Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

acme

Package Overview
Dependencies
Maintainers
3
Versions
17
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

acme

Free SSL certificates for Node.js and Browsers. Issued via Let's Encrypt

  • 3.0.3
  • latest
  • npm
  • Socket score

Version published
Weekly downloads
3.3K
decreased by-5.86%
Maintainers
3
Weekly downloads
 
Created
Source

Let's Encrypt™ + JavaScript = ACME.js

| Built by Root for Hub

ACME.js is a low-level client for Let's Encrypt.

Looking for an easy, high-level client? Check out Greenlock.js.

Online Demo

See https://greenlock.domains

Features

| 15k gzipped | 55k minified | 88k (2,500 loc) source with comments |

Supports the latest (Nov 2019) release of Let's Encrypt in a small, lightweight, Vanilla JS package.

  • Let's Encrypt v2
    • ACME RFC 8555
    • November 2019
    • POST-as-GET
    • StartTLS Everywhere™ (in-progress)
  • IDN (i.e. .中国)
  • ECDSA and RSA keypairs
    • JWK
    • PEM
    • DER
    • Native Crypto in Node.js
    • WebCrypto in Browsers
  • Domain Validation Plugins
    • tls-alpn-01
    • http-01
    • dns-01
      • Wildcards
      • Localhost
      • Private Networks
    • Create your own
  • Vanilla JS*
    • No Transpiling Necessary!
    • Node.js
    • Browsers
    • WebPack
    • Zero External Dependencies
  • Commercial Support
    • Safe, Efficient, Maintained

* Although we use async/await in the examples, the codebase is written entirely in Common JS.

Use Cases

  • Home Servers
  • IoT
  • Enterprise On-Prem
  • Web Hosting
  • Cloud Services
  • Localhost Development

API

The public API encapsulates the three high-level steps of the ACME protocol:

  1. API Discovery
  2. Account Creation
    • Subscriber Agreement
  3. Certificate Issuance
    • Certificate Request
    • Authorization Challenges
    • Challenge Presentation
    • Certificate Redemption

Overview

The core API can be show in just four functions:

ACME.create({ maintainerEmail, packageAgent, notify });
acme.init(directoryUrl);
acme.accounts.create({ subscriberEmail, agreeToTerms, accountKey });
acme.certificates.create({
	customerEmail, // do not use
	account,
	accountKey,
	csr,
	domains,
	challenges
});

Helper Functions

ACME.computeChallenge({
	accountKey,
	hostname: 'example.com',
	challenge: { type: 'dns-01', token: 'xxxx' }
});
ParameterDescription
accountan object containing the Let's Encrypt Account ID as "kid" (misnomer, not actually a key id/thumbprint)
accountKeyan RSA or EC public/private keypair in JWK format
agreeToTermsset to true to agree to the Let's Encrypt Subscriber Agreement
challengesthe 'http-01', 'alpn-01', and/or 'dns-01' challenge plugins (get, set, and remove callbacks) to use
csra Certificate Signing Request (CSR), which may be generated with @root/csr, openssl, or another
customerEmailDon't use this. Given as an example to differentiate between Maintainer, Subscriber, and End-User
directoryUrlshould be the Let's Encrypt Directory URL
https://acme-staging-v02.api.letsencrypt.org/directory
domainsthe list of altnames (subject first) that are listed in the CSR and will be listed on the certificate
maintainerEmailshould be a contact for the author of the code to receive critical bug and security notices
notifyall callback for logging events and errors in the form function (ev, args) { ... }
packageAgentshould be an RFC72321-style user-agent string to append to the ACME client (ex: mypackage/v1.1.1)
skipChallengeTestsdo not do a self-check that the ACME-issued challenges will pass (not recommended)
skipDryRun: falsedo not do a self-check with self-issued challenges (not recommended)
subscriberEmailshould be a contact for the service provider to receive renewal failure notices and manage the ACME account

Maintainer vs Subscriber vs Customer

  • maintainerEmail should be the email address of the author of the code. This person will receive critical security and API change notifications.
  • subscriberEmail should be the email of the admin of the hosting service. This person agrees to the Let's Encrypt Terms of Service and will be notified when a certificate fails to renew.
  • customerEmail should be the email of individual who owns the domain. This is optional (not currently implemented).

Generally speaking YOU are the maintainer and you or your employer is the subscriber.

If you (or your employer) is running any type of service you SHOULD NOT pass the customer email as the subscriber email.

If you are not running a service (you may be building a CLI, for example), then you should prompt the user for their email address, and they are the subscriber.

Events

These notify events are intended for logging and debugging, NOT as a data API.

Event NameExample Message
certificate_order{ subject: 'example.com', altnames: ['...'], account: { key: { kid: '...' } } }
challenge_select{ altname: '*.example.com', type: 'dns-01' }
challenge_status{ altname: '*.example.com', type: 'dns-01', status: 'pending' }
challenge_remove{ altname: '*.example.com', type: 'dns-01' }
certificate_status{ subject: 'example.com', status: 'valid' }
warning{ message: 'what went wrong', description: 'what action to take about it' }
error{ message: 'a background process failed, and it may have side-effects' }

Note: DO NOT rely on undocumented properties. They are experimental and will break. If you have a use case for a particular property open an issue - we can lock it down and document it.

Example

A basic example includes the following:

  1. Initialization
    • maintainer contact
    • package user-agent
    • log events
  2. Discover API
    • retrieves Terms of Service and API endpoints
  3. Get Subscriber Account
    • create an ECDSA (or RSA) Account key in JWK format
    • agree to terms
    • register account by the key
  4. Prepare a Certificate Signing Request
    • create a RSA (or ECDSA) Server key in PEM format
    • select domains
    • choose challenges
    • sign CSR
    • order certificate

See examples/README.md

Install

To make it easy to generate, encode, and decode keys and certificates, ACME.js uses Keypairs.js and CSR.js

Node.js
npm install --save acme
var ACME = require('acme');
WebPack
<meta charset="UTF-8" />

(necessary in case the webserver headers don't specify plain/text; charset="UTF-8")

var ACME = require('acme');
Vanilla JS
<meta charset="UTF-8" />

(necessary in case the webserver headers don't specify plain/text; charset="UTF-8")

<script src="https://unpkg.com/@root/acme@3.0.0/dist/acme.all.js"></script>

acme.min.js

<script src="https://unpkg.com/@root/acme@3.0.0/dist/acme.all.min.js"></script>

Use

var ACME = window['@root/acme'];

Challenge Callbacks

The challenge callbacks are documented in the test suite, essentially:

function create(options) {
	var plugin = {
		init: async function(deps) {
			// for http requests
			plugin.request = deps.request;
		},
		zones: async function(args) {
			// list zones relevant to the altnames
		},
		set: async function(args) {
			// set TXT record
		},
		get: async function(args) {
			// get TXT records
		},
		remove: async function(args) {
			// remove TXT record
		},
		// how long to wait after *all* TXT records are set
		// before presenting them for validation
		propagationDelay: 5000
	};
	return plugin;
}

The http-01 plugin is similar, but without zones or propagationDelay.

Many challenge plugins are already available for popular platforms.

Search acme-http-01- or acme-dns-01- on npm to find more.

TypeServicePlugin
dns-01CloudFlareacme-dns-01-cloudflare
dns-01Digital Oceanacme-dns-01-digitalocean
dns-01DNSimpleacme-dns-01-dnsimple
dns-01DuckDNSacme-dns-01-duckdns
http-01File System / Web Rootacme-http-01-webroot
dns-01GoDaddyacme-dns-01-godaddy
dns-01Gandiacme-dns-01-gandi
dns-01NameCheapacme-dns-01-namecheap
dns-01Name.comacme-dns-01-namedotcom
dns-01Route53 (AWS)acme-dns-01-route53
http-01S3 (AWS, Digital Ocean, Scaleway)acme-http-01-s3
dns-01Vultracme-dns-01-vultr
dns-01Build your ownacme-dns-01-test
http-01Build your ownacme-http-01-test
tls-alpn-01Contact us-

Running the Tests

npm test

Usa a dns-01 challenge

Although you can run the tests from a public facing server, its easiest to do so using a dns-01 challenge.

You will need to use one of the acme-dns-01-* plugins to run the test locally.

ENV=DEV
MAINTAINER_EMAIL=letsencrypt+staging@example.com
SUBSCRIBER_EMAIL=letsencrypt+staging@example.com
BASE_DOMAIN=test.example.com
CHALLENGE_TYPE=dns-01
CHALLENGE_PLUGIN=acme-dns-01-digitalocean
CHALLENGE_OPTIONS='{"token":"xxxxxxxxxxxx"}'

For Example

# Get the repo and change directories into it
git clone https://git.rootprojects.org/root/acme.js
pushd acme.js/

# Install the challenge plugin you'll use for the tests
npm install --save-dev acme-dns-01-digitalocean

Create a .env config

You'll need a .env in the project root that looks something like the one in examples/example.env:

# Copy the sample .env file
rsync -av examples/example.env .env

# Edit the config file to use a domain in your account, and your API token
#vim .env
code .env

# Run the tests
node tests/index.js

Contributions

Did this project save you some time? Maybe make your day? Even save the day?

Please say "thanks" via Paypal or Patreon:

Where does your contribution go?

Root is a collection of experts who trust each other and enjoy working together on deep-tech, Indie Web projects.

Our goal is to operate as a sustainable community.

Your contributions - both in code and especially monetarily - help to not just this project, but also our broader work of projects that fuel the Indie Web.

Also, we chat on Keybase in #rootprojects

Commercial Support

Do you need...

  • more features?
  • bugfixes, on your timeline?
  • custom code, built by experts?
  • commercial support and licensing?

You're welcome to contact us in regards to IoT, On-Prem, Enterprise, and Internal installations, integrations, and deployments.

We have both commercial support and commercial licensing available.

We also offer consulting for all-things-ACME and Let's Encrypt.

ACME.jsk™ is a trademark of AJ ONeal

The rule of thumb is "attribute, but don't confuse". For example:

Built with ACME.js (a Root project).

Please contact us if have any questions in regards to our trademark, attribution, and/or visible source policies. We want to build great software and a great community.

ACME.js | MPL-2.0 | Terms of Use | Privacy Policy

Keywords

FAQs

Package last updated on 26 Oct 2019

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc