1
0
Fork 0
A memory-based strategy for node-letsencrypt for setting, retrieving, and clearing ACME challenges issued by the ACME server
Datei suchen
AJ ONeal 7ad1ffdfdc fix typos 2019-05-16 01:30:12 -06:00
.gitignore Initial commit 2016-08-09 21:25:24 -06:00
LICENSE v2.0.1 2019-05-16 01:17:53 -06:00
README.md fix typos 2019-05-16 01:30:12 -06:00
index.js v2.1.1 2019-05-16 01:26:21 -06:00
package.json fix typos 2019-05-16 01:30:12 -06:00
test.js v2.0.0 2016-08-09 23:32:39 -04:00

README.md

| letsencrypt (library) | letsencrypt-cli | letsencrypt-express | letsencrypt-koa | letsencrypt-hapi |

le-challenge-memory

An in-memory strategy for node-letsencrypt for setting, retrieving, and clearing ACME challenges issued by the ACME server

  • Safe to use on ephemeral services (i.e. AWS)

Install

npm install --save le-challenge-standalone@2.x

Usage

var leChallenge = require('le-challenge-standalone').create({
, debug: false
});

var LE = require('greenlock');

LE.create({
  server: LE.stagingServerUrl
, challenge: leChallenge
});

NOTE: If you request a certificate with 6 domains listed, it will require 6 individual challenges.

Exposed Methods

For ACME Challenge:

  • set(opts, domain, key, val, done)
  • get(defaults, domain, key, done)
  • remove(defaults, domain, key, done)

Legal & Rules of the Road

Greenlock™ and Bluecrypt™ are trademarks of AJ ONeal

The rule of thumb is "attribute, but don't confuse". For example:

Built with Greenlock (a Root project).

Please contact us if you have any questions in regards to our trademark, attribution, and/or visible source policies. We want to build great software and a great community.

Greenlock™ | MPL-2.0 | Terms of Use | Privacy Policy