Compare commits

..

27 Commits

Author SHA1 Message Date
803cb4ef2c add missing node-v6-compat 2019-06-15 17:31:01 -06:00
f26b7bd58b v3.3.1: add @root/request as dep 2019-06-15 12:28:25 -06:00
2a383ada48 v3.3.0: include request, cleanup 2019-06-15 11:10:45 -06:00
9e0aedca41 v3.2.1: bugfix new dns-01 tests 2019-06-13 03:16:09 -06:00
fa60eb0149 clean text 2019-06-13 01:43:57 -06:00
649a8532d9 from tabs back to spaces 2019-06-13 01:36:25 -06:00
c473091e0e v3.2.0: support zones(), separate docs 2019-06-13 01:32:52 -06:00
dda7ecb497 v3.1.2: keep same random prefix per test set 2019-06-07 00:48:15 -06:00
ea508c68f4 v3.1.1: perform all sets, then all gets, then all removes 2019-06-07 00:14:10 -06:00
17e409b158 v3.1.0: update docs, default to testing full zones 2019-06-06 23:04:51 -06:00
f2373a09de Update record test, use random prefix
* Test multiple zone records (@, foo, *.foo)
* Use random _acme-challenge-xxxx
2019-06-06 22:48:34 -06:00
e179188bc0 Merge branch 'master' of ssh://git.coolaj86.com:22042/coolaj86/acme-challenge-test.js 2019-06-06 12:18:27 -06:00
1e77bd19c9 add missing dnsAuthorization for get test 2019-06-06 12:17:57 -06:00
6a32bf9e2f make Prettier 2019-06-06 12:16:00 -06:00
844a668f70 make Prettier 2019-06-06 12:15:40 -06:00
595de158ee more http-01 => dns-01 2019-06-06 06:53:05 +00:00
d3f958df98 typo fix http-01 => dns-01 2019-06-06 06:50:24 +00:00
fa912800b4 make Prettier 2019-06-06 06:49:46 +00:00
d2fca0eea7 update docs 2019-06-06 06:20:19 +00:00
3db24ffeb5 update docs 2019-06-06 06:15:51 +00:00
331d370eaf mention ACME.js 2019-06-06 06:11:59 +00:00
2b51651e6f more notes 2019-06-06 06:07:08 +00:00
0d27ad4dd4 add another sample 2019-06-06 05:41:27 +00:00
8ab67b5a23 update package name 2019-06-02 22:11:11 -06:00
f939b2488e rename acme-challenge- => acme-http-01- acme-dns-01- 2019-06-02 22:10:26 -06:00
d30c59d4c7 greenlock-challenge-test => acme-challenge-test, make Prettier 2019-06-02 22:08:29 -06:00
33cf5a35bb doc formatting update 2019-04-15 23:03:16 -06:00
6 changed files with 439 additions and 172 deletions

8
.prettierrc Normal file
View File

@ -0,0 +1,8 @@
{
"bracketSpacing": true,
"printWidth": 80,
"singleQuote": true,
"tabWidth": 2,
"trailingComma": "none",
"useTabs": false
}

118
README.md
View File

@ -1,98 +1,70 @@
# [greenlock-challenge-test](https://git.rootprojects.org/root/greenlock-challenge-test.js.git) | A [Root](https://rootprojects.org) Project
# [acme-challenge-test](https://git.rootprojects.org/root/acme-challenge-test.js.git) | a [Root](https://rootprojects.org) project
The test harness you should use when writing an ACME challenge strategy
for [Greenlock](https://git.coolaj86.com/coolaj86/greenlock-express.js) v2.7+ (and v3).
Test harness for ACME http-01 and dns-01 challenges for Let's Encrypt Free SSL integration.
All implementations MUST pass these tests, which is a very easy thing to do (just `set()`, `get()`, and `remove()`).
This was specificially designed for [ACME.js](https://git.coolaj86.com/coolaj86/acme-v2.js) and [Greenlock.js](https://git.coolaj86.com/coolaj86/greenlock-express.js), but will be generically useful to any ACME module.
The tests account for single-domain certificates (`example.com`) as well as multiple domain certs (SAN / AltName),
wildcards (`*.example.com`), and valid private / localhost certificates. As someone creating a challenge strategy
that's not something you have to take special consideration for - just pass the tests.
> If you are building a plugin, please let us know.
> We may like to co-author and help maintain and promote your module.
## Install
This package has been split in two for the purpose of keeping the documentation clear and concise.
```bash
npm install --save-dev greenlock-challenge-test@3.x
```
## ACME http-01
## Usage
Use this for quick-and-easy, average-joe kind of stuff.
```js
var tester = require('greenlock-challenge-test');
- See <https://git.rootprojects.org/root/acme-http-01-test.js>
//var challenger = require('greenlock-challenge-http').create({});
//var challenger = require('greenlock-challenge-dns').create({});
var challenger = require('./YOUR-CHALLENGE-STRATEGY').create({});
## ACME dns-01
// The dry-run tests can pass on, literally, 'example.com'
// but the integration tests require that you have control over the domain
var domain = 'example.com';
Use this for wildcards, and private and local domains.
tester.test('http-01', domain, challenger).then(function () {
console.info("PASS");
});
```
- See <https://git.rootprojects.org/root/acme-dns-01-test.js>
## Reference Implementations
These are plugins that use the v2.7+ (v3) API, and pass this test harness,
which you should use as a model for any plugins that you create.
* [greenlock-challenge-http](https://git.rootprojects.org/root/greenlock-challenge-http.js)
* [greenlock-challenge-dns](https://git.rootprojects.org/root/greenlock-challenge-dns.js)
- http-01
- [`acme-http-01-cli`](https://git.rootprojects.org/root/acme-http-01-cli.js)
- [`acme-http-01-fs`](https://git.rootprojects.org/root/acme-http-01-fs.js)
- dns-01
- [`acme-dns-01-cli`](https://git.rootprojects.org/root/acme-dns-01-cli.js)
- [`acme-dns-01-digitalocean`](https://git.rootprojects.org/root/acme-dns-01-digitalocean.js)
## Example
You can find other implementations by searching npm for [acme-http-01-](https://www.npmjs.com/search?q=acme-http-01-)
and [acme-dns-01-](https://www.npmjs.com/search?q=acme-dns-01-).
See `example.js` (it works).
## Starter Template
## Overview
Here's a quick pseudo stub-out of what a test-passing plugin object might look like:
Just so you have an idea, this is typically how you'd start passing the tests:
```js
tester.test('http-01', 'example.com', {
set: function (opts) {
var ch = opts.challenge;
// { type: 'http-01' // or 'dns-01'
// , identifier: { type: 'dns', value: 'example.com' }
// , wildcard: false
// , token: 'xxxx'
// , keyAuthorization: 'xxxx.yyyy'
// , dnsHost: '_acme-challenge.example.com'
// , dnsAuthorization: 'zzzz' }
var tester = require('acme-challenge-test');
return API.set(...);
}
, get: function (query) {
var ch = query.challenge;
// { type: 'http-01' // or 'dns-01', 'tls-alpn-01', etc
// , identifier: { type: 'dns', value: 'example.com' }
// // http-01 only
// , token: 'xxxx'
// , url: '...' // for testing and debugging
// // dns-01 only, for testing / dubgging
// , altname: '...'
// , dnsHost: '...'
// , wildcard: false }
// Note: query.identifier.value is different for http-01 than for dns-01
// The dry-run tests can pass on, literally, 'example.com'
// but the integration tests require that you have control over the domain
var domain = 'example.com';
return API.get(...).then(function (secret) {
// http-01
return { keyAuthorization: secret };
// dns-01
//return { dnsAuthorization: secret };
});
}
, remove: function (opts) {
var ch = opts.challenge;
// same options as in `set()` (which are not the same as `get()`
tester
.testRecord('http-01', domain, {
set: function(opts) {
console.log('set opts:', opts);
throw new Error('set not implemented');
},
return API.remove(...);
}
}).then(function () {
console.info("PASS");
});
remove: function(opts) {
console.log('remove opts:', opts);
throw new Error('remove not implemented');
},
get: function(opts) {
console.log('get opts:', opts);
throw new Error('get not implemented');
}
})
.then(function() {
console.info('PASS');
});
```
Note: The `API.get()`, `API.set()`, and `API.remove()` is where you do your magic up to upload a file to the correct
location on an http serever, set DNS records, or add the appropriate data to the database that handles such things.

View File

@ -1,24 +1,26 @@
'use strict';
//var tester = require('greenlock-challenge-test');
//var tester = require('acme-challenge-test');
var tester = require('./');
var type = 'http-01';
var challenger = require('greenlock-challenge-http').create({});
//var type = 'dns-01';
//var challenger = require('greenlock-challenge-dns').create({});
//var type = 'http-01';
//var challenger = require('acme-http-01-cli').create({});
var type = 'dns-01';
var challenger = require('acme-dns-01-cli').create({});
//var challenger = require('./YOUR-CHALLENGE-STRATEGY').create({});
//var type = 'YOUR-TYPE-01';
// The dry-run tests can pass on, literally, 'example.com'
// but the integration tests require that you have control over the domain
var domain = 'example.com';
//var domain = '*.example.com';
var zone = 'example.com';
tester.test(type, domain, challenger).then(function () {
console.info("PASS");
}).catch(function (err) {
console.error("FAIL");
console.error(err);
process.exit(20);
});
tester
.test(type, zone, challenger)
.then(function() {
console.info('ALL PASSED');
})
.catch(function(err) {
console.error('FAIL');
console.error(err);
process.exit(20);
});

409
index.js
View File

@ -1,23 +1,47 @@
'use strict';
/*global Promise*/
var crypto = require('crypto');
module.exports.create = function () {
throw new Error("greenlock-challenge-test is a test fixture for greenlock-challenge-* plugins, not a plugin itself");
if (process.version.match(/^v(\d+)/)[1] > 6) {
console.warn();
console.warn('#########################');
console.warn('# Node v6 Compatibility #');
console.warn('#########################');
console.warn();
console.warn("You're using node " + process.version);
console.warn(
'Please write node-v6 compatible JavaScript (not Babel/ECMAScript) and test with node v6.'
);
console.warn();
console.warn(
'(ACME.js and Greenlock.js are widely deployed in enterprise node v6 environments. The few node v6 bugs in Buffer and Promise are hotfixed by ACME.js in just a few lines of code)'
);
console.warn();
}
require('./lib/node-v6-compat.js');
// Load _after_ node v6 compat
var crypto = require('crypto');
var promisify = require('util').promisify;
var request = require('@root/request');
request = promisify(request);
module.exports.create = function() {
throw new Error(
'acme-challenge-test is a test fixture for acme-challenge-* plugins, not a plugin itself'
);
};
// ignore all of this, it's just to normalize Promise vs node-style callback thunk vs synchronous
function promiseCheckAndCatch(obj, name) {
var promisify = require('util').promisify;
// don't loose this-ness, just in case that's important
var fn = obj[name].bind(obj);
var promiser;
// function signature must match, or an error will be thrown
if (1 === fn.length) {
if (fn.length <= 1) {
// wrap so that synchronous errors are caught (alsa handles synchronous results)
promiser = function (opts) {
return Promise.resolve().then(function () {
promiser = function(opts) {
return Promise.resolve().then(function() {
return fn(opts);
});
};
@ -25,44 +49,142 @@ function promiseCheckAndCatch(obj, name) {
// wrap as a promise
promiser = promisify(fn);
} else {
return Promise.reject(new Error("'challenge." + name + "' should accept either one argument, the options,"
+ " and return a Promise or accept two arguments, the options and a node-style callback thunk"));
throw new Error(
"'challenge." +
name +
"' should accept either one argument, the options," +
' and return a Promise or accept two arguments, the options and a node-style callback thunk'
);
}
function shouldntBeNull(result) {
function shouldntBeUndefined(result) {
if ('undefined' === typeof result) {
throw new Error("'challenge.'" + name + "' should never return `undefined`. Please explicitly return null"
+ " (or fix the place where a value should have been returned but wasn't).");
throw new Error(
"'challenge.'" +
name +
"' should never return `undefined`. Please explicitly `return null`" +
" (or fix the place where a value should have been returned but wasn't)."
);
}
return result;
}
return function (opts) {
return promiser(opts).then(shouldntBeNull);
return function(opts) {
return promiser(opts).then(shouldntBeUndefined);
};
}
function mapAsync(els, doer) {
els = els.slice(0);
var results = [];
function next() {
var el = els.shift();
if (!el) {
return results;
}
return doer(el).then(function(result) {
results.push(result);
return next();
});
}
return next();
}
function newZoneRegExp(zonename) {
// (^|\.)example\.com$
// which matches:
// foo.example.com
// example.com
// but not:
// fooexample.com
return new RegExp('(^|\\.)' + zonename.replace(/\./g, '\\.') + '$');
}
function pluckZone(zones, dnsHost) {
return zones
.filter(function(zonename) {
// the only character that needs to be escaped for regex
// and is allowed in a domain name is '.'
return newZoneRegExp(zonename).test(dnsHost);
})
.sort(function(a, b) {
// longest match first
return b.length - a.length;
})[0];
}
// Here's the meat, where the tests are happening:
function run(challenger, opts) {
function testEach(type, domains, challenger) {
var chr = wrapChallenger(type, challenger);
// We want the same rnd for all domains so that we catch errors like removing
// the apex (bare) domain TXT record to when creating the wildcard record
var rnd = crypto.randomBytes(2).toString('hex');
console.info("Testing each of '%s'", domains.join(', '));
//
// Zones
//
// Get ALL zones for all records on the certificate
//
return chr
.init({ request: request })
.then(function() {
return chr.zones({ request: request, dnsHosts: domains });
})
.then(function(zones) {
var all = domains.map(function(domain) {
var zone = pluckZone(zones, domain);
return {
domain: domain,
challenge: fakeChallenge(type, zone, domain, rnd),
request: request
};
});
// resolving for the sake of same indentation / scope
return Promise.resolve()
.then(function() {
return mapAsync(all, function(opts) {
return set(chr, opts);
});
})
.then(function() {
return mapAsync(all, function(opts) {
return check(chr, opts);
});
})
.then(function() {
return mapAsync(all, function(opts) {
return remove(chr, opts).then(function() {
console.info("PASS '%s'", opts.domain);
});
});
})
.then(function() {
console.info();
console.info('It looks like the soft tests all passed.');
console.log('It is highly likely that your plugin is correct.');
console.log(
'Now go test with Greenlock.js and/or ACME.js to be sure.'
);
console.info();
});
});
}
function set(chr, opts) {
var ch = opts.challenge;
if ('http-01' === ch.type && ch.wildname) {
throw new Error("http-01 cannot be used for wildcard domains");
throw new Error('http-01 cannot be used for wildcard domains');
}
var set = promiseCheckAndCatch(challenger, 'set');
if ('function' !== typeof challenger.get) {
throw new Error("'challenge.get' should be implemented for the sake of testing."
+ " It should be implemented as the internal method for fetching the challenge"
+ " (i.e. reading from a database, file system or API, not return internal),"
+ " not the external check (the http call, dns query, etc), which will already be done as part of this test.");
}
var get = promiseCheckAndCatch(challenger, 'get');
var remove = promiseCheckAndCatch(challenger, 'remove');
// The first time we just check it against itself
// this will cause the prompt to appear
return set(opts).then(function () {
// this will cause the final completion message to appear
//
// Set
//
// Add (not replace) a TXT for the domain
//
return chr.set(opts).then(function() {
// _test is used by the manual cli reference implementations
var query = { type: ch.type, /*debug*/ status: ch.status, _test: true };
if ('http-01' === ch.type) {
@ -77,18 +199,45 @@ function run(challenger, opts) {
// there should only be two possible TXT records per challenge domain:
// one for the bare domain, and the other if and only if there's a wildcard
query.wildcard = ch.wildcard;
query.dnsAuthorization = ch.dnsAuthorization;
query.dnsZone = ch.dnsZone;
query.dnsPrefix = ch.dnsPrefix;
} else {
query = JSON.parse(JSON.stringify(ch));
query.comment = "unknown challenge type, supplying everything";
query.comment = 'unknown challenge type, supplying everything';
}
return get({ challenge: query }).then(function (secret) {
opts.query = query;
return opts;
});
}
function check(chr, opts) {
var ch = opts.challenge;
//
// Get
//
// Check that ONE of the relevant TXT records matches
//
return chr
.get({ request: request, challenge: opts.query })
.then(function(secret) {
if (!secret) {
throw new Error(
'`secret` should be an object containing `keyAuthorization` or `dnsAuthorization`'
);
}
if ('string' === typeof secret) {
console.info("secret was passed as a string, which works historically, but should be an object instead:");
console.info(
'secret was passed as a string, which works historically, but should be an object instead:'
);
console.info('{ "keyAuthorization": "' + secret + '" }');
console.info("or");
console.info('or');
// TODO this should be "keyAuthorizationDigest"
console.info('{ "dnsAuthorization": "' + secret + '" }');
console.info("This is to help keep greenlock (and associated plugins) future-proof for new challenge types");
console.info(
'This is to help keep acme / greenlock (and associated plugins) future-proof for new challenge types'
);
}
// historically 'secret' has been a string, but I'd like it to transition to be an object.
// to make it backwards compatible in v2.7 to change it,
@ -96,76 +245,180 @@ function run(challenger, opts) {
if ('http-01' === ch.type) {
secret = secret.keyAuthorization || secret;
if (ch.keyAuthorization !== secret) {
throw new Error("http-01 challenge.get() returned '" + secret + "', which does not match the keyAuthorization"
+ " saved with challenge.set(), which was '" + ch.keyAuthorization + "'");
throw new Error(
"http-01 challenge.get() returned '" +
secret +
"', which does not match the keyAuthorization" +
" saved with challenge.set(), which was '" +
ch.keyAuthorization +
"'"
);
}
} else if ('dns-01' === ch.type) {
secret = secret.dnsAuthorization || secret;
if (ch.dnsAuthorization !== secret) {
throw new Error("dns-01 challenge.get() returned '" + secret + "', which does not match the dnsAuthorization"
+ " (keyAuthDigest) saved with challenge.set(), which was '" + ch.dnsAuthorization + "'");
throw new Error(
"dns-01 challenge.get() returned '" +
secret +
"', which does not match the dnsAuthorization" +
" (keyAuthDigest) saved with challenge.set(), which was '" +
ch.dnsAuthorization +
"'"
);
}
} else {
if ('tls-alpn-01' === ch.type) {
console.warn("'tls-alpn-01' support is in development"
+ " (or developed and we haven't update this yet). Please contact us.");
console.warn(
"'tls-alpn-01' support is in development" +
" (or developed and we haven't update this yet). Please contact us."
);
} else {
console.warn("We don't know how to test '" + ch.type + "'... are you sure that's a thing?");
console.warn(
"We don't know how to test '" +
ch.type +
"'... are you sure that's a thing?"
);
}
secret = secret.keyAuthorization || secret;
if (ch.keyAuthorization !== secret) {
console.warn("The returned value doesn't match keyAuthorization", ch.keyAuthorization, secret);
console.warn(
"The returned value doesn't match keyAuthorization",
ch.keyAuthorization,
secret
);
}
}
}).then(function () {
return remove(opts).then(function () {
return get(opts).then(function (result) {
if (result) {
throw new Error("challenge.remove() should have made it not possible for challenge.get() to return a value");
}
if (null !== result) {
throw new Error("challenge.get() should return null when the value is not set");
}
});
});
});
}).then(function () {
console.info("All soft tests: PASS");
console.warn("Hard tests (actually checking http URLs and dns records) is implemented in acme-v2.");
console.warn("We'll copy them over here as well, but that's a TODO for next week.");
}
function remove(chr, opts) {
//
// Remove
//
// Delete ONLY the SINGLE relevant TXT record
//
return chr.remove(opts).then(function() {
return chr.get(opts).then(function(result) {
if (result) {
throw new Error(
'challenge.remove() should have made it not possible for challenge.get() to return a value'
);
}
if (null !== result) {
throw new Error(
'challenge.get() should return null when the value is not set'
);
}
});
});
}
module.exports.test = function (type, altname, challenger) {
var expires = new Date(Date.now() + (10*60*1000)).toISOString();
function wrapChallenger(type, challenger) {
var zones;
if ('dns-01' === type) {
if ('function' !== typeof challenger.zones) {
console.error(
'You must implement `zones` to return an array of strings.' +
" If you're testing a special type of service that doesn't support" +
' domain zone listing (as opposed to domain record listing),' +
' such as DuckDNS, return an empty array.'
);
process.exit(28);
return;
}
zones = promiseCheckAndCatch(challenger, 'zones');
} else {
zones = function() {
return Promise.resolve([]);
};
}
if ('function' !== typeof challenger.get) {
console.error(
"'challenge.get' should be implemented for the sake of testing." +
' It should be implemented as the internal method for fetching the challenge' +
' (i.e. reading from a database, file system or API, not return internal),' +
' not the external check (the http call, dns query, etc),' +
' which will already be done as part of this test.'
);
process.exit(29);
return;
}
var init = challenger.init;
if ('function' !== typeof init) {
init = function(opts) {
return null;
};
}
return {
init: promiseCheckAndCatch(challenger, 'init'),
zones: zones,
set: promiseCheckAndCatch(challenger, 'set'),
get: promiseCheckAndCatch(challenger, 'get'),
remove: promiseCheckAndCatch(challenger, 'remove')
};
}
function fakeChallenge(type, zone, altname, rnd) {
var expires = new Date(Date.now() + 10 * 60 * 1000).toISOString();
var token = crypto.randomBytes(8).toString('hex');
var thumb = crypto.randomBytes(16).toString('hex');
var keyAuth = token + '.' + crypto.randomBytes(16).toString('hex');
var dnsAuth = crypto.createHash('sha256').update(keyAuth).digest('base64')
.replace(/\+/g, '-').replace(/\//g, '_').replace(/=/g, '');
var dnsAuth = crypto
.createHash('sha256')
.update(keyAuth)
.digest('base64')
.replace(/\+/g, '-')
.replace(/\//g, '_')
.replace(/=/g, '');
var challenge = {
type: type
, identifier: { type: 'dns', value: null } // completed below
, wildcard: false // completed below
, status: 'pending'
, expires: expires
, token: token
, thumbprint: thumb
, keyAuthorization: keyAuth
, url: null // completed below
, dnsHost: '_acme-challenge.' // completed below
, dnsAuthorization: dnsAuth
, altname: altname
, _test: true // used by CLI referenced implementations
type: type,
identifier: { type: 'dns', value: null }, // completed below
wildcard: false, // completed below
status: 'pending',
expires: expires,
token: token,
thumbprint: thumb,
keyAuthorization: keyAuth,
url: null, // completed below
// we create a random record to prevent self cache-poisoning
dnsHost: '_' + rnd.slice(0, 2) + '-acme-challenge-' + rnd.slice(2) + '.', // completed below
dnsAuthorization: dnsAuth,
altname: altname,
_test: true // used by CLI referenced implementations
};
if ('*.' === altname.slice(0, 2)) {
challenge.wildcard = true;
altname = altname.slice(2);
}
challenge.identifier.value = altname;
challenge.url = 'http://' + altname + '/.well-known/acme-challenge/' + challenge.token;
challenge.url =
'http://' + altname + '/.well-known/acme-challenge/' + challenge.token;
challenge.dnsHost += altname;
if (zone) {
challenge.dnsZone = zone;
challenge.dnsPrefix = challenge.dnsHost
.replace(newZoneRegExp(zone), '')
.replace(/\.$/, '');
}
return run(challenger, { challenge: challenge });
};
return challenge;
}
function testZone(type, zone, challenger) {
var domains = [zone, 'foo.' + zone];
if ('dns-01' === type) {
domains.push('*.foo.' + zone);
}
return testEach(type, domains, challenger);
}
function testRecord(type, altname, challenger) {
return testEach(type, [altname], challenger);
}
module.exports.testRecord = testRecord;
module.exports.testZone = testZone;
module.exports.test = testZone;

25
lib/node-v6-compat.js Normal file
View File

@ -0,0 +1,25 @@
"use strict";
function requireBluebird() {
try {
return require("bluebird");
} catch (e) {
console.error("");
console.error("DON'T PANIC. You're running an old version of node with incomplete Promise support.");
console.error("EASY FIX: `npm install --save bluebird`");
console.error("");
throw e;
}
}
if ("undefined" === typeof Promise) {
global.Promise = requireBluebird();
}
if ("function" !== typeof require("util").promisify) {
require("util").promisify = requireBluebird().promisify;
}
if (!console.debug) {
console.debug = console.log;
}

View File

@ -1,17 +1,23 @@
{
"name": "greenlock-challenge-test",
"version": "3.0.2",
"description": "The base set of tests for all ACME challenge strategies. Any `greenlock-challenge-` plugin should be able to pass these tests.",
"name": "acme-challenge-test",
"version": "3.3.2",
"description": "ACME challenge test harness for Let's Encrypt integrations. Any `acme-http-01-` or `acme-dns-01-` challenge strategy or Greenlock plugin should be able to pass these tests.",
"main": "index.js",
"homepage": "https://git.rootprojects.org/root/greenlock-challenge-test.js",
"dependencies": {},
"homepage": "https://git.rootprojects.org/root/acme-challenge-test.js",
"files": [
"example.js",
"lib"
],
"dependencies": {
"@root/request": "^1.3.11"
},
"devDependencies": {},
"scripts": {
"test": "node example.js"
},
"repository": {
"type": "git",
"url": "https://git.rootprojects.org/root/greenlock-challenge-test.js.git"
"url": "https://git.rootprojects.org/root/acme-challenge-test.js.git"
},
"keywords": [
"Let's Encrypt",
@ -21,7 +27,8 @@
"challenge",
"plugin",
"module",
"strategy"
"strategy",
"greenlock"
],
"author": "AJ ONeal <solderjs@gmail.com> (https://solderjs.com/)",
"license": "MPL-2.0"