Let's Encrypt provide free SSL certificates for HTTPS. It's easy to get a Let's Encrypt certificate working on PythonAnywhere. Here's how:
- Tip: free sites at yourusername.pythonanywhere.com already have HTTPS, you don't need your own certificate for them.
Make sure you've enabled the PythonAnywhere API
The first step to do that is to make sure you have an API token set up for your account; go to the "Account" page and then click the "API token" tab. If you see this:
...then you're all set. If, however, you see this:
...then you need to click the button to generate a key.
Install the PythonAnywhere helper scripts
Start a new Bash console (old ones won't have API access) and run this command to install the PythonAnywhere helper scripts:
pip3.6 install --user --upgrade pythonanywhere
(If you're on our "classic" image and don't have Python 3.6 available, you can use pip3.5 instead.)
We use a package called "dehydrated" to get our Let's Encrypt certificate. To install it, run the following in the Bash console:
git clone https://github.com/lukas2511/dehydrated.git ~/dehydrated
Now we need some directories to store our keys, certificates and associated files:
mkdir -p ~/letsencrypt/wellknown cd ~/letsencrypt
(Don't forget the
cd command -- you'll get problems later if you do.)
Set up static file mappings
You'll need your PythonAnywhere site to be able to serve static
files from the
wellknown directory you just created. Head over to web app tab and set up a new
mapping (replacing "YOURUSERNAME" with your actual username):
- Static URL:
- Static Path:
The result should look like this (with a different username in the second column):
If you're using our password-protection feature for your web app, you'll also need to switch that off for the duration of this procedure; you can turn it on again once you've got the certificate.
Next, reload your web app using the button at the top of the page.
Now we'll need to create a simple config file. Go back to the Bash console, and create it like this (replacing "YOURUSERNAME" with your actual username):
echo WELLKNOWN=/home/YOURUSERNAME/letsencrypt/wellknown > ~/letsencrypt/config
Next, if this is the first time you've ever created a Let's Encrypt certificate from PythonAnywhere, you need to register with them by running this command:
~/dehydrated/dehydrated --register --accept-terms
Generate the certificate
Now we need to actually request a certificate (replace "www.yourdomain.com" with the actual hostname of your website as it's specified on the "Web" page):
~/dehydrated/dehydrated --config ~/letsencrypt/config --cron --domain www.yourdomain.com --out ~/letsencrypt --challenge http-01
If you get a warning saying something like this:
To use dehydrated with this certificate authority you have to agree to their terms of service which you can find here: https://letsencrypt.org/documents/LE-SA-v1.1.1-August-1-2016.pdf To accept these terms of service run `/home/username/dehydrated/dehydrated --register --accept-terms`.
...then it's probably because you haven't registered -- you need to run the version of the command above (with the "--register" and "--accept-terms" flags), and then run the dehydrated command to request the certificate again.
If this is successful, you will see something like this:
# INFO: Using main config file /home/YOURUSERNAME/letsencrypt/config # Processing www.yourdomain.com # + Checking domain name(s) of existing cert... unchanged. # + Checking expire date of existing cert... # + Valid till Nov 3 13:48:00 2016 GMT (Less than 30 days). Renewing! # + Signing domains... # + Generating private key... # + Generating signing request... # + Requesting challenge for www.yourdomain.com... # + Responding to challenge for www.yourdomain.com... # + Challenge is valid! # + Requesting certificate... # + Checking certificate... # + Done! # + Creating fullchain.pem... # + Done!
You'll now have a directory named
letsencrypt directory and your certificate and key will be in there.
/home/YOURUSERNAME/letsencryptdirectory safe. It contains the information necessary for you to renew your certs.
Install the certificate
To install the certificate, just run the following PythonAnywhere helper script (replacing www.yourdomain.com with your actual domain name):
It should print out something like this:
< Setting up SSL for www.yourdomain.com via API > \ ~<:>>>>>>>>> < Reloading www.yourdomain.com via API > \ ~<:>>>>>>>>> _________________________________________________________________ / \ | That's all set up now :-) Your new certificate will expire | | on 12 November 2018, so shortly before then you should | | renew it (see https://help.pythonanywhere.com/pages/LetsEncrypt/) | | and install the new certificate. | \ / ----------------------------------------------------------------- \ ~<:>>>>>>>>>
If you get any errors, just email us at firstname.lastname@example.org.
You're all set! However, when your certificate expires (you can see that the script told you when that will happen) you'll need to renew it.
Tip: If you followed these instructions originally before mid-August 2018, and have just come back here to renew the certificate, you will need to go through the first two sections ("Make sure you've enabled the PythonAnywhere API" and "Install the PythonAnywhere helper scripts") before running these commands.
To renew your certificate, assuming you've left the static file mapping in
place and still have your
letsencrypt.sh directories, you
just need to re-run:
cd ~/letsencrypt ~/dehydrated/dehydrated --cron --domain www.yourdomain.com --out . --challenge http-01
and then run the certificate installation script again:
Checking expiration date
Forgot when your certificate will expire?
Assuming your files are in the default directories, you can run this command:
openssl x509 -enddate -noout -in ~/letsencrypt/www.yourdomain.com/cert.pem
and if you have multiple domains, you can create a bash script like this:
echo www.domain1.com expires $(openssl x509 -enddate -noout -in ~/letsencrypt/www.domain1.com/cert.pem) echo www.domain2.com expires $(openssl x509 -enddate -noout -in ~/letsencrypt/www.domain2.com/cert.pem) echo www.domain3.com expires $(openssl x509 -enddate -noout -in ~/letsencrypt/www.domain3.com/cert.pem)
which you can run with