mirror of
https://github.com/go-acme/lego
synced 2026-03-14 14:35:48 +01:00
4.9 KiB
4.9 KiB
Changelog
0.3.0 - 2016-03-19
Added:
- CLI: The
--dnsswitch. To include the DNS challenge for consideration. When using this switch, all other solvers are disabled. Supported are the following solvers: cloudflare, digitalocean, dnsimple, dyn, gandi, googlecloud, namecheap, route53, rfc2136 and manual. - CLI: The
--accept-tosswitch. Indicates your acceptance of the Let's Encrypt terms of service without prompting you. - CLI: The
--webrootswitch. The HTTP-01 challenge may now be completed by dropping a file into a webroot. When using this switch, all other solvers are disabled. - CLI: The
--key-typeswitch. This replaces the--rsa-key-sizeswitch and supports the following key types: EC256, EC384, RSA2048, RSA4096 and RSA8192. - CLI: The
--dnshelpswitch. This displays a more in-depth help topic for DNS solvers. - CLI: The
--no-bundlesub switch for therunandrenewcommands. When this switch is set, the CLI will not bundle the issuer certificate with your certificate. - lib: A new type for challenge identifiers
Challenge - lib: A new interface for custom challenge providers
acme.ChallengeProvider - lib: A new interface for DNS-01 providers to allow for custom timeouts for the validation function
acme.ChallengeProviderTimeout - lib: SetChallengeProvider function. Pass a challenge identifier and a Provider to replace the default behaviour of a challenge.
- lib: The DNS-01 challenge has been implemented with modular solvers using the
ChallengeProviderinterface. Included solvers are: cloudflare, digitalocean, dnsimple, gandi, namecheap, route53, rfc2136 and manual. - lib: The
acme.KeyTypetype was added and is used for the configuration of crypto parameters for RSA and EC keys. Valid KeyTypes are: EC256, EC384, RSA2048, RSA4096 and RSA8192.
Changed
- lib: ExcludeChallenges now expects to be passed an array of
Challengetypes. - lib: HTTP-01 now supports custom solvers using the
ChallengeProviderinterface. - lib: TLS-SNI-01 now supports custom solvers using the
ChallengeProviderinterface. - lib: The
GetPrivateKeyfunction in theacme.Userinterface is now expected to return acrypto.PrivateKeyinstead of anrsa.PrivateKeyfor EC compat. - lib: The
acme.NewClientfunction now expects anacme.KeyTypeinstead of the keyBits parameter.
Removed
- CLI: The
rsa-key-sizeswitch was removed in favor ofkey-typeto support EC keys.
Fixed
- lib: Fixed a race condition in HTTP-01
- lib: Fixed an issue where status codes on ACME challenge responses could lead to no action being taken.
- lib: Fixed a regression when calling the Renew function with a SAN certificate.
0.2.0 - 2016-01-09
Added:
- CLI: The
--excludeor-xswitch. To exclude a challenge from being solved. - CLI: The
--httpswitch. To set the listen address and port of HTTP based challenges. Supportshost:portand:portfor any interface. - CLI: The
--tlsswitch. To set the listen address and port of TLS based challenges. Supportshost:portand:portfor any interface. - CLI: The
--reuse-keyswitch for therenewoperation. This lets you reuse an existing private key for renewals. - lib: ExcludeChallenges function. Pass an array of challenge identifiers to exclude them from solving.
- lib: SetHTTPAddress function. Pass a port to set the listen port for HTTP based challenges.
- lib: SetTLSAddress function. Pass a port to set the listen port of TLS based challenges.
- lib: acme.UserAgent variable. Use this to customize the user agent on all requests sent by lego.
Changed:
- lib: NewClient does no longer accept the optPort parameter
- lib: ObtainCertificate now returns a SAN certificate if you pass more then one domain.
- lib: GetOCSPForCert now returns the parsed OCSP response instead of just the status.
- lib: ObtainCertificate has a new parameter
privKey crypto.PrivateKeywhich lets you reuse an existing private key for new certificates. - lib: RenewCertificate now expects the PrivateKey property of the CertificateResource to be set only if you want to reuse the key.
Removed:
- CLI: The
--portswitch was removed. - lib: RenewCertificate does no longer offer to also revoke your old certificate.
Fixed:
- CLI: Fix logic using the
--daysparameter for renew
0.1.1 - 2015-12-18
Added:
- CLI: Added a way to automate renewal through a cronjob using the --days parameter to renew
Changed:
- lib: Improved log output on challenge failures.
Fixed:
- CLI: The short parameter for domains would not get accepted
- CLI: The cli did not return proper exit codes on error library errors.
- lib: RenewCertificate did not properly renew SAN certificates.
Security
- lib: Fix possible DOS on GetOCSPForCert
0.1.0 - 2015-12-03
- Initial release