acme
Version information
This version is compatible with:
- Puppet Enterprise 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x
- Puppet >= 6.0.0 < 8.0.0
- , , , ,
This module has been deprecated by its author since Jul 11th 2023.
The reason given was: new maintainer
The author has suggested markt-acme as its replacement.
Start using this module
Documentation
puppet-acme
Table of Contents
Overview
Centralized SSL certificate management using Let's Encrypt™ or other ACME CA's. Keep your private keys safe on the host they belong to and let your Puppet Server sign the CSRs and distribute the certificates.
Requirements
- Puppet 6+ with Exported Resources enabled (PuppetDB)
- A compatible DNS provider to validate your ACME certificates
Furthermore it is highly recommended to use hiera-eyaml to protect sensitive information (such as DNS API secrets).
Workflow
For every configured certificate, this module creates a private key and CSR, transfers the CSR to your Puppet Server where it is signed using the popular and lightweight acmesh-official/acme.sh.
Signed certificates are shipped back to the originating host. The private key is never exposed.
You just need to specify the required challenge configuration on your Puppet Server. All DNS-01 hooks that are supported by acme.sh will work immediately.
Setup
Configure your Puppet Server
The whole idea is centralized certificate management, thus you have to add some configuration on your Puppet Server.
First configure the ACME accounts that are available to issue certificates:
Class { 'acme':
accounts => ['certmaster@example.com', 'ssl@example.com']
...
}
Next add configuration for the challenge types you want to use, we call each configuration a "profile":
Class { 'acme':
accounts => ['certmaster@example.com', 'ssl@example.com'],
profiles => {
nsupdate_example => {
challengetype => 'dns-01',
hook => 'nsupdate',
env => {
'NSUPDATE_SERVER' => 'bind.example.com'
},
options => {
dnssleep => 15,
nsupdate_id => 'example-key',
nsupdate_type => 'hmac-md5',
nsupdate_key => 'abcdefg1234567890',
}
},
route53_example => {
challengetype => 'dns-01',
hook => 'aws',
env => {
'AWS_ACCESS_KEY_ID' => 'foobar',
'AWS_SECRET_ACCESS_KEY' => 'secret',
},
options => {
dnssleep => 15,
}
}
}
}
In this example we create two "profiles": One is utilizing the "nsupdate" hook to communicate with a BIND DNS server and the other one uses the "aws" hook to communicate with Amazon Route53.
Note that the hook
parameter must exactly match the name of the hook that is used by acmesh-official/acme.sh.
Some DNS hooks require environment variables that contain usernames or API tokens,
simply add them to the env
parameter.
All CSRs are collected and signed on your Puppet Server via PuppetDB, and the resulting certificates and CA chain files are shipped back to the originating host via PuppetDB.
Usage
Request a certificate
On the Puppet node where you need the certificate(s):
class { 'acme':
certificates => {
# issue a test certificate
test.example.com => {
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
}
# a cert for the current FQDN is nice too
${::fqdn} => {
use_profile => 'nsupdate_example',
use_account => 'certmaster@example.com',
ca => 'letsencrypt',
},
}
}
Note: The use_profile
and use_account
parameters must match the profiles
and accounts that you've previously configured on your Puppet Server. Otherwise
the module will refuse to issue the certificate.
The private key and CSR will be generated on your node and the CSR is shipped to your Puppet Server for signing. The certificate is put on your node as soon as it was signed on your Puppet Server.
Instead of specifying the domains as parameter to the acme
class, it is
also possible to use the acme::certificate
defined type directly:
acme::certificate { 'test.example.com':
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
}
Using other ACME CA's
This module uses the Let's Encrypt ACME CA by default. The default ACME CA can be changed on the Puppet Server:
Class { 'acme':
default_ca => 'zerossl',
ca_whitelist => ['letsencrypt', 'letsencrypt_test', 'zerossl'],
...
}
Note that other CA's must always be added to the $ca_whitelist
, otherwise issueing
certificates will fail for this CA. By default only 'letsencrypt' and 'letsencrypt_test'
are whitelisted.
Besides that a different CA can also be specified for individual certificates:
class { 'acme':
certificates => {
test.example.com => {
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'zerossl',
}
}
}
SAN certificates
Requesting SAN certificates is easy too. To do so add a space separated list
of domain names to the certificates
hash.
The first domain name in each list is used as the base domain for the request.
For example:
class { 'acme':
certificates => {
'test.example.com foo.example.com bar.example.com' => {
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
}
}
Or use the defined type directly:
acme::certificate { 'test.example.com foo.example.com bar.example.com':
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
}
In both examples "test.example.com" will be used as base domain for the CSR.
Alternatively, you can specify the domains explicitly:
class { 'acme':
certificates => {
'test.example.com' => {
domain => 'test.example.com foo.example.com bar.example.com',
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
}
}
or as a list of domains:
class { 'acme':
certificates => {
'test.example.com' => {
domain => ['test.example.com', 'foo.example.com', 'bar.example.com'],
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
}
}
It is recommended to use the first domain as name for the certificate resource, to increase compatibility with the acme.sh script. However, it is not a strict requirement, and is not possible when multiple certificates are required for the same base name (see below).
Multiple certificates for one base domain
Sometimes you need to issue multiple certificates for the same base domain. This can happen either on a single node (for example one certificate with ocsp_must_staple flag set, and one without it), or on multiple nodes (for example two failover nodes serving the same domain).
You can use the resource name to specify a unique identifier, and the domain
parameter to
explicitly list the domain(s):
class { 'acme':
certificates => {
'mail.example.com (webserver)' => {
domain => 'mail.example.com',
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
},
'mail.example.com (mailserver)' => {
domain => 'mail.example.com',
use_profile => 'route53_example',
use_account => 'ssl@example.com',
ca => 'letsencrypt_test',
ocsp_must_staple => true,
}
}
}
Please note that this functionality relies on an undocumented feature of acme.sh.
DNS alias mode
In order to use DNS alias mode, specify the domain name either in the challenge_alias
or domain_alias
parameter of your profile:
Class { 'acme':
accounts => ['certmaster@example.com', 'ssl@example.com'],
profiles => {
route53_example => {
challengetype => 'dns-01',
challenge_alias => 'alias-example.com',
hook => 'aws',
env => {
AWS_ACCESS_KEY_ID => 'foobar',
AWS_SECRET_ACCESS_KEY => 'secret',
},
options => {
challenge_alias => 'alias-example.com',
dnssleep => 15,
}
}
}
}
Testing and Debugging
For testing purposes you should use a test CA, such as letsencrypt_test
. Otherwise
you will hit rate limits pretty soon. It is possible to set the default CA on
your Puppet Server by using the default_ca
parameter:
class { 'acme' :
default_ca => 'letsencrypt_test'
}
Or you can use this parameter directly when configuring certificates on your Puppet nodes, as shown in the previous examples.
Note that certificates generated by a test CA cannot be validated and as a result will generate security warnings.
Updating acme.sh
This module automatically updates acme.sh to the latest version, which may not
always be desirable. It is possible to change the $acme_revision
parameter to
install a specific version of acme.sh:
class { 'acme' :
acme_revision => '9293bcfb1cd5a56c6cede3f5f46af8529ee99624'
}
The revision should be taken from the official acme.sh repository. In order to revert to the latest version, the value should be set to 'master'.
Examples
Apache
Using acme
in combination with puppetlabs-apache:
# request a certificate from acme
acme::certificate { $::fqdn:
use_profile => 'nsupdate_example',
use_account => 'certmaster@example.com',
ca => 'letsencrypt',
# restart apache when the certificate is signed (or renewed)
notify => Class['apache::service'],
}
# get configuration from acme
include acme
$base_dir = $acme::base_dir
$crt_dir = $acme::crt_dir
$key_dir = $acme::key_dir
# where acme stores our certificate and key files
$my_key = "${key_dir}/${::fqdn}/private.key"
$my_cert = "${crt_dir}/${::fqdn}/cert.pem"
$my_chain = "${crt_dir}/${::fqdn}/chain.pem"
# configure apache
include apache
apache::vhost { $::fqdn:
port => '443',
docroot => '/var/www/example',
ssl => true,
ssl_cert => "/etc/ssl/${::fqdn}.crt",
ssl_ca => "/etc/ssl/${::fqdn}.ca",
ssl_key => "/etc/ssl/${::fqdn}.key",
}
# copy certificate files
file { "/etc/ssl/${::fqdn}.crt":
ensure => file,
owner => 'root',
group => 'root',
mode => '0644',
source => $my_cert,
subscribe => Acme::Certificate[$::fqdn],
notify => Class['apache::service'],
}
file { "/etc/ssl/${::fqdn}.key":
ensure => file,
owner => 'root',
group => 'root',
mode => '0640',
source => $my_key,
subscribe => Acme::Certificate[$::fqdn],
notify => Class['apache::service'],
}
file { "/etc/ssl/${::fqdn}.ca":
ensure => file,
owner => 'root',
group => 'root',
mode => '0644',
source => $my_chain,
subscribe => Acme::Certificate[$::fqdn],
notify => Class['apache::service'],
}
Reference
Files and directories
Locations of the important certificate files (i.e. "cert.example.com"):
/etc/acme.sh/certs/cert.example.com/cert.pem
: the certificate/etc/acme.sh/certs/cert.example.com/chain.pem
: the CA chain/etc/acme.sh/certs/cert.example.com/fullchain.pem
: Certificate and CA chain in one file/etc/acme.sh/certs/cert.example.com/cert.ocsp
: OCSP Must-Staple extension data/etc/acme.sh/keys/cert.example.com/private.key
: Private key/etc/acme.sh/keys/cert.example.com/fullchain_with_key.pem
: All-in-one: certificate, CA chain, private key
Basic directory layout:
/etc/acme.sh/accounts
: (Puppet Server) Private keys and other files related to ACME accounts/etc/acme.sh/certs
: Certificates, CA chains and OCSP files/etc/acme.sh/configs
: OpenSSL configuration and other files required for the CSR/etc/acme.sh/csrs
: Certificate signing requests (CSR)/etc/acme.sh/home
: (Puppet Server) Working directory for acme.sh/etc/acme.sh/keys
: Private keys for each certificate/etc/acme.sh/results
: (Puppet Server) Working directory, used to export certificates/opt/acme.sh
: (Puppet Server) Local copy of acme.sh (GIT repository)/var/log/acme.sh/acme.log
: (Puppet Server) acme.sh log file
Classes and parameters
Classes and parameters are documented in REFERENCE.md.
Limitations
Requires multiple Puppet runs
It takes several puppet runs to issue a certificate. Two Puppet runs are required to prepare the CSR on your Puppet node. Two more Puppet runs on your Puppet Server are required to sign the certificate and send it to PuppetDB. Now it's ready to be collected by your Puppet node.
The process is seamless for certificate renewals, but it takes a little time to issue a new certificate.
HTTP-01 challenge type untested
The HTTP-01 challenge type is theoretically supported, but it is untested with this module. Some additional parameters may be missing. Feel free to report issues or suggest enhancements.
Rebuilding nodes
When rebuilding or reinstalling an existing node, the module will be unable to create new or update existing certificates for this node. Instead a key mismatch will occur, because an entirely new private key will be created on the node.
There is currently no way to fix this automatically #6.
The old files can be manually cleaned on the Puppet Server by running something like this:
find /etc/acme.sh -name '*NODENAME*' -type f -delete
Besides that it may also be necessary to purge the old PuppetDB contents for this node.
OS Compatibility
This module was tested on CentOS/RedHat, Ubuntu/Debian and FreeBSD. Please open a new issue if your operating system is not supported yet, and provide information about problems or missing features.
Development
Please use the GitHub issues functionality to report any bugs or requests for new features. Feel free to fork and submit pull requests for potential contributions.
Fork
This module is a fork of the excellent bzed/bzed-letsencrypt. The fork was necessary in order to use acme.sh instead of dehydrated.
License
Copyright (C) 2017-2021 Frank Wall
Based on bzed/bzed-letsencrypt, Copyright 2017 Bernd Zeimetz.
Let's Encrypt is a trademark of the Internet Security Research Group. All rights reserved.
See the LICENSE
file for further information.
Reference
Table of Contents
Classes
Public Classes
acme
: Install and configure acme.sh to manage SSL certificates
Private Classes
acme::request::handler
: Gather all data and use acme.sh to create accounts and sign certificates.acme::setup::common
: Setup all necessary directories, users and groups.acme::setup::puppetmaster
: Setup acme.sh and all necessary directories and packages.
Defined types
Public Defined types
acme::certificate
: Request a certificate.
Private Defined types
acme::csr
: Create a Certificate Signing Request (CSR) and send it to PuppetDBacme::deploy
: Collects signed certificates for this host from PuppetDB.acme::deploy::crt
: Install a signed certificate on the target host.acme::request
: A request to sign a CSR or renew a certificate.acme::request::crt
: Fetch the certificate from facter and export it via PuppetDB.acme::request::ocsp
: Retrieve ocsp stapling information
Functions
file_or_empty_string
: Return the contents of a file. Multiple files can be passed, and the first file that exists will be read in.
Classes
acme
Install and configure acme.sh to manage SSL certificates
Parameters
The following parameters are available in the acme
class.
accounts
Data type: Array
An array of e-mail addresses that acme.sh may use during the ACME account registration. Should only be defined on $acme_host.
acct_dir
Data type: Stdlib::Compat::Absolute_path
The directory for acme.sh accounts.
acme_dir
Data type: Stdlib::Compat::Absolute_path
The working directory for acme.sh.
acme_git_url
Data type: String
URL to the acme.sh GIT repository. Defaults to the official GitHub project. Feel free to use a local mirror or fork.
acme_git_force
Data type: Boolean
Force repository creation, destroying any files on the path in the process. Useful when the repo URL has changed.
acme_host
Data type: String
The host you want to run acme.sh on. For now it needs to be a puppetmaster, as it needs direct access to the certificates using functions in Puppet.
acme_install_dir
Data type: Stdlib::Compat::Absolute_path
The installation directory for acme.sh.
acme_revision
Data type: String
The GIT revision of the acme.sh repository. Defaults to master
which should
contain a stable version of acme.sh.
acmecmd
Data type: String
The binary path to acme.sh.
acmelog
Data type: Stdlib::Compat::Absolute_path
The log file.
base_dir
Data type: Stdlib::Compat::Absolute_path
The configuration base directory for acme.sh.
ca_whitelist
Data type: Array
Specifies the CAs that may be used on $acme_host
. The module will register
any account specified in $accounts
with all specified CAs. This ensure that
these accounts are ready for use.
certificates
Data type: Hash
Array of full qualified domain names you want to request a certificate for. For SAN certificates you need to pass space seperated strings, for example ['foo.example.com fuzz.example.com', 'blub.example.com']
cfg_dir
Data type: Stdlib::Compat::Absolute_path
The directory for acme.sh configs.
crt_dir
Data type: Stdlib::Compat::Absolute_path
The directory for acme.sh certificates.
csr_dir
Data type: Stdlib::Compat::Absolute_path
The directory for acme.sh CSRs.
date_expression
Data type: String
The command used to calculate renewal dates for existing certificates.
default_ca
Data type: Enum['buypass', 'buypass_test', 'letsencrypt', 'letsencrypt_test', 'sslcom', 'zerossl']
The default ACME CA you want to use. May be overriden by specifying a
different value for $ca
for the certificate.
Previous versions of acme.sh used to have Let's Encrypt as their default CA,
hence this is the default value for this Puppet module.
dh_param_size
Data type: Integer
Specifies the DH parameter size, defaults to 2048
.
dnssleep
Data type: Integer
The time in seconds acme.sh should wait for all DNS changes to take effect.
Settings this to 0
disables the sleep mechanism and lets acme.sh poll DNS
status automatically by using DNS over HTTPS.
exec_timeout
Data type: Integer
Specifies the time in seconds that any acme.sh operation can take before
it is aborted by Puppet. This should usually be set to a higher value
than $dnssleep
.
group
Data type: String
The group for acme.sh.
key_dir
Data type: Stdlib::Compat::Absolute_path
The directory for acme.sh keys.
log_dir
Data type: Stdlib::Compat::Absolute_path
The log directory for acme.sh.
manage_packages
Data type: Boolean
Whether the module should install necessary packages, mainly git.
Set to false
to disable package management.
ocsp_must_staple
Data type: Boolean
Whether to request certificates with OCSP Must-Staple extension, defaults to true
.
ocsp_request
Data type: Stdlib::Compat::Absolute_path
The script used by acme.sh to get OCSP data.
path
Data type: String
The content of the PATH env variable when running Exec resources.
posthook_cmd
Data type: String
Specifies a optional command to run after a certificate has been changed.
profiles
Data type: Optional[Hash]
A hash of profiles that contain information how acme.sh should sign certificates. A profile defines not only the challenge type, but also all required parameters and credentials used by acme.sh to sign the certificate. Should only be defined on $acme_host.
Default value: undef
proxy
Data type: Optional[String]
Proxy server to use to connect to the ACME CA, for example proxy.example.com:3128
Default value: undef
renew_days
Data type: Integer
Specifies the interval at which certs should be renewed automatically. Defaults to 60
.
results_dir
Data type: Stdlib::Compat::Absolute_path
The output directory for acme.sh.
shell
Data type: String
The shell for the acme.sh user account.
stat_expression
Data type: String
The command used to get the modification time of a file.
user
Data type: String
The user for acme.sh.
Defined types
acme::certificate
Request a certificate.
Parameters
The following parameters are available in the acme::certificate
defined type.
acme_host
Data type: String
The host you want to run acme.sh on. Usually your Puppet Server.
Defaults to $acme::acme_host
.
Default value: $acme::acme_host
ca
Data type: Optional[Enum['buypass', 'buypass_test', 'letsencrypt', 'letsencrypt_test', 'sslcom', 'zerossl']]
The ACME CA that should be used. Used to overwrite the default
CA that is configured on $acme_host
.
Default value: undef
dh_param_size
Data type: Integer
dh parameter size, defaults to $::acme::dh_param_size
Default value: $acme::dh_param_size
domain
Data type: Variant[String, Array[String], Undef]
Full qualified domain names you want to request a certificate for. For SAN certificates you need to pass space seperated strings, for example 'foo.example.com fuzz.example.com', or an array of names.
If no domain is specified, the resource name will be parsed as a list of domains, and the first domain will be used as certificate name.
Default value: undef
ocsp_must_staple
Data type: Boolean
request certificate with OCSP Must-Staple exctension, defaults to $::acme::ocsp_must_staple
Default value: $acme::ocsp_must_staple
posthook_cmd
Data type: String
Specifies a optional command to run after a certificate has been changed.
Default value: $acme::posthook_cmd
renew_days
Data type: Integer
Specifies the interval at which certs should be renewed automatically. Defaults to 60
.
Default value: $acme::renew_days
use_account
Data type: String
The ACME account that should be used (or registered).
This account must exist in $accounts
on your $acme_host
.
use_profile
Data type: String
Specify the profile that should be used to sign the certificate.
This profile must exist in $profiles
on your $acme_host
.
Functions
file_or_empty_string
Type: Ruby 3.x API
Return the contents of a file. Multiple files can be passed, and the first file that exists will be read in.
file_or_empty_string()
Return the contents of a file. Multiple files can be passed, and the first file that exists will be read in.
Returns: Any
Changelog
All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog and this project adheres to Semantic Versioning.
4.0.0 - 2022-12-16
This major release aims to be compatible with all existing configurations. However, a lot was changed unter the hood so be careful when deploying this release.
Added
- Allow the same certificate on multiple nodes (#40)
Changed
- Replace dependency camptocamp/openssl with voxpupuli/openssl
- Update OS support and module dependencies
- Replace legacy facts with modern facts
- Migrate unit tests to GitHub Actions
- Update to PDK 2.5.0
Fixed
- Fix unknown variable '_hook_params_pre'
3.0.0 - 2021-07-08
This new major release is a response to the most recent changes in acme.sh, namely the switch from Let's Encrypt to ZeroSSL as default ACME CA. This module will keep Let's Encrypt as the default CA, but adds support for all CA's that are currently supported by acme.sh.
Existing users need to update acme.sh to a recent version (using the $acme_revision
parameter) and adopt the parameter changes, especially replacing the old parameter
$letsencrypt_ca
with $ca
(or $default_ca
respectively).
Added
- Add support for new ACME CA's: buypass, buypass_test, sslcom, zerossl
- Add parameters
$ca
and$default_ca
- Add parameter
$ca_whitelist
to specify which CA's will be used on$acme_host
Changed
- Set default CA to Let's Encrypt
- New parameter
$ca
must be used to use Let's Encrypt "staging" environment (set it toletsencrypt_test
) - New parameter
$ca
must be used to use Let's Encrypt "production" environment (set it toletsencrypt
) - Rename parameter
$letsencrypt_proxy
to$proxy
- Adjust wording: replace "Let's Encrypt" with "ACME" wherever applicable
Fixed
- Fix accidential switch from Let's Encrypt to ZeroSSL with recent version of acme.sh (#33)
Removed
- Remove parameter
$letsencrypt_ca
, new parameter$ca
must be used instead
2.3.0 - 2020-08-17
NOTE: When upgrading from version 1.x to 2.x temporarely set $acme_git_force
to true
.
Changed
- Replace deprecated acme.sh parameters (#32)
2.2.0 - 2020-07-24
Changed
- Change default value of
$acme_git_force
tofalse
Fixed
- Fix an issue where certificates would incorrectly be deployed on Puppet Server (#31)
2.1.0 - 2020-07-08
This is a maintenance release. It fixes an issue with deployment of signed certificates.
Changed
- Small improvements to code readability and documentation
- Use
$facts
hash instead of top-scope variables - Add messages for two common issues that could occur on first run
Fixed
- Prevent duplicate declaration error if package git is already defined (#30)
- Prevent cert files from being overwritten when using OCSP and wildcard certs
2.0.0 - 2020-06-16
This new major release is an effort to modernize the module. It fixes some long-standing bugs that have been uncovered by new unit tests. Please note that these bugfixes most likely trigger a re-issue of ALL certificates.
Added
- Add support for FreeBSD (#25, this time for real)
- Add unit tests
- Add parameter
$acme_revision
to checkout a different version of acme.sh - Add parameter
$acme_git_force
to force acme.sh repository checkout - Add parameter
$exec_timeout
to control how long acme.sh is allowed to run (#28) - Make
$dnssleep
optional, setting it to0
lets acme.sh poll for DNS changes (DoH)
Changed
- Migrate default values from
params.pp
to module data - Convert templates to EPP
- Use Posix Shell instead of Bash
- Update list of supported operating systems
- Require Puppet 6
- Convert documentation to Puppet Strings
- Increase default timeout for acme.sh related
Exec
resources to 3600 seconds
Fixed
- Only add subjectAltName for SAN certificates
- Add missing default value for
acme::dnssleep
- Fix cert deployment when the OCSP Must-Staple extension is disabled
- Fix support for wildcard certificates (caused a server error)
- No longer overwrite acme.sh's changes in account config files
1.0.5 - 2020-06-03
Added
- Add support for domain alias when using DNS alias mode
- Add support for FreeBSD
Changed
- Update PDK to 1.18.0
Fixed
- Fix possible conflicts in cert deployment on
$acme_host
(#24) - Correct syntax errors in the usage example (#24)
1.0.4 - 2019-11-30
Fixed
- Make sure
$acme_git_url
is passed toacme::setup::puppetmaster
(#18) - Fix create dhparam command (#19)
- Fix facts lookup on Puppet 5 (#22)
- Fix duplicate resource error (#20)
1.0.3 - 2019-09-18
Added
- Allow certificate renewal requests to defer without failing (#8)
- Adding possibility to provide challenge alias for signing certificates (#11)
- Add posthook command (#15)
Changed
- Use only lowercase for domains (#14)
Fixed
- Fixes for Puppet 5 (#12)
1.0.2 - 2017-11-13
Changed
- Support openssl >= 1.1.0 (#4)
Fixed
- Allow to request certs without OCSP Must-Staple extension (#3)
1.0.1 - 2017-04-16
Fixed
- Style fixes and documentation improvements
[1.0.0] - 2917-04-16
Initial release (fork of bzed-letsencrypt).
Dependencies
- puppetlabs-stdlib (>= 6.0.0 <9.0.0)
- puppetlabs-concat (>= 6.0.0 <8.0.0)
- puppetlabs-vcsrepo (>= 3.0.0 <6.0.0)
- puppetlabs-augeas_core (>= 1.0.0 <2.0.0)
- puppet-openssl (>= 2.0.0 <3.0.0)
Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright [yyyy] [name of copyright owner] Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.