Easy to use Let's Encrypt client and acme client library to issue, renew and revoke TLS certificates.
You can install letsencrypt-rs with:
cargo install letsencrypt-rs
letsencrypt-rs is using the openssl library to generate all required keys and certificate signing request. You don't need to run any openssl command. You can use your already generated keys and CSR if you want and you don't need any root access while running letsencrypt-rs.
letsencrypt-rs is using simple HTTP validation to pass Let's Encrypt's DNS validation challenge. You need a working HTTP server to host the challenge file.
letsencrypt-rs sign -D example.org -P /var/www -k domain.key -o domain.crt
This command will generate a user key, domain key and X509 certificate signing
request. It will register a new user account and identify the domain ownership
by putting the required challenge token into /var/www/.well-known/acme-challenge/
.
If everything goes well, it will save the domain private key into domain.key
and the signed certificate into domain.crt
.
You can also use the --email
option to provide a contact adress on registration.
You can use your own RSA keys for user registration and domain. For example:
letsencrypt-rs sign \
--user-key user.key \
--domain-key domain.key \
--domain-csr domain.csr \
--domain example.org \
-P /var/www \
-o domain.crt
This will not generate any key and it will use provided keys to sign the certificate.
letsencrypt-rs can also revoke a signed certificate. You need to use your user key and a signed certificate to revoke.
letsencrypt-rs revoke --user-key user.key --signed-crt signed.crt
You can get a list of all available options with letsencrypt-rs sign --help
and letsencrypt-rs revoke --help
:
$ letsencrypt-rs sign --help
letsencrypt-rs-sign
Signs a certificate
USAGE:
letsencrypt-rs sign [FLAGS] [OPTIONS] --domain <DOMAIN> --public-dir <PUBLIC_DIR>
FLAGS:
-c, --chain Chains the signed certificate with Let's Encrypt Authority X3 (IdenTrust
cross-signed) intermediate certificate.
-h, --help Prints help information
-V, --version Prints version information
OPTIONS:
-B, --bit-length <BIT_LENGHT> Bit length for CSR. Default is 2048.
-D, --domain <DOMAIN> Name of domain for identification.
-C, --domain-csr <DOMAIN_CSR> Path to domain certificate signing request.
-K --domain-key <DOMAIN_KEY_PATH> Domain private key path to use it in CSR
generation.
-E, --email <EMAIL> Contact email address (optional).
-P, --public-dir <PUBLIC_DIR> Directory to save ACME simple http challenge.
-S, --save-csr <SAVE_DOMAIN_CSR> Path to save domain certificate signing request.
-k, --save-domain-key <SAVE_DOMAIN_KEY> Path to save domain private key.
-o, --save-crt <SAVE_SIGNED_CERTIFICATE> Path to save signed certificate. Default is STDOUT.
-u --save-user-key <SAVE_USER_KEY> Path to save private user key.
-U, --user-key <USER_KEY_PATH> User private key path to use it in account
registration.
$ letsencrypt-rs revoke --help
letsencrypt-rs-revoke
Revokes a signed certificate
USAGE:
letsencrypt-rs revoke --user-key <USER_KEY> --signed-crt <SIGNED_CRT>
FLAGS:
-h, --help Prints help information
-V, --version Prints version information
OPTIONS:
-C, --signed-crt <SIGNED_CRT> Path to signed domain certificate to revoke.
-K, --user-key <USER_KEY> User or domain private key path.
letsencrypt-rs
is powered by the acme-client library. You can read the
documentation in docs.rs. Example usage of
AcmeClient
:
AcmeClient::new()
.and_then(|ac| ac.set_domain("example.org"))
.and_then(|ac| ac.register_account(Some("contact@example.org")))
.and_then(|ac| ac.identify_domain())
.and_then(|ac| ac.save_http_challenge_into("/var/www"))
.and_then(|ac| ac.simple_http_validation())
.and_then(|ac| ac.sign_certificate())
.and_then(|ac| ac.save_domain_private_key("domain.key"))
.and_then(|ac| ac.save_signed_certificate("domain.crt"));