master 01e81577dabc cached
18 files
92.2 KB
22.1k tokens
141 symbols
1 requests
Download .txt
Repository: ubergeek42/lambda-letsencrypt
Branch: master
Commit: 01e81577dabc
Files: 18
Total size: 92.2 KB

Directory structure:
gitextract_17dpkt9h/

├── .gitignore
├── LICENSE
├── Readme.md
├── Readme_S3.md
├── config.py.dist
├── docopt.py
├── installer/
│   ├── __init__.py
│   ├── awslambda.py
│   ├── cloudfront.py
│   ├── elb.py
│   ├── iam.py
│   ├── iam_policy_template.json
│   ├── route53.py
│   ├── s3.py
│   └── sns.py
├── lambda_function.py
├── simple_acme.py
└── wizard.py

================================================
FILE CONTENTS
================================================

================================================
FILE: .gitignore
================================================
.DS_Store
*.pyc
venv/

# Don't include user config files
config.py

# Don't include any generated zip files
*.zip


================================================
FILE: LICENSE
================================================
The MIT License (MIT)

Copyright (c) 2016 Keith Johnson

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.


================================================
FILE: Readme.md
================================================
# Lambda Lets-Encrypt

Use [AWS Lambda](https://aws.amazon.com/lambda/) to manage SSL certificates for
any site that uses [Amazon's CloudFront CDN](https://aws.amazon.com/cloudfront/).

# Why do I want this?
Rather than having to dedicate a machine to running the Lets-Encrypt client to
maintain your certificate for your CloudFront distribution, you can let it all
live on Amazon's infrastructure for cheap. You'll receive notification if
anything goes wrong, and there's no hardware or virtual machines for you to
manage.

## How do I use this?
If you just want it to work and be done there is a wizard that will do all the
work for you. Or if you're more of a power user and want to see what all is
going on you can follow the steps to configure it manually.

### Automatic Wizard

1. Download this repo

2. Install the required dependency with `pip install boto3`

3. Save your AWS credentials:

    * install [`awscli`](https://aws.amazon.com/cli/) and run `aws configure`, **or**
    * manually create the file `~/.aws/credentials` with the following contents:

        ```ini
        [default]
        aws_access_key_id = YOUR_ACCESS_KEY
        aws_secret_access_key = YOUR_SECRET_KEY
        region = us-east-1 ; Replace with your region
        ```

4. Run `python wizard.py`
    
    This will

    * ask you a few questions about your desired set up
    * create a configuration file 
    * upload the lambda function for you
    * help you manually configure the lambda's daily scheduling (this can't be done automatically because there's no API yet)

### Manual Setup
More docs coming soon.

# How does it work?

This works by running a Lambda function once per day which will check
your certificate's expiration, and renew it if it is nearing expiration.

Since Lambda is billed in 100ms increments and this only needs to run once a day
for less than 10seconds each time the cost to run this is less than a
penny per month(i.e. effectively free)

## But I only have a static S3 website, how do I use this?
See the guide:
[Configuring a static S3 website to use CloudFront](./Readme_S3.md)

## Reporting Bugs/Feature Requests
The goal of this project is to make it as simple as possible for anyone to add
encryption to their (cloudfront hosted) website. Anything that makes you
uncertain should be
[filed as an issue](https://github.com/ubergeek42/lambda-lets-encrypt/issues).


## Special Thanks
I want to thank @diafygi for https://github.com/diafygi/acme-tiny, which I've
borrowed some code for so as not to need any python-openssl dependencies(which
isn't easily available in Lambda).

## Hacking

### Python Dependencies(for local development):
* boto3
* python-dateutil


================================================
FILE: Readme_S3.md
================================================
# Configuring a static S3 website to use CloudFront
To make your static website available over SSL you need to serve it through
Amazon's CDN, CloudFront. This adds minimal cost and makes your site faster for
your visitors as well. This document will detail how to set up your CloudFront
Distribution.

![AWS S3 CloudFront Diagram](docs/images/s3-cloudfront.png)

## Create a CloudFront Distribution
You need to create a CloudFront Distribution for your S3 website. Log in to the
[AWS Console](http://console.aws.amazon.com) and then navigate to the
[CloudFront management page](https://console.aws.amazon.com/cloudfront/home).

Click on "Create a Distribution", then select "Web Distribution". Fill out the
form paying attention to these fields:

* `Origin Domain Name` - Make sure you use your S3 HTTP endpoint, e.g.
  `BUCKET_NAME.s3-website-us-east-1.amazonaws.com`.  
  **NOTE**: Do *not* use the autocomplete dropdown to select your S3 bucket. If
  you do redirects or index documents will not work.

* `Price Class` - You may choose to reduce your cost by only using Edge
  Locations in certain regions.  
  Check the [CloudFront pricing page](https://aws.amazon.com/cloudfront/pricing/)
  for details.

* `Alternate Domain Names(CNAMEs)` - Make sure you enter your real domain name here.

* Leave the `SSL Certificate` setting alone. The Lambda function will take care of
  setting this appropriately.

* **Default Root Object** - Set this to the page you want loaded when visiting
  your bare domain(e.g. `index.html`)

* You may also want to adjust the cache settings to your liking, but this is all
  you need to get a working configuration

Click on the "Create Distribution" button and then wait for the "State" field
to change to "Deployed".

## Test that it works
Try visiting the `CloudFront Domain Name` which has been assigned to your
distribution, which will look something like `a1bcd123abc2.cloudfront.net`.
Your static S3 site should load and you can verify it is working.

## Update your DNS settings to point to your new CloudFront Distribution
Update your DNS settings to point to the `CloudFront Domain Name` your
Distribution has been assigned(Same domain as the testing step). Basically you
should be changing DNS to point to CloudFront instead of S3.


## Run the wizard
Go back to the main docs and run the wizard to set up SSL for your new
distribution with Lets-Encrypt.


================================================
FILE: config.py.dist
================================================
DIRECTORY_URL = 'https://acme-staging.api.letsencrypt.org'
# DIRECTORY_URL = 'https://acme-v01.api.letsencrypt.org'

# Number of bits to use for your Lets-Encrypt User Key
# Leave alone if you don't know what this is
USERKEY_BITS = 2048

# The AWS region your resources exist in
AWS_REGION = 'us-east-1'

# The SNS topic to send messages to(Set to None to disable)
SNS_TOPIC_ARN = "$SNS_ARN"

# S3 Bucket where we'll store the Lets-Encrypt user key and necessary files
# These files will be stored in a subdomain
S3CONFIGBUCKET = "$S3_CONFIG_BUCKET"

# The number of bits for your certificate
# Leave alone if you don't know what this is
CERT_BITS = 2048

# The email you want to register with Lets-Encrypt
# (Can be used for account recovery and things)
EMAIL = "$NOTIFY_EMAIL"

# The S3 Bucket to be used for Challenge Validation
S3CHALLENGEBUCKET = "$S3_CHALLENGE_BUCKET"

# This is the list of all domains you want to validate with Lets-Encrypt, as
# well as the available validation methods
DOMAINS = $DOMAINS

# This is the list of CloudFront IDs and list of domains that will be present
# on the ssl cert for the Distribution.
SITES = $SITES


================================================
FILE: docopt.py
================================================
"""Pythonic command-line interface parser that will make you smile.

 * http://docopt.org
 * Repository and issue-tracker: https://github.com/docopt/docopt
 * Licensed under terms of MIT license (see LICENSE-MIT)
 * Copyright (c) 2013 Vladimir Keleshev, vladimir@keleshev.com

"""
import sys
import re


__all__ = ['docopt']
__version__ = '0.6.1'


class DocoptLanguageError(Exception):

    """Error in construction of usage-message by developer."""


class DocoptExit(SystemExit):

    """Exit in case user invoked program with incorrect arguments."""

    usage = ''

    def __init__(self, message=''):
        SystemExit.__init__(self, (message + '\n' + self.usage).strip())


class Pattern(object):

    def __eq__(self, other):
        return repr(self) == repr(other)

    def __hash__(self):
        return hash(repr(self))

    def fix(self):
        self.fix_identities()
        self.fix_repeating_arguments()
        return self

    def fix_identities(self, uniq=None):
        """Make pattern-tree tips point to same object if they are equal."""
        if not hasattr(self, 'children'):
            return self
        uniq = list(set(self.flat())) if uniq is None else uniq
        for i, child in enumerate(self.children):
            if not hasattr(child, 'children'):
                assert child in uniq
                self.children[i] = uniq[uniq.index(child)]
            else:
                child.fix_identities(uniq)

    def fix_repeating_arguments(self):
        """Fix elements that should accumulate/increment values."""
        either = [list(child.children) for child in transform(self).children]
        for case in either:
            for e in [child for child in case if case.count(child) > 1]:
                if type(e) is Argument or type(e) is Option and e.argcount:
                    if e.value is None:
                        e.value = []
                    elif type(e.value) is not list:
                        e.value = e.value.split()
                if type(e) is Command or type(e) is Option and e.argcount == 0:
                    e.value = 0
        return self


def transform(pattern):
    """Expand pattern into an (almost) equivalent one, but with single Either.

    Example: ((-a | -b) (-c | -d)) => (-a -c | -a -d | -b -c | -b -d)
    Quirks: [-a] => (-a), (-a...) => (-a -a)

    """
    result = []
    groups = [[pattern]]
    while groups:
        children = groups.pop(0)
        parents = [Required, Optional, OptionsShortcut, Either, OneOrMore]
        if any(t in map(type, children) for t in parents):
            child = [c for c in children if type(c) in parents][0]
            children.remove(child)
            if type(child) is Either:
                for c in child.children:
                    groups.append([c] + children)
            elif type(child) is OneOrMore:
                groups.append(child.children * 2 + children)
            else:
                groups.append(child.children + children)
        else:
            result.append(children)
    return Either(*[Required(*e) for e in result])


class LeafPattern(Pattern):

    """Leaf/terminal node of a pattern tree."""

    def __init__(self, name, value=None):
        self.name, self.value = name, value

    def __repr__(self):
        return '%s(%r, %r)' % (self.__class__.__name__, self.name, self.value)

    def flat(self, *types):
        return [self] if not types or type(self) in types else []

    def match(self, left, collected=None):
        collected = [] if collected is None else collected
        pos, match = self.single_match(left)
        if match is None:
            return False, left, collected
        left_ = left[:pos] + left[pos + 1:]
        same_name = [a for a in collected if a.name == self.name]
        if type(self.value) in (int, list):
            if type(self.value) is int:
                increment = 1
            else:
                increment = ([match.value] if type(match.value) is str
                             else match.value)
            if not same_name:
                match.value = increment
                return True, left_, collected + [match]
            same_name[0].value += increment
            return True, left_, collected
        return True, left_, collected + [match]


class BranchPattern(Pattern):

    """Branch/inner node of a pattern tree."""

    def __init__(self, *children):
        self.children = list(children)

    def __repr__(self):
        return '%s(%s)' % (self.__class__.__name__,
                           ', '.join(repr(a) for a in self.children))

    def flat(self, *types):
        if type(self) in types:
            return [self]
        return sum([child.flat(*types) for child in self.children], [])


class Argument(LeafPattern):

    def single_match(self, left):
        for n, pattern in enumerate(left):
            if type(pattern) is Argument:
                return n, Argument(self.name, pattern.value)
        return None, None

    @classmethod
    def parse(class_, source):
        name = re.findall('(<\S*?>)', source)[0]
        value = re.findall('\[default: (.*)\]', source, flags=re.I)
        return class_(name, value[0] if value else None)


class Command(Argument):

    def __init__(self, name, value=False):
        self.name, self.value = name, value

    def single_match(self, left):
        for n, pattern in enumerate(left):
            if type(pattern) is Argument:
                if pattern.value == self.name:
                    return n, Command(self.name, True)
                else:
                    break
        return None, None


class Option(LeafPattern):

    def __init__(self, short=None, long=None, argcount=0, value=False):
        assert argcount in (0, 1)
        self.short, self.long, self.argcount = short, long, argcount
        self.value = None if value is False and argcount else value

    @classmethod
    def parse(class_, option_description):
        short, long, argcount, value = None, None, 0, False
        options, _, description = option_description.strip().partition('  ')
        options = options.replace(',', ' ').replace('=', ' ')
        for s in options.split():
            if s.startswith('--'):
                long = s
            elif s.startswith('-'):
                short = s
            else:
                argcount = 1
        if argcount:
            matched = re.findall('\[default: (.*)\]', description, flags=re.I)
            value = matched[0] if matched else None
        return class_(short, long, argcount, value)

    def single_match(self, left):
        for n, pattern in enumerate(left):
            if self.name == pattern.name:
                return n, pattern
        return None, None

    @property
    def name(self):
        return self.long or self.short

    def __repr__(self):
        return 'Option(%r, %r, %r, %r)' % (self.short, self.long,
                                           self.argcount, self.value)


class Required(BranchPattern):

    def match(self, left, collected=None):
        collected = [] if collected is None else collected
        l = left
        c = collected
        for pattern in self.children:
            matched, l, c = pattern.match(l, c)
            if not matched:
                return False, left, collected
        return True, l, c


class Optional(BranchPattern):

    def match(self, left, collected=None):
        collected = [] if collected is None else collected
        for pattern in self.children:
            m, left, collected = pattern.match(left, collected)
        return True, left, collected


class OptionsShortcut(Optional):

    """Marker/placeholder for [options] shortcut."""


class OneOrMore(BranchPattern):

    def match(self, left, collected=None):
        assert len(self.children) == 1
        collected = [] if collected is None else collected
        l = left
        c = collected
        l_ = None
        matched = True
        times = 0
        while matched:
            # could it be that something didn't match but changed l or c?
            matched, l, c = self.children[0].match(l, c)
            times += 1 if matched else 0
            if l_ == l:
                break
            l_ = l
        if times >= 1:
            return True, l, c
        return False, left, collected


class Either(BranchPattern):

    def match(self, left, collected=None):
        collected = [] if collected is None else collected
        outcomes = []
        for pattern in self.children:
            matched, _, _ = outcome = pattern.match(left, collected)
            if matched:
                outcomes.append(outcome)
        if outcomes:
            return min(outcomes, key=lambda outcome: len(outcome[1]))
        return False, left, collected


class Tokens(list):

    def __init__(self, source, error=DocoptExit):
        self += source.split() if hasattr(source, 'split') else source
        self.error = error

    @staticmethod
    def from_pattern(source):
        source = re.sub(r'([\[\]\(\)\|]|\.\.\.)', r' \1 ', source)
        source = [s for s in re.split('\s+|(\S*<.*?>)', source) if s]
        return Tokens(source, error=DocoptLanguageError)

    def move(self):
        return self.pop(0) if len(self) else None

    def current(self):
        return self[0] if len(self) else None


def parse_long(tokens, options):
    """long ::= '--' chars [ ( ' ' | '=' ) chars ] ;"""
    long, eq, value = tokens.move().partition('=')
    assert long.startswith('--')
    value = None if eq == value == '' else value
    similar = [o for o in options if o.long == long]
    if tokens.error is DocoptExit and similar == []:  # if no exact match
        similar = [o for o in options if o.long and o.long.startswith(long)]
    if len(similar) > 1:  # might be simply specified ambiguously 2+ times?
        raise tokens.error('%s is not a unique prefix: %s?' %
                           (long, ', '.join(o.long for o in similar)))
    elif len(similar) < 1:
        argcount = 1 if eq == '=' else 0
        o = Option(None, long, argcount)
        options.append(o)
        if tokens.error is DocoptExit:
            o = Option(None, long, argcount, value if argcount else True)
    else:
        o = Option(similar[0].short, similar[0].long,
                   similar[0].argcount, similar[0].value)
        if o.argcount == 0:
            if value is not None:
                raise tokens.error('%s must not have an argument' % o.long)
        else:
            if value is None:
                if tokens.current() in [None, '--']:
                    raise tokens.error('%s requires argument' % o.long)
                value = tokens.move()
        if tokens.error is DocoptExit:
            o.value = value if value is not None else True
    return [o]


def parse_shorts(tokens, options):
    """shorts ::= '-' ( chars )* [ [ ' ' ] chars ] ;"""
    token = tokens.move()
    assert token.startswith('-') and not token.startswith('--')
    left = token.lstrip('-')
    parsed = []
    while left != '':
        short, left = '-' + left[0], left[1:]
        similar = [o for o in options if o.short == short]
        if len(similar) > 1:
            raise tokens.error('%s is specified ambiguously %d times' %
                               (short, len(similar)))
        elif len(similar) < 1:
            o = Option(short, None, 0)
            options.append(o)
            if tokens.error is DocoptExit:
                o = Option(short, None, 0, True)
        else:  # why copying is necessary here?
            o = Option(short, similar[0].long,
                       similar[0].argcount, similar[0].value)
            value = None
            if o.argcount != 0:
                if left == '':
                    if tokens.current() in [None, '--']:
                        raise tokens.error('%s requires argument' % short)
                    value = tokens.move()
                else:
                    value = left
                    left = ''
            if tokens.error is DocoptExit:
                o.value = value if value is not None else True
        parsed.append(o)
    return parsed


def parse_pattern(source, options):
    tokens = Tokens.from_pattern(source)
    result = parse_expr(tokens, options)
    if tokens.current() is not None:
        raise tokens.error('unexpected ending: %r' % ' '.join(tokens))
    return Required(*result)


def parse_expr(tokens, options):
    """expr ::= seq ( '|' seq )* ;"""
    seq = parse_seq(tokens, options)
    if tokens.current() != '|':
        return seq
    result = [Required(*seq)] if len(seq) > 1 else seq
    while tokens.current() == '|':
        tokens.move()
        seq = parse_seq(tokens, options)
        result += [Required(*seq)] if len(seq) > 1 else seq
    return [Either(*result)] if len(result) > 1 else result


def parse_seq(tokens, options):
    """seq ::= ( atom [ '...' ] )* ;"""
    result = []
    while tokens.current() not in [None, ']', ')', '|']:
        atom = parse_atom(tokens, options)
        if tokens.current() == '...':
            atom = [OneOrMore(*atom)]
            tokens.move()
        result += atom
    return result


def parse_atom(tokens, options):
    """atom ::= '(' expr ')' | '[' expr ']' | 'options'
             | long | shorts | argument | command ;
    """
    token = tokens.current()
    result = []
    if token in '([':
        tokens.move()
        matching, pattern = {'(': [')', Required], '[': [']', Optional]}[token]
        result = pattern(*parse_expr(tokens, options))
        if tokens.move() != matching:
            raise tokens.error("unmatched '%s'" % token)
        return [result]
    elif token == 'options':
        tokens.move()
        return [OptionsShortcut()]
    elif token.startswith('--') and token != '--':
        return parse_long(tokens, options)
    elif token.startswith('-') and token not in ('-', '--'):
        return parse_shorts(tokens, options)
    elif token.startswith('<') and token.endswith('>') or token.isupper():
        return [Argument(tokens.move())]
    else:
        return [Command(tokens.move())]


def parse_argv(tokens, options, options_first=False):
    """Parse command-line argument vector.

    If options_first:
        argv ::= [ long | shorts ]* [ argument ]* [ '--' [ argument ]* ] ;
    else:
        argv ::= [ long | shorts | argument ]* [ '--' [ argument ]* ] ;

    """
    parsed = []
    while tokens.current() is not None:
        if tokens.current() == '--':
            return parsed + [Argument(None, v) for v in tokens]
        elif tokens.current().startswith('--'):
            parsed += parse_long(tokens, options)
        elif tokens.current().startswith('-') and tokens.current() != '-':
            parsed += parse_shorts(tokens, options)
        elif options_first:
            return parsed + [Argument(None, v) for v in tokens]
        else:
            parsed.append(Argument(None, tokens.move()))
    return parsed


def parse_defaults(doc):
    defaults = []
    for s in parse_section('options:', doc):
        # FIXME corner case "bla: options: --foo"
        _, _, s = s.partition(':')  # get rid of "options:"
        split = re.split('\n[ \t]*(-\S+?)', '\n' + s)[1:]
        split = [s1 + s2 for s1, s2 in zip(split[::2], split[1::2])]
        options = [Option.parse(s) for s in split if s.startswith('-')]
        defaults += options
    return defaults


def parse_section(name, source):
    pattern = re.compile('^([^\n]*' + name + '[^\n]*\n?(?:[ \t].*?(?:\n|$))*)',
                         re.IGNORECASE | re.MULTILINE)
    return [s.strip() for s in pattern.findall(source)]


def formal_usage(section):
    _, _, section = section.partition(':')  # drop "usage:"
    pu = section.split()
    return '( ' + ' '.join(') | (' if s == pu[0] else s for s in pu[1:]) + ' )'


def extras(help, version, options, doc):
    if help and any((o.name in ('-h', '--help')) and o.value for o in options):
        print(doc.strip("\n"))
        sys.exit()
    if version and any(o.name == '--version' and o.value for o in options):
        print(version)
        sys.exit()


class Dict(dict):
    def __repr__(self):
        return '{%s}' % ',\n '.join('%r: %r' % i for i in sorted(self.items()))


def docopt(doc, argv=None, help=True, version=None, options_first=False):
    """Parse `argv` based on command-line interface described in `doc`.

    `docopt` creates your command-line interface based on its
    description that you pass as `doc`. Such description can contain
    --options, <positional-argument>, commands, which could be
    [optional], (required), (mutually | exclusive) or repeated...

    Parameters
    ----------
    doc : str
        Description of your command-line interface.
    argv : list of str, optional
        Argument vector to be parsed. sys.argv[1:] is used if not
        provided.
    help : bool (default: True)
        Set to False to disable automatic help on -h or --help
        options.
    version : any object
        If passed, the object will be printed if --version is in
        `argv`.
    options_first : bool (default: False)
        Set to True to require options precede positional arguments,
        i.e. to forbid options and positional arguments intermix.

    Returns
    -------
    args : dict
        A dictionary, where keys are names of command-line elements
        such as e.g. "--verbose" and "<path>", and values are the
        parsed values of those elements.

    Example
    -------
    >>> from docopt import docopt
    >>> doc = '''
    ... Usage:
    ...     my_program tcp <host> <port> [--timeout=<seconds>]
    ...     my_program serial <port> [--baud=<n>] [--timeout=<seconds>]
    ...     my_program (-h | --help | --version)
    ...
    ... Options:
    ...     -h, --help  Show this screen and exit.
    ...     --baud=<n>  Baudrate [default: 9600]
    ... '''
    >>> argv = ['tcp', '127.0.0.1', '80', '--timeout', '30']
    >>> docopt(doc, argv)
    {'--baud': '9600',
     '--help': False,
     '--timeout': '30',
     '--version': False,
     '<host>': '127.0.0.1',
     '<port>': '80',
     'serial': False,
     'tcp': True}

    See also
    --------
    * For video introduction see http://docopt.org
    * Full documentation is available in README.rst as well as online
      at https://github.com/docopt/docopt#readme

    """
    argv = sys.argv[1:] if argv is None else argv

    usage_sections = parse_section('usage:', doc)
    if len(usage_sections) == 0:
        raise DocoptLanguageError('"usage:" (case-insensitive) not found.')
    if len(usage_sections) > 1:
        raise DocoptLanguageError('More than one "usage:" (case-insensitive).')
    DocoptExit.usage = usage_sections[0]

    options = parse_defaults(doc)
    pattern = parse_pattern(formal_usage(DocoptExit.usage), options)
    # [default] syntax for argument is disabled
    #for a in pattern.flat(Argument):
    #    same_name = [d for d in arguments if d.name == a.name]
    #    if same_name:
    #        a.value = same_name[0].value
    argv = parse_argv(Tokens(argv), list(options), options_first)
    pattern_options = set(pattern.flat(Option))
    for options_shortcut in pattern.flat(OptionsShortcut):
        doc_options = parse_defaults(doc)
        options_shortcut.children = list(set(doc_options) - pattern_options)
        #if any_options:
        #    options_shortcut.children += [Option(o.short, o.long, o.argcount)
        #                    for o in argv if type(o) is Option]
    extras(help, version, argv, doc)
    matched, left, collected = pattern.fix().match(argv)
    if matched and left == []:  # better error message if left?
        return Dict((a.name, a.value) for a in (pattern.flat() + collected))
    raise DocoptExit()


================================================
FILE: installer/__init__.py
================================================


================================================
FILE: installer/awslambda.py
================================================
import boto3
from botocore.exceptions import ClientError
lambda_c = boto3.client('lambda')


def create_function(name, iam_role, archive, handler='lambda_function.lambda_handler'):
    with open(archive, 'rb') as f:
        contents = f.read()
    try:
        lambda_c.create_function(
            FunctionName=name,
            Runtime='python2.7',
            Role=iam_role,
            Handler=handler,
            Code={
                'ZipFile': contents
            },
            Description='Lambda Function for AWS Lets-Encrypt',
            Timeout=30,
            MemorySize=128,
            Publish=True
        )
    except Exception as e:
        print(e)
        return False

    return True


def list_distributions():
    dl = cloudfront_c.list_distributions()
    ret = []
    for dist in dl['DistributionList']['Items']:
        ret.append({
            'Id': dist['Id'],
            'Comment': dist['Comment'],
            'Aliases': dist['Aliases'].get('Items', [])
        })
    return ret


================================================
FILE: installer/cloudfront.py
================================================
import boto3
from botocore.exceptions import ClientError
cloudfront_c = boto3.client('cloudfront')


def list_distributions():
    dl = cloudfront_c.list_distributions()
    ret = []
    if 'Items' not in dl['DistributionList']:
        return ret
    for dist in dl['DistributionList']['Items']:
        ret.append({
            'Id': dist['Id'],
            'Comment': dist['Comment'],
            'Aliases': dist['Aliases'].get('Items', [])
        })
    return ret


================================================
FILE: installer/elb.py
================================================
import boto3
from botocore.exceptions import ClientError

elb_c = boto3.client('elb')

def list_elbs():
    elbs = elb_c.describe_load_balancers()
    ret = []
    for x in elbs['LoadBalancerDescriptions']:
        ret.append(x['LoadBalancerName'])
    return ret


================================================
FILE: installer/iam.py
================================================
import boto3
from botocore.exceptions import ClientError
import json

iam_c = boto3.client('iam')
iam_r = boto3.resource('iam')


def generate_policy_document(s3buckets=None, snstopicarn=None):
    policy_template = None
    with open('installer/iam_policy_template.json', 'r') as policy_file:
        policy_template = json.loads(policy_file.read())

    bucketresources = []
    for bucket in s3buckets:
        bucketresources.append("arn:aws:s3:::{}".format(bucket))
        bucketresources.append("arn:aws:s3:::{}/*".format(bucket))
    policy_template['Statement'][3]['Resource'] = bucketresources

    if snstopicarn:
        policy_template['Statement'][4]['Resource'] = [snstopicarn]
    else:
        # don't need sns statement if there's no topic
        del policy_template['Statement'][4]
    return json.dumps(policy_template, indent=4)


def get_or_create_role(role_name):
    lambda_assume_role_policy_document = """{
      "Version": "2012-10-17",
      "Statement": [
        {
          "Effect": "Allow",
          "Principal": {
            "Service": "lambda.amazonaws.com"
          },
          "Action": "sts:AssumeRole"
        }
      ]
    }"""
    create_role = False
    role = iam_r.Role(role_name)
    try:
        role.load()
    except ClientError as e:
        if e.response['Error']['Code'] == 'NoSuchEntity':
            print("Role doesn't exist, attempting to create")
            create_role = True
        else:
            print("Some other error occurred checking for the role, please review the error message below")
            print(e)

    if create_role:
        # create the role here
        try:
            print("Creating Role '{}'".format(role_name))
            role = iam_r.create_role(
                Path="/lambda-letsencrypt/",
                RoleName=role_name,
                AssumeRolePolicyDocument=lambda_assume_role_policy_document
            )
            print("Role Created")
        except ClientError as e:
            print("Error creating role")
            print(e)
            return None
    return role


def get_or_create_role_policy(role, policy_name, policy_document):
    create_role_policy = False
    role_policy = iam_r.RolePolicy(role.role_name, policy_name)
    try:
        role_policy.load()
    except ClientError as e:
        if e.response['Error']['Code'] == 'NoSuchEntity':
            print("Role policy doesn't exist, attempting to create")
            create_role_policy = True
        else:
            print("Some other error occurred checking for the role policy, please review the error message below")
            print(e)

    if create_role_policy:
        iam_c.put_role_policy(
            RoleName=role.role_name,
            PolicyName=policy_name,
            PolicyDocument=policy_document
        )
        role_policy = iam_r.RolePolicy(role.role_name, policy_name)
        role_policy.load()

    return role_policy


def update_role_policy(role_policy, policy_document):
    if role_policy.policy_document != policy_document:
        try:
            role_policy.put(
                PolicyDocument=policy_document
            )
            return True
        except ClientError as e:
            print("An error occurred while updating the policy document")
            print(e)
            return False


def configure(role_name, policy_document):
    policy_name = "lambda-letsencrypt-policy"

    role = get_or_create_role(role_name)
    role_policy = get_or_create_role_policy(role, policy_name, policy_document)
    update_role_policy(role_policy, policy_document)

    return role.arn


def get_arn(role_name):
    role = iam_r.Role(role_name)
    try:
        role.load()
    except ClientError as e:
        return None
    return role.arn


def list_roles():
    roles = iam_c.list_roles()
    ret = []
    for x in roles['Roles']:
        ret.append(x['RoleName'])
    return ret


================================================
FILE: installer/iam_policy_template.json
================================================
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "lambdalogs",
            "Effect": "Allow",
            "Action": [
                "logs:CreateLogGroup",
                "logs:CreateLogStream",
                "logs:PutLogEvents"
            ],
            "Resource": "arn:aws:logs:*:*:*"
        },
        {
            "Sid": "cloudfrontconfig",
            "Effect": "Allow",
            "Action": [
                "cloudfront:GetDistributionConfig",
                "cloudfront:UpdateDistribution"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "iamcert",
            "Effect": "Allow",
            "Action": [
                "iam:DeleteServerCertificate",
                "iam:GetServerCertificate",
                "iam:ListServerCertificates",
                "iam:UpdateServerCertificate",
                "iam:UploadServerCertificate"
            ],
            "Resource": [
                "*"
            ]
        },
        {
            "Sid": "s3bucketpermissions",
            "Effect": "Allow",
            "Action": [
                "s3:GetObject",
                "s3:GetObjectAcl",
                "s3:PutObject",
                "s3:PutObjectAcl",
                "s3:ListBucket",
                "s3:DeleteObject"
            ],
            "Resource": []
        },
        {
            "Sid": "snspublish",
            "Effect": "Allow",
            "Action": [
                "sns:Publish"
            ],
            "Resource": []
        }
    ]
}


================================================
FILE: installer/route53.py
================================================
import boto3
from botocore.exceptions import ClientError

route53_c = boto3.client('route53')


def list_zones():
    elbs = route53_c.list_hosted_zones()
    ret = []
    for x in elbs['HostedZones']:
        ret.append({
            'Id': x['Id'],
            'Name': x['Name'].rstrip('.')  # remove trailing dots
        })
    return ret


def get_zone_id(zone):
    zone = zone.rstrip(".")  # remove any possible trailing dots
    zones = list_zones()
    return next((z['Id'] for z in zones if z['Name'] == zone), None)


================================================
FILE: installer/s3.py
================================================
import boto3
from botocore.exceptions import ClientError
import string

s3_c = boto3.client('s3')
s3_r = boto3.resource('s3')

WEB_POLICY_DOC = string.Template("""\
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "PublicReadGetObject",
            "Effect": "Allow",
            "Principal": "*",
            "Action": "s3:GetObject",
            "Resource": "$arn/*"
        }
    ]
}
""")


def s3_list_buckets():
    buckets = s3_c.list_buckets()
    ret = []
    for x in buckets['Buckets']:
        ret.append(x['Name'])
    return ret


def create_bucket(bucket_name):
    bucket = s3_r.create_bucket(
        Bucket=bucket_name,
        ACL="private"
    )
    return bucket


def create_web_bucket(bucket_name):
    bucket = create_bucket(bucket_name)
    bucket_policy = bucket.Policy()
    bucket_arn = "arn:aws:s3:::{}".format(bucket_name)
    bucket_policy.put(Policy=WEB_POLICY_DOC.substitute(arn=bucket_arn))

    webconfig = bucket.Website()
    webconfig.put(
        WebsiteConfiguration={
            'ErrorDocument': {'Key': '404.html'},
            'IndexDocument': {'Suffix': 'index.html'},
        }
    )
    return bucket


================================================
FILE: installer/sns.py
================================================
import boto3
from botocore.exceptions import ClientError


def get_or_create_topic(email):
    topicname = "letsencrypt-lambda-notify"
    sns_r = boto3.resource('sns')
    sns_c = boto3.client('sns')

    # If the topic doesn't exist, this will create it, otherwise it returns
    # the existing topic.
    topic = sns_c.create_topic(Name=topicname)
    topic_arn = topic['TopicArn']

    # subscribe the email to the topic
    sns_c.subscribe(
        TopicArn=topic_arn,
        Protocol='email',
        Endpoint=email
    )
    return topic_arn


================================================
FILE: lambda_function.py
================================================
from __future__ import print_function
import logging
import datetime
from time import strftime, gmtime, sleep
from dateutil.tz import tzutc
from simple_acme import AcmeUser, AcmeAuthorization, AcmeCert
from functools import partial
import urllib2

# aws imports
import boto3
import botocore

# Configure logging
logging.basicConfig(level=logging.ERROR)
logger = logging.getLogger("Lambda-LetsEncrypt")
logger.setLevel(logging.DEBUG)


import config as cfg

###############################################################################
# No need to edit beyond this line
###############################################################################

# Global Variables and AWS Resources
s3 = boto3.resource('s3', region_name=cfg.AWS_REGION)
cloudfront = boto3.client('cloudfront', region_name=cfg.AWS_REGION)
iam = boto3.client('iam', region_name=cfg.AWS_REGION)
sns = boto3.client('sns', region_name=cfg.AWS_REGION)
elb = boto3.client('elb', region_name=cfg.AWS_REGION)
route53 = boto3.client('route53', region_name=cfg.AWS_REGION)

# Internal files to store user/authorization information
USERFILE = 'letsencrypt_user.json'
AUTHZRFILE = 'letsencrypt_authzr.json'


# Functions for storing/retrieving/deleting files from our config bucket
def save_file(site_id, filename, content):
    s3.Object(cfg.S3CONFIGBUCKET, site_id + "/" + filename).put(Body=content)


def load_file(directory, filename):
    try:
        obj = s3.Object(cfg.S3CONFIGBUCKET, directory + "/" + filename).get()
        return obj['Body'].read()
    except botocore.exceptions.ClientError as e:
        if e.response['Error']['Code'] == 'NoSuchKey':
            return False
        return False


# Verify the bucket exists
def check_bucket(bucketname):
    try:
        s3.meta.client.head_bucket(Bucket=bucketname)
        exists = True
    except botocore.exceptions.ClientError as e:
        error_code = int(e.response['Error']['Code'])
        if error_code == 404:
            exists = False
        # TODO: handle other errors better
        exists = False
    return exists


def get_user():
    # Generate a user key to use with letsencrypt
    userfile = load_file('letsencrypt', USERFILE)
    user = None
    if userfile is not False:
        logger.info("User key exists, loading...")
        user = AcmeUser.unserialize(userfile)
        user.register(cfg.EMAIL)
    else:
        logger.info("Creating user and key")
        user = AcmeUser(keybits=cfg.USERKEY_BITS)
        user.create_key()
        user.register(cfg.EMAIL)
        save_file('letsencrypt', USERFILE, user.serialize())
    return user


def notify_email(subject, message):
    if cfg.SNS_TOPIC_ARN:
        logger.info("Sending notification")
        sns.publish(
            TopicArn=cfg.SNS_TOPIC_ARN,
            Subject="[Lambda-LetsEncrypt] {}".format(subject),
            Message=message
        )


def s3_challenge_solver(domain, token, keyauth, bucket=None, prefix=None):
    # logger.info("Writing file {} with content '{}.{}' for domain '{}'".format(token, token, keyauth, domain))
    logger.info("Got prefix {}".format(prefix))
    filename = "{}/.well-known/acme-challenge/{}".format(prefix, token)
    logger.info("Writing {} into S3 Bucket {}".format(filename, bucket))

    expires = datetime.datetime.now() + datetime.timedelta(days=3)
    s3.Object(bucket, filename).put(
        Body=keyauth,
        Expires=expires
    )
    return True


def http_challenge_verifier(domain, token, keyauth):
    url = "http://{}/.well-known/acme-challenge/{}".format(domain, token)
    try:
        response = urllib2.urlopen(url)
        contents = response.read()
        code = response.getcode()
    except Exception as e:
        logger.warn("Failed to verify:")
        logger.warn(e)
        return False

    if code != 200:
        logger.warn("HTTP code {} returned, expected 200".format(code))
        return False
    if contents != keyauth:
        logger.warn("Validation body didn't match, expected '{}', got '{}'".format(keyauth, contents))
        return False

    return True


def route53_challenge_solver(domain, token, keyauth, zoneid=None):
    route53.change_resource_record_sets(
        HostedZoneId=zoneid,
        ChangeBatch={
            'Comment': "Lamdba LetsEncrypt DNS Challenge Response",
            'Changes': [{
                'Action': 'UPSERT',
                'ResourceRecordSet': {
                    'Name': '_acme-challenge.{}'.format(domain),
                    'Type': 'TXT',
                    'TTL': 300,
                    'ResourceRecords': [{
                        'Value': '"{}"'.format(keyauth)
                    }]
                }
            }]
        }

    )
    return True


def route53_challenge_verifier(domain, token, keyauth):
    # TODO: this isn't implemented yet.
    # XXX: DNS propagation may make this somewhat time consuming.
    # try to resolve record '_acme-challenge.domain' and verify that the txt record value matches 'keyauth'
    pass


def authorize_domain(user, domain):
    authzrfilename = 'authzr-{}.json'.format(domain)
    authzrfile = load_file(domain['DOMAIN'], authzrfilename)
    if authzrfile is not False:
        authzr = AcmeAuthorization.unserialize(user, authzrfile)
    else:
        authzr = AcmeAuthorization(user=user, domain=domain['DOMAIN'])
    status = authzr.authorize()

    # save the (new/updated) authorization response
    save_file(domain['DOMAIN'], authzrfilename, authzr.serialize())
    logger.debug(authzr.serialize())

    # see if we're done
    if status == 'pending':
        if 'http-01' in domain['VALIDATION_METHODS']:
            logger.info("Attempting challenge 'http-01'")
            authzr.complete_challenges(
                "http-01",
                partial(s3_challenge_solver, bucket=cfg.S3CHALLENGEBUCKET, prefix=domain['CLOUDFRONT_ID']),
                http_challenge_verifier
            )
        if 'dns-01' in domain['VALIDATION_METHODS']:
            logger.info("Attempting challenge 'dns-01'")
            authzr.complete_challenges(
                "dns-01",
                partial(route53_challenge_solver, zoneid=domain['ROUTE53_ZONE_ID']),
                route53_challenge_verifier
            )
        logger.info("Waiting for challenge to be confirmed for '{}'".format(domain['DOMAIN']))
        return False
    elif status == 'valid':
        logger.info("Got domain authorization for: {}".format(domain['DOMAIN']))
        return authzr
    else:  # probably failed the challenge
        logger.warn("Some error happend with authz request for '{}'(review above messages)".format(domain['DOMAIN']))
        logger.warn("Will retry again next time this runs")
        return False


def iam_upload_cert(certname, cert, key, chain):
        # upload new cert
        try:
            newcert = iam.upload_server_certificate(
                Path="/cloudfront/",
                ServerCertificateName=certname,
                CertificateBody=cert,
                PrivateKey=key,
                CertificateChain=chain
            )
            cert_id = newcert['ServerCertificateMetadata']['ServerCertificateId']
            cert_arn = newcert['ServerCertificateMetadata']['Arn']
            logger.info("Uploaded cert '{}' ({})".format(certname, cert_id))
            return cert_id, cert_arn
        except botocore.exceptions.ClientError as e:
            logger.error("Error uploading iam cert:")
            logger.error(e)
            return False


def iam_delete_cert(arn=None, cert_id=None):
    oldcert_name = None
    allcerts = iam.list_server_certificates(
        PathPrefix="/cloudfront/"
    )
    for c in allcerts['ServerCertificateMetadataList']:
        if c['ServerCertificateId'] == cert_id or c['Arn'] == arn:
            oldcert_name = c['ServerCertificateName']
            break
    if not oldcert_name:
        logger.warn('Unable to find old certificate to delete')
        return
    logger.info('Deleting old certificate {}'.format(oldcert_name))
    retries = 5
    while retries > 0:
        try:
            iam.delete_server_certificate(ServerCertificateName=oldcert_name)
            return
        except botocore.exceptions.ClientError as e:
            # we only retry if it said cert deleteconflict since it may take a few moments
            # for something to stop using the certificate(e.g. elb)
            if e.response['Error']['Code'] == 'DeleteConflict':
                logger.info("Cert in use while trying to delete, retrying...")
                sleep(5)
                continue

            logger.error("Unknown error occurred while deleting certificate")
            logger.error(e)
            notify_email(
                "Unable to delete certificate",
                """Lambda-LetsEncrypt failed to delete the certificate '{}'. You should manually do this yourself""".format(oldcert_name)
            )
            break


def iam_check_expiration(arn=None, cert_id=None):
    allcerts = iam.list_server_certificates(PathPrefix="/cloudfront/")
    expiration = None
    cert = None
    for c in allcerts['ServerCertificateMetadataList']:
        if c['ServerCertificateId'] == cert_id or c['Arn'] == arn:
            cert = c
            break
    if not cert:
        # no expiration found?
        return True
    expiration = cert['Expiration']
    time_left = expiration - datetime.datetime.now(tz=tzutc())

    if time_left.days < 10:
        logger.warn("Only {} days left on cert {}!".format(time_left.days, cert['ServerCertificateName']))
        notify_email(
            'Less than 10 days left on cert {}'.format(cert['ServerCertificateName']),
            """
There's less than 10 days left on your certificate for {}. This probably
means the lambda function that is supposed to be handling the renewal is
failing. Please check the logs for it. Attempting to renew now.
""".format(cert['ServerCertificateName'])
        )
        return True
    elif time_left.days < 30:
        logger.info("Only {} days remaining, will proceed with renewal for {}".format(time_left.days, cert['ServerCertificateName']))
        return True
    else:
        logger.info("{} days remaining on cert, nothing to do for {}.".format(time_left.days, cert['ServerCertificateName']))
        return False


def is_elb_cert_expiring(site):
    return True
    try:
        load_balancers = elb.describe_load_balancers(
            LoadBalancerNames=[site['ELB_NAME']],
        )
    except botocore.exceptions.ClientError as e:
        logger.error("Error getting information about Elastic Load Balancer '{}'".format(site['ELB_NAME']))
        logger.error(e)
        return False

    currentcert_arn = None
    for lb in load_balancers['LoadBalancerDescriptions']:
        if lb['LoadBalancerName'] != site['ELB_NAME']:
            continue
        for listener in lb['ListenerDescriptions']:
            if listener['Listener']['LoadBalancerPort'] != site['ELB_PORT']:
                continue
            if 'SSLCertificateId' in listener['Listener']:
                currentcert_arn = listener['Listener']['SSLCertificateId']
    if currentcert_arn is None:
        logger.info("No certificate exists for elb name {}".format(site['ELB_NAME']))
    return iam_check_expiration(arn=currentcert_arn)


def is_cf_cert_expiring(site):
    cf_config = cloudfront.get_distribution_config(Id=site['CLOUDFRONT_ID'])
    currentcert = cf_config['DistributionConfig']['ViewerCertificate'].get('IAMCertificateId', None)

    if currentcert is None:
        logger.info("No certificate exists for {}".format(site['CLOUDFRONT_ID']))
        return True

    return iam_check_expiration(cert_id=currentcert)


def is_domain_expiring(site):
    if 'CLOUDFRONT_ID' in site:
        return is_cf_cert_expiring(site)
    if 'ELB_NAME' in site:
        return is_elb_cert_expiring(site)
    logger.error("Can't detect site type(ELB or CLOUDFRONT)")
    return False


def configure_cert(site, cert, key, chain):
    certname = "{}_{}".format(site_id(site), strftime("%Y%m%d_%H%M%S", gmtime()))
    cert_id, cert_arn = iam_upload_cert(certname, cert, key, chain)

    f = None
    if 'CLOUDFRONT_ID' in site:
        f = cloudfront_configure_cert
    if 'ELB_NAME' in site:
        f = elb_configure_cert
    if f is None:
        logger.error("Can't detect site type when configuring certificate(ELB or CLOUDFRONT)")

    ret = False
    retries = 5
    while retries > 0:
        retries -= 1
        try:
            ret = f(site, cert_id, cert_arn)
            break
        except botocore.exceptions.ClientError as e:
            # we only retry if it said cert not found
            if e.response['Error']['Code'] == 'CertificateNotFound':
                logger.info("Cert not found when trying to configure ELB, retrying...")
                sleep(5)
                continue

            logger.error("Unknown error occurred while updating certificate")
            logger.error(e)
            ret = False
            break

    return ret


def elb_configure_cert(site, cert_id, cert_arn):
    # get the current certificate for the load balancer(if there is one)
    load_balancers = elb.describe_load_balancers(
        LoadBalancerNames=[site['ELB_NAME']],
    )
    oldcert_arn = None
    for lb in load_balancers['LoadBalancerDescriptions']:
        if lb['LoadBalancerName'] != site['ELB_NAME']:
            continue

        for listener in lb['ListenerDescriptions']:
            if listener['Listener']['LoadBalancerPort'] != site['ELB_PORT']:
                continue
            if 'SSLCertificateId' in listener['Listener']:
                oldcert_arn = listener['Listener']['SSLCertificateId']

    # if there wasn't an old cert, we need to configure the elb for HTTPS
    if oldcert_arn is None:
        logger.info("No listener exists for specified port, creating default")
        # create a load balancer policy
        logger.debug("Creating load balancer policy")
        elb.create_load_balancer_policy(
            LoadBalancerName=site['ELB_NAME'],
            PolicyName="lambda-letsencrypt-default-ssl-policy",
            PolicyTypeName="SSLNegotiationPolicyType",
            PolicyAttributes=[{
                'AttributeName': 'Reference-Security-Policy',
                'AttributeValue': 'ELBSecurityPolicy-2015-05'
            }]
        )
        # create a load balancer listener
        logger.debug("Creating load balancer listener")
        elb.create_load_balancer_listeners(
            LoadBalancerName=site['ELB_NAME'],
            Listeners=[{
                'Protocol': 'HTTPS',
                'LoadBalancerPort': site['ELB_PORT'],
                'InstanceProtocol': 'HTTP',
                'InstancePort': 80,
                'SSLCertificateId': cert_arn
            }]
        )
        # associate policy with the listener
        logger.debug("Setting load balancer listener policy")
        elb.set_load_balancer_policies_of_listener(
            LoadBalancerName=site['ELB_NAME'],
            LoadBalancerPort=site['ELB_PORT'],
            PolicyNames=['lambda-letsencrypt-default-ssl-policy']
        )
    # Set up the new certificate
    elb.set_load_balancer_listener_ssl_certificate(
        LoadBalancerName=site['ELB_NAME'],
        LoadBalancerPort=site['ELB_PORT'],
        SSLCertificateId=cert_arn
    )

    # Delete the old certificate if it existed
    if oldcert_arn:
        iam_delete_cert(arn=oldcert_arn)

    return True


def cloudfront_configure_cert(site, cert_id, cert_arn):
    # get current cloudfront distribution settings
    cf_config = cloudfront.get_distribution_config(Id=site['CLOUDFRONT_ID'])
    oldcert_id = cf_config['DistributionConfig']['ViewerCertificate'].get('IAMCertificateId', None)

    # Make sure the default cloudfront cert isn't being used
    if 'CloudFrontDefaultCertificate' in cf_config['DistributionConfig']['ViewerCertificate']:
        del cf_config['DistributionConfig']['ViewerCertificate']['CloudFrontDefaultCertificate']

    # update it to point to the new cert
    cf_config['DistributionConfig']['ViewerCertificate']['IAMCertificateId'] = cert_id
    cf_config['DistributionConfig']['ViewerCertificate']['Certificate'] = cert_id
    cf_config['DistributionConfig']['ViewerCertificate']['CertificateSource'] = 'iam'
    # make sure we use SNI only(otherwise the bill can be quite large, $600/month or so)
    cf_config['DistributionConfig']['ViewerCertificate']['MinimumProtocolVersion'] = 'TLSv1'
    cf_config['DistributionConfig']['ViewerCertificate']['SSLSupportMethod'] = 'sni-only'

    # actually update the distribution
    cloudfront.update_distribution(
        DistributionConfig=cf_config['DistributionConfig'],
        Id=site['CLOUDFRONT_ID'],
        IfMatch=cf_config['ETag']
    )

    # delete the old cert
    iam_delete_cert(cert_id=oldcert_id)
    return True


def configure_cloudfront(domain, s3bucket):
    cf_config = cloudfront.get_distribution_config(Id=domain['CLOUDFRONT_ID'])
    changed = False
    # make sure we have the origin configured
    origins = cf_config['DistributionConfig']['Origins']['Items']
    # check for the right origin
    challenge_origin = [x for x in origins if x['Id'] == 'lambda-letsencrypt-challenges']
    if not challenge_origin:
        changed = True
        quantity = cf_config['DistributionConfig']['Origins'].get('Quantity', 0)
        cf_config['DistributionConfig']['Origins']['Quantity'] = quantity + 1
        cf_config['DistributionConfig']['Origins']['Items'].append({
            'DomainName': '{}.s3.amazonaws.com'.format(s3bucket),
            'Id': 'lambda-letsencrypt-challenges',
            'OriginPath': "/{}".format(domain['CLOUDFRONT_ID']),
            'S3OriginConfig': {u'OriginAccessIdentity': ''}
        })

    # now check for the behavior rule
    behaviors = cf_config['DistributionConfig']['CacheBehaviors'].get('Items', [])
    challenge_behavior = [x for x in behaviors if x['PathPattern'] == '/.well-known/acme-challenge/*']
    if not challenge_behavior:
        changed = True
        if 'Items' not in cf_config['DistributionConfig']['CacheBehaviors']:
            cf_config['DistributionConfig']['CacheBehaviors']['Items'] = []
        cf_config['DistributionConfig']['CacheBehaviors']['Items'].append({
            'AllowedMethods': {
                'CachedMethods': {
                    'Items': ['HEAD', 'GET'],
                    'Quantity': 2
                },
                'Items': ['HEAD', 'GET'],
                'Quantity': 2
            },
            'DefaultTTL': 86400,
            'ForwardedValues': {
                u'Cookies': {u'Forward': 'none'},
                'Headers': {'Quantity': 0},
                'QueryString': False
            },
            'MaxTTL': 31536000,
            'MinTTL': 0,
            'PathPattern': '/.well-known/acme-challenge/*',
            'SmoothStreaming': False,
            'TargetOriginId': 'lambda-letsencrypt-challenges',
            'TrustedSigners': {u'Enabled': False, 'Quantity': 0},
            'ViewerProtocolPolicy': 'allow-all',
            'Compress': False
        })
        quantity = cf_config['DistributionConfig']['CacheBehaviors'].get('Quantity', 0)
        cf_config['DistributionConfig']['CacheBehaviors']['Quantity'] = quantity + 1

    # make sure we use SNI and not dedicated IP($600/month)
    #ssl_method = cf_config['DistributionConfig']['ViewerCertificate'].get('SSLSupportMethod', None)
    #if ssl_method != 'sni-only':
    #    changed = True
    #    cf_config['DistributionConfig']['ViewerCertificate']['MinimumProtocolVersion'] = 'TLSv1'
    #    cf_config['DistributionConfig']['ViewerCertificate']['SSLSupportMethod'] = 'sni-only'

    if changed:
        logger.info("Updating cloudfront distribution with additional origin for challenges")
        #  now save that config back
        try:
            cloudfront.update_distribution(
                DistributionConfig=cf_config['DistributionConfig'],
                Id=domain['CLOUDFRONT_ID'],
                IfMatch=cf_config['ETag']
            )
        except Exception as e:
            logger.error("Error updating cloudfront distribution")
            logger.error(e)


def site_name(site):
    if 'CLOUDFRONT_ID' in site:
        return "CloudFront Distribution '{}'".format(site['CLOUDFRONT_ID'])
    elif 'ELB_NAME' in site:
        return "ELB Name '{}'".format(site['ELB_NAME'])


def site_id(site):
    if 'CLOUDFRONT_ID' in site:
        return "cfd-{}".format(site['CLOUDFRONT_ID'])
    elif 'ELB_NAME' in site:
        return 'elb-{}'.format(site['ELB_NAME'])


def lambda_handler(event, context):
    action_needed = False
    # Do a few sanity checks
    if not check_bucket(cfg.S3CONFIGBUCKET):
        logger.error("S3 configuration bucket does not exist")
        # TODO: maybe send email?
        return False

    if not check_bucket(cfg.S3CHALLENGEBUCKET):
        logger.error("S3 challenge bucket does not exist")
        # TODO: maybe send email?
        return False

    # check the certificates we want issued
    for site in cfg.SITES:
        if not is_domain_expiring(site):
            site['skip'] = True
            continue
        action_needed = True

    # quit if there's nothing to do
    if not action_needed:
        return False

    # get our user key to use with lets-encrypt
    user = get_user()

    # validate domains
    my_domains = []
    for domain in cfg.DOMAINS:
        # make sure cloudfront is configured properly for http-01 challenge validation
        if 'http-01' in domain['VALIDATION_METHODS']:
            configure_cloudfront(domain, cfg.S3CHALLENGEBUCKET)

        authzr = authorize_domain(user, domain)
        if authzr:
            my_domains.append(domain['DOMAIN'])

    for site in cfg.SITES:
        if 'skip' in site:
            continue
        # check that we are authed for all the domains for this site
        if not set(site['DOMAINS']).issubset(my_domains):
            logger.info("Can't get cert for {}, still waiting on domain authorizations".format(site_name(site)))
            continue

        try:
            # Now that we're authorized to get certs for the domain(s), lets generate
            # a private key and a csr, then use them to get a certificate
            logger.info("Generate CSR and get cert for {}".format(site_name(site)))
            pkey, csr = AcmeCert.generate_csr(cfg.CERT_BITS, site['DOMAINS'])
            cert, cert_chain = AcmeCert.get_cert(user, csr)

            # With our certificate in hand we can update the site configuration
            ret = configure_cert(site, cert, pkey, cert_chain)
            if ret:
                notify_email("Certificate issued",
                             "The certificate for {} has been successfully updated".format(site_name(site)))
            else:
                notify_email("Error issuing cert",
                             "There was some sort of error configuring the site({}) with the certificate.".format(site_name(site)) +
                             "Please review the logs in cloudwatch.")
        except Exception as e:
            logger.warning(e)

# Support running directly for testing
if __name__ == '__main__':
    lambda_handler(None, None)


================================================
FILE: simple_acme.py
================================================
import base64
import binascii
import config as cfg
import copy
import hashlib
import json
import logging
import os
import re
import subprocess
import tempfile
import textwrap
from urllib2 import urlopen

# Configure logging
logging.basicConfig(level=logging.ERROR)
logger = logging.getLogger("Simple-ACME")
logger.setLevel(logging.INFO)


LE_NONCE = None


# from: https://github.com/diafygi/acme-tiny
# helper function base64 encode for jose spec
def _b64(b):
    return base64.urlsafe_b64encode(b).decode('utf8').replace("=", "")


# helper functions for making (un)signed requests
def _get_request(url):
    try:
        resp = urlopen(url)
        return resp.getcode(), resp.read(), resp.info()
    except IOError as e:
        return e.getcode(), e.read(), e.info()


def _send_signed_request(user, url, payload):
    global LE_NONCE
    payload64 = _b64(json.dumps(payload).encode('utf8'))
    protected = copy.deepcopy(user.jws_header)

    # Get a Nonce if we don't have one
    if LE_NONCE is None:
        LE_NONCE = urlopen(cfg.DIRECTORY_URL + "/directory").headers['Replay-Nonce']
    protected["nonce"] = LE_NONCE
    LE_NONCE = None  # Make sure we don't re-use a nonce

    protected64 = _b64(json.dumps(protected).encode('utf8'))
    signature = user.sign("{0}.{1}".format(protected64, payload64))
    data = json.dumps({
        "header": user.jws_header, "protected": protected64,
        "payload": payload64, "signature": _b64(signature),
    })
    try:
        resp = urlopen(url, data.encode('utf8'))
        LE_NONCE = resp.info().getheader('Replay-Nonce', None)
        return resp.getcode(), resp.read(), resp.info()
    except IOError as e:
        LE_NONCE = e.info().getheader('Replay-Nonce', None)
        raise IOError("Unexpected response: {}".format(e.read()))


class AcmeUser:
    def serialize(self):
        d = {
            'key': self.key,
            'keybits': self.keybits,
            'url': self.url,
            'agreement': self.agreement
        }
        return json.dumps(d)

    @staticmethod
    def unserialize(data):
        data = json.loads(data)
        u = AcmeUser(
            keybits=data['keybits'],
            key=data['key'],
            url=data['url'],
            agreement=data['agreement'])
        u._init_keydata()
        return u

    def __init__(self, keybits=2048, key=None, url=None, agreement=None):
        self.keybits = keybits
        self.key = key
        self.url = url
        self.agreement = agreement
        self._keydata_loaded = False

    def create_key(self):
        proc = subprocess.Popen(["openssl", "genrsa", str(self.keybits)],
                                stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
        out, err = proc.communicate()
        logger.debug("Stdout: ".format(out))
        if proc.returncode != 0:
            raise IOError("OpenSSL Error: {0}".format(err))
        self.key = out

    def _init_keydata(self):
        # parse account key to get public key
        proc = subprocess.Popen(["openssl", "rsa", "-in", "/dev/stdin", "-noout", "-text"],
                                stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
        out, err = proc.communicate(self.key)
        if proc.returncode != 0:
            raise IOError("OpenSSL Error: {0}".format(err))
        pub_hex, pub_exp = re.search(
            r"modulus:\n\s+00:([a-f0-9\:\s]+?)\npublicExponent: ([0-9]+)",
            out.decode('utf8'), re.MULTILINE | re.DOTALL).groups()
        pub_exp = "{0:x}".format(int(pub_exp))
        pub_exp = "0{0}".format(pub_exp) if len(pub_exp) % 2 else pub_exp
        self.pub_exp = pub_exp
        self.pub_hex = pub_hex
        self._keydata_loaded = True

    @property
    def pub_exp(self):
        if not self._keydata_loaded:
            self._init_keydata()
        return self.pub_exp

    @property
    def pub_hex(self):
        if not self._keydata_loaded:
            self._init_keydata()
        return self.pub_hex

    @property
    def jws_header(self):
        # Build the JWS header needed to sign requests
        jws_header = {
            "alg": "RS256",
            "jwk": {
                "e": _b64(binascii.unhexlify(self.pub_exp)),
                "kty": "RSA",
                "n": _b64(binascii.unhexlify(re.sub(r"(\s|:)", "", self.pub_hex))),
            },
        }

        return jws_header

    @property
    def thumbprint(self):
        # thumbprint is used for validating challenges
        accountkey_json = json.dumps(self.jws_header['jwk'], sort_keys=True, separators=(',', ':'))
        return _b64(hashlib.sha256(accountkey_json.encode('utf8')).digest())

    def refresh_registration(self):
        # refresh registration details(and agreement if necessary)
        code, result, info = _send_signed_request(
            self, self.url, {
                "resource": "reg",
                "agreement": self.agreement,
            }
        )

        # if the agreement has changed, autoaccept it and refresh the registration again
        links = info.getheader('Link')
        if re.search(r';rel="terms-of-service"', links):
            new_agreement = re.sub(r'.*<(.*)>;rel="terms-of-service".*', r'\1', links)
        if self.agreement != new_agreement:
            self.agreement = new_agreement
            self.refresh_registration()

    def register(self, email):
        if not self.url:
            code, result, info = _send_signed_request(
                self,
                cfg.DIRECTORY_URL + "/acme/new-reg",
                {
                    "resource": "new-reg",
                    "contact": [
                        "mailto:{}".format(email)
                    ],
                })
            self.url = info.getheader('Location')
            links = info.getheader('Link')
            if re.search(r';rel="terms-of-service"', links):
                self.agreement = re.sub(r'.*<(.*)>;rel="terms-of-service".*', r'\1', links)

        self.refresh_registration()

    def sign(self, data):
        # write key to tmp file
        f = tempfile.NamedTemporaryFile(delete=False)
        f.write(self.key)
        f.close()

        # sign the data
        proc = subprocess.Popen(["openssl", "dgst", "-sha256", "-sign", f.name],
                                stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
        signature, err = proc.communicate(data.encode('utf8'))

        # delete temp key file
        # TODO: maybe overwrite this?
        os.unlink(f.name)

        if proc.returncode != 0:
            raise IOError("OpenSSL Error: {0}".format(err))
        return signature


class AcmeAuthorization:
    @staticmethod
    def unserialize(user, data):
        data = json.loads(data)
        authzr = AcmeAuthorization(
            user=user,
            domain=data['domain'],
            url=data['url']
        )
        return authzr

    def serialize(self):
        return json.dumps({
            'domain': self.domain,
            'url': self.url
        })

    def __init__(self, user, domain, url=None):
        self.user = user
        self.domain = domain
        self.url = url
        self.challenges = []

    def authorize(self):
        if not self.url:
            code, result, info = _send_signed_request(
                self.user,
                cfg.DIRECTORY_URL + "/acme/new-authz",
                {
                    "resource": "new-authz",
                    "identifier": {
                        "type": "dns",
                        "value": self.domain
                    }
                })
            # save the url of this authorization so we can check it later
            self.url = info.getheader("Location")

        # get the data from our url
        code, result, info = _get_request(self.url)
        result = json.loads(result.decode('utf-8'))
        status = result['status']

        if status == 'pending':
            self.challenges = result['challenges']
        elif status == 'invalid':
            self.url = None
            # print out any error messages
            for c in result['challenges']:
                if 'error' in c:
                    logger.debug(c['error']['detail'])
        return status

    def complete_challenges(self, challenge_type, func_challenge, func_verifier):
        """ calls func_challenge to complete any challenges matching the desired type """
        challenges = [x for x in self.challenges if x['type'] == challenge_type]
        for challenge in challenges:
            token = challenge['token']
            key_authorization = "{}.{}".format(token, self.user.thumbprint)

            # DNS validation uses a different value for validation
            if challenge_type == 'dns-01':
                hashed_keyauth = hashlib.sha256(key_authorization.encode("utf-8")).digest()
                hashed_keyauth = base64.urlsafe_b64encode(hashed_keyauth).decode('utf8').replace("=", "")
                ret = func_challenge(self.domain, token, hashed_keyauth)
            else:
                ret = func_challenge(self.domain, token, key_authorization)

            if not ret:
                logger.debug("Challenge completion handler failed...")
                continue

            # try to verify/validate it
            ret = func_verifier(self.domain, token, key_authorization)
            if not ret:
                logger.warn("Error checking validation for {}. Trying anyway.".format(self.domain))

            # tell letsencrypt we finished the challenge
            code, result, info = _send_signed_request(
                self.user,
                challenge['uri'],
                {
                    "resource": "challenge",
                    "keyAuthorization": key_authorization
                })
            result = json.loads(result)


class AcmeCert:
    @staticmethod
    def _generate_private_key(keybits):
        proc = subprocess.Popen(["openssl", "genrsa", str(keybits)],
                                stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
        out, err = proc.communicate()
        logger.debug("Stdout: ".format(out))
        if proc.returncode != 0:
            raise IOError("OpenSSL Error: {0}".format(err))
        return out

    @staticmethod
    def generate_csr(keybits, domains):
        # first create a private key
        pkey = AcmeCert._generate_private_key(keybits)

        # construct the list of SANs to go in the config file
        san_str = ""
        for i, domain in enumerate(domains, start=1):
            san_str += "DNS.{} = {}\n".format(i, domain)

        # create temporary openssl conf file
        f = tempfile.NamedTemporaryFile(delete=False)
        f.write("""# openssl config file
[req]
req_extensions = v3_req
distinguished_name = req_distinguished_name
prompt = no

[req_distinguished_name]
countryName = US
stateOrProvinceName = NA
localityName = NA
organizationalUnitName = NA
commonName = {}
emailAddress = NA

[ v3_req ]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names

[alt_names]
{}""".format(domains[0], san_str))
        f.close()

        # now make the csr
        proc = subprocess.Popen(["openssl", "req", "-sha256", "-subj", "/", "-new", "-outform", "DER", "-key", "/dev/stdin", "-config", f.name],
                                stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
        out, err = proc.communicate(pkey)
        if proc.returncode != 0:
            raise IOError("OpenSSL Error: {0}".format(err))
        csr = out
        os.unlink(f.name)

        return pkey, csr

    @staticmethod
    def get_cert(user, csr_der):
        code, result, info = _send_signed_request(
            user,
            cfg.DIRECTORY_URL + "/acme/new-cert",
            {
                "resource": "new-cert",
                "csr": _b64(csr_der),
            })
        cert = None
        cert_chain = None

        cert = "-----BEGIN CERTIFICATE-----\n{0}\n-----END CERTIFICATE-----\n".format(
               "\n".join(textwrap.wrap(base64.b64encode(result).decode('utf8'), 64)))

        links = info.getheader('Link')
        if re.search(r';rel="up"', links):
            chain_cert_url = re.sub(r'.*<(.*)>;rel="up".*', r'\1', links)
            code, result, info = _get_request(chain_cert_url)
            proc = subprocess.Popen(["openssl", "x509", "-in", "/dev/stdin", "-inform", "DER", "-outform", "PEM"],
                                    stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
            cert_chain, err = proc.communicate(result)
            if proc.returncode != 0:
                raise IOError("OpenSSL Error: {0}".format(err))

        return cert, cert_chain


================================================
FILE: wizard.py
================================================
#!/usr/bin/env python
"""Lambda Lets-Encrypt Configuration/Setup Tool

This is a wizard that will help you configure the Lambda function to
automatically manage your SSL certifcates for CloudFront Distributions.

Usage:
  setup.py
  setup.py (-h | --help)
  setup.py --version

Options:
    -h --help   Show this screen
    --version   Show the version
"""
from __future__ import print_function
import json
import textwrap
import time
import zipfile
from docopt import docopt
from string import Template

from installer import sns, cloudfront, iam, s3, awslambda, elb, route53


class colors:
    OKBLUE = '\033[94m'
    OKGREEN = '\033[92m'
    WARNING = '\033[93m'
    QUESTION = '\033[96m'
    FAIL = '\033[91m'
    ENDC = '\033[0m'
    BOLD = '\033[1m'
    UNDERLINE = '\033[4m'


def write_str(string):
    lines = textwrap.wrap(textwrap.dedent(string), 80)
    for line in lines:
        print(line)


def print_header(string):
    print()
    print(colors.OKGREEN, end='')
    write_str(string)
    print(colors.ENDC, end='')


def get_input(prompt, allow_empty=True):
    from sys import version_info
    py3 = version_info[0] > 2  # creates boolean value for test that Python major version > 2
    response = None
    while response is None or (not allow_empty and len(response) == 0):
        print(colors.QUESTION + "> " + prompt + colors.ENDC, end='')
        if py3:
            response = input()
        else:
            response = raw_input()
    return response


def get_yn(prompt, default=True):
    if default is True:
        prompt += "[Y/n]? "
        default = True
    else:
        prompt += "[y/N]? "
        default = False
    ret = get_input(prompt, allow_empty=True)
    if len(ret) == 0:
        return default
    if ret.lower() == "y" or ret.lower() == "yes":
        return True
    return False


def get_selection(prompt, options, prompt_after='Please select from the list above', allow_empty=False):
    if allow_empty:
        prompt_after += "(Empty for none)"
    prompt_after += ": "
    while True:
        print(prompt)
        for item in options:
            print('[{}] {}'.format(item['selector'], item['prompt']))
        print()
        choice = get_input(prompt_after, allow_empty=True)

        # Allow for empty things if desired
        if len(choice) == 0 and allow_empty:
            return None

        # find and return their choice
        for x in options:
            if choice == str(x['selector']):
                return x['return']
        print(colors.WARNING + 'Please enter a valid choice!' + colors.ENDC)


def choose_s3_bucket():
    bucket_list = s3.s3_list_buckets()
    options = []
    for i, bucket in enumerate(bucket_list):
        options.append({
            'selector': i,
            'prompt': bucket,
            'return': bucket
        })
    return get_selection("Select the S3 Bucket to use:", options, prompt_after="Which S3 Bucket?", allow_empty=False)


def wizard_elb(global_config):
    print_header("ELB Configuration")
    write_str("""\
        Now we'll detect your existing Elastic Load Balancers and allow you
        to configure them to use SSL. You must select the domain names
        you want on the certificate for each ELB.""")
    write_str("""\
        Note that only DNS validation(via Route53) is supported for ELBs""")
    print()

    global_config['elb_sites'] = []
    global_config['elb_domains'] = []

    # Get the list of all Cloudfront Distributions
    elb_list = elb.list_elbs()
    elb_list_opts = []
    for i, elb_name in enumerate(elb_list):
        elb_list_opts.append({
            'selector': i,
            'prompt': elb_name,
            'return': elb_name
        })

    route53_list = route53.list_zones()
    route53_list_opts = []
    for i, zone in enumerate(route53_list):
        route53_list_opts.append({
            'selector': i,
            'prompt': "{} - {}".format(zone['Name'], zone['Id']),
            'return': zone
        })

    while True:
        lb = get_selection("Choose an ELB to configure SSL for(Leave blank for none)", elb_list_opts, prompt_after="Which ELB?", allow_empty=True)
        if lb is None:
            break

        lb_port = get_input("What port number will this certificate be for(HTTPS is 443) [443]?", allow_empty=True)
        if len(lb_port) == 0:
            lb_port = 443

        domains = []
        while True:
            if len(domains) > 0:
                print("Already selected: {}".format(",".join(domains)))
            zone = get_selection("Choose a Route53 Zone that points to this load balancer: ", route53_list_opts, prompt_after="Which zone?", allow_empty=True)
            # stop when they don't enter anything
            if zone is None:
                break

            # Only allow adding each domain once
            if zone['Name'] in domains:
                continue
            domains.append(zone['Name'])
            global_config['elb_domains'].append({
                'DOMAIN': zone['Name'],
                'ROUTE53_ZONE_ID': zone['Id'],
                'VALIDATION_METHODS': ['dns-01']
            })

        site = {
            'ELB_NAME': lb,
            'ELB_PORT': lb_port,
            'DOMAINS': domains,
        }
        global_config['elb_sites'].append(site)


def wizard_cf(global_config):
    print_header("CloudFront Configuration")

    global_config['cf_sites'] = []
    global_config['cf_domains'] = []

    # Get the list of all Cloudfront Distributions
    cf_dist_list = cloudfront.list_distributions()
    cf_dist_opts = []
    for i, d in enumerate(cf_dist_list):
        cf_dist_opts.append({
            'selector': i,
            'prompt': "{} - {} ({}) ".format(d['Id'], d['Comment'], ", ".join(d['Aliases'])),
            'return': d
        })

    write_str("""\
        Now we'll detect your existing CloudFront Distributions and allow you
        to configure them to use SSL. Domain names will be automatically
        detected from the 'Aliases/CNAMEs' configuration section of each
        Distribution.""")
    print()
    write_str("""\
        You will configure each Distribution fully before being presented with
        the list of Distributions again. You can configure as many Distributions
        as you like.""")
    while True:
        print()
        dist = get_selection("Select a CloudFront Distribution to configure with Lets-Encrypt(leave blank to finish)", cf_dist_opts, prompt_after="Which CloudFront Distribution?", allow_empty=True)
        if dist is None:
            break

        cnames = dist['Aliases']
        write_str("The following domain names exist for the selected CloudFront Distribution:")
        write_str("    " + ", ".join(cnames))
        write_str("Each domain in this list will be validated with Lets-Encrypt and added to the certificate assigned to this Distribution.")
        print()
        for dns_name in cnames:
            domain = {
                'DOMAIN': dns_name,
                'VALIDATION_METHODS': []
            }
            print("Choose validation methods for the domain '{}'".format(dns_name))
            route53_id = route53.get_zone_id(dns_name)
            if route53_id:
                write_str(colors.OKGREEN + "Route53 zone detected!" + colors.ENDC)
                validate_via_dns = get_yn("Validate using DNS", default=False)
                if validate_via_dns:
                    domain['ROUTE53_ZONE_ID'] = route53_id
                    domain['VALIDATION_METHODS'].append('dns-01')
            else:
                write_str(colors.WARNING + "No Route53 zone detected, DNS validation not possible." + colors.ENDC)

            validate_via_http = get_yn("Validate using HTTP", default=True)
            if validate_via_http:
                domain['CLOUDFRONT_ID'] = dist['Id']
                domain['VALIDATION_METHODS'].append('http-01')

            global_config['cf_domains'].append(domain)
        site = {
            'CLOUDFRONT_ID': dist['Id'],
            'DOMAINS': cnames
        }
        global_config['cf_sites'].append(site)


def wizard_sns(global_config):
    sns_email = None

    print_header("Notifications")
    write_str("""\
        The lambda function can send notifications when a certificate is issued,
        errors occur, or other things that may need your attention.
        Notifications are optional.""")

    use_sns = True
    sns_email = get_input("Enter the email address for notifications(blank to disable): ", allow_empty=True)
    if len(sns_email) == 0:
        use_sns = False

    global_config['use_sns'] = use_sns
    global_config['sns_email'] = sns_email


def wizard_s3_cfg_bucket(global_config):
    print_header("S3 Configuration Bucket")
    write_str('An S3 Bucket is required to store configuration. If you already have a bucket you want to use for this choose no and select it from the list. Otherwise let the wizard create one for you.')
    create_s3_cfg_bucket = get_yn("Create a bucket for configuration", True)

    if create_s3_cfg_bucket:
        s3_cfg_bucket = "lambda-letsencrypt-config-{}".format(global_config['ts'])
    else:
        s3_cfg_bucket = choose_s3_bucket()

    global_config['create_s3_cfg_bucket'] = create_s3_cfg_bucket
    global_config['s3_cfg_bucket'] = s3_cfg_bucket


def wizard_iam(global_config):
    print_header("IAM Configuration")
    write_str("An IAM role must be created for this lambda function giving it access to CloudFront, Route53, S3, SNS(notifications), IAM(certificates), and CloudWatch(logs/alarms).")
    print()
    write_str("If you do not let the wizard create this role you will be asked to select an existing role to use.")
    create_iam_role = get_yn("Do you want to automatically create this role", True)
    if not create_iam_role:
        role_list = iam.list_roles()
        options = []
        for i, role in enumerate(role_list):
            options.append({
                'selector': i,
                'prompt': role,
                'return': role
            })
        iam_role_name = get_selection("Select the IAM Role:", options, prompt_after="Which IAM Role?", allow_empty=False)
    else:
        iam_role_name = "lambda-letsencrypt"

    global_config['create_iam_role'] = create_iam_role
    global_config['iam_role_name'] = iam_role_name


def wizard_challenges(global_config):
    create_s3_challenge_bucket = False
    s3_challenge_bucket = None

    print_header("Lets-Encrypt Challenge Validation Settings")
    write_str("""This tool will handle validation of your domains automatically. There are two possible validation methods: HTTP and DNS.""")
    print()
    write_str("HTTP validation is only available for CloudFront sites. It requires an S3 bucket to store the challenge responses in. This bucket needs to be publicly accessible. Your CloudFront Distribution(s) will be reconfigured to use this bucket as an origin for challenge responses.")
    write_str("If you do not configure a bucket for this you will only be able to use DNS validation.")
    print()
    write_str("DNS validation requires your domain to be managed with Route53. This validation method is always available and requires no additional configuration.")
    write_str(colors.WARNING + "Note: DNS validation is currently only supported by the staging server." + colors.ENDC)
    print()
    write_str("Each domain you want to manage can be configured to validate using either of these methods.")
    print()

    use_http_challenges = get_yn("Do you want to configure HTTP validation", True)
    if use_http_challenges:
        create_s3_challenge_bucket = get_yn("Do you want to create a bucket for these challenges(Choose No to select an existing bucket)", True)
        if create_s3_challenge_bucket:
            s3_challenge_bucket = "lambda-letsencrypt-challenges-{}".format(global_config['ts'])
        else:
            s3_challenge_bucket = choose_s3_bucket()
    else:
        # only dns challenge support is available
        pass

    global_config['use_http_challenges'] = use_http_challenges
    global_config['create_s3_challenge_bucket'] = create_s3_challenge_bucket
    global_config['s3_challenge_bucket'] = s3_challenge_bucket


def wizard_summary(global_config):
    gc = global_config

    print_header("**Summary**")
    print("Notification Email:                              {}".format(gc['sns_email'] or "(notifications disabled)"))

    print("S3 Config Bucket:                                {}".format(gc['s3_cfg_bucket']), end="")
    if (gc['create_s3_cfg_bucket']):
        print(" (to be created)")
    else:
        print(" (existing)")

    if gc['create_iam_role']:
        print("IAM Role Name:                                   {} (to be created)".format(gc['iam_role_name']))
    else:
        print("IAM Role Name:                                   {} (existing)".format(gc['iam_role_name']))

    print("Support HTTP Challenges:                         {}".format(gc['use_http_challenges']))
    if gc['use_http_challenges']:
        print("S3 HTTP Challenge Bucket:                        {}".format(gc['s3_challenge_bucket']), end="")
        if (gc['create_s3_challenge_bucket']):
            print(" (to be created)")
        else:
            print(" (existing)")

    print("Domains To Manage With Lets-Encrypt")
    for d in gc['cf_domains']:
        print("    {} - [{}]".format(d['DOMAIN'], ",".join(d['VALIDATION_METHODS'])))
    for d in gc['elb_domains']:
        print("    {} - [{}]".format(d['DOMAIN'], ",".join(d['VALIDATION_METHODS'])))

    print("CloudFront Distributions To Manage:")
    for cf in gc['cf_sites']:
        print("    {} - [{}]".format(cf['CLOUDFRONT_ID'], ",".join(cf['DOMAINS'])))

    print("Elastic Load Balancers to Manage:")
    for lb in gc['elb_sites']:
        print("    {}:{} - [{}]".format(lb['ELB_NAME'], lb['ELB_PORT'], ",".join(lb['DOMAINS'])))


def wizard_save_config(global_config):
    print_header("Making Requested Changes")
    templatevars = {}
    with open('config.py.dist', 'r') as template:
        configfile = Template(template.read())

    templatevars['SNS_ARN'] = None
    templatevars['NOTIFY_EMAIL'] = None

    # Configure SNS if appropriate
    sns_arn = None
    if len(global_config['sns_email']) > 0:
        # Create SNS Topic if necessary
        print("Creating SNS Topic for Notifications ", end='')
        sns_arn = sns.get_or_create_topic(global_config['sns_email'])
        if sns_arn is False or sns_arn is None:
            print(colors.FAIL + u'\u2717' + colors.ENDC)
        else:
            print(colors.OKGREEN + u'\u2713' + colors.ENDC)
            templatevars['SNS_ARN'] = sns_arn
            templatevars['NOTIFY_EMAIL'] = global_config['sns_email']

    # create config bucket if necessary
    if global_config['create_s3_cfg_bucket']:
        print("Creating S3 Configuration Bucket ", end='')
        s3.create_bucket(global_config['s3_cfg_bucket'])
        print(colors.OKGREEN + u'\u2713' + colors.ENDC)

    # create challenge bucket if necessary(needs to be configured as static website)
    if global_config['create_s3_challenge_bucket']:
        print("Creating S3 Challenge Bucket ", end='')
        s3.create_web_bucket(global_config['s3_challenge_bucket'])
        print(colors.OKGREEN + u'\u2713' + colors.ENDC)

    # create IAM role if required
    if global_config['create_iam_role']:
        global_config['iam_role_name'] = 'lambda-letsencrypt-test-role'
        policy_document = iam.generate_policy_document(
            s3buckets=[
                global_config['s3_cfg_bucket'],
                global_config['s3_challenge_bucket']
            ],
            snstopicarn=sns_arn
        )
        iam_arn = iam.configure(global_config['iam_role_name'], policy_document)

    templatevars['S3_CONFIG_BUCKET'] = global_config['s3_cfg_bucket']
    templatevars['S3_CHALLENGE_BUCKET'] = global_config['s3_challenge_bucket']

    domains = global_config['cf_domains'] + global_config['elb_domains']
    sites = global_config['cf_sites'] + global_config['elb_sites']
    templatevars['DOMAINS'] = json.dumps(domains, indent=4)
    templatevars['SITES'] = json.dumps(sites, indent=4)

    # write out the config file
    config = configfile.substitute(templatevars)
    with open("config-wizard.py", 'w') as configfinal:
        print("Writing Configuration File ", end='')
        configfinal.write(config)
        print(colors.OKGREEN + u'\u2713' + colors.ENDC)

    print("Creating Zip File To Upload To Lambda")
    archive_success = True
    archive = zipfile.ZipFile('lambda-letsencrypt-dist.zip', mode='w')
    try:
        for f in ['lambda_function.py', 'simple_acme.py']:
            print("    Adding '{}'".format(f))
            archive.write(f)
        print("    Adding 'config.py'")
        archive.write('config-wizard.py', 'config.py')
    except Exception as e:
        print(colors.FAIL + 'Zip File Creation Failed' + colors.ENDC)
        print(e)
        archive_success = False
    finally:
        print('Zip File Created Successfully')
        archive.close()

    # can't continue if this failed
    if not archive_success:
        return

    print("Configuring Lambda Function:")
    iam_arn = iam.get_arn(global_config['iam_role_name'])
    print("    IAM ARN: {}".format(iam_arn))
    print("    Uploading Function ", end='')
    if awslambda.create_function("lambda-letsencrypt", iam_arn, 'lambda-letsencrypt-dist.zip'):
        print(colors.OKGREEN + u'\u2713' + colors.ENDC)
    else:
        print(colors.FAIL + u'\u2717' + colors.ENDC)
        return

    print_header("Schedule Lambda Function")
    write_str("I've done all I can for you now, there's one last step you have to take manually in order to schedule your lambda function to run once a day.")
    write_str("Log into your aws console and go to this page:")
    lambda_event_url = "https://console.aws.amazon.com/lambda/home#/functions/lambda-letsencrypt?tab=eventSources"
    print(colors.OKBLUE + lambda_event_url + colors.ENDC)
    print()
    write_str('Click on "Add event source". From the dropdown, choose "Scheduled Event". Enter the following:')
    write_str("Name:                 'daily - rate(1 day)'")
    write_str("Description:          'Run every day'")
    write_str("Schedule Expression:  'rate(1 day)'")
    print()
    write_str("Choose to 'Enable Now', then click 'Submit'")

    print_header("Testing")
    write_str("You may want to test this before you set it to be recurring. Click on the 'Test' button in the AWS Console for the lambda-letsencrypt function. The data you provide to this function does not matter. Make sure to review the logs after it finishes and check for anything out of the ordinary.")
    print()
    write_str("It will take at least 2 runs before your certificates are issued, maybe 3 depending on how fast cloudfront responds. This is because it needs one try to configure cloudfront, one to submit the challenge and have it verified, and one final run to issue the certificate and configure the cloudfront distribution")


def wizard(global_config):
    ts = int(time.time())
    ts = 1000
    global_config['ts'] = ts
    print_header("Lambda Lets-Encrypt Wizard")
    write_str("""\
        This wizard will guide you through the process of setting up your existing
        CloudFront Distributions to use SSL certificates provided by Lets-Encrypt
        and automatically issued/maintained by an AWS Lambda function.

        These certificates are free of charge, and valid for 90 days. This wizard
        will also set up a Lambda function that is responsible for issuing and
        renewing these certificates automatically as they near their expiration
        date.

        The cost of the AWS services used to make this work are typically less
        than a penny per month. For full pricing details please refer to the
        docs.
    """)

    print()
    print(colors.WARNING + "WARNING: ")
    write_str("""\
        Manual configuration is required at this time to configure the Lambda
        function to run on a daily basis to keep your certificate updated. If
        you do not follow the steps provided at the end of this wizard your
        Lambda function will *NOT* run.
    """)
    print(colors.ENDC)

    wizard_sns(global_config)
    wizard_iam(global_config)
    wizard_s3_cfg_bucket(global_config)
    wizard_challenges(global_config)
    wizard_cf(global_config)
    wizard_elb(global_config)

    cfg_menu = []
    cfg_menu.append({'selector': 1, 'prompt': 'SNS', 'return': wizard_sns})
    cfg_menu.append({'selector': 2, 'prompt': 'IAM', 'return': wizard_iam})
    cfg_menu.append({'selector': 3, 'prompt': 'S3 Config', 'return': wizard_s3_cfg_bucket})
    cfg_menu.append({'selector': 4, 'prompt': 'Challenges', 'return': wizard_challenges})
    cfg_menu.append({'selector': 5, 'prompt': 'CloudFront', 'return': wizard_cf})
    cfg_menu.append({'selector': 6, 'prompt': 'Elastic Load Balancers', 'return': wizard_cf})
    cfg_menu.append({'selector': 9, 'prompt': 'Done', 'return': None})

    finished = False
    while not finished:
        wizard_summary(global_config)
        finished = get_yn("Are these settings correct", True)
        if not finished:
            selection = get_selection("Which section do you want to change", cfg_menu, prompt_after="Which section to modify?", allow_empty=False)
            if selection:
                selection(global_config)

    wizard_save_config(global_config)


if __name__ == "__main__":
    args = docopt(__doc__, version='Lambda Lets-Encrypt 1.0')
    global_config = {}
    wizard(global_config)
Download .txt
gitextract_17dpkt9h/

├── .gitignore
├── LICENSE
├── Readme.md
├── Readme_S3.md
├── config.py.dist
├── docopt.py
├── installer/
│   ├── __init__.py
│   ├── awslambda.py
│   ├── cloudfront.py
│   ├── elb.py
│   ├── iam.py
│   ├── iam_policy_template.json
│   ├── route53.py
│   ├── s3.py
│   └── sns.py
├── lambda_function.py
├── simple_acme.py
└── wizard.py
Download .txt
SYMBOL INDEX (141 symbols across 11 files)

FILE: docopt.py
  class DocoptLanguageError (line 17) | class DocoptLanguageError(Exception):
  class DocoptExit (line 22) | class DocoptExit(SystemExit):
    method __init__ (line 28) | def __init__(self, message=''):
  class Pattern (line 32) | class Pattern(object):
    method __eq__ (line 34) | def __eq__(self, other):
    method __hash__ (line 37) | def __hash__(self):
    method fix (line 40) | def fix(self):
    method fix_identities (line 45) | def fix_identities(self, uniq=None):
    method fix_repeating_arguments (line 57) | def fix_repeating_arguments(self):
  function transform (line 72) | def transform(pattern):
  class LeafPattern (line 99) | class LeafPattern(Pattern):
    method __init__ (line 103) | def __init__(self, name, value=None):
    method __repr__ (line 106) | def __repr__(self):
    method flat (line 109) | def flat(self, *types):
    method match (line 112) | def match(self, left, collected=None):
  class BranchPattern (line 133) | class BranchPattern(Pattern):
    method __init__ (line 137) | def __init__(self, *children):
    method __repr__ (line 140) | def __repr__(self):
    method flat (line 144) | def flat(self, *types):
  class Argument (line 150) | class Argument(LeafPattern):
    method single_match (line 152) | def single_match(self, left):
    method parse (line 159) | def parse(class_, source):
  class Command (line 165) | class Command(Argument):
    method __init__ (line 167) | def __init__(self, name, value=False):
    method single_match (line 170) | def single_match(self, left):
  class Option (line 180) | class Option(LeafPattern):
    method __init__ (line 182) | def __init__(self, short=None, long=None, argcount=0, value=False):
    method parse (line 188) | def parse(class_, option_description):
    method single_match (line 204) | def single_match(self, left):
    method name (line 211) | def name(self):
    method __repr__ (line 214) | def __repr__(self):
  class Required (line 219) | class Required(BranchPattern):
    method match (line 221) | def match(self, left, collected=None):
  class Optional (line 232) | class Optional(BranchPattern):
    method match (line 234) | def match(self, left, collected=None):
  class OptionsShortcut (line 241) | class OptionsShortcut(Optional):
  class OneOrMore (line 246) | class OneOrMore(BranchPattern):
    method match (line 248) | def match(self, left, collected=None):
  class Either (line 268) | class Either(BranchPattern):
    method match (line 270) | def match(self, left, collected=None):
  class Tokens (line 282) | class Tokens(list):
    method __init__ (line 284) | def __init__(self, source, error=DocoptExit):
    method from_pattern (line 289) | def from_pattern(source):
    method move (line 294) | def move(self):
    method current (line 297) | def current(self):
  function parse_long (line 301) | def parse_long(tokens, options):
  function parse_shorts (line 334) | def parse_shorts(tokens, options):
  function parse_pattern (line 369) | def parse_pattern(source, options):
  function parse_expr (line 377) | def parse_expr(tokens, options):
  function parse_seq (line 390) | def parse_seq(tokens, options):
  function parse_atom (line 402) | def parse_atom(tokens, options):
  function parse_argv (line 428) | def parse_argv(tokens, options, options_first=False):
  function parse_defaults (line 452) | def parse_defaults(doc):
  function parse_section (line 464) | def parse_section(name, source):
  function formal_usage (line 470) | def formal_usage(section):
  function extras (line 476) | def extras(help, version, options, doc):
  class Dict (line 485) | class Dict(dict):
    method __repr__ (line 486) | def __repr__(self):
  function docopt (line 490) | def docopt(doc, argv=None, help=True, version=None, options_first=False):

FILE: installer/awslambda.py
  function create_function (line 6) | def create_function(name, iam_role, archive, handler='lambda_function.la...
  function list_distributions (line 30) | def list_distributions():

FILE: installer/cloudfront.py
  function list_distributions (line 6) | def list_distributions():

FILE: installer/elb.py
  function list_elbs (line 6) | def list_elbs():

FILE: installer/iam.py
  function generate_policy_document (line 9) | def generate_policy_document(s3buckets=None, snstopicarn=None):
  function get_or_create_role (line 28) | def get_or_create_role(role_name):
  function get_or_create_role_policy (line 70) | def get_or_create_role_policy(role, policy_name, policy_document):
  function update_role_policy (line 95) | def update_role_policy(role_policy, policy_document):
  function configure (line 108) | def configure(role_name, policy_document):
  function get_arn (line 118) | def get_arn(role_name):
  function list_roles (line 127) | def list_roles():

FILE: installer/route53.py
  function list_zones (line 7) | def list_zones():
  function get_zone_id (line 18) | def get_zone_id(zone):

FILE: installer/s3.py
  function s3_list_buckets (line 24) | def s3_list_buckets():
  function create_bucket (line 32) | def create_bucket(bucket_name):
  function create_web_bucket (line 40) | def create_web_bucket(bucket_name):

FILE: installer/sns.py
  function get_or_create_topic (line 5) | def get_or_create_topic(email):

FILE: lambda_function.py
  function save_file (line 40) | def save_file(site_id, filename, content):
  function load_file (line 44) | def load_file(directory, filename):
  function check_bucket (line 55) | def check_bucket(bucketname):
  function get_user (line 68) | def get_user():
  function notify_email (line 85) | def notify_email(subject, message):
  function s3_challenge_solver (line 95) | def s3_challenge_solver(domain, token, keyauth, bucket=None, prefix=None):
  function http_challenge_verifier (line 109) | def http_challenge_verifier(domain, token, keyauth):
  function route53_challenge_solver (line 130) | def route53_challenge_solver(domain, token, keyauth, zoneid=None):
  function route53_challenge_verifier (line 152) | def route53_challenge_verifier(domain, token, keyauth):
  function authorize_domain (line 159) | def authorize_domain(user, domain):
  function iam_upload_cert (line 199) | def iam_upload_cert(certname, cert, key, chain):
  function iam_delete_cert (line 219) | def iam_delete_cert(arn=None, cert_id=None):
  function iam_check_expiration (line 254) | def iam_check_expiration(arn=None, cert_id=None):
  function is_elb_cert_expiring (line 287) | def is_elb_cert_expiring(site):
  function is_cf_cert_expiring (line 312) | def is_cf_cert_expiring(site):
  function is_domain_expiring (line 323) | def is_domain_expiring(site):
  function configure_cert (line 332) | def configure_cert(site, cert, key, chain):
  function elb_configure_cert (line 366) | def elb_configure_cert(site, cert_id, cert_arn):
  function cloudfront_configure_cert (line 429) | def cloudfront_configure_cert(site, cert_id, cert_arn):
  function configure_cloudfront (line 458) | def configure_cloudfront(domain, s3bucket):
  function site_name (line 531) | def site_name(site):
  function site_id (line 538) | def site_id(site):
  function lambda_handler (line 545) | def lambda_handler(event, context):

FILE: simple_acme.py
  function _b64 (line 26) | def _b64(b):
  function _get_request (line 31) | def _get_request(url):
  function _send_signed_request (line 39) | def _send_signed_request(user, url, payload):
  class AcmeUser (line 65) | class AcmeUser:
    method serialize (line 66) | def serialize(self):
    method unserialize (line 76) | def unserialize(data):
    method __init__ (line 86) | def __init__(self, keybits=2048, key=None, url=None, agreement=None):
    method create_key (line 93) | def create_key(self):
    method _init_keydata (line 102) | def _init_keydata(self):
    method pub_exp (line 119) | def pub_exp(self):
    method pub_hex (line 125) | def pub_hex(self):
    method jws_header (line 131) | def jws_header(self):
    method thumbprint (line 145) | def thumbprint(self):
    method refresh_registration (line 150) | def refresh_registration(self):
    method register (line 167) | def register(self, email):
    method sign (line 185) | def sign(self, data):
  class AcmeAuthorization (line 205) | class AcmeAuthorization:
    method unserialize (line 207) | def unserialize(user, data):
    method serialize (line 216) | def serialize(self):
    method __init__ (line 222) | def __init__(self, user, domain, url=None):
    method authorize (line 228) | def authorize(self):
    method complete_challenges (line 258) | def complete_challenges(self, challenge_type, func_challenge, func_ver...
  class AcmeCert (line 293) | class AcmeCert:
    method _generate_private_key (line 295) | def _generate_private_key(keybits):
    method generate_csr (line 305) | def generate_csr(keybits, domains):
    method get_cert (line 351) | def get_cert(user, csr_der):

FILE: wizard.py
  class colors (line 27) | class colors:
  function write_str (line 38) | def write_str(string):
  function print_header (line 44) | def print_header(string):
  function get_input (line 51) | def get_input(prompt, allow_empty=True):
  function get_yn (line 64) | def get_yn(prompt, default=True):
  function get_selection (line 79) | def get_selection(prompt, options, prompt_after='Please select from the ...
  function choose_s3_bucket (line 101) | def choose_s3_bucket():
  function wizard_elb (line 113) | def wizard_elb(global_config):
  function wizard_cf (line 181) | def wizard_cf(global_config):
  function wizard_sns (line 247) | def wizard_sns(global_config):
  function wizard_s3_cfg_bucket (line 265) | def wizard_s3_cfg_bucket(global_config):
  function wizard_iam (line 279) | def wizard_iam(global_config):
  function wizard_challenges (line 302) | def wizard_challenges(global_config):
  function wizard_summary (line 334) | def wizard_summary(global_config):
  function wizard_save_config (line 374) | def wizard_save_config(global_config):
  function wizard (line 485) | def wizard(global_config):
Condensed preview — 18 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (99K chars).
[
  {
    "path": ".gitignore",
    "chars": 114,
    "preview": ".DS_Store\n*.pyc\nvenv/\n\n# Don't include user config files\nconfig.py\n\n# Don't include any generated zip files\n*.zip\n"
  },
  {
    "path": "LICENSE",
    "chars": 1080,
    "preview": "The MIT License (MIT)\n\nCopyright (c) 2016 Keith Johnson\n\nPermission is hereby granted, free of charge, to any person obt"
  },
  {
    "path": "Readme.md",
    "chars": 2690,
    "preview": "# Lambda Lets-Encrypt\n\nUse [AWS Lambda](https://aws.amazon.com/lambda/) to manage SSL certificates for\nany site that use"
  },
  {
    "path": "Readme_S3.md",
    "chars": 2402,
    "preview": "# Configuring a static S3 website to use CloudFront\nTo make your static website available over SSL you need to serve it "
  },
  {
    "path": "config.py.dist",
    "chars": 1149,
    "preview": "DIRECTORY_URL = 'https://acme-staging.api.letsencrypt.org'\n# DIRECTORY_URL = 'https://acme-v01.api.letsencrypt.org'\n\n# N"
  },
  {
    "path": "docopt.py",
    "chars": 19784,
    "preview": "\"\"\"Pythonic command-line interface parser that will make you smile.\n\n * http://docopt.org\n * Repository and issue-tracke"
  },
  {
    "path": "installer/__init__.py",
    "chars": 0,
    "preview": ""
  },
  {
    "path": "installer/awslambda.py",
    "chars": 1016,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\nlambda_c = boto3.client('lambda')\n\n\ndef create_function(name, i"
  },
  {
    "path": "installer/cloudfront.py",
    "chars": 470,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\ncloudfront_c = boto3.client('cloudfront')\n\n\ndef list_distributi"
  },
  {
    "path": "installer/elb.py",
    "chars": 264,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\n\nelb_c = boto3.client('elb')\n\ndef list_elbs():\n    elbs = elb_c"
  },
  {
    "path": "installer/iam.py",
    "chars": 3908,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\nimport json\n\niam_c = boto3.client('iam')\niam_r = boto3.resource"
  },
  {
    "path": "installer/iam_policy_template.json",
    "chars": 1584,
    "preview": "{\n    \"Version\": \"2012-10-17\",\n    \"Statement\": [\n        {\n            \"Sid\": \"lambdalogs\",\n            \"Effect\": \"Allo"
  },
  {
    "path": "installer/route53.py",
    "chars": 526,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\n\nroute53_c = boto3.client('route53')\n\n\ndef list_zones():\n    el"
  },
  {
    "path": "installer/s3.py",
    "chars": 1177,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\nimport string\n\ns3_c = boto3.client('s3')\ns3_r = boto3.resource("
  },
  {
    "path": "installer/sns.py",
    "chars": 550,
    "preview": "import boto3\nfrom botocore.exceptions import ClientError\n\n\ndef get_or_create_topic(email):\n    topicname = \"letsencrypt-"
  },
  {
    "path": "lambda_function.py",
    "chars": 23272,
    "preview": "from __future__ import print_function\nimport logging\nimport datetime\nfrom time import strftime, gmtime, sleep\nfrom dateu"
  },
  {
    "path": "simple_acme.py",
    "chars": 12831,
    "preview": "import base64\nimport binascii\nimport config as cfg\nimport copy\nimport hashlib\nimport json\nimport logging\nimport os\nimpor"
  },
  {
    "path": "wizard.py",
    "chars": 21643,
    "preview": "#!/usr/bin/env python\n\"\"\"Lambda Lets-Encrypt Configuration/Setup Tool\n\nThis is a wizard that will help you configure the"
  }
]

About this extraction

This page contains the full source code of the ubergeek42/lambda-letsencrypt GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 18 files (92.2 KB), approximately 22.1k tokens, and a symbol index with 141 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!