.45%)
Mutual labels:  letsencrypt, acme
Posh Acme
ACME protocol client for obtaining certificates using Let's Encrypt (or other ACME compliant CA)
Stars: ✭ 425 (+289.91%)
Mutual labels:  letsencrypt, acme
Certificaat
General-purpose ACME client
Stars: ✭ 88 (-19.27%)
Mutual labels:  letsencrypt, acme
Win Acme
A simple ACME client for Windows (for use with Let's Encrypt et al.)
Stars: ✭ 4,305 (+3849.54%)
Mutual labels:  letsencrypt, acme
Acme
Async ACME library written in PHP based on the Amp concurrency framework.
Stars: ✭ 102 (-6.42%)
Mutual labels:  letsencrypt, acme
Pebble
A miniature version of Boulder, Pebble is a small RFC 8555 ACME test server not suited for a production certificate authority. Let's Encrypt is hiring! Work on Pebble with us.
Stars: ✭ 359 (+229.36%)
Mutual labels:  letsencrypt, acme
Docker Letsencrypt Nginx Proxy Companion
Automated ACME SSL certificate generation for nginx-proxy
Stars: ✭ 6,350 (+5725.69%)
Mutual labels:  letsencrypt, acme
Certmagic
Automatic HTTPS for any Go program: fully-managed TLS certificate issuance and renewal
Stars: ✭ 3,864 (+3444.95%)
Mutual labels:  letsencrypt, acme
Acme Client
Let's Encrypt / ACME client written in PHP for the CLI.
Stars: ✭ 337 (+209.17%)
Mutual labels:  letsencrypt, acme
Certify
SSL Certificate Manager UI for Windows, powered by Let's Encrypt. Download from certifytheweb.com
Stars: ✭ 1,075 (+886.24%)
Mutual labels:  letsencrypt, acme
Letscertbot
Let's Certbot is a tool builds automated scripts base on Certbot for obtaining, renewing, deploying SSL certificates.
Stars: ✭ 84 (-22.94%)
Mutual labels:  letsencrypt, acme

Acmesmith: A simple, effective ACME v2 client to use with many servers and a cloud

ci

Acmesmith is an ACME (Automatic Certificate Management Environment) client that works perfect on environment with multiple servers. This client saves certificate and keys on cloud services (e.g. AWS S3) securely, then allow to deploy issued certificates onto your servers smoothly. This works well on Let's encrypt.

This tool is written in Ruby, but Acmesmith saves certificates in simple scheme, so you can fetch certificate by your own simple scripts.

Features

  • ACME v2 client designed to work on multiple servers
  • ACME registration, domain authorization, certificate requests
  • Storing keys in several ways
  • Challenge response
  • Many cloud services support
    • AWS S3 storage and Route 53 dns-01 responder support out-of-the-box
    • 3rd party plugins available for OpenStack designate, Google Cloud DNS, simple http-01, and Google Cloud Storage. See Plugins below

Installation

Add this line to your application's Gemfile:

gem 'acmesmith'

And then execute:

$ bundle

Or install it yourself as:

$ gem install acmesmith

Docker

docker run -v /path/to/acmesmith.yml:/app/acmesmith.yml:ro sorah/acmesmith:latest

Dockerfile is available. Default confguration file is at /app/acmesmith.yml.

Pre-built docker images are provided at https://hub.docker.com/r/sorah/acmesmith for your convenience Built with GitHub Actions & sorah-rbpkg/dockerfiles.

Usage

$ acmesmith new-account CONTACT              # Create account key (contact e.g. mailto:[email protected])
$ acmesmith order COMMON_NAME [SAN]     # request certificate for CN +COMMON_NAME+ with SANs +SAN+
$ acmesmith add-san COMMON_NAME [SAN]     # re-request existing certificate of CN with additional SAN(s)
$ acmesmith list [COMMON_NAME]                          # list certificates or its versions
$ acmesmith current COMMON_NAME                         # show current version for certificate
$ acmesmith show-certificate COMMON_NAME                # show certificate
$ acmesmith show-private-key COMMON_NAME                # show private key
$ acmesmith save-certificate COMMON_NAME --output=PATH  # Save certificate to a file
$ acmesmith save-private-key COMMON_NAME --output=PATH  # Save private key to a file
$ acmesmith save-pkcs12      COMMON_NAME --output=PATH  # Save certificate and private key to a PKCS12 file
$ acmesmith autorenew [-d DAYS] # Renew certificates which being expired soon
# Save (or update) certificate files and key in a one command
$ acmesmith save COMMON_NAME \
      --version-file=/tmp/cert.txt   # Path to save a certificate version for following run 
      --key-file=/tmp/cert.key       # Path to save a key
      --fullchain-file=/tmp/cert.pem # Path to save a certficiate and its chain (concatenated)

See acmesmith help [subcommand] for more help.

Configuration

See config.sample.yml to start. Default configuration file is ./acmesmith.yml.

directory: https://acme-v02.api.letsencrypt.org/directory # production

storage:
  # configure where to store keys and certificates; described later
  type: s3
  region: 'us-east-1'
  bucket: 'my-acmesmith-bucket'
  prefix: 'prod/'

challenge_responders:
  # configure how to respond ACME challenges; described later
  - route53: {}

Storage

Storage provider stores issued certificates, private keys and ACME account keys.

Challenge Responders

Challenge responders responds to ACME challenges to prove domain ownership to CA.

Common options

challenge_responders:
  ## Multiple responders are accepted.
  ## The first responder that supports a challenge and applicable for given domain name will be used.
  - {RESPONDER_TYPE}:
      {RESPONDER_OPTIONS}

    ### Filter (optional)
    filter:
      subject_name_exact:
        - my-app.example.com
      subject_name_suffix:
        - .example.org
      subject_name_regexp:
        - '\Aapp\d+.example.org\z'

  - {RESPONDER_TYPE}:
      {RESPONDER_OPTIONS}
    ...

Post Issuing Hooks

Post issuing hooks are configurable actions that are executed when a new certificate has been succesfully issued. The hooks are sequentially executed in the same order as they are configured, and they are configurable per certificate's common-name.

  • Shell script: shell
  • Amazon Certificate Manager (ACM): acm

Vendor dependent notes

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/sorah/acmesmith.

Running tests

unit test:

bundle exec rspec

integration test using letsencrypt/pebble. needs Docker:

ACMESMITH_CI_START_PEBBLE=1 CI=1 bundle exec -t integration_pebble

Writing plugins

Publish as a gem (RubyGems). Files will be loaded automatically from lib/acmesmith/{plugin_type}/{name}.rb.

e.g.

  • storage: lib/acmesmith/storages/perfect_storage.rb & Acmesmith::Storages::PerfectStorage
  • challenge_responder: lib/acmesmith/challenge_responders/perfect_authority.rb & Acmesmith::Storages::PerfectAuthority
  • post_issuing_hook: lib/acmesmith/challenge_responders/nice_deploy.rb & Acmesmith::Storages::NiceDeploy

Development

After checking out the repo, run bin/setup to install dependencies. Then, run rake spec to run the tests. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and tags, and push the .gem file to rubygems.org.

License

The gem is available as open source under the terms of the MIT License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].