step-ca
step-ca
step-ca
in a Docker containerstep-ca
step-ca
step-ca
in a Docker containerstep certificate needs-renewal
step certificate needs-renewal -- Check if a certificate needs to be renewed
step certificate needs-renewal <cert-file or hostname>
[--expires-in=<percent|duration>] [--bundle] [--verbose]
[--roots=<root-bundle>] [--servername=<servername>]
step certificate needs-renewal returns '0' if the certificate needs to be renewed based on its remaining lifetime. Returns '1' the certificate is within its validity lifetime bounds and does not need to be renewed. By default, a certificate "needs renewal" when it has passed 66% (default threshold) of its allotted lifetime. This threshold can be adjusted using the '--expires-in' flag. Additionally, by default only the leaf certificate will be checked by the command; to check each certificate in the chain use the '--bundle' flag.
cert-file or hostname
The path to a certificate OR a hostname with protocol prefix.
--expires-in=percent|duration
Check if the certificate expires within the given time window
using percent|duration
. If using percent
, the input must be followed by a "%"
character. If using duration
, the input must be a sequence of decimal numbers,
each with optional fraction and a unit suffix, such as "300ms", "-1.5h" or "2h45m".
Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h".
--roots=roots
Root certificate(s) that will be used to verify the
authenticity of the remote server.
roots
is a case-sensitive string and may be one of:
file: Relative or full path to a file. All certificates in the file will be used for path validation.
list of files: Comma-separated list of relative or full file paths. Every PEM encoded certificate from each file will be used for path validation.
directory: Relative or full path to a directory. Every PEM encoded certificate from each file in the directory will be used for path validation.
--bundle Check all certificates in the order in which they appear in the bundle.
--verbose, -v Print human readable affirmation if certificate requires renewal.
--servername=value
TLS Server Name Indication that should be sent to request a specific certificate from the server.
This command returns '0' if the X509 certificate needs renewal, '1' if the X509 certificate does not need renewal, '2' if the X509 certificate file does not exist, and '255' for any other error.
Check if the leaf certificate in the file certificate.crt has passed 66 percent of its validity period:
$ step certificate needs-renewal ./certificate.crt
Check if any certificate in the bundle has passed 66 percent of its validity period:
$ step certificate needs-renewal ./certificate.crt --bundle
Check if the leaf certificate provided by smallstep.com has passed 66 percent of its vlaidity period:
$ step certificate needs-renewal https://smallstep.com
Check if any certificate in the bundle for smallstep.com has has passed 66 percent of its validity period:
$ step certificate needs-renewal https://smallstep.com --bundle
Check if certificate.crt expires within 1 hour 15 minutes from now:
$ step certificate needs-renewal ./certificate.crt --expires-in 1h15m
Check if certificate for smallstep.com is expired or not:
$ step certificate needs-renewal https://smallstep.com --expires-in 0s
Check if certificate has passed 75 percent of its validity period:
$ step certificate needs-renewal ./certificate.crt --expires-in 75%
Check a remote certificate using a custom root certificate:
$ step certificate needs-renewal https://smallstep.com --roots ./root-ca.crt
Check a remote certificate using a custom list of root certificates:
$ step certificate needs-renewal https://smallstep.com \
--roots "./root-ca.crt,./root-ca2.crt,/root-ca3.crt"
Check a remote certificate using a custom directory of root certificates:
$ step certificate needs-renewal https://smallstep.com \
--roots "./path/to/root/certificates/"
Unsubscribe anytime. See our privacy policy.
© 2023 Smallstep Labs, Inc. All rights reserved.