CloudCannon Documentation

Let’s Encrypt is a new Certificate Authority: It’s free, automated, and open. This document will detail the steps to generating a free SSL Certificate for use on CloudCannon. Let’s Encrypt has many clients, for this example certbot will be used.

These notes are for installation on a Mac / *nix system and will not work on a standard Windows system. Sorry.

Installing certbot

If you have previously installed an older version of certbot or the letsencryptclient, run rm -rf ~/.local/share/letsencrypt to clear conflicting data.

To install certbot on your local system, enter the following commands in your terminal.

cd /tmp
git clone
cd certbot
./certbot-auto --no-self-upgrade --debug renew --dry-run

Running certbot

Running certbot will generate SSL Certificates for the domains we specify.

./certbot-auto --no-self-upgrade --debug certonly --manual

Choosing the domain name

Once the domain has been specified we must verify that we have access to that domain. Below is example output shown after the prompt:

Make sure your web server displays the following content at before continuing:


If you don't have HTTP server configured, you can run the following
command on the target server (as root):

mkdir -p /tmp/certbot/public_html/.well-known/acme-challenge
cd /tmp/certbot/public_html
printf "%s" 34sS6lKqRtmEH6nccSVNF8ifykpAAueVhHz0yvheY0o.3-40nFYEAf5ItpgZuuISWUhg4fNm-vVW3T0RXmdzNkU > .well-known/acme-challenge/34sS6lKqRtmEH6nccSVNF8ifykpAAueVhHz0yvheY0o
# run only once per server:
$(command -v python2 || command -v python2.7 || command -v python2.6) -c \
"import BaseHTTPServer, SimpleHTTPServer; \
s = BaseHTTPServer.HTTPServer(('', 80), SimpleHTTPServer.SimpleHTTPRequestHandler); \
Press ENTER to continue

Before pressing ENTER, you must add a letsencrypt.txt file to your site with the following contents. Make sure you add your unique values from the terminal output:

layout: null
permalink: /.well-known/acme-challenge/34sS6lKqRtmEH6nccSVNF8ifykpAAueVhHz0yvheY0o/index.html

Save the file and wait for the site to compile and update. Test the URL in a new browser window to ensure the URL returns only the required key string.

ie: visit http://DOMAIN_NAME/.well-known/acme-challenge/34sS6lKqRtmEH6nccSVNF8ifykpAAueVhHz0yvheY0o/index.html

Once you have confirmed that the correct output is returned, return to your terminal console and press ENTER.

If everything went smoothly, you should see output similar to this:

 - Congratulations! Your certificate and chain have been saved at
   Your cert will expire on 2016-09-06. To obtain a new or tweaked
   version of this certificate in the future, simply run certbot-auto
   again. To non-interactively renew *all* of your ceriticates, run
   "certbot-auto renew"
 - If you like Certbot, please consider supporting our work by:

   Donating to ISRG / Let's Encrypt:
   Donating to EFF:          

If you received errors, please ensure the output of your URL (above) is correct, before running the certbot command again and updating the letsencrypt.txt file again with the new values.

This completes the use of certbot with a free cert for our domain. All parts of the cert are available at /etc/letsencrypt/live/DOMAIN_NAME/.

Converting the Private Key to RSA

Before uploading to CloudCannon we must convert the private key into the correct format. This is done using the following command:

sudo openssl rsa -inform pem -in /etc/letsencrypt/live/DOMAIN_NAME/privkey.pem -outform pem

This command will output the key in RSA format, use this output when installing the cert onto CloudCannon.

Installing onto CloudCannon

To install the newly generated SSL Certificate to CloudCannon:

  • Follow the instructions for Adding a new SSL Certificate
  • Copy /etc/letsencrypt/live/DOMAIN_NAME/cert.pem to the public key field
  • Copy the RSA format of the private key to the private key field
  • Copy /etc/letsencrypt/live/DOMAIN_NAME/chain.pem to chain
  • Save the added information
  • Click the “Attach” button to attach the certificate to the site

It can take a few minutes before the redirect to HTTPS takes effect.