8.4 KiB
Change Log
All notable changes to this project will be documented in this file. See Conventional Commits for commit guidelines.
1.0.6 (2023-05-25)
Note: Version bump only for package @certd/acme-client
1.0.5 (2023-05-25)
Note: Version bump only for package @certd/acme-client
1.0.4 (2023-05-25)
Note: Version bump only for package @certd/acme-client
1.0.3 (2023-05-25)
Note: Version bump only for package @certd/acme-client
1.0.2 (2023-05-24)
Note: Version bump only for package @certd/acme-client
1.0.1 (2023-05-24)
Note: Version bump only for package @certd/acme-client
Changelog
Important upgrade notice
On September 15, 2022, Let's Encrypt will stop accepting Certificate Signing Requests signed using the obsolete SHA-1 hash. This change affects all acme-client
versions lower than 3.3.2
and 4.2.4
. Please upgrade ASAP to ensure that your certificates can still be issued following this date.
A more detailed explanation can be found at the Let's Encrypt forums.
v5.0.0 (2022-07-28)
- Upgrade guide here
added
New native crypto interface, ECC/ECDSA supportbreaking
Remove support for Node v10, v12 and v14breaking
Prioritize issuer closest to root during preferred chain selection - #46changed
Replacebluebird
dependency with native promise APIschanged
Replacebacko2
dependency with internal utility
v4.2.5 (2022-03-21)
fixed
Upgradeaxios@0.26.1
fixed
Upgradenode-forge@1.3.0
- CVE-2022-24771, CVE-2022-24772, CVE-2022-24773
4.2.4 (2022-03-19)
fixed
Use SHA-256 when signing CSRs
v3.3.2 (2022-03-19)
backport
Use SHA-256 when signing CSRs
v4.2.3 (2022-01-11)
added
Directory URLs for ACME providers Buypass and ZeroSSLfixed
Skip already valid authorizations when usingclient.auto()
v4.2.2 (2022-01-10)
fixed
Upgradenode-forge@1.2.0
v4.2.1 (2022-01-10)
fixed
ZeroSSLduplicate_domains_in_array
error when usingclient.auto()
v4.2.0 (2022-01-06)
added
Support for external account binding - RFC 8555 Section 7.3.4added
Ability to pass through custom logger functionchanged
Increase defaultbackoffAttempts
to 10fixed
Deactivate authorizations where challenges can not be completedfixed
Attempt authoritative name servers when verifyingdns-01
challengesfixed
Error verbosity when failing to read ACME directoryfixed
Correctly recognizeready
andprocessing
states - RFC 8555 Section 7.1.6
v4.1.4 (2021-12-23)
fixed
Upgradeaxios@0.21.4
- CVE-2021-3749
v4.1.3 (2021-02-22)
fixed
Upgradeaxios@0.21.1
- CVE-2020-28168
v4.1.2 (2020-11-16)
fixed
Bug when encoding PEM payloads, potentially causing malformed requests
v4.1.1 (2020-11-13)
fixed
Missing TypeScript definitions
v4.1.0 (2020-11-12)
added
OptionpreferredChain
added toclient.getCertificate()
andclient.auto()
to indicate which certificate chain is preferred if a CA offers multipleadded
Methodclient.getOrder()
to refresh order from CAfixed
Upgradeaxios@0.21.0
fixed
Error when attempting to revoke a certificate chainfixed
Missing URL augmentation inclient.finalizeOrder()
andclient.deactivateAuthorization()
fixed
Add certificate issuer to response fromforge.readCertificateInfo()
v4.0.2 (2020-10-09)
fixed
Explicitly set defaultaxios
HTTP adapter - axios/axios#1180
v4.0.1 (2020-09-15)
fixed
Upgradenode-forge@0.10.0
- CVE-2020-7720
v4.0.0 (2020-05-29)
breaking
Remove support for Node v8breaking
Remove deprecatedopenssl
crypto modulefixed
Incorrect TypeScriptCertificateInfo
definitionsfixed
Allow trailing whitespace character inhttp-01
challenge response
v3.3.1 (2020-01-07)
fixed
Improvements to TypeScript definitions
v3.3.0 (2019-12-19)
added
TypeScript definitionsfixed
Allow missing ACME directory meta field - RFC 8555 Section 7.1.1
v3.2.1 (2019-11-14)
added
New optionskipChallengeVerification
added toclient.auto()
to bypass internal challenge verification
v3.2.0 (2019-08-26)
added
More extensive testing using letsencrypt/pebblechanged
When creating a CSR,commonName
no longer defaults to'localhost'
- This change is not considered breaking since
commonName: 'localhost'
will result in an error when ordering a certificate
- This change is not considered breaking since
fixed
Retry signed API requests onurn:ietf:params:acme:error:badNonce
- RFC 8555 Section 6.5fixed
Minor bugs related toPOST-as-GET
when callingupdateAccount()
fixed
Ensure subject common name is present in SAN when creating a CSR - CAB v1.2.3 Section 9.2.2fixed
Send empty JSON body when responding to challenges - RFC 8555 Section 7.5.1
v2.3.1 (2019-08-26)
backport
Minor bugs related toPOST-as-GET
when callingclient.updateAccount()
backport
Send empty JSON body when responding to challenges
v3.1.0 (2019-08-21)
added
UTF-8 support when generating a CSR subject using forge - RFC 5280fixed
ImplementPOST-as-GET
for all ACME API requests - RFC 8555 Section 6.3
v2.3.0 (2019-08-21)
backport
ImplementPOST-as-GET
for all ACME API requests
v3.0.0 (2019-07-13)
added
Exposeaxios
instance to allow manipulating HTTP client defaultsbreaking
Remove support for Node v4 and v6breaking
Remove Babel transpilation
v2.2.3 (2019-01-25)
added
DNS CNAME detection when verifyingdns-01
challenges
v2.2.2 (2019-01-07)
added
Support fortls-alpn-01
challenge key authorization
v2.2.1 (2019-01-04)
fixed
Handle and throw errors from OpenSSL process
v2.2.0 (2018-11-06)
added
New node-forge crypto interface, removes OpenSSL CLI dependencyadded
Support nativecrypto.generateKeyPair()
API when generating key pairs
v2.1.0 (2018-10-21)
added
Ability to set and get current account URLfixed
Replace HTTP clientrequest
withaxios
fixed
Auto-mode no longer tries to create account when account URL exists
v2.0.1 (2018-08-17)
fixed
Key rollover in compliance with draft-ietf-acme-13
v2.0.0 (2018-04-02)
breaking
ACMEv2breaking
API changesbreaking
Rewrite to ES6breaking
Promises instead of callbacks
v1.0.0 (2017-10-20)
- API stable
v0.2.1 (2017-09-27)
fixed
Bug causing invalid anti-replay nonce
v0.2.0 (2017-09-21)
breaking
OpenSSL methodreadCsrDomains
andreadCertificateInfo
now return domains as an objectfixed
Added and fixed some tests
v0.1.0 (2017-09-14)
acme-client
released