mirror of
				https://git.coolaj86.com/coolaj86/greenlock-store-memory.js.git
				synced 2025-11-03 18:42:47 +00:00 
			
		
		
		
	v1.0.0: a stupid-simple reference implementation for storage strategies
This commit is contained in:
		
						commit
						cbe20c4d00
					
				
							
								
								
									
										61
									
								
								.gitignore
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										61
									
								
								.gitignore
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@ -0,0 +1,61 @@
 | 
			
		||||
# ---> Node
 | 
			
		||||
# Logs
 | 
			
		||||
logs
 | 
			
		||||
*.log
 | 
			
		||||
npm-debug.log*
 | 
			
		||||
yarn-debug.log*
 | 
			
		||||
yarn-error.log*
 | 
			
		||||
 | 
			
		||||
# Runtime data
 | 
			
		||||
pids
 | 
			
		||||
*.pid
 | 
			
		||||
*.seed
 | 
			
		||||
*.pid.lock
 | 
			
		||||
 | 
			
		||||
# Directory for instrumented libs generated by jscoverage/JSCover
 | 
			
		||||
lib-cov
 | 
			
		||||
 | 
			
		||||
# Coverage directory used by tools like istanbul
 | 
			
		||||
coverage
 | 
			
		||||
 | 
			
		||||
# nyc test coverage
 | 
			
		||||
.nyc_output
 | 
			
		||||
 | 
			
		||||
# Grunt intermediate storage (http://gruntjs.com/creating-plugins#storing-task-files)
 | 
			
		||||
.grunt
 | 
			
		||||
 | 
			
		||||
# Bower dependency directory (https://bower.io/)
 | 
			
		||||
bower_components
 | 
			
		||||
 | 
			
		||||
# node-waf configuration
 | 
			
		||||
.lock-wscript
 | 
			
		||||
 | 
			
		||||
# Compiled binary addons (http://nodejs.org/api/addons.html)
 | 
			
		||||
build/Release
 | 
			
		||||
 | 
			
		||||
# Dependency directories
 | 
			
		||||
node_modules/
 | 
			
		||||
jspm_packages/
 | 
			
		||||
 | 
			
		||||
# Typescript v1 declaration files
 | 
			
		||||
typings/
 | 
			
		||||
 | 
			
		||||
# Optional npm cache directory
 | 
			
		||||
.npm
 | 
			
		||||
 | 
			
		||||
# Optional eslint cache
 | 
			
		||||
.eslintcache
 | 
			
		||||
 | 
			
		||||
# Optional REPL history
 | 
			
		||||
.node_repl_history
 | 
			
		||||
 | 
			
		||||
# Output of 'npm pack'
 | 
			
		||||
*.tgz
 | 
			
		||||
 | 
			
		||||
# Yarn Integrity file
 | 
			
		||||
.yarn-integrity
 | 
			
		||||
 | 
			
		||||
# dotenv environment variables file
 | 
			
		||||
.env
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										41
									
								
								LICENSE
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										41
									
								
								LICENSE
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,41 @@
 | 
			
		||||
Copyright 2019 AJ ONeal
 | 
			
		||||
 | 
			
		||||
This is open source software; you can redistribute it and/or modify it under the
 | 
			
		||||
terms of either:
 | 
			
		||||
 | 
			
		||||
   a) the "MIT License"
 | 
			
		||||
   b) the "Apache-2.0 License"
 | 
			
		||||
 | 
			
		||||
MIT License
 | 
			
		||||
 | 
			
		||||
   Permission is hereby granted, free of charge, to any person obtaining a copy
 | 
			
		||||
   of this software and associated documentation files (the "Software"), to deal
 | 
			
		||||
   in the Software without restriction, including without limitation the rights
 | 
			
		||||
   to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 | 
			
		||||
   copies of the Software, and to permit persons to whom the Software is
 | 
			
		||||
   furnished to do so, subject to the following conditions:
 | 
			
		||||
 | 
			
		||||
   The above copyright notice and this permission notice shall be included in all
 | 
			
		||||
   copies or substantial portions of the Software.
 | 
			
		||||
 | 
			
		||||
   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 | 
			
		||||
   IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 | 
			
		||||
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 | 
			
		||||
   AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 | 
			
		||||
   LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 | 
			
		||||
   OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 | 
			
		||||
   SOFTWARE.
 | 
			
		||||
 | 
			
		||||
Apache-2.0 License Summary
 | 
			
		||||
 | 
			
		||||
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
			
		||||
   you may not use this file except in compliance with the License.
 | 
			
		||||
   You may obtain a copy of the License at
 | 
			
		||||
 | 
			
		||||
     http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 | 
			
		||||
   Unless required by applicable law or agreed to in writing, software
 | 
			
		||||
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
			
		||||
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
   See the License for the specific language governing permissions and
 | 
			
		||||
   limitations under the License.
 | 
			
		||||
							
								
								
									
										245
									
								
								README.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										245
									
								
								README.md
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,245 @@
 | 
			
		||||
# le-store-memory
 | 
			
		||||
 | 
			
		||||
An in-memory reference implementation of a Certificate and Keypair storage strategy for Greenlock v2.7+ (and v3)
 | 
			
		||||
 | 
			
		||||
# Usage
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
var greenlock = require('greenlock');
 | 
			
		||||
 | 
			
		||||
// This in-memory plugin has only one option: 'cache'.
 | 
			
		||||
// We could have It's used so that we can peek and poke at the store.
 | 
			
		||||
var cache = {};
 | 
			
		||||
var gl = greenlock.create({
 | 
			
		||||
  store: require('le-store-memory').create({ cache: cache })
 | 
			
		||||
, approveDomains: approveDomains
 | 
			
		||||
  ...
 | 
			
		||||
});
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
# How to build your own module:
 | 
			
		||||
 | 
			
		||||
**TL;DR**: Just take a look the code here, and don't over think it.
 | 
			
		||||
 | 
			
		||||
Also, you have the flexibility to get really fancy. _Don't!_
 | 
			
		||||
You probably don't need to (unless you already know that you do).
 | 
			
		||||
 | 
			
		||||
In most cases you're just implementing dumb storage.
 | 
			
		||||
If all you do is `JSON.stringify()` on `set` (save) and `JSON.parse()` after `check` (get)
 | 
			
		||||
and just treat it as a blob with an ID, you'll do just fine. You can always optimize later.
 | 
			
		||||
 | 
			
		||||
**Promises** vs **Thunks** ("node callbacks") vs **Synchronous** returns:
 | 
			
		||||
You can use whatever style you like best. Everything is promisified under the hood.
 | 
			
		||||
 | 
			
		||||
Whenever you have neither a result, nor an error, you must **always return null** (instead of 'undefined').
 | 
			
		||||
 | 
			
		||||
### storage strategy vs approveDomains()
 | 
			
		||||
 | 
			
		||||
The _most_ important thing to keep in mind: `approveDomains()` is where all of the implementation-specific logic goes.
 | 
			
		||||
 | 
			
		||||
If you're writing a storage strategy (presumably why you're here), it's because you have logic in `approveDomains()`
 | 
			
		||||
that isn't supported by existing strategies. That makes it tempting to start thinking about things backwards, letting
 | 
			
		||||
your implementation-specific logic creep into your storage strategy. DON'T DO IT.
 | 
			
		||||
 | 
			
		||||
Keep in mind that, ultimately, **it takes human decision** / interaction / configuration to add, remove, or
 | 
			
		||||
**modify the collection of domains** that are allowed, and how many / which domains are listed on each certificate -
 | 
			
		||||
all of which is a _completely_ separate process that lives outside of Greenlock (i.e uploading a site to a new folder).
 | 
			
		||||
 | 
			
		||||
The coupling between the method chosen for storage and the method chosen for approval is inherint, but keep it loose.
 | 
			
		||||
 | 
			
		||||
Lastly, it would be appropriate to include an example `approveDomains()` with your implementation for reference.
 | 
			
		||||
 | 
			
		||||
### 0. approveDomains() is the kick off
 | 
			
		||||
 | 
			
		||||
`approveDomains()` is called only when there is no certificate for a given domain in Greenlock's internal cache
 | 
			
		||||
and when that certificate is "renewable" (typically 15 days before expiration, which is configurable).
 | 
			
		||||
 | 
			
		||||
The user (perhaps you) will have checked in their database (or config file or file system) and retrieved relevant
 | 
			
		||||
details (email associated with the domain, related domains that belong as altnames on the certificate, etc).
 | 
			
		||||
 | 
			
		||||
Those options will be available to _all_ storage and challenge strategies. In fact, they can even change which
 | 
			
		||||
strategy is used (i.e. some users using a Digital Ocean strategy for DNS challenges, others using Route53).
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
function approveDomains(opts) {
 | 
			
		||||
  var info = userDb.getInfo(opts.domain);
 | 
			
		||||
  if (!info) { throw new Error("ignoring junk request, bad domain"); }
 | 
			
		||||
 | 
			
		||||
  opts.email = info.certificateOwner;
 | 
			
		||||
  opts.subject = info.certificateSubject
 | 
			
		||||
  opts.domains = info.certificateAltnames;
 | 
			
		||||
 | 
			
		||||
  return opts; // or Promise.resolve(opts);
 | 
			
		||||
}
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
### 1. Implement `accounts.setKeypair`
 | 
			
		||||
 | 
			
		||||
First, you should implement `accounts.setKeypair()`. Just treat it like dumb storage.
 | 
			
		||||
 | 
			
		||||
This only gets called after a new account has already been created successfully.
 | 
			
		||||
That will only happen when a completely new certificate is going to be issued (not renewal),
 | 
			
		||||
and there's no user account already associate with that set of domains.
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.accounts.setKeypair = function (opts) {
 | 
			
		||||
  console.log('accounts.setKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
  var id = opts.account.id || opts.email || 'default';
 | 
			
		||||
  var keypair = opts.keypair;
 | 
			
		||||
 | 
			
		||||
  cache.accountKeypairs[id] = JSON.stringify({
 | 
			
		||||
    privateKeyPem: keypair.privateKeyPem
 | 
			
		||||
  , privateKeyJwk: keypair.privateKeyJwk
 | 
			
		||||
  });
 | 
			
		||||
 | 
			
		||||
  return null; // or Promise.resolve(null);
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
### 2. Implement `accounts.checkKeypair`
 | 
			
		||||
 | 
			
		||||
Whatever you did above, you just do the opposite instead. Tada!
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.accounts.checkKeypair = function (opts) {
 | 
			
		||||
  console.log('accounts.checkKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
  var id = opts.account.id || opts.email || 'default';
 | 
			
		||||
  var keyblob = cache.accountKeypairs[id];
 | 
			
		||||
 | 
			
		||||
  if (!keyblob) { return null; }
 | 
			
		||||
 | 
			
		||||
  return JSON.parse(keyblob);
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
### 3. (and 4.) Optionally save ACME account metadata
 | 
			
		||||
 | 
			
		||||
You should probably skip this and not worry about it.
 | 
			
		||||
 | 
			
		||||
However, if you have a special need for it, or if you want to shave off an ACME API call,
 | 
			
		||||
you can save the account `kid` (a misnomer intended to mean "key id", but actually refers
 | 
			
		||||
to an arbitrary ACME URL, used to identify the account).
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.accounts.set = function (opts) {
 | 
			
		||||
  console.log('accounts.set:', opts);
 | 
			
		||||
  return null;
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.accounts.check = function (opts) {
 | 
			
		||||
  var id = opts.account.id || opts.email || 'default';
 | 
			
		||||
  console.log('accounts.check:', opts);
 | 
			
		||||
  return null;
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
If you don't implement these the account key will be used to "recover" the `kid` as necessary.
 | 
			
		||||
You don't have to worry though, it doesn't create a duplicate accounts or have any other negative
 | 
			
		||||
side affects other than an additional API call as needed.
 | 
			
		||||
 | 
			
		||||
### 5. Implement a method to save certificate keypairs
 | 
			
		||||
 | 
			
		||||
Each certificate is supposed to have a unique keypair, which **must not** be the same as the account keypair.
 | 
			
		||||
 | 
			
		||||
Again, just treat it like a blob in dumb storage and you'll be fine.
 | 
			
		||||
 | 
			
		||||
This is the same as `accounts.setKeypair()`, but using a different idea.
 | 
			
		||||
You could even use the same data store in most cases because the IDs aren't likely to clash.
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.certificates.setKeypair = function (opts) {
 | 
			
		||||
  console.log('certificates.setKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
  var id = opts.certificate.kid || opts.certificate.id || opts.subject;
 | 
			
		||||
  var keypair = opts.keypair;
 | 
			
		||||
 | 
			
		||||
  cache.certificateKeypairs[id] = JSON.stringify({
 | 
			
		||||
    privateKeyPem: keypair.privateKeyPem
 | 
			
		||||
  , privateKeyJwk: keypair.privateKeyJwk
 | 
			
		||||
  });
 | 
			
		||||
 | 
			
		||||
  return null;
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
### 6. Implement a method to get certificate keypairs
 | 
			
		||||
 | 
			
		||||
You know the drill. Same as `accounts.checkKeypair()`, but a different ID.
 | 
			
		||||
 | 
			
		||||
This isn't called until after the certificate retrieval is successful.
 | 
			
		||||
 | 
			
		||||
Note: Every account **must have** a unique account key and account keys are
 | 
			
		||||
**not allowed** to be used as certificate keys. However, you could use the
 | 
			
		||||
same certificate key for all domains on a device (i.e. a server) or an account.
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.certificates.checkKeypair = function (opts) {
 | 
			
		||||
  console.log('certificates.checkKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
  var id = opts.certificate.kid || opts.certificate.id || opts.subject;
 | 
			
		||||
  var keyblob = cache.certificateKeypairs[id];
 | 
			
		||||
 | 
			
		||||
  if (!keyblob) { return null; }
 | 
			
		||||
 | 
			
		||||
  return JSON.parse(keyblob);
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
### 7. Implement a method to save certificates
 | 
			
		||||
 | 
			
		||||
Whenever the ACME process completes successfully, you get a shiny new certificate with all of the domains you requested.
 | 
			
		||||
 | 
			
		||||
It's a good idea to save them - otherwise you run the risk of running up your rate limit and getting blocked
 | 
			
		||||
as your server restarts, respawns, auto-scales, etc.
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.certificates.set = function (opts) {
 | 
			
		||||
  console.log('certificates.set:', opts);
 | 
			
		||||
 | 
			
		||||
  var id = opts.certificate.id || opts.subject;
 | 
			
		||||
  var pems = opts.pems;
 | 
			
		||||
  cache.certificates[id] = JSON.stringify({
 | 
			
		||||
    cert: pems.cert
 | 
			
		||||
  , chain: pems.chain
 | 
			
		||||
  , subject: pems.subject
 | 
			
		||||
  , altnames: pems.altnames
 | 
			
		||||
  , issuedAt: pems.issuedAt   // a.k.a. NotBefore
 | 
			
		||||
  , expiresAt: pems.expiresAt // a.k.a. NotAfter
 | 
			
		||||
  });
 | 
			
		||||
 | 
			
		||||
  return null;
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
Note that `chain` is likely to be the same for all certificates issued by a service,
 | 
			
		||||
but there's no guarantee. The service may rotate which keys do the signing, for example.
 | 
			
		||||
 | 
			
		||||
### 8. Implement a method to get certificates
 | 
			
		||||
 | 
			
		||||
Lastly, you just need a way to fetch the result of all the work you've done.
 | 
			
		||||
 | 
			
		||||
```js
 | 
			
		||||
store.certificates.check = function (opts) {
 | 
			
		||||
  console.log('certificates.check:', opts);
 | 
			
		||||
 | 
			
		||||
  var id = opts.certificate.id || opts.subject;
 | 
			
		||||
  var certblob = cache.certificates[id];
 | 
			
		||||
 | 
			
		||||
  if (!certblob) { return null; }
 | 
			
		||||
 | 
			
		||||
  return JSON.parse(certblob);
 | 
			
		||||
};
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
# Huzzah!
 | 
			
		||||
 | 
			
		||||
There you go - you basically just have 8 setter and getter functions that usually act as dumb storage,
 | 
			
		||||
but that you can tweak with custom options if you need to.
 | 
			
		||||
 | 
			
		||||
Remember: Keep It Stupid-Simple
 | 
			
		||||
 | 
			
		||||
:D
 | 
			
		||||
							
								
								
									
										144
									
								
								index.js
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										144
									
								
								index.js
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,144 @@
 | 
			
		||||
'use strict';
 | 
			
		||||
 | 
			
		||||
module.exports.create = function (opts) {
 | 
			
		||||
  // pass in database url, connection string, filepath,
 | 
			
		||||
  // or whatever it is you need to get your job done well
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // This is our in-memory storage.
 | 
			
		||||
  // We take it from the outside to make testing the dummy module easier.
 | 
			
		||||
  var cache = opts.cache || {};
 | 
			
		||||
  if (!cache.accounts) { cache.accounts = {}; }
 | 
			
		||||
  if (!cache.certificates) { cache.certificates = {}; }
 | 
			
		||||
  // Although we could have two collections of keypairs,
 | 
			
		||||
  // it's also fine to store both types together.
 | 
			
		||||
  if (!cache.keypairs) { cache.keypairs = {}; }
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  var store = {};
 | 
			
		||||
  // any options you need per instance
 | 
			
		||||
  // (probably okay to leave empty)
 | 
			
		||||
  store.options = {};
 | 
			
		||||
  store.accounts = {};
 | 
			
		||||
  store.certificates = {};
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // Whenever a new keypair is used to successfully create an account, we need to save its keypair
 | 
			
		||||
  store.accounts.setKeypair = function (opts) {
 | 
			
		||||
    console.log('accounts.setKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
    var id = opts.account.id || opts.email || 'default';
 | 
			
		||||
    var keypair = opts.keypair;
 | 
			
		||||
 | 
			
		||||
    cache.keypairs[id] = JSON.stringify({
 | 
			
		||||
      privateKeyPem: keypair.privateKeyPem
 | 
			
		||||
    , privateKeyJwk: keypair.privateKeyJwk
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    return null; // or Promise.resolve(null);
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // We need a way to retrieve a prior account's keypair for renewals and additional ACME certificate "orders"
 | 
			
		||||
  store.accounts.checkKeypair = function (opts) {
 | 
			
		||||
    console.log('accounts.checkKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
    var id = opts.account.id || opts.email || 'default';
 | 
			
		||||
    var keyblob = cache.keypairs[id];
 | 
			
		||||
 | 
			
		||||
    if (!keyblob) { return null; }
 | 
			
		||||
 | 
			
		||||
    return JSON.parse(keyblob);
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // We can optionally implement ACME account storage and retrieval
 | 
			
		||||
  // (to reduce API calls), but it's really not necessary.
 | 
			
		||||
  /*
 | 
			
		||||
    store.accounts.set = function (opts) {
 | 
			
		||||
      console.log('accounts.set:', opts);
 | 
			
		||||
      return null;
 | 
			
		||||
    };
 | 
			
		||||
    store.accounts.check = function (opts) {
 | 
			
		||||
      var id = opts.account.id || opts.email || 'default';
 | 
			
		||||
      console.log('accounts.check:', opts);
 | 
			
		||||
      return null;
 | 
			
		||||
    };
 | 
			
		||||
  */
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // The certificate keypairs must not be the same as any account keypair
 | 
			
		||||
  store.certificates.setKeypair = function (opts) {
 | 
			
		||||
    console.log('certificates.setKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
    var id = opts.certificate.kid || opts.certificate.id || opts.subject;
 | 
			
		||||
    var keypair = opts.keypair;
 | 
			
		||||
 | 
			
		||||
    cache.keypairs[id] = JSON.stringify({
 | 
			
		||||
      privateKeyPem: keypair.privateKeyPem
 | 
			
		||||
    , privateKeyJwk: keypair.privateKeyJwk
 | 
			
		||||
    });
 | 
			
		||||
    // Note: you can use the "keypairs" package to convert between
 | 
			
		||||
    // public and private for jwk and pem, as well as convert JWK <-> PEM
 | 
			
		||||
 | 
			
		||||
    return null;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // You won't be able to use a certificate without it's private key, gotta save it
 | 
			
		||||
  store.certificates.checkKeypair = function (opts) {
 | 
			
		||||
    console.log('certificates.checkKeypair:', opts);
 | 
			
		||||
 | 
			
		||||
    var id = opts.certificate.kid || opts.certificate.id || opts.subject;
 | 
			
		||||
    var keyblob = cache.keypairs[id];
 | 
			
		||||
 | 
			
		||||
    if (!keyblob) { return null; }
 | 
			
		||||
 | 
			
		||||
    return JSON.parse(keyblob);
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // And you'll also need to save certificates. You may find the metadata useful to save
 | 
			
		||||
  // (perhaps to delete expired keys), but the same information can also be redireved from
 | 
			
		||||
  // the key using the "cert-info" package.
 | 
			
		||||
  store.certificates.set = function (opts) {
 | 
			
		||||
    console.log('certificates.set:', opts);
 | 
			
		||||
 | 
			
		||||
    var id = opts.certificate.id || opts.subject;
 | 
			
		||||
    var pems = opts.pems;
 | 
			
		||||
    cache.certificates[id] = JSON.stringify({
 | 
			
		||||
      cert: pems.cert
 | 
			
		||||
    , chain: pems.chain
 | 
			
		||||
    , subject: pems.subject
 | 
			
		||||
    , altnames: pems.altnames
 | 
			
		||||
    , issuedAt: pems.issuedAt   // a.k.a. NotBefore
 | 
			
		||||
    , expiresAt: pems.expiresAt // a.k.a. NotAfter
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    return null;
 | 
			
		||||
  };
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
  // This is actually the first thing to be called after approveDomins(),
 | 
			
		||||
  // but it's easiest to implement last since it's not useful until there
 | 
			
		||||
  // are certs that can actually be loaded from storage.
 | 
			
		||||
  store.certificates.check = function (opts) {
 | 
			
		||||
    console.log('certificates.check:', opts);
 | 
			
		||||
 | 
			
		||||
    var id = opts.certificate.id || opts.subject;
 | 
			
		||||
    var certblob = cache.certificates[id];
 | 
			
		||||
 | 
			
		||||
    if (!certblob) { return null; }
 | 
			
		||||
 | 
			
		||||
    return JSON.parse(certblob);
 | 
			
		||||
  };
 | 
			
		||||
};
 | 
			
		||||
							
								
								
									
										5
									
								
								package-lock.json
									
									
									
										generated
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								package-lock.json
									
									
									
										generated
									
									
									
										Normal file
									
								
							@ -0,0 +1,5 @@
 | 
			
		||||
{
 | 
			
		||||
  "name": "le-store-memory",
 | 
			
		||||
  "version": "1.0.0",
 | 
			
		||||
  "lockfileVersion": 1
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										29
									
								
								package.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										29
									
								
								package.json
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,29 @@
 | 
			
		||||
{
 | 
			
		||||
  "name": "le-store-memory",
 | 
			
		||||
  "version": "1.0.0",
 | 
			
		||||
  "description": "An in-memory reference implementation for account, certificate, and keypair storage strategies in Greenlock",
 | 
			
		||||
  "homepage": "https://git.coolaj86.com/coolaj86/le-store-memory.js",
 | 
			
		||||
  "main": "index.js",
 | 
			
		||||
  "directories": {
 | 
			
		||||
    "test": "tests"
 | 
			
		||||
  },
 | 
			
		||||
  "scripts": {
 | 
			
		||||
    "test": "node tests"
 | 
			
		||||
  },
 | 
			
		||||
  "repository": {
 | 
			
		||||
    "type": "git",
 | 
			
		||||
    "url": "https://git.coolaj86.com/coolaj86/le-store-memory.js.git"
 | 
			
		||||
  },
 | 
			
		||||
  "keywords": [
 | 
			
		||||
    "greenlock",
 | 
			
		||||
    "acme",
 | 
			
		||||
    "json",
 | 
			
		||||
    "keypairs",
 | 
			
		||||
    "certificates",
 | 
			
		||||
    "store",
 | 
			
		||||
    "database"
 | 
			
		||||
  ],
 | 
			
		||||
  "author": "AJ ONeal <coolaj86@gmail.com> (https://coolaj86.com/)",
 | 
			
		||||
  "license": "MPL-2.0",
 | 
			
		||||
  "dependencies": {}
 | 
			
		||||
}
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user