Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure. Learn more →
Top 22 Go Certificate Projects
-
Gravitational Teleport
The easiest, and most secure way to access and protect all of your infrastructure.
Teleport (YC S15) | Backend and Fullstack Engineers | US, Toronto, London, Remote OK | https://goteleport.com
Do you enjoy building security and deployment tools for other engineers? Join us to hack on https://github.com/gravitational/teleport. Most of our code is Go, we have very little technical debt, our codebase is clean and small.
If you are a backend or fullstack engineer, we expect you to be comfortable with the following:
* Go for backend and Go+TypeScript for fullstack engineers.
-
InfluxDB
InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
-
Applying the Deployment, Service, and Ingress went off without a hitch. cert-manager minted a new certificate and External DNS set the DNS target for me. All that was left was to make sure it worked.
-
Project mention: I no longer have an old-school cert on my HTTPS site | news.ycombinator.com | 2025-05-23
I don't understand the tone of aggression against ACME and their plethora of clients.
I know it isn't a skill issue because of who the author is. So I can only imagine it is some sort of personal opinion that they dislike ACME as a concept or the tooling around ACME in general.
We've been using LE for a while (since 2019 I think) for handful of sites, and the best nonsense client _for us_ was https://github.com/do-know/Crypt-LE/releases.
Then this year we've done another piece of work this time against the Sectigo ACME server and le64 wasn't quite good enough.
So we ended up trying:-
- https://github.com/certbot/certbot on GitHub Actions, it was fine but didn't quite like the locked down environment
- https://github.com/go-acme/lego huge binary, cli was interestingly designed and the maintainer was quite rude when raising an issue
- https://github.com/rmbolger/Posh-ACME our favourite, but we ended up going with certbot on GHA once we fixed the weird issues around permissions
-
cli
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc. (by smallstep)
Project mention: Setting up a trusted, self-signed SSL/TLS certificate authority in Linux | news.ycombinator.com | 2025-02-17I previously used openssl-based scripts to generate certificates to use for local development or applications on a private network. I have since moved to using the step CLI [1].
OpenSSL is powerful, but it's hard to figure out how to use correctly. Each command seems cryptic no matter how many times I use it.
The step CLI is a lot simpler, even though it has a few quirks: generating PKCS1 formatted private keys instead of the newer PKCS7 format, making every leaf certificate eligible to be either a server certificate or a client certificate, and absurdly low default certificate expirations.
1: https://github.com/smallstep/cli
-
-
-
-
Stream
Stream - Scalable APIs for Chat, Feeds, Moderation, & Video. Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.
-
ssl-proxy
:lock: Simple zero-config SSL reverse proxy with real autogenerated certificates (LetsEncrypt, self-signed, provided)
-
-
labca
A private Certificate Authority for internal (lab) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).
-
-
-
nico
A HTTP3 web server for reverse proxy and single page application, automatically apply for ssl certificate, Zero-Configuration. (by txthinking)
-
-
-
-
ca-injector
Painlessly use off-the-shelf images (and your own) in your k8s cluster, with custom root CAs.
-
-
chkcerts
A Go program to display certificate chains simply and quickly with an easy to remember syntax
-
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Go Certificate discussion
Go Certificate related posts
-
Google says "not a security issue", quickly fixes without attribution
-
Kubernetes Ingress Controllers: Routing Traffic Made Simple
-
Elastic Cloud on Kubernetes (ECK) with custom domain name
-
Firewall rules: not as secure as you think
-
Eclipse Che on AWS with EFS
-
Cert-Manager
-
Importing kubernetes manifests with terraform for cert-manager
-
A note from our sponsor - Stream
getstream.io | 8 Jul 2025
Index
What are some of the best open-source Certificate projects in Go? This list will help you:
# | Project | Stars |
---|---|---|
1 | Gravitational Teleport | 18,723 |
2 | cert-manager | 12,926 |
3 | lego | 8,700 |
4 | cli | 3,917 |
5 | certstrap | 2,366 |
6 | acmetool | 2,073 |
7 | certigo | 978 |
8 | ssl-proxy | 755 |
9 | cashier | 721 |
10 | labca | 442 |
11 | sharkey | 402 |
12 | gke-managed-certs | 246 |
13 | nico | 132 |
14 | certmaster | 84 |
15 | crt | 69 |
16 | certify | 45 |
17 | ca-injector | 31 |
18 | sslmgr | 30 |
19 | chkcerts | 27 |
20 | devcert | 12 |
21 | agent | 2 |
22 | check-cert | 0 |