README.md in r509-ca-http-0.2.2 vs README.md in r509-ca-http-0.3.0

- old
+ new

@@ -1,24 +1,23 @@ -#r509-ca-http +#r509-ca-http [![Build Status](https://secure.travis-ci.org/r509/r509-ca-http.png)](http://travis-ci.org/r509/r509-ca-http) [![Coverage Status](https://coveralls.io/repos/r509/r509-ca-http/badge.png)](https://coveralls.io/r/r509/r509-ca-http) r509-ca-http is an HTTP server that runs a certificate authority, for signing SSL certificates. It supports issuance and revocation, and is intended to be part of a complete certificate authority for use in production environments. ##Requirements/Installation -You need r509 and sinatra. For development/tests you need rack-test and rspec. +You need [r509](https://github.com/r509/r509) and sinatra. For development/tests you need rack-test and rspec. ## API ### GET /1/crl/:ca/get -Get the most recently generate CRL for the given ```:ca```. +Deprecated; will be removed in a future version. Use generate instead. -A new CRL is generated when a certificate is revoked or unrevoked, or if you explicitly generate it. ### GET /1/crl/:ca/generate -Explicitly generate and get a new CRL for the given ```:ca```. +Generate and get a new CRL for the given ```:ca```. ### POST /1/certificate/issue Issue a certificate. @@ -35,17 +34,20 @@ subject[CN]=domain.com&subject[O]=orgname&subject[L]=locality Optional POST parameters: - extensions[subjectAlternativeName] +- message\_digest SAN names are provided like so: extensions[subjectAlternativeName][]=domain1.com&extensions[subjectAlternativeName][]=domain2.com The issue method will return the PEM text of the issued certificate. +Please note that all fields subject/extension request fields encoded in a CSR are ignored in favor of the POST parameters. + ### POST /1/certificate/revoke Revoke a certificate. Required POST parameters: @@ -82,11 +84,11 @@ ## certificate\_authorities (config.yaml) You use the ```config.yaml``` file to specify information about your certificate authority. You can operate multiple certificate authorities, each of which can have multiple profiles, with one instance of r509-ca-http. -Information about how to construct the YAML can be found at [the official r509 documentation](https://github.com/reaperhulk/r509#config). +Information about how to construct the YAML can be found at [the official r509 documentation](https://github.com/reaperhulk/r509). ## Middleware (config.ru) Running r509-ca-http will let you issue and revoke certificates. But that's not everything you need to do, if you're going to run a CA. You're going to need information about validity, and you may want to save a record of issued certificates to the filesystem. @@ -94,9 +96,13 @@ - [r509-middleware-validity](https://github.com/sirsean/r509-middleware-validity) - [r509-middleware-certwriter](https://github.com/sirsean/r509-middleware-certwriter) After installing one or both of them, you'll have to edit your ```config.ru`` and/or ```config.yaml``` files. + +##Support + +You can file bugs on GitHub or join the #r509 channel on irc.freenode.net to ask questions. ## Rake tasks There are a few things you can do with Rake.