summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2016-04-09generate stub CertSpec objects from config fileAndrew Cady
(CertSpec is the new name for AcmeCertRequest)
2016-04-09stub parsing of yaml config fileAndrew Cady
2016-04-09import Data.Yaml.ConfigAndrew Cady
2016-04-09Separate CLI into subcommandsAndrew Cady
Viz. 'update' and 'certify' 'certify' is just the previous CLI. 'update' is unimplemented. The binary was renamed from 'acme-certify' to 'acme' to reflect this.
2016-04-09Trivial, formattingAndrew Cady
2016-04-09Move generation of CSR into `certify` functionAndrew Cady
2016-04-08More renames/cleanup related to HttpProvisionerAndrew Cady
2016-04-08Improve HttpProvisioner interfaceAndrew Cady
These still need to be renamed
2016-04-08More refactoringAndrew Cady
2016-04-08Change type of HttpProvisionerAndrew Cady
Now it is parameterized on domain name. This will allow to provision to a different directory for each (sub)domain.
2016-04-08slight refactorAndrew Cady
2016-01-28non-semantic changesAndrew Cady
2016-01-28http 300 response is not successAndrew Cady
2016-01-27Re-order some definitions (no semantic changes)Andrew Cady
2016-01-27remove Keys type from Network.ACME.EncodingAndrew Cady
2016-01-27Embed issuer certificate in binaryAndrew Cady
This permits the program to be run from outside the source directory.
2016-01-27clean up http-served files after challenges completeAndrew Cady
2016-01-26bump stack resolver to lts-5.0Andrew Cady
2016-01-26Improve documentationAndrew Cady
2016-01-26Pre-generate DH paramsAndrew Cady
The program now outputs a combined PEM certificate. A new option allows DH-param generation to be disabled.
2016-01-26use Control.ErrorAndrew Cady
2016-01-25generate DH params; use PEM for final outputAndrew Cady
this needs to be made optional and the DH params should be cached, because generating them is very slow.
2016-01-25move genReq into the libraryAndrew Cady
2016-01-25Change API of "certify"Andrew Cady
It now expects a callback to provision the challenge responses. This needs to be improved so that it will also do cleanup.
2016-01-24update documentationAndrew Cady
2016-01-24poll for challenge results before getting certificateAndrew Cady
2016-01-24fix warningsAndrew Cady
2016-01-24Oops; don't use "show" with DomainName typeAndrew Cady
2016-01-24Don't save CSR to disk; cleanupAndrew Cady
2016-01-24use BasePreludeAndrew Cady
2016-01-24split out another moduleAndrew Cady
2016-01-24rename module & files; remove unused depsAndrew Cady
2016-01-24Function 'certify' now returns certificate dataAndrew Cady
(previously it saved to a file)
2016-01-24validate domain namesAndrew Cady
2016-01-24validate URIsAndrew Cady
2016-01-24Validate email addressAndrew Cady
2016-01-24Remove unused imports, extensions, & definitionsAndrew Cady
2016-01-23change package name to "acme-certify"Andrew Cady
2016-01-23add support for multi-domain (subjectAltName) certificatesAndrew Cady
2016-01-22Use subjectAltName X509v3 extensionAndrew Cady
2016-01-22use HsOpenSSL version that actually worksAndrew Cady
2016-01-22move key reading function into exported libraryAndrew Cady
2016-01-22Factored out Network.ACME libraryAndrew Cady
2016-01-22Avoid calling "openssl req" external processAndrew Cady
This required patching HsOpenSSL. stack.yaml has been updated to pull the patched version from github. stack.yaml was also updated to lts-4.2.
2016-01-21helper function to replace "flip unless" uglinessAndrew Cady
2016-01-21Fail earlierAndrew Cady
Checks that the output dirs are writable and that writing to the challenge dir results in a file hosted at the proper URL. I once had a linksys router that would forward incoming TCP connections to a machine on my LAN, but would not route connections from that machine to itself over the public IP. This check would break on such a configuration; I suppose it might be made optional.
2016-01-21add option --domain-dirAndrew Cady
also renamed --dir to --challenge-dir
2016-01-21update documentation to reflect new codeAndrew Cady
2016-01-21Generate RSA keys and CSRs using HsOpenSSLAndrew Cady
Unfortunately, an external process is still needed to convert x509 CSRs from PEM to DER.
2016-01-21It _does_ work!Andrew Cady
The fix was: don't repeat the request after seeing "pending." Turns out the cert was actually being issued. Besides that, a "--staging" option was added to allow testing against Let's Encrypt staging servers. This is necessary for success because I am now rate-limited! Error reporting is improved and code is cleaned up somewhat.