Commit graph

779 commits

Author SHA1 Message Date
xenolf
bc8cfbe0d6 Merge pull request #162 from xi2/googlecloud
googlecloud dns: Make package name match import path
2016-03-19 22:18:49 +01:00
xenolf
c1b0d4387d Merge pull request #105 from aebruno/dns-dyn
Add Dyn DNS provider
2016-03-19 22:18:25 +01:00
Andrew E. Bruno
b10c35bba1 golint fixes.
- dynRequest should be private to dyn package
- Fix JobID name
2016-03-19 16:14:23 -04:00
Michael Cross
516d2a65e1 googlecloud dns: Make package name match import path
Also, add package description
2016-03-19 18:20:01 +00:00
xenolf
cbcaa2da50 Fix namecheap test 2016-03-19 18:05:35 +01:00
xenolf
4562a14383 Fix a few golint errors. 2016-03-19 17:53:16 +01:00
xenolf
d6fb247c29 Fix typo in dns_challenge 2016-03-19 17:48:50 +01:00
xenolf
e06278fead Make DO and namecheap providers use a HTTP client with a timeout. 2016-03-19 17:47:26 +01:00
xenolf
0ba8d6993b Rename googlecloud provider files to be more in-line with the other providers. 2016-03-19 17:40:12 +01:00
Andrew E. Bruno
9f8d5e4076 Add timeout to HTTP client 2016-03-18 23:20:58 -04:00
xenolf
d77634bb2b Merge pull request #141 from peterwald/master
Add DNS challenge provider for Google Cloud DNS
2016-03-18 23:30:11 +01:00
Peter Waldschmidt
4da4506839 Add DNS challenge provider for Google Cloud DNS
Use GCE_PROJECT to designate your GCE project.

Authentication is automatically picked up from gcloud credentials if
running locally and from GCE metadata if run within Google Cloud.

Requires at least permission scope
"https://www.googleapis.com/auth/ndev.clouddns.readwrite"
2016-03-18 11:22:33 -04:00
Andrew E. Bruno
1de97a90da Move dyn provider out of acme package per #144 2016-03-17 22:30:21 -04:00
Andrew E. Bruno
b90b31980a Add Dyn DNS provider
This commit adds support for Dyn, specifically Dyn Managed DNS. Makes
use of the Dyn REST API [1] and requires 3 environment variables for
credentails:

    DYN_CUSTOMER_NAME
    DYN_USER_NAME
    DYN_PASSWORD

The Dyn DNS API requires a session to be established first using the
credentials above, After creating a session an api token is used for
subsequent requests.

The unit test performs a "live test" and currently requires a valid Dyn
account and domain.

[1] https://help.dyn.com/rest/
2016-03-17 22:08:00 -04:00
xenolf
9ba0eda945 Add go 1.6 to travis tests 2016-03-18 02:44:16 +01:00
xenolf
7ca253d0dc Merge pull request #155 from beevik/cleanup-help
Add a separate 'dnshelp' command.
2016-03-18 02:05:40 +01:00
Brett Vickers
855dff01da Add a separate 'dnshelp' command.
Move the DNS provider (--dns) help to a separate command and elaborate on its usage by providing an example.
This should reduce clutter in the the help system's usage text.
2016-03-17 17:32:24 -07:00
xenolf
19d96bab0b Merge pull request #153 from beevik/namecheap
Add DNS challenge provider for namecheap.
2016-03-18 01:12:18 +01:00
Brett Vickers
55968bcd21 Add DNS challenge provider for namecheap. 2016-03-17 14:17:56 -07:00
xenolf
8c3023d198 Merge pull request #133 from xi2/gandi-dns-challenge-provider
Add Gandi DNS challenge provider
2016-03-17 16:07:41 +01:00
xenolf
faed8af4f2 Merge pull request #148 from xi2/challenge-provider-custom-timeout
Add ChallengeProviderTimeout type to acme package
2016-03-17 13:34:37 +01:00
Michael Cross
bcd4e51d65 Add Gandi DNS challenge provider 2016-03-16 18:32:56 +00:00
Michael Cross
8aa797f49d Add ChallengeProviderTimeout type to acme package
This type allows for implementing DNS ChallengeProviders that require
an unsually long timeout when checking for record propagation.
2016-03-16 18:17:03 +00:00
xenolf
f00bb8b4bb Merge pull request #154 from xi2/improve-challengeprovider-comment
Improve wording of ChallengeProvider comment
2016-03-16 16:00:47 +01:00
xenolf
118d9d5ec9 Adjust naming of webroot provider to be in line with DNS providers. 2016-03-16 11:32:09 +01:00
xenolf
325db78c91 Merge pull request #118 from adriencarbonne/master
Added a --webroot option for HTTP challenge
2016-03-16 11:09:38 +01:00
Michael Cross
f70a48e28a Improve wording of ChallengeProvider comment 2016-03-15 12:46:48 +00:00
Adrien Carbonne
0886c37703 Excluding DNS01 and TLSSNI01 challenges if --webroot is used 2016-03-15 11:38:23 +01:00
Adrien Carbonne
4116254e6c Fixed CLI after WebRoot provider was moved 2016-03-14 11:52:45 +01:00
Adrien Carbonne
7ebad0e886 Relocating provider to lego/providers/http/webroot 2016-03-14 11:49:02 +01:00
Adrien Carbonne
eb773f17d2 Merge remote-tracking branch 'refs/remotes/xenolf/master' 2016-03-14 11:20:15 +01:00
xenolf
98c95e83c9 Add link to account to certificate meta data. 2016-03-14 03:29:29 +01:00
xenolf
06fc07007f Merge pull request #144 from xenolf/refactor-providers
Move DNS providers out of ACME package.
2016-03-14 02:46:14 +01:00
Adrien Carbonne
f9ae3791c5 Fixed typo in readme.md 2016-03-13 16:36:13 +01:00
xenolf
3252b0bcb9 Fix WaitFor calls 2016-03-11 04:52:59 +01:00
xenolf
c50baa67cb Move WaitFor into new utils.go and switch timeout and interval to time.Duration. 2016-03-11 03:52:46 +01:00
xenolf
2ae35a755d Rename provider types as provider names are already in the package name. Added package level comments and fixed the name of the interface the providers are importing. 2016-03-11 03:46:09 +01:00
xenolf
9008ec6949 Move functions from dns package back into ACME. 2016-03-11 03:40:28 +01:00
xenolf
b412c67aa6 Move providers out of ACME package. 2016-03-03 01:14:32 +01:00
xenolf
39eef1c2f6 Merge pull request #143 from middelink/issue-140-multi-zone-certs
Issue/140: Using RFC2136 dns challenge does not allow me to create multi domain certs.
2016-03-03 00:21:10 +01:00
Pauline Middelink
8b90b1a380 Added testcase for in-valid.co.uk
Camelcased: fqdn2zone to fqdnToZone
Grammatical fix in externally visible error message
2016-02-29 08:46:15 +01:00
Pauline Middelink
4945919c69 - Moved findZone from rfc2136 to dns_challenge.go and renamed to findZoneByFqdn
- Reworked the code in dns_challenge.go to not assume nameserver is
   port-less or defaults to 53. (messes up testing)
- Updated nameserver test to clear the fqdn2zone cache and return a dummy
  SOA RR to make initial findZoneByFqdn call happy.
- Used publicsuffix library to determine if the "authorative" zone we found
  is a public registry, in that case error out. (Also used by boulder btw)
2016-02-28 21:09:05 +01:00
Pauline Middelink
bc5c3b53e1 Merge remote-tracking branch 'upstream/master' into issue-140-multi-zone-certs
Conflicts solved:
	README.md
	cli.go
2016-02-28 15:42:09 +01:00
xenolf
e316284682 Merge pull request #139 from middelink/master
Some small textual fixes and adding a flag to supress bundle creation.
2016-02-28 07:10:08 +01:00
Pauline Middelink
e772779caf Fix for issue/140:
- Removal of RFC2136_ZONE from help text
 - Query nameserver directly to find zone we have to update
 - During insert, make sure the new record is the ONLY challence.
   (I had a few panics, hence 3 challences left. Not good.)
2016-02-28 01:08:59 +01:00
Pauline Middelink
b5e0b91c05 Merge remote-tracking branch 'upstream/master' 2016-02-27 17:47:25 +01:00
Pauline Middelink
3b56b5a3e2 As per request, renamed nobundle to no-bundle to be more in line with the other multi word switches. 2016-02-27 10:46:13 +01:00
xenolf
fcd05ae397 Merge pull request #130 from xenolf/add-ecc-support
Add EC support
2016-02-27 03:38:12 +01:00
Pauline Middelink
96762fa6ba Add --nobundle flag to supress the default creation of certificate bundle. 2016-02-26 02:57:16 +01:00
Pauline Middelink
6b0be6de61 Update help+README for missing RFC2136_TSIG_ALGORITHM environment setting. 2016-02-26 02:56:17 +01:00