You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,13 @@
1
1
# Changelog
2
2
3
+
## [v1.0.0] - 2018-05-30
4
+
5
+
### Changed:
6
+
-**[lib]** ACME v2 Support.
7
+
-**[dnsprovider]** Renamed `/providers/dns/googlecloud` to `/providers/dns/gcloud`.
8
+
-**[dnsprovider]** Modified Google Cloud provider `gcloud.NewDNSProviderServiceAccount` function to extract the project id directly from the service account file.
9
+
-**[dnsprovider]** Made errors more verbose for the Cloudflare provider.
- Obtain certificates, both from scratch or with an existing CSR
@@ -55,33 +66,9 @@ Please keep in mind that CLI switches and APIs are still subject to change.
55
66
56
67
When using the standard `--path` option, all certificates and account configurations are saved to a folder *.lego*in the current working directory.
57
68
58
-
#### Sudo
59
-
The CLI does not require root permissions but needs to bind to port 80 and 443 for certain challenges.
60
-
To run the CLI without sudo, you have four options:
61
-
62
-
- Use setcap 'cap_net_bind_service=+ep' /path/to/program
63
-
- Pass the `--http` or/and the `--tls` option and specify a custom port to bind to. In this case you have to forward port 80/443 to these custom ports (see [Port Usage](#port-usage)).
64
-
- Pass the `--webroot` option and specify the path to your webroot folder. In this case the challenge will be written in a file in `.well-known/acme-challenge/` inside your webroot.
65
-
- Pass the `--dns` option and specify a DNS provider.
66
-
67
-
#### Port Usage
68
-
By default lego assumes it is able to bind to ports 80 and 443 to solve challenges.
69
-
If this is not possible in your environment, you can use the `--http` and `--tls` options to instruct
70
-
lego to listen on that interface:port for any incoming challenges.
71
-
72
-
If you are using this option, make sure you proxy all of the following traffic to these ports.
73
-
74
-
HTTP Port:
75
-
- All plaintext HTTP requests to port 80 which begin with a request path of `/.well-known/acme-challenge/` for the HTTP challenge.
76
-
77
-
TLS Port:
78
-
- All TLS handshakes on port 443 for the TLS-SNI challenge.
79
-
80
-
This traffic redirection is only needed as long as lego solves challenges. As soon as you have received your certificates you can deactivate the forwarding.
81
-
82
-
#### Usage
69
+
## Usage
83
70
84
-
```
71
+
```text
85
72
NAME:
86
73
lego - Let's Encrypt client written in Go
87
74
@@ -119,56 +106,84 @@ GLOBAL OPTIONS:
119
106
--version, -v print the version
120
107
```
121
108
122
-
##### CLI Example
109
+
### Sudo
110
+
111
+
The CLI does not require root permissions but needs to bind to port 80 and 443 for certain challenges.
112
+
To run the CLI without sudo, you have four options:
113
+
114
+
- Use setcap 'cap_net_bind_service=+ep' /path/to/program
115
+
- Pass the `--http` or/and the `--tls` option and specify a custom port to bind to. In this case you have to forward port 80/443 to these custom ports (see [Port Usage](#port-usage)).
116
+
- Pass the `--webroot` option and specify the path to your webroot folder. In this case the challenge will be written in a file in `.well-known/acme-challenge/` inside your webroot.
117
+
- Pass the `--dns` option and specify a DNS provider.
118
+
119
+
### Port Usage
120
+
121
+
By default lego assumes it is able to bind to ports 80 and 443 to solve challenges.
122
+
If this is not possible in your environment, you can use the `--http` and `--tls` options to instruct
123
+
lego to listen on that interface:port for any incoming challenges.
124
+
125
+
If you are using this option, make sure you proxy all of the following traffic to these ports.
126
+
127
+
HTTP Port:
128
+
129
+
- All plaintext HTTP requests to port 80 which begin with a request path of `/.well-known/acme-challenge/` for the HTTP challenge.
130
+
131
+
TLS Port:
132
+
133
+
- All TLS handshakes on port 443 for the TLS-SNI challenge.
134
+
135
+
This traffic redirection is only needed as long as lego solves challenges. As soon as you have received your certificates you can deactivate the forwarding.
136
+
137
+
### CLI Example
123
138
124
139
Assumes the `lego` binary has permission to bind to ports 80 and 443. You can get a pre-built binary from the [releases](https://github.com/xenolf/lego/releases) page.
125
140
If your environment does not allow you to bind to these ports, please read [Port Usage](#port-usage).
(lego will infer the domains to be validated based on the contents of the CSR, so make sure the CSR's Common Name and optional SubjectAltNames are set correctly.)
162
177
163
178
lego defaults to communicating with the production Let's Encrypt ACME server. If you'd like to test something without issuing real certificates, consider using the staging endpoint instead:
lego introduced support forACME v2in [v1.0.0](https://github.com/xenolf/lego/releases/tag/v1.0.0), if you still need to utilize ACME v1, you can do so by using the [v0.5.0](https://github.com/xenolf/lego/releases/tag/v0.5.0) version.
0 commit comments