Revisions of certbot

Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 138)
- update to 0.29.1
- changes from 0.29.0
  * Added
    - Noninteractive renewals with certbot renew (those not started
      from a terminal) now randomly sleep 1-480 seconds before 
      beginning work in order to spread out load spikes on the 
      server side.
    - Added External Account Binding support in cli and acme 
      library. Command line arguments --eab-kid and --eab-hmac-key 
      added.
  * Changed
    - Private key permissioning changes: Renewal preserves existing 
      group mode & gid of previous private key material. Private 
      keys for new lineages (i.e. new certs, not renewed) default
      to 0o600.
  * Fixed
    - Update code and dependencies to clean up Resource and 
      Deprecation Warnings.
    - Only depend on imgconverter extension for Sphinx >= 1.6
  Despite us having broken lockstep, we are continuing to release
  new versions of all Certbot components during releases for the
  time being, however, the only package with changes other than 
  its version number was:
    acme
    certbot
    certbot-apache
    certbot-dns-cloudflare
    certbot-dns-digitalocean
    certbot-dns-google
    certbot-nginx
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 137)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 136)
- update to 0.28.0
  * Added
    - revoke accepts --cert-name, and doesn't accept both 
      --cert-name and --cert-path.
    - Use the ACMEv2 newNonce endpoint when a new nonce is needed,
      and newNonce is available in the directory.
  * Changed
    - Removed documentation mentions of #letsencrypt IRC on 
      Freenode.
    - Write README to the base of (config-dir)/live directory
    - --manual will explicitly warn users that earlier challenges 
      should remain in place when setting up subsequent challenges.
    - Warn when using deprecated acme.challenges.TLSSNI01
    - Log warning about TLS-SNI deprecation in Certbot
    - Stop preferring TLS-SNI in the Apache, Nginx, and standalone 
      plugins
    - OVH DNS plugin now relies on Lexicon>=2.7.14 to support HTTP 
      proxies
    - Default time the Linode plugin waits for DNS changes to 
      propogate is now 1200 seconds.
  * Fixed
    - Match Nginx parser update in allowing variable names to start 
      with ${.
    - Fix ranking of vhosts in Nginx so that all port-matching 
      vhosts come first
    - Correct OVH integration tests on machines without internet 
      access.
    - Stop caching the results of ipv6_info in http01.py
    - Test fix for Route53 plugin to prevent boto3 making outgoing 
      connections.
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 135)
buildservice-autocommit accepted request 634970 from Eric Schirra's avatar Eric Schirra (ecsos) (revision 134)
baserev update by copy to link target
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 133)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 132)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 131)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 130)
- update to 0.27.1
buildservice-autocommit accepted request 625327 from Eric Schirra's avatar Eric Schirra (ecsos) (revision 129)
baserev update by copy to link target
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 128)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 127)
- update to 0.26.1
buildservice-autocommit accepted request 623152 from Eric Schirra's avatar Eric Schirra (ecsos) (revision 126)
baserev update by copy to link target
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 125)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 124)
- rebase certbot-fix_constants.patch
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 123)
- update to 0.26.0
  * Added
    - A new security enhancement which we're calling AutoHSTS has 
      been added to Certbot's Apache plugin. This enhancement 
      configures your webserver to send a HTTP Strict Transport 
      Security header with a low max-age value that is slowly 
      increased over time. The max-age value is not increased to 
      a large value until you've successfully managed to renew your 
      certificate. 
      This enhancement can be requested with the --auto-hsts flag.
    - New official DNS plugins have been created for Gehirn 
      Infrastracture Service, Linode, OVH, and Sakura Cloud. 
      These plugins can be found on our Docker Hub page at 
      https://hub.docker.com/u/certbot and on PyPI.
    - The ability to reuse ACME accounts from Let's Encrypt's 
      ACMEv1 endpoint on Let's Encrypt's ACMEv2 endpoint has been 
      added.
    - Certbot and its components now support Python 3.7.
    - Certbot's install subcommand now allows you to interactively
      choose which certificate to install from the list of 
      certificates managed by Certbot.
    - Certbot now accepts the flag --no-autorenew which causes any 
      obtained certificates to not be automatically renewed when it 
      approaches expiration.
    - Support for parsing the TLS-ALPN-01 challenge has been added 
    back to the acme library.
  * Changed
    - Certbot's default ACME server has been changed to 
      Let's Encrypt's ACMEv2 endpoint. By default, this server
      will now be used for both new certificate lineages and
buildservice-autocommit accepted request 620604 from Eric Schirra's avatar Eric Schirra (ecsos) (revision 122)
baserev update by copy to link target
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 121)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 120)
Eric Schirra's avatar Eric Schirra (ecsos) committed (revision 119)
Displaying revisions 101 - 120 of 238
openSUSE Build Service is sponsored by