A framework for building letsencrypt clients, forked from letiny.
Go to file
AJ ONeal 0775bf9000 pass known urls 2015-12-15 15:12:02 +00:00
lib pass known urls 2015-12-15 15:12:02 +00:00
test added tests 2015-12-13 17:50:58 +01:00
History.md added fork, privateKey and accountKey options 2015-12-14 20:54:01 +01:00
LICENSE.txt initial commit 2015-12-13 17:50:04 +01:00
README.md initial commit 2015-12-13 17:50:04 +01:00
index.js initial commit 2015-12-13 17:50:04 +01:00
package.json added fork, privateKey and accountKey options 2015-12-14 20:54:01 +01:00

README.md

letiny

Tiny acme client library and CLI to obtain ssl certificates (without using external commands like openssl).

Usage:

npm install letiny

Using the "webroot" option

This will create a file in /var/www/example.com/.well-known/acme-challenge/ to verify the domain.

require('letiny').getCert({
  email:'me@example.com',
  domains:['example.com', 'www.example.com'],
  webroot:'/var/www/example.com',
  certFile:'./cert.pem',
  keyFile:'./key.pem',
  caFile:'./ca.pem',
  agreeTerms:true
}, function(err, cert, key, cacert) {
  console.log(err || cert+'\n'+key+'\n'+cacert);
});

Using the "challenge" option

This allows you to provide the challenge data on your own, so you can obtain certificates on-the-fly within your software.

require('letiny').getCert({
  email:'me@example.com',
  domains:'example.com',
  challenge:function(domain, path, data, done) {
    // make http://+domain+path serving "data"
    done();
  },
  certFile:'./cert.pem',
  keyFile:'./key.pem',
  caFile:'./ca.pem',
  agreeTerms:true
}, function(err, cert, key, cacert) {
  console.log(err || cert+'\n'+key+'\n'+cacert);
});

Options

Required:

  • email: Your email adress
  • domains: Comma seperated string or array
  • agreeTerms: You need to agree the terms
  • webroot (string) or challenge (function)

Optional:

  • certFile: Path to save certificate
  • keyFile: Path to save private key
  • caFile: Path to save issuer certificate
  • pfxFile: Path to save PKCS#12 certificate
  • pfxPassword: Password for PKCS#12 certificate
  • aes: (boolean), use AES instead of 3DES for PKCS#12 certificate
  • newReg: URL, use https://acme-staging.api.letsencrypt.org/acme/new-reg for testing

Command line interface

sudo npm install letiny -g

Options:

-h, --help               output usage information
-e, --email <email>      your email address
-w, --webroot <path>     path for webroot verification
-m, --manual             use manual verification
-d, --domains <domains>  domains (comma seperated)
-c, --cert <path>        path to save your certificate (cert.pem)
-k, --key <path>         path to save your private key (privkey.pem)
-i, --ca <path>          path to save issuer certificate (cacert.pem)
--pfx <path>             path to save PKCS#12 certificate (optional)
--password <password>    password for PKCS#12 certificate (optional)
--aes                    use AES instead of 3DES for PKCS#12
--agree                  agree terms of the ACME CA (required)
--newreg <URL>           optional AMCE server newReg URL
--debug                  print debug information

When --pfx is used without --cert, --key and --ca no .pem files will be created.

Examples:

letiny -e me@example.com -w /var/www/example.com -d example.com --agree
letiny -e me@example.com -m -d example.com -c cert.pem -k key.pem -i ca.pem --agree
letiny -e me@example.com -m -d example.com,www.example.com --agree
letiny -e me@example.com -m -d example.com --pfx cert.pfx --password secret --agree
letiny --email me@example.com --webroot ./ --domains example.com --agree

Licence

MPL 2.0