Use AWS Lambda to manage SSL certificates for any site that uses Amazon's CloudFront CDN.
Rather than having to dedicate a machine to running the Lets-Encrypt client to maintain your certificate for your CloudFront distribution, you can let it all live on Amazon's infrastructure for cheap. You'll receive notification if anything goes wrong, and there's no hardware or virtual machines for you to manage.
If you just want it to work and be done there is a wizard that will do all the work for you. Or if you're more of a power user and want to see what all is going on you can follow the steps to configure it manually.
Download this repo
Install the required dependency with pip install boto3
Save your AWS credentials:
awscli
and run aws configure
, ormanually create the file ~/.aws/credentials
with the following contents:
[default]
aws_access_key_id = YOUR_ACCESS_KEY
aws_secret_access_key = YOUR_SECRET_KEY
region = us-east-1 ; Replace with your region
Run python wizard.py
This will
More docs coming soon.
This works by running a Lambda function once per day which will check your certificate's expiration, and renew it if it is nearing expiration.
Since Lambda is billed in 100ms increments and this only needs to run once a day for less than 10seconds each time the cost to run this is less than a penny per month(i.e. effectively free)
See the guide: Configuring a static S3 website to use CloudFront
The goal of this project is to make it as simple as possible for anyone to add encryption to their (cloudfront hosted) website. Anything that makes you uncertain should be filed as an issue.
I want to thank @diafygi for https://github.com/diafygi/acme-tiny, which I've borrowed some code for so as not to need any python-openssl dependencies(which isn't easily available in Lambda).