Skip to content

Instantly share code, notes, and snippets.

@renchap
Last active September 24, 2024 14:39
Show Gist options
  • Save renchap/c093702f06df69ba5cac to your computer and use it in GitHub Desktop.
Save renchap/c093702f06df69ba5cac to your computer and use it in GitHub Desktop.
One-line certificate generation/renews with Letsencrypt and nginx

Prerequisites : the letsencrypt CLI tool

This method allows your to generate and renew your Lets Encrypt certificates with 1 command. This is easily automatable to renew each 60 days, as advised.

You need nginx to answer on port 80 on all the domains you want a certificate for. Then you need to serve the challenge used by letsencrypt on /.well-known/acme-challenge. Then we invoke the letsencrypt command, telling the tool to write the challenge files in the directory we used as a root in the nginx configuration.

I redirect all HTTP requests on HTTPS, so my nginx config looks like :

server {
  listen              80;
  listen              [::]:80;
  server_name         example.net example.org;
  location '/.well-known/acme-challenge' {
  default_type "text/plain";
    root        /tmp/letsencrypt-auto;
  }

  location / {
    return              301 https://$server_name$request_uri;
  }
}

This approatch allows me do no longer needing to do any nginx config change if I add a new domain and use server_name *;, I create a new certificate with the needed hostname, and add the new vhost for this domain listening on 443 only using the newly generated certificate.

Then, to generate your initial certificate for those domains :

$ export DOMAINS="-d example.net -d example.org"
$ export DIR=/tmp/letsencrypt-auto
$ mkdir -p $DIR && letsencrypt certonly --server https://acme-v01.api.letsencrypt.org/directory -a webroot --webroot-path=$DIR --agree-dev-preview $DOMAINS
$ service nginx reload

The command will output the path to the signed certificate, and you can add it to your nginx configuration as usual. The private key is located in the same directory than the generated fullchain.pem

A Lets Encrypt cert is valid for 90 days, it is recommended to renew every 60 days. Automation is needed here to avoid any expired certificate ! To renew your certificate (in a cron job for example), call the same command with a --renew arg :

$ export DOMAINS="-d example.net -d example.org"
$ export DIR=/tmp/letsencrypt-auto
$ mkdir -p $DIR && letsencrypt --renew certonly --server https://acme-v01.api.letsencrypt.org/directory -a webroot --webroot-path=$DIR --agree-dev-preview $DOMAINS
$ service nginx reload

You can also get a duplicate certificate by using the same command again, with a --duplicate arg.

@rturk
Copy link

rturk commented Jun 9, 2016

I'm surprised that Letsencrypt don't try HTTPS first and only as second option HTTP.

@BillyParadise
Copy link

BillyParadise commented Aug 2, 2016

Some things have changed

  • letsencrypt is now letsencrypt-auto
  • --agree-dev-preview is deprecated

Renewal also needs to be updated

./letsencrypt-auto renew --server https://acme-v01.api.letsencrypt.org/directory -a webroot --webroot-path=$DIR

@marcmmx
Copy link

marcmmx commented Aug 12, 2016

For me this package works:

export DOMAINS="-d example.net -d example.org"
export DIR=/tmp/letsencrypt-auto
mkdir -p $DIR && ./letsencrypt-auto certonly --server https://acme-v01.api.letsencrypt.org/directory -a webroot --webroot-path=$DIR --agree-tos $DOMAINS
service nginx reload

@Lewiscowles1986
Copy link

❤️ this. Been messing with DNS challenge, but aside from spamming my DNS with records I now have to clear it was nothing but a PITA.

Is anyone using this with nginx as a FLB? I'm thinking of installing letsencrypt to terminate SSL at the FLB and transfer via private network but I'm sure that is less secure than it should be and I'd love to see any reference material anyone has to share.

@917huB
Copy link

917huB commented May 3, 2017

thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment