Revisions of certbot
Eric Schirra (ecsos)
committed
(revision 138)
- update to 0.29.1 - changes from 0.29.0 * Added - Noninteractive renewals with certbot renew (those not started from a terminal) now randomly sleep 1-480 seconds before beginning work in order to spread out load spikes on the server side. - Added External Account Binding support in cli and acme library. Command line arguments --eab-kid and --eab-hmac-key added. * Changed - Private key permissioning changes: Renewal preserves existing group mode & gid of previous private key material. Private keys for new lineages (i.e. new certs, not renewed) default to 0o600. * Fixed - Update code and dependencies to clean up Resource and Deprecation Warnings. - Only depend on imgconverter extension for Sphinx >= 1.6 Despite us having broken lockstep, we are continuing to release new versions of all Certbot components during releases for the time being, however, the only package with changes other than its version number was: acme certbot certbot-apache certbot-dns-cloudflare certbot-dns-digitalocean certbot-dns-google certbot-nginx
Eric Schirra (ecsos)
committed
(revision 137)
Eric Schirra (ecsos)
committed
(revision 136)
- update to 0.28.0 * Added - revoke accepts --cert-name, and doesn't accept both --cert-name and --cert-path. - Use the ACMEv2 newNonce endpoint when a new nonce is needed, and newNonce is available in the directory. * Changed - Removed documentation mentions of #letsencrypt IRC on Freenode. - Write README to the base of (config-dir)/live directory - --manual will explicitly warn users that earlier challenges should remain in place when setting up subsequent challenges. - Warn when using deprecated acme.challenges.TLSSNI01 - Log warning about TLS-SNI deprecation in Certbot - Stop preferring TLS-SNI in the Apache, Nginx, and standalone plugins - OVH DNS plugin now relies on Lexicon>=2.7.14 to support HTTP proxies - Default time the Linode plugin waits for DNS changes to propogate is now 1200 seconds. * Fixed - Match Nginx parser update in allowing variable names to start with ${. - Fix ranking of vhosts in Nginx so that all port-matching vhosts come first - Correct OVH integration tests on machines without internet access. - Stop caching the results of ipv6_info in http01.py - Test fix for Route53 plugin to prevent boto3 making outgoing connections.
Eric Schirra (ecsos)
committed
(revision 135)
buildservice-autocommit
accepted
request 634970
from
Eric Schirra (ecsos)
(revision 134)
baserev update by copy to link target
Eric Schirra (ecsos)
committed
(revision 133)
Eric Schirra (ecsos)
committed
(revision 132)
Eric Schirra (ecsos)
committed
(revision 131)
Eric Schirra (ecsos)
committed
(revision 130)
- update to 0.27.1
buildservice-autocommit
accepted
request 625327
from
Eric Schirra (ecsos)
(revision 129)
baserev update by copy to link target
Eric Schirra (ecsos)
committed
(revision 128)
Eric Schirra (ecsos)
committed
(revision 127)
- update to 0.26.1
buildservice-autocommit
accepted
request 623152
from
Eric Schirra (ecsos)
(revision 126)
baserev update by copy to link target
Eric Schirra (ecsos)
committed
(revision 125)
Eric Schirra (ecsos)
committed
(revision 124)
- rebase certbot-fix_constants.patch
Eric Schirra (ecsos)
committed
(revision 123)
- update to 0.26.0 * Added - A new security enhancement which we're calling AutoHSTS has been added to Certbot's Apache plugin. This enhancement configures your webserver to send a HTTP Strict Transport Security header with a low max-age value that is slowly increased over time. The max-age value is not increased to a large value until you've successfully managed to renew your certificate. This enhancement can be requested with the --auto-hsts flag. - New official DNS plugins have been created for Gehirn Infrastracture Service, Linode, OVH, and Sakura Cloud. These plugins can be found on our Docker Hub page at https://hub.docker.com/u/certbot and on PyPI. - The ability to reuse ACME accounts from Let's Encrypt's ACMEv1 endpoint on Let's Encrypt's ACMEv2 endpoint has been added. - Certbot and its components now support Python 3.7. - Certbot's install subcommand now allows you to interactively choose which certificate to install from the list of certificates managed by Certbot. - Certbot now accepts the flag --no-autorenew which causes any obtained certificates to not be automatically renewed when it approaches expiration. - Support for parsing the TLS-ALPN-01 challenge has been added back to the acme library. * Changed - Certbot's default ACME server has been changed to Let's Encrypt's ACMEv2 endpoint. By default, this server will now be used for both new certificate lineages and
buildservice-autocommit
accepted
request 620604
from
Eric Schirra (ecsos)
(revision 122)
baserev update by copy to link target
Eric Schirra (ecsos)
committed
(revision 121)
Eric Schirra (ecsos)
committed
(revision 120)
Eric Schirra (ecsos)
committed
(revision 119)
Displaying revisions 101 - 120 of 238