lego/CHANGELOG.md

83 lines
4.9 KiB
Markdown
Raw Permalink Normal View History

2015-12-21 01:21:23 +00:00
# Changelog
2016-03-19 21:43:26 +00:00
## [0.3.0] - 2016-03-19
2016-01-30 23:30:35 +00:00
### Added:
2016-03-19 21:43:26 +00:00
- CLI: The `--dns` switch. To include the DNS challenge for consideration. When using this switch, all other solvers are disabled. Supported are the following solvers: cloudflare, digitalocean, dnsimple, dyn, gandi, googlecloud, namecheap, route53, rfc2136 and manual.
- CLI: The `--accept-tos` switch. Indicates your acceptance of the Let's Encrypt terms of service without prompting you.
2016-03-19 21:43:26 +00:00
- CLI: The `--webroot` switch. The HTTP-01 challenge may now be completed by dropping a file into a webroot. When using this switch, all other solvers are disabled.
- CLI: The `--key-type` switch. This replaces the `--rsa-key-size` switch and supports the following key types: EC256, EC384, RSA2048, RSA4096 and RSA8192.
- CLI: The `--dnshelp` switch. This displays a more in-depth help topic for DNS solvers.
- CLI: The `--no-bundle` sub switch for the `run` and `renew` commands. When this switch is set, the CLI will not bundle the issuer certificate with your certificate.
2016-01-30 23:30:35 +00:00
- lib: A new type for challenge identifiers `Challenge`
2016-03-19 21:43:26 +00:00
- lib: A new interface for custom challenge providers `acme.ChallengeProvider`
- lib: A new interface for DNS-01 providers to allow for custom timeouts for the validation function `acme.ChallengeProviderTimeout`
2016-01-30 23:30:35 +00:00
- lib: SetChallengeProvider function. Pass a challenge identifier and a Provider to replace the default behaviour of a challenge.
- lib: The DNS-01 challenge has been implemented with modular solvers using the `ChallengeProvider` interface. Included solvers are: cloudflare, digitalocean, dnsimple, gandi, namecheap, route53, rfc2136 and manual.
2016-03-19 21:43:26 +00:00
- lib: The `acme.KeyType` type was added and is used for the configuration of crypto parameters for RSA and EC keys. Valid KeyTypes are: EC256, EC384, RSA2048, RSA4096 and RSA8192.
2016-01-30 23:30:35 +00:00
### Changed
- lib: ExcludeChallenges now expects to be passed an array of `Challenge` types.
- lib: HTTP-01 now supports custom solvers using the `ChallengeProvider` interface.
- lib: TLS-SNI-01 now supports custom solvers using the `ChallengeProvider` interface.
2016-03-19 21:43:26 +00:00
- lib: The `GetPrivateKey` function in the `acme.User` interface is now expected to return a `crypto.PrivateKey` instead of an `rsa.PrivateKey` for EC compat.
- lib: The `acme.NewClient` function now expects an `acme.KeyType` instead of the keyBits parameter.
2016-01-30 23:30:35 +00:00
### Removed
2016-03-19 21:43:26 +00:00
- CLI: The `rsa-key-size` switch was removed in favor of `key-type` to support EC keys.
2016-01-30 23:30:35 +00:00
### Fixed
- lib: Fixed a race condition in HTTP-01
- lib: Fixed an issue where status codes on ACME challenge responses could lead to no action being taken.
- lib: Fixed a regression when calling the Renew function with a SAN certificate.
2016-01-09 11:29:35 +00:00
## [0.2.0] - 2016-01-09
2015-12-21 20:10:13 +00:00
### Added:
- CLI: The `--exclude` or `-x` switch. To exclude a challenge from being solved.
2016-01-08 07:19:09 +00:00
- CLI: The `--http` switch. To set the listen address and port of HTTP based challenges. Supports `host:port` and `:port` for any interface.
- CLI: The `--tls` switch. To set the listen address and port of TLS based challenges. Supports `host:port` and `:port` for any interface.
2016-01-08 09:17:35 +00:00
- CLI: The `--reuse-key` switch for the `renew` operation. This lets you reuse an existing private key for renewals.
- lib: ExcludeChallenges function. Pass an array of challenge identifiers to exclude them from solving.
2016-01-08 07:19:09 +00:00
- lib: SetHTTPAddress function. Pass a port to set the listen port for HTTP based challenges.
- lib: SetTLSAddress function. Pass a port to set the listen port of TLS based challenges.
- lib: acme.UserAgent variable. Use this to customize the user agent on all requests sent by lego.
### Changed:
- lib: NewClient does no longer accept the optPort parameter
- lib: ObtainCertificate now returns a SAN certificate if you pass more then one domain.
2016-01-08 07:19:09 +00:00
- lib: GetOCSPForCert now returns the parsed OCSP response instead of just the status.
2016-01-08 09:17:35 +00:00
- lib: ObtainCertificate has a new parameter `privKey crypto.PrivateKey` which lets you reuse an existing private key for new certificates.
- lib: RenewCertificate now expects the PrivateKey property of the CertificateResource to be set only if you want to reuse the key.
### Removed:
- CLI: The `--port` switch was removed.
2016-01-08 07:19:09 +00:00
- lib: RenewCertificate does no longer offer to also revoke your old certificate.
2015-12-21 20:10:13 +00:00
### Fixed:
- CLI: Fix logic using the `--days` parameter for renew
2015-12-21 20:10:13 +00:00
2015-12-21 01:21:23 +00:00
## [0.1.1] - 2015-12-18
### Added:
- CLI: Added a way to automate renewal through a cronjob using the --days parameter to renew
### Changed:
- lib: Improved log output on challenge failures.
### Fixed:
- CLI: The short parameter for domains would not get accepted
- CLI: The cli did not return proper exit codes on error library errors.
- lib: RenewCertificate did not properly renew SAN certificates.
### Security
- lib: Fix possible DOS on GetOCSPForCert
## [0.1.0] - 2015-12-03
2015-12-23 22:31:03 +00:00
- Initial release
2016-03-19 21:43:26 +00:00
[0.3.0]: https://github.com/xenolf/lego/compare/v0.2.0...v0.3.0
2016-01-09 11:29:35 +00:00
[0.2.0]: https://github.com/xenolf/lego/compare/v0.1.1...v0.2.0
2015-12-23 22:31:03 +00:00
[0.1.1]: https://github.com/xenolf/lego/compare/v0.1.0...v0.1.1
[0.1.0]: https://github.com/xenolf/lego/tree/v0.1.0