diff --git a/README.md b/README.md
index 295321f..1c27729 100644
--- a/README.md
+++ b/README.md
@@ -9,6 +9,7 @@ Free SSL, Free Wildcard SSL, and Fully Automated HTTPS made dead simple
!["Lifetime Downloads"](https://img.shields.io/npm/dt/greenlock.svg "Lifetime Download Count can't be shown")
!["Monthly Downloads"](https://img.shields.io/npm/dm/greenlock.svg "Monthly Download Count can't be shown")
!["Weekly Downloads"](https://img.shields.io/npm/dw/greenlock.svg "Weekly Download Count can't be shown")
+!["Stackoverflow Questions"](https://img.shields.io/stackexchange/stackoverflow/t/greenlock.svg "S.O. Question count can't be shown")
| Sponsored by [ppl](https://ppl.family)
| **Greenlock for Web Servers**
@@ -26,168 +27,202 @@ Features
- [x] One-off standalone registration / renewal
- [x] On-the-fly registration / renewal via webroot
-## Install Node
+Install
+=======
-For **Windows**:
+Mac & Linux
+-----------
-Choose **Stable** from
-
-For Linux and **OS X**:
-
-```
-curl -L bit.ly/nodejs-min | bash
-```
-
-# Install Greenlock
+Open Terminal and run this install script:
```bash
-npm install -g greenlock-cli@2.x
+curl -fsS https://get.greenlock.app/ | bash
```
-## Usage
+This will install greenlock to `/opt/greenlock` and put a symlink to
+`/opt/greenlock/bin/greenlock` in `/usr/local/bin/greenlock` for convenience.
-These commands are shown using the **testing server**.
-
-Want to use the **live server**?
-
-1. change server to `--server https://acme-v01.api.letsencrypt.org/directory`
-
-**Note**: This has really only been tested with single domains so if
-multiple domains doesn't work for you, file a bug.
-
-### Standalone (primarily for testing)
-
-You can run standalone mode to get a cert **on the server**. You either use an
-http-01 challenge (the default) on port 80. Like so:
+You can customize the installation:
```bash
-greenlock certonly \
- --agree-tos --email john.doe@example.com \
- --standalone \
- --domains example.com,www.example.com \
- --server https://acme-staging.api.letsencrypt.org/directory \
- --config-dir ~/letsencrypt/etc
+export NODEJS_VER=v8.11.1
+export GREENLOCK_PATH=/opt/greenlock
+curl -fsS https://get.greenlock.app/ | bash
```
-Then you can see your certs at `~/letsencrypt/etc/live`.
+This will change which version of node.js is bundled with greenlock
+and the path to which greenlock installs.
+
+Windows & Node.js
+-----------------
+
+1. Install [node.js](https://nodejs.org)
+2. Open _Node.js_
+2. Run the command `npm install -g greenlock-cli`
+
+Usage
+=====
+
+We have a few different examples of issuing SSL certificates:
+
+* Standalone (testing): Issue a one-off certificate
+* Webroot (production): Automatic certificate renewal for Apache, Nginx, HAProxy, etc
+* Manual (debugging): Go through the certificate proccess step-by-step
+
+
+**Important Note**: Staging vs Production
+
+Each of these examples are using the **staging server**.
+
+Once you've successfully gotten certificates with the staging server
+you must **delete** `--config-dir` (i.e. `rm -rf ~/acme`) and then
+switch to the **production server**.
```
-ls ~/letsencrypt/etc/live
+--acme-version draft-11 --server https://acme-v02.api.letsencrypt.org/directory \
```
-This option is great for testing, but since it requires the use of
-the same ports that your webserver needs, it isn't a good choice
-for production.
+## Standalone
-### WebRoot
+**primarily for testing**
-You can specify the path to where you keep your `index.html` with `webroot`, as
-long as your server is serving plain HTTP on port 80.
+You can run in standalone mode **on your server** and get a cert instantly.
-For example, if I want to get a domain for `example.com` and my `index.html` is
-at `/srv/www/example.com`, then I would use this command:
+Note: No other webserver may be running at the time (use Webroot mode for that).
```bash
-sudo greenlock certonly \
- --agree-tos --email john.doe@example.com \
- --webroot --webroot-path /srv/www/example.com \
- --config-dir /etc/letsencrypt \
- --domains example.com,www.example.com \
- --server https://acme-staging.api.letsencrypt.org/directory
+sudo greenlock certonly --standalone \
+ --acme-version draft-11 --acme-url https://acme-staging-v02.api.letsencrypt.org/directory \
+ --agree-tos --email jon@example.com --domains example.com,www.example.com \
+ --community-member \
+ --config-dir ~/acme/etc
```
-Note that we use `sudo` because in this example we are using `/etc/letsencrypt`
-as the cert directory rather than `~/letsencrypt/etc`, which we used in the previous example.
+## WebRoot
-Then see your brand new shiny certs:
+**for testing and production**
-```
-ls /etc/letsencrypt/live/
+With this method you must use **your existing http (port 80) server** (Apache, Nginx, HAProxy, etc).
+You will specify the **path or template path** to your `public_html` or `www` webroot.
+
+For example:
+
+ * I want to get an SSL cert for `example.com`
+ * `index.html` lives at `/srv/www/example.com`
+ * I would use this command:
+
+```bash
+sudo greenlock certonly --webroot \
+ --acme-version draft-11 --acme-url https://acme-staging-v02.api.letsencrypt.org/directory \
+ --agree-tos --email jon@example.com --domains example.com \
+ --community-member \
+ --root /srv/www/example.com \
+ --config-dir ~/acme/etc
```
-You can use a cron job to run the script above every 80 days (the certificates expire after 90 days)
-so that you always have fresh certificates.
+Now let's say that
-### Interactive (for debugging)
+ * I have many sites in `/srv/www/`, all by their name
+ * I already store my ssl certs in the format `/etc/apache/ssl/:hostname/{key.pem,ssl.crt}`
+ * I'll run this command instead:
+
+```bash
+sudo greenlock certonly --webroot \
+ --acme-version draft-11 --acme-url https://acme-staging-v02.api.letsencrypt.org/directory \
+ --agree-tos --email jon@example.com --domains example.com,whatever.com,foobar.net \
+ --community-member \
+ --root "/srv/www/:hostname" \
+ --privkey-path "/etc/apache/ssl/:hostname/key.pem" \
+ --fullchain-path "/etc/apache/ssl/:hostname/ssl.crt" \
+ --config-dir ~/acme/etc
+```
+
+### Run with cron
+
+Those commands are safe to be run **daily** with cron.
+The certificates will automatically renew 2 weeks before expiring.
+
+## Interactive
+
+**primarily for debugging**
The token (for all challenge types) and keyAuthorization (only for https-01)
will be printed to the screen and you will be given time to copy it wherever
(file, dns record, database, etc) and the process will complete once you hit `enter`.
```bash
-sudo greenlock certonly \
- --agree-tos --email john.doe@example.com \
- --manual
- --config-dir /etc/letsencrypt \
- --domains example.com,www.example.com \
- --server https://acme-staging.api.letsencrypt.org/directory
+sudo greenlock certonly --manual \
+ --acme-version draft-11 --acme-url https://acme-staging-v02.api.letsencrypt.org/directory \
+ --agree-tos --email jon@example.com --domains example.com \
+ --community-member \
+ --config-dir ~/acme/etc
```
-## Test with a free domain
+Certificate Locations
+=====================
+Then you can see your certs at `~/acme/etc/live`.
+
+```
+~/acme/etc/
+└── example.com
+ ├── cert.pem
+ ├── chain.pem
+ ├── fullchain.pem (Apache, Nginx, node.js)
+ ├── privkey.pem (Apache, Nginx, node.js)
+ └── bundle.pem (HAProxy)
+```
+
+
+## Run without root (no sudo)
+
+`sudo` is used to allow greenlock to use port 80 and write to httpd-owned directories.
+
+Allow greenlock to bind on system ports without root:
```bash
-# Install Daplie DNS
-npm install -g ddns-cli
-
-# see terms of use
-ddns --help
-
-# agree to terms and get domain
-ddns --random --email user@example.com --agree
-
-# the default is to use the ip address from which
-# you can the command, but you can also assign the
-# ip manually
-ddns --random --email user@example.com --agree -a '127.0.0.1'
+sudo setcap cap_net_bind_service=+ep /opt/greenlock/bin/node
```
-Example domain:
+To allow greenlock to write to folders owned by another user, set it to run as that user.
-```
-rubber-duck-42.daplie.me
-```
-
-## Run without Root
-
-If you'd like to allow node.js to use privileged ports `80` and `443`
-(and everything under 1024 really) without being run as `root` or `sudo`,
-you can use `setcap` to do so. (it may need to be run any time you reinstall node as well)
-
-```bash
-sudo setcap cap_net_bind_service=+ep /usr/local/bin/node
-```
-
-By default `node-greenlock` assumes your home directory `~/letsencrypt/`, but if
-you really want to use `/etc/letsencrypt`, `/var/lib/letsencrypt/`, and `/var/log/letsencrypt`
-you could change the permissions on them. **Probably a BAD IDEA**. Probabry a security risk.
+Otherwise, you can change the permissions on the folders, which is
+**probably a BAD IDEA**. Probabry a **security risk**.
+But since some of you are going to do it anyway I might as well tell you how:
```
# PROBABLY A BAD IDEA
-sudo chown -R $(whoami) /etc/letsencrypt /var/lib/letsencrypt /var/log/letsencrypt
+sudo chown -R $(whoami) /etc/ssl /etc/acme
```
-## Command Line Options
+Command Line Options
+====================
```
Usage:
greenlock [OPTIONS] [ARGS]
Options:
- --server [STRING] ACME Directory Resource URI. (Default is https://acme-v01.api.letsencrypt.org/directory))
+ --acme-version [STRING] 'draft-11' for Let's Encrypt v2 or 'v01' for Let's Encrypt v1. (default: null)
+
+ --acme-url [URL] Directory URL for ACME API. Let's Encrypt URLs are:
+ draft-11
+ https://acme-staging-v02.api.letsencrypt.org/directory
+ https://acme-v02.api.letsencrypt.org/directory
+
+ v01
+ https://acme-staging.api.letsencrypt.org/directory
+ https://acme-v01.api.letsencrypt.org/directory
--email EMAIL Email used for registration and recovery contact. (default: null)
--agree-tos BOOLEAN Agree to the Let's Encrypt Subscriber Agreement
- --domains URL Domain names to apply. For multiple domains you can enter a comma
+ --community-member Submit stats to and receive updates from Greenlock
+
+ --domains HOSTNAME Domain names to apply. For multiple domains you can enter a comma
separated list of domains as a parameter. (default: [])
- --renew-within [NUMBER] Renew certificates this many days before expiry. (default: 7)
-
- --duplicate BOOLEAN Allow getting a certificate that duplicates an existing one/is
- an early renewal.
-
- --rsa-key-size [NUMBER] Size (in bits) of the RSA key. (Default is 2048)
+ --renew-within [NUMBER] Renew certificates this many days before expiry. (default: 10)
--cert-path STRING Path to where new cert.pem is saved
(Default is :conf/live/:hostname/cert.pem)
@@ -198,6 +233,9 @@ Options:
--chain-path [STRING] Path to where new chain.pem is saved
(Default is :conf/live/:hostname/chain.pem)
+ --bundle-path [STRING] Path to where new bundle.pem (fullchain + privkey) is saved
+ (Default is :conf/live/:hostname/bundle.pem)
+
--domain-key-path STRING Path to privkey.pem to use for domain (default: generate new)
--account-key-path STRING Path to privkey.pem to use for account (default: generate new)
@@ -214,13 +252,26 @@ Options:
--manual [BOOLEAN] Print the token and key to the screen and wait for you to hit enter,
giving you time to copy it somewhere before continuing. (Default is false)
- --webroot BOOLEAN Obtain certs by placing files in a webroot directory.
-
- --webroot-path STRING public_html / webroot path.
-
--debug BOOLEAN show traces and logs
-h, --help Display help and usage details
```
+
+Certbot Command Line Options
+============================
+
+These options are maintained for compatability with certbot:
+
+```
+ --server [STRING] ACME Directory Resource URI. (Default is https://acme-v01.api.letsencrypt.org/directory))
+
+ --duplicate BOOLEAN Allow getting a certificate that duplicates an existing one/is
+ an early renewal.
+
+ --webroot BOOLEAN Obtain certs by placing files in a webroot directory.
+
+ --webroot-path STRING public_html / webroot path.
+```
+
Note: some of the options may not be fully implemented. If you encounter a problem, please report a bug on the issues page.
diff --git a/bin/greenlock.js b/bin/greenlock.js
index a0c273b..cde6b36 100755
--- a/bin/greenlock.js
+++ b/bin/greenlock.js
@@ -5,49 +5,67 @@ var cli = require('cli');
var mkdirp = require('mkdirp');
cli.parse({
- server: [ false, " ACME Directory Resource URI.", 'string', '' ]
-, email: [ false, " Email used for registration and recovery contact. (default: null)", 'email' ]
+ 'acme-version':
+ [ false, " ACME / Let's Encrypt version. v01 or draft-11 (aka v02)", 'string', 'draft-11' ]
+, 'acme-url':
+ [ false, " ACME Directory Resource URL", 'string', '' ]
+, email:
+ [ false, " Email used for registration and recovery contact. (default: null)", 'email' ]
, 'agree-tos': [ false, " Agree to the Let's Encrypt Subscriber Agreement", 'boolean', false ]
-, domains: [ false, " Domain names to apply. For multiple domains you can enter a comma separated list of domains as a parameter. (default: [])", 'string' ]
+, 'community-member': [ false, " Submit stats to and get updates from Greenlock", 'boolean', false ]
+, domains:
+ [ false, " Domain names to apply. For multiple domains you can enter a comma separated list of domains as a parameter. (default: [])", 'string' ]
, 'renew-within': [ false, " Renew certificates this many days before expiry", 'int', 7 ]
-, duplicate: [ false, " Allow getting a certificate that duplicates an existing one/is an early renewal", 'boolean', false ]
-, 'rsa-key-size': [ false, " Size (in bits) of the RSA key.", 'int', 2048 ]
-, 'cert-path': [ false, " Path to where new cert.pem is saved", 'string',':configDir/live/:hostname/cert.pem' ]
-, 'fullchain-path': [ false, " Path to where new fullchain.pem (cert + chain) is saved", 'string', ':configDir/live/:hostname/fullchain.pem' ]
-, 'chain-path': [ false, " Path to where new chain.pem is saved", 'string', ':configDir/live/:hostname/chain.pem' ]
-, 'domain-key-path': [ false, " Path to privkey.pem to use for domain (default: generate new)", 'string' ]
-, 'account-key-path': [ false, " Path to privkey.pem to use for account (default: generate new)", 'string' ]
-, 'config-dir': [ false, " Configuration directory.", 'string', '~/letsencrypt/etc/' ]
-, 'tls-sni-01-port': [ false, " Use TLS-SNI-01 challenge type with this port (only port 443 is valid with most production servers)", 'int' ]
+, 'cert-path':
+ [ false, " Path to where new cert.pem is saved", 'string'
+ , ':configDir/live/:hostname/cert.pem' ]
+, 'fullchain-path':
+ [ false, " Path to where new fullchain.pem (cert + chain) is saved", 'string'
+ , ':configDir/live/:hostname/fullchain.pem' ]
+, 'bundle-path':
+ [ false, " Path to where new bundle.pem (fullchain + privkey) is saved", 'string'
+ , ':configDir/live/:hostname/bundle.pem' ]
+, 'chain-path':
+ [ false, " Path to where new chain.pem is saved", 'string'
+ , ':configDir/live/:hostname/chain.pem' ]
+, 'privkey-path':
+ [ false, " Path to where privkey.pem is saved", 'string'
+ , ':configDir/live/:hostname/privkey.pem' ]
+, 'config-dir':
+ [ false, " Configuration directory.", 'string'
+ , '~/letsencrypt/etc/' ]
, 'http-01-port': [ false, " Use HTTP-01 challenge type with this port (only port 80 is valid with most production servers) (default: 80)", 'int' ]
, 'dns-01': [ false, " Use DNS-01 challange type", 'boolean', false ]
, standalone: [ false, " Obtain certs using a \"standalone\" webserver.", 'boolean', false ]
, manual: [ false, " Print the token and key to the screen and wait for you to hit enter, giving you time to copy it somewhere before continuing (default: false)", 'boolean', false ]
-, webroot: [ false, " Obtain certs by placing files in a webroot directory.", 'boolean', false ]
-, 'webroot-path': [ false, " public_html / webroot path.", 'string' ]
-, hooks: [ false, " Obtain certs with hooks that configure a webserver to meet TLS-SNI-01 challenges.", 'boolean', false ]
-, 'hooks-path': [ false, " Path in which to store files for hooks.", 'string' ]
-, 'hooks-server': [ false, " Type of webserver to configure.", 'string' ]
-, 'hooks-template': [ false, " Template to use for hooks configuration file.", 'string' ]
-, 'hooks-bind': [ false, " IP address to use in configuration for hooks.", 'string' ]
-, 'hooks-port': [ false, " Port to use in configuration for hooks.", 'string' ]
-, 'hooks-webroot': [ false, " Webroot to use in configuration for hooks (e.g. empty dir).", 'string' ]
-, 'hooks-pre-enable': [ false, " Hook to check the webserver configuration prior to enabling.", 'string' ]
-, 'hooks-enable': [ false, " Hook to enable the webserver configuration.", 'string' ]
-, 'hooks-pre-reload': [ false, " Hook to check the webserver configuration prior to reloading.", 'string' ]
-, 'hooks-reload': [ false, " Hook to reload the webserver.", 'string' ]
-, 'hooks-disable': [ false, " Hook to disable the webserver configuration.", 'string' ]
-//, 'standalone-supported-challenges': [ false, " Supported challenges, order preferences are randomly chosen. (default: http-01,tls-sni-01)", 'string', 'http-01,tls-sni-01']
, debug: [ false, " show traces and logs", 'boolean', false ]
-, 'work-dir': [ false, "(ignored)", 'string', '~/letsencrypt/var/lib/' ]
-, 'logs-dir': [ false, "(ignored)", 'string', '~/letsencrypt/var/log/' ]
+, 'root': [ false, " public_html / webroot path (may use the :hostname template such as /srv/www/:hostname)", 'string' ]
+
+//
+// backwards compat
+//
+, duplicate:
+ [ false, " Allow getting a certificate that duplicates an existing one/is an early renewal", 'boolean', false ]
+, 'rsa-key-size':
+ [ false, " Size (in bits) of the RSA key.", 'int', 2048 ]
+, server:
+ [ false, " alias of acme-url for certbot compatibility", 'string', '' ]
+, 'domain-key-path':
+ [ false, " Path to privkey.pem to use for domain (default: generate new)", 'string' ]
+, 'account-key-path':
+ [ false, " Path to privkey.pem to use for account (default: generate new)", 'string' ]
+, webroot: [ false, " for certbot compatibility", 'boolean', false ]
+, 'webroot-path': [ false, "alias of '--root' for certbot compatibility", 'string' ]
+//, 'standalone-supported-challenges': [ false, " Supported challenges, order preferences are randomly chosen. (default: http-01,tls-sni-01)", 'string', 'http-01,tls-sni-01']
+, 'work-dir': [ false, "for certbot compatibility (ignored)", 'string', '~/letsencrypt/var/lib/' ]
+, 'logs-dir': [ false, "for certbot compatibility (ignored)", 'string', '~/letsencrypt/var/log/' ]
});
// ignore certonly and extraneous arguments
cli.main(function(_, options) {
console.log('');
var args = {};
- var homedir = require('homedir')();
+ var homedir = require('os').homedir();
Object.keys(options).forEach(function (key) {
var val = options[key];
@@ -74,20 +92,15 @@ cli.main(function(_, options) {
args.domains = args.domains.split(',');
}
- if (!(Array.isArray(args.domains) && args.domains.length) || !args.email || !args.agreeTos) {
- console.error("\nUsage: greenlock certonly --standalone --domains example.com --email user@example.com --agree-tos");
+ if (!(Array.isArray(args.domains) && args.domains.length) || !args.email || !args.agreeTos || !args.acmeVersion || (!args.server && !args.acmeUrl)) {
+ console.error("\nUsage:\n\ngreenlock certonly --standalone \\");
+ console.error("\t--acme-version draft-11 --acme-url https://acme-staging-v02.api.letsencrypt.org/directory \\");
+ console.error("\t--agree-tos --email user@example.com --domains example.com \\");
+ console.error("\t--config-dir ~/acme/etc \\");
console.error("\nSee greenlock --help for more details\n");
return;
}
- if (args.tlsSni01Port) {
- // [@agnat]: Coerce to string. cli returns a number although we request a string.
- args.tlsSni01Port = "" + args.tlsSni01Port;
- args.tlsSni01Port = args.tlsSni01Port.split(',').map(function (port) {
- return parseInt(port, 10);
- });
- }
-
if (args.http01Port) {
// [@agnat]: Coerce to string. cli returns a number although we request a string.
args.http01Port = "" + args.http01Port;
diff --git a/index.js b/index.js
index 95c5c57..6dc2f4d 100644
--- a/index.js
+++ b/index.js
@@ -2,22 +2,21 @@
var DAY = 24 * 60 * 60 * 1000;
-var LE = require('greenlock');
+var Greenlock = require('greenlock');
module.exports.run = function (args) {
var leChallenge;
var leStore;
var servers;
var USE_DNS = {};
-
var challengeType;
+
+ args.acmeUrl = args.server = (args.acmeUrl || args.server);
+ args.root = args.webrootPath = (args.root || args.webrootPath);
if (args.dns01) {
challengeType = 'dns-01';
args.webrootPath = '';
args.standalone = USE_DNS;
- } else if (args.tlsSni01Port || args.hooks) {
- challengeType = 'tls-sni-01';
- args.webrootPath = '';
} else /*if (args.http01Port)*/ {
challengeType = 'http-01';
}
@@ -25,57 +24,43 @@ module.exports.run = function (args) {
if (args.manual) {
leChallenge = require('le-challenge-manual').create({});
}
- else if (args.hooks) {
- leChallenge = require('le-challenge-hooks').create({
- hooksPath: args.hooksPath
- , hooksServer: args.hooksServer
- , hooksTemplate: args.hooksTemplate
- , hooksBind: args.hooksBind
- , hooksPort: args.hooksPort
- , hooksWebroot: args.hooksWebroot
- , hooksPreEnable: args.hooksPreEnable
- , hooksEnable: args.hooksEnable
- , hooksPreReload: args.hooksPreReload
- , hooksReload: args.hooksReload
- , hooksDisable: args.hooksDisable
- });
- }
else if (args.webrootPath) {
// webrootPath is all that really matters here
// TODO rename le-challenge-fs to le-challenge-webroot
leChallenge = require('./lib/webroot').create({ webrootPath: args.webrootPath });
}
- else if (args.tlsSni01Port) {
- leChallenge = require('le-challenge-sni').create({});
- servers = require('./lib/servers').create(leChallenge);
- }
else if (USE_DNS !== args.standalone) {
leChallenge = require('le-challenge-standalone').create({});
servers = require('./lib/servers').create(leChallenge);
}
- var privkeyPath = args.domainKeyPath || ':configDir/live/:hostname/privkey.pem'; //args.privkeyPath
+ var privkeyPath = args.privkeyPath || args.domainKeyPath || ':configDir/live/:hostname/privkey.pem'; //args.privkeyPath
leStore = require('le-store-certbot').create({
configDir: args.configDir
, privkeyPath: privkeyPath
, fullchainPath: args.fullchainPath
, certPath: args.certPath
, chainPath: args.chainPath
- , webrootPath: args.webrootPath
+ , bundlePath: args.bundlePath
+ , webrootPath: args.root
, domainKeyPath: args.domainKeyPath
, accountKeyPath: args.accountKeyPath
});
- if (!args.server) {
- throw new Error("You must specify a server to use with --server");
+ if (!args.acmeUrl) {
+ throw new Error("You must specify the ACME server url with --acme-url");
+ }
+ if (!args.acmeVersion) {
+ throw new Error("You must specify the ACME API version with --acme-version");
}
- // let LE know that we're handling standalone / webroot here
+ // let Greenlock know that we're handling standalone / webroot here
var leChallenges = {};
leChallenges[challengeType] = leChallenge;
- var le = LE.create({
+ var greenlock = Greenlock.create({
debug: args.debug
- , server: args.server
+ , server: args.acmeUrl
+ , version: args.acmeVersion
, store: leStore
, challenges: leChallenges
, renewWithin: args.renewWithin * DAY
@@ -86,7 +71,7 @@ module.exports.run = function (args) {
if (args.tlsSni01Port) {
servers.startServers(
[], args.tlsSni01Port
- , { debug: args.debug, httpsOptions: le.httpsOptions }
+ , { debug: args.debug, tlsOptions: greenlock.tlsOptions }
);
}
else {
@@ -98,10 +83,11 @@ module.exports.run = function (args) {
}
// Note: can't use args directly as null values will overwrite template values
- return le.register({
+ return greenlock.register({
debug: args.debug
, email: args.email
, agreeTos: args.agreeTos
+ , communityMember: args.communityMember
, domains: args.domains
, rsaKeySize: args.rsaKeySize
, challengeType: challengeType
@@ -134,10 +120,12 @@ module.exports.run = function (args) {
console.log('Certificates installed at:');
console.log(
[
+ // args.privkeyPath
args.certPath
, args.chainPath
, args.fullchainPath
- ].join('\n')
+ , args.bundlePath || ''
+ ].join('\n').replace(/\n+/g, '\n')
.replace(/:configDir/g, args.configDir)
.replace(/:hostname/g, args.domains[0])
);
diff --git a/installer/get.sh b/installer/get.sh
new file mode 100644
index 0000000..bac890f
--- /dev/null
+++ b/installer/get.sh
@@ -0,0 +1,128 @@
+#!/bin/bash
+
+# This is a 3 step process
+# 1. First we need to figure out whether to use wget or curl for fetching remote files
+# 2. Next we need to figure out whether to use unzip or tar for downloading releases
+# 3. We need to actually install the stuff
+
+set -e
+set -u
+
+###############################
+# #
+# http_get #
+# boilerplate for curl / wget #
+# #
+###############################
+
+# See https://git.coolaj86.com/coolaj86/snippets/blob/master/bash/http-get.sh
+
+_my_http_get=""
+_my_http_opts=""
+_my_http_out=""
+
+detect_http_get()
+{
+ set +e
+ if type -p curl >/dev/null 2>&1; then
+ _my_http_get="curl"
+ _my_http_opts="-fsSL"
+ _my_http_out="-o"
+ elif type -p wget >/dev/null 2>&1; then
+ _my_http_get="wget"
+ _my_http_opts="--quiet"
+ _my_http_out="-O"
+ else
+ echo "Aborted, could not find curl or wget"
+ return 7
+ fi
+ set -e
+}
+
+http_get()
+{
+ $_my_http_get $_my_http_opts $_my_http_out "$2" "$1"
+ touch "$2"
+}
+
+http_bash()
+{
+ _http_url=$1
+ my_args=${2:-}
+ rm -rf my-tmp-runner.sh
+ $_my_http_get $_my_http_opts $_my_http_out my-tmp-runner.sh "$_http_url"; bash my-tmp-runner.sh $my_args; rm my-tmp-runner.sh
+}
+
+detect_http_get
+
+###############################
+## END HTTP_GET ##
+###############################
+
+echo ""
+echo ""
+echo ""
+
+if [ -z "${GREENLOCK_PATH:-}" ]; then
+ echo 'GREENLOCK_PATH="'${GREENLOCK_PATH:-}'"'
+ GREENLOCK_PATH=/opt/greenlock
+fi
+
+echo "Installing Greenlock to '$GREENLOCK_PATH'"
+echo ""
+
+echo "sudo mkdir -p '$GREENLOCK_PATH'"
+sudo mkdir -p "$GREENLOCK_PATH"
+echo "sudo chown -R $(whoami) '$GREENLOCK_PATH'"
+sudo chown -R $(whoami) "$GREENLOCK_PATH"
+
+# until node v10.x gets fix for ursa we have no advantage to switching from 8.x
+export NODEJS_VER=v8.11.1
+export NODE_PATH="$GREENLOCK_PATH/lib/node_modules"
+export NPM_CONFIG_PREFIX="$GREENLOCK_PATH"
+export PATH="$GREENLOCK_PATH/bin:$PATH"
+sleep 1
+http_bash https://git.coolaj86.com/coolaj86/node-installer.sh/raw/branch/master/install.sh --no-dev-deps
+
+my_tree="master"
+my_node="$GREENLOCK_PATH/bin/node"
+my_npm="$my_node $GREENLOCK_PATH/bin/npm"
+my_tmp="$GREENLOCK_PATH/tmp"
+mkdir -p $my_tmp
+
+echo "blah"
+set +e
+my_unzip=$(type -p unzip)
+my_tar=$(type -p tar)
+if [ -n "$my_unzip" ]; then
+ rm -f $my_tmp/greenlock-$my_tree.zip
+ http_get https://git.coolaj86.com/coolaj86/greenlock-cli.js/archive/$my_tree.zip $my_tmp/greenlock-$my_tree.zip
+ # -j is the same as --strip 1, it nixes the top-level directory
+ $my_unzip -j $my_tmp/greenlock-$my_tree.zip -d $GREENLOCK_PATH/
+elif [ -n "$my_tar" ]; then
+ rm -f $my_tmp/greenlock-$my_tree.tar.gz
+ http_get https://git.coolaj86.com/coolaj86/greenlock-cli.js/archive/$my_tree.tar.gz $my_tmp/greenlock-$my_tree.tar.gz
+ ls -lah $my_tmp/greenlock-$my_tree.tar.gz
+ $my_tar -xzf $my_tmp/greenlock-$my_tree.tar.gz --strip 1 -C $GREENLOCK_PATH/
+else
+ echo "Neither tar nor unzip found. Abort."
+ exit 13
+fi
+set -e
+
+pushd $GREENLOCK_PATH
+ $my_npm install
+popd
+
+cat << EOF > $GREENLOCK_PATH/bin/greenlock
+!#/bin/bash
+$my_node $GREENLOCK_PATH/bin/greenlock.js
+EOF
+chmod a+x $GREENLOCK_PATH/bin/greenlock
+ln -sf $GREENLOCK_PATH/bin/greenlock /usr/local/bin/greenlock
+
+#sudo setcap cap_net_bind_service=+ep $GREENLOCK_PATH/bin/node
+
+#https://git.coolaj86.com/coolaj86/greenlock-cli.js.git
+#https://git.coolaj86.com/coolaj86/greenlock-cli.js/archive/:tree:.tar.gz
+#https://git.coolaj86.com/coolaj86/greenlock-cli.js/archive/:tree:.zip
diff --git a/lib/servers.js b/lib/servers.js
index e1e45e8..2f1820f 100644
--- a/lib/servers.js
+++ b/lib/servers.js
@@ -7,17 +7,22 @@ module.exports.create = function (challenge) {
_servers: []
, httpResponder: function (req, res) {
- console.log('[LE-CLI] httpResponder');
+ console.info(req.method + ' ' + req.headers.host + req.url);
var acmeChallengePrefix = '/.well-known/acme-challenge/';
if (0 !== req.url.indexOf(acmeChallengePrefix)) {
- res.end("Let's Encrypt! Command line tool");
+ res.end("Greenlock™ Commandline: https://git.coolaj86.com/coolaj86/greenlock-cli.js");
return;
}
var token = req.url.slice(acmeChallengePrefix.length);
challenge.get(NOBJ, req.headers.host.replace(/:.*/, ''), token, function (err, val) {
+ if (val) {
+ console.info("Responding with authorization token '" + val + "'");
+ } else {
+ console.info("No authorization token found");
+ }
res.end(val || '_ ERROR challenge not found _');
});
}
@@ -25,7 +30,7 @@ module.exports.create = function (challenge) {
, startServers: function (plainPorts, tlsPorts, opts) {
opts = opts || {};
- var httpsOptions = opts.httpsOptions || require('localhost.daplie.me-certificates');
+ var tlsOptions = opts.tlsOptions || {};
var https = require('https');
var http = require('http');
@@ -56,7 +61,7 @@ module.exports.create = function (challenge) {
// tls-sni-01-port
tlsPorts.forEach(function (port) {
- var server = https.createServer(httpsOptions, servers.httpResponder);
+ var server = https.createServer(tlsOptions, servers.httpResponder);
servers._servers.push(server);
server.listen(port, function () {
diff --git a/package.json b/package.json
index 1f684e8..eaca5be 100644
--- a/package.json
+++ b/package.json
@@ -34,16 +34,11 @@
},
"homepage": "https://git.coolaj86.com/coolaj86/greenlock-cli.js",
"dependencies": {
- "cli": "^0.11.1",
- "greenlock": "^2.1.16",
- "homedir": "^0.6.0",
- "le-acme-core": "^2.0.5",
- "le-challenge-hooks": "^2.0.0",
- "le-challenge-manual": "^2.0.0",
- "le-challenge-sni": "^2.0.0",
- "le-challenge-standalone": "^2.0.0",
- "le-store-certbot": "^2.0.2",
- "localhost.daplie.me-certificates": "^1.3.2",
+ "cli": "^1.0.1",
+ "greenlock": "^2.2.15",
+ "le-challenge-manual": "^2.1.0",
+ "le-challenge-standalone": "^2.1.0",
+ "le-store-certbot": "^2.1.0",
"mkdirp": "^0.5.1"
}
}