use acme2_eab::gen_rsa_private_key; use acme2_eab::AccountBuilder; use acme2_eab::AuthorizationStatus; use acme2_eab::ChallengeStatus; use acme2_eab::Csr; use acme2_eab::DirectoryBuilder; use acme2_eab::Error; use acme2_eab::OrderBuilder; use acme2_eab::OrderStatus; use std::time::Duration; const LETS_ENCRYPT_URL: &str = "https://acme-v02.api.letsencrypt.org/directory"; #[tokio::main] async fn main() -> Result<(), Error> { // Create a new ACMEv2 directory for Let's Encrypt. let dir = DirectoryBuilder::new(LETS_ENCRYPT_URL.to_string()) .build() .await?; // Create an ACME account to use for the order. For production // purposes, you should keep the account (and private key), so // you can renew your certificate easily. let mut builder = AccountBuilder::new(dir.clone()); builder.contact(vec!["mailto:hello@lcas.dev".to_string()]); builder.terms_of_service_agreed(true); let account = builder.build().await?; // Create a new order for a specific domain name. let mut builder = OrderBuilder::new(account); builder.add_dns_identifier("example.com".to_string()); let order = builder.build().await?; // Get the list of needed authorizations for this order. let authorizations = order.authorizations().await?; for auth in authorizations { // Get an http-01 challenge for this authorization (or panic // if it doesn't exist). let challenge = auth.get_challenge("http-01").unwrap(); // At this point in time, you must configure your webserver to serve // a file at `https://example.com/.well-known/${challenge.token}` // with the content of `challenge.key_authorization()??`. // Start the validation of the challenge. let challenge = challenge.validate().await?; // Poll the challenge every 5 seconds until it is in either the // `valid` or `invalid` state. let challenge = challenge.wait_done(Duration::from_secs(5), 3).await?; assert_eq!(challenge.status, ChallengeStatus::Valid); // You can now remove the challenge file hosted on your webserver. // Poll the authorization every 5 seconds until it is in either the // `valid` or `invalid` state. let authorization = auth.wait_done(Duration::from_secs(5), 3).await?; assert_eq!(authorization.status, AuthorizationStatus::Valid) } // Poll the order every 5 seconds until it is in either the // `ready` or `invalid` state. Ready means that it is now ready // for finalization (certificate creation). let order = order.wait_ready(Duration::from_secs(5), 3).await?; assert_eq!(order.status, OrderStatus::Ready); // Generate an RSA private key for the certificate. let pkey = gen_rsa_private_key(4096)?; // Create a certificate signing request for the order, and request // the certificate. let order = order.finalize(Csr::Automatic(pkey)).await?; // Poll the order every 5 seconds until it is in either the // `valid` or `invalid` state. Valid means that the certificate // has been provisioned, and is now ready for download. let order = order.wait_done(Duration::from_secs(5), 3).await?; assert_eq!(order.status, OrderStatus::Valid); // Download the certificate, and panic if it doesn't exist. let cert = order.certificate().await?.unwrap(); assert!(cert.len() > 1); Ok(()) }