Versions in this module Expand all Collapse all v0 v0.24.3 Jun 26, 2024 Changes in this version + const ALPNProto + const LetsEncryptURL + const StatusDeactivated + const StatusExpired + const StatusInvalid + const StatusPending + const StatusProcessing + const StatusReady + const StatusRevoked + const StatusUnknown + const StatusValid + var ErrAccountAlreadyExists = errors.New("acme: account already exists") + var ErrNoAccount = errors.New("acme: account does not exist") + var ErrUnsupportedKey = errors.New("acme: unknown key type; only RSA and ECDSA are supported") + func AcceptTOS(tosURL string) bool + func JWKThumbprint(pub crypto.PublicKey) (string, error) + func RateLimit(err error) (time.Duration, bool) + type Account struct + AgreedTerms string + Authorizations string + Authz string + Certificates string + Contact []string + CurrentTerms string + ExternalAccountBinding *ExternalAccountBinding + OrdersURL string + Status string + URI string + type Authorization struct + Challenges []*Challenge + Combinations [][]int + Expires time.Time + Identifier AuthzID + Status string + URI string + Wildcard bool + type AuthorizationError struct + Errors []error + Identifier string + URI string + func (a *AuthorizationError) Error() string + type AuthzID struct + Type string + Value string + func DomainIDs(names ...string) []AuthzID + func IPIDs(addr ...string) []AuthzID + type CRLReasonCode int + const CRLReasonAACompromise + const CRLReasonAffiliationChanged + const CRLReasonCACompromise + const CRLReasonCertificateHold + const CRLReasonCessationOfOperation + const CRLReasonKeyCompromise + const CRLReasonPrivilegeWithdrawn + const CRLReasonRemoveFromCRL + const CRLReasonSuperseded + const CRLReasonUnspecified + type CertOption interface + func WithKey(key crypto.Signer) CertOption + func WithTemplate(t *x509.Certificate) CertOption + type Challenge struct + Error error + Status string + Token string + Type string + URI string + Validated time.Time + type Client struct + DirectoryURL string + HTTPClient *http.Client + KID KeyID + Key crypto.Signer + RetryBackoff func(n int, r *http.Request, resp *http.Response) time.Duration + UserAgent string + func (c *Client) Accept(ctx context.Context, chal *Challenge) (*Challenge, error) + func (c *Client) AccountKeyRollover(ctx context.Context, newKey crypto.Signer) error + func (c *Client) Authorize(ctx context.Context, domain string) (*Authorization, error) + func (c *Client) AuthorizeIP(ctx context.Context, ipaddr string) (*Authorization, error) + func (c *Client) AuthorizeOrder(ctx context.Context, id []AuthzID, opt ...OrderOption) (*Order, error) + func (c *Client) CreateCert(ctx context.Context, csr []byte, exp time.Duration, bundle bool) (der [][]byte, certURL string, err error) + func (c *Client) CreateOrderCert(ctx context.Context, url string, csr []byte, bundle bool) (der [][]byte, certURL string, err error) + func (c *Client) DNS01ChallengeRecord(token string) (string, error) + func (c *Client) DeactivateReg(ctx context.Context) error + func (c *Client) Discover(ctx context.Context) (Directory, error) + func (c *Client) FetchCert(ctx context.Context, url string, bundle bool) ([][]byte, error) + func (c *Client) GetAuthorization(ctx context.Context, url string) (*Authorization, error) + func (c *Client) GetChallenge(ctx context.Context, url string) (*Challenge, error) + func (c *Client) GetOrder(ctx context.Context, url string) (*Order, error) + func (c *Client) GetReg(ctx context.Context, url string) (*Account, error) + func (c *Client) HTTP01ChallengePath(token string) string + func (c *Client) HTTP01ChallengeResponse(token string) (string, error) + func (c *Client) ListCertAlternates(ctx context.Context, url string) ([]string, error) + func (c *Client) Register(ctx context.Context, acct *Account, prompt func(tosURL string) bool) (*Account, error) + func (c *Client) RevokeAuthorization(ctx context.Context, url string) error + func (c *Client) RevokeCert(ctx context.Context, key crypto.Signer, cert []byte, reason CRLReasonCode) error + func (c *Client) TLSALPN01ChallengeCert(token, domain string, opt ...CertOption) (cert tls.Certificate, err error) + func (c *Client) TLSSNI01ChallengeCert(token string, opt ...CertOption) (cert tls.Certificate, name string, err error) + func (c *Client) TLSSNI02ChallengeCert(token string, opt ...CertOption) (cert tls.Certificate, name string, err error) + func (c *Client) UpdateReg(ctx context.Context, acct *Account) (*Account, error) + func (c *Client) WaitAuthorization(ctx context.Context, url string) (*Authorization, error) + func (c *Client) WaitOrder(ctx context.Context, url string) (*Order, error) + type Directory struct + AuthzURL string + CAA []string + CertURL string + ExternalAccountRequired bool + KeyChangeURL string + NonceURL string + OrderURL string + RegURL string + RevokeURL string + Terms string + Website string + type Error struct + Detail string + Header http.Header + Instance string + ProblemType string + StatusCode int + Subproblems []Subproblem + func (e *Error) Error() string + type ExternalAccountBinding struct + KID string + Key []byte + func (e *ExternalAccountBinding) String() string + type KeyID string + type Order struct + AuthzURLs []string + CertURL string + Error *Error + Expires time.Time + FinalizeURL string + Identifiers []AuthzID + NotAfter time.Time + NotBefore time.Time + Status string + URI string + type OrderError struct + OrderURL string + Status string + func (oe *OrderError) Error() string + type OrderOption interface + func WithOrderNotAfter(t time.Time) OrderOption + func WithOrderNotBefore(t time.Time) OrderOption + type Subproblem struct + Detail string + Identifier *AuthzID + Instance string + Type string + func (sp Subproblem) String() string