aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFiles
* Use /run for the listening socket of the webserver component.HEADmasterGuilhem Moulin2019-08-226
|
* New release 0.6.upstream/0.6Guilhem Moulin2019-08-211
|
* lacme: new option 'account --deactivate'Guilhem Moulin2019-08-213
| | | | For client-initiated account deactivation. See RFC 8555 sec. 7.3.6.
* Issue GET and POST-as-GET requests (RFC 8555 sec. 6.3)Guilhem Moulin2019-08-212
| | | | | For the authorizations, order and certificate URLs. See RFC 8555 sec. 7.1.
* Link to RFC 8555 instead of the ACME I-D URL.Guilhem Moulin2019-08-214
|
* Call iptables binaries from /usr/sbin not /sbin.Guilhem Moulin2019-08-212
| | | | | | | As of Buster this is the case, and the maintainer plans to drop compatibility symlinks once Bullseye is released. See /usr/share/doc/iptables/NEWS.Debian.gz .
* [git] ignore vims' swapfilesBenjamin Tietz2019-01-211
|
* lacme, client: new dependency Date::Parse.Guilhem Moulin2019-01-213
|
* client: poll order URL instead of each authz URL successively.Guilhem Moulin2019-01-213
| | | | We were blocking on https://github.com/letsencrypt/boulder/issues/3530 .
* New dependency: perl module Types::Serialiserupstream/0.5Guilhem Moulin2018-05-091
|
* Use ACME v2 endpointsGuilhem Moulin2018-04-276
| | | | https://tools.ietf.org/html/draft-ietf-acme-acme-12
* Fix manpage generation with pandoc >=2.1Guilhem Moulin2018-04-262
|
* Copy snippets/*.conf to /etc/lacmeupstream/0.4Guilhem Moulin2017-07-282
|
* Fix generation of manpages with pandoc >=1.18Guilhem Moulin2017-07-282
|
* Update copyright infoupstream/0.3Guilhem Moulin2017-07-096
|
* Bind webserver to /var/run/lacme-www.socket by default.Guilhem Moulin2017-07-086
|
* mv config/{apache2.conf,nginx.conf} snippets/Guilhem Moulin2017-07-082
|
* lacme: Specify minimum required Socket version 1.95.Guilhem Moulin2017-07-012
|
* Specify minimum required Perl versions.Guilhem Moulin2017-07-015
|
* Avoid hash slices.Guilhem Moulin2017-07-011
| | | | That's mostly what prevents us from supporting Perl older than 5.20.
* Ensure fdopen is called with an integer.Guilhem Moulin2017-07-014
|
* wibbleGuilhem Moulin2017-06-301
|
* Improve docs.Guilhem Moulin2017-06-291
|
* Provide apache2 configuration snippet.Guilhem Moulin2017-06-293
|
* webserver: improve serving logic for ACME challenge responses.Guilhem Moulin2017-06-291
| | | | | In particular, we now return "403 Forbidden" for /.well-known/acme-challenge/
* webserver: open ACME challenge files with O_NOFOLLOW.Guilhem Moulin2017-06-291
|
* Remove potential race when creating ACME challenge response files.Guilhem Moulin2017-06-292
|
* lacme(1), lacme-accountd(1): fix version number.Guilhem Moulin2017-06-293
|
* webserver: refuse to follow symlink when serving ACME challenge responses.Guilhem Moulin2017-06-293
|
* wibbleGuilhem Moulin2017-06-291
|
* wibbleGuilhem Moulin2017-06-291
|
* Improve docs.Guilhem Moulin2017-06-292
|
* Improve docs.Guilhem Moulin2017-06-281
|
* Update README.Guilhem Moulin2017-06-281
|
* Provide nginx configuration snippet.Guilhem Moulin2017-06-282
|
* Change the default 'min-days' from 10 to 21.Guilhem Moulin2017-06-284
| | | | | | This avoids expiration notices from Let's Encrypt when auto-renewal is done by a cronjob: Let's Encrypt sends a notice 19 (then 9) days before expiration.
* new-cert: use File::Temp for the temporary cert filename.Guilhem Moulin2017-06-281
| | | | This ensures we aren't overwritting existing /path/to/srv.pem.new files.
* webserver: allow listening to multiple addresses.Guilhem Moulin2017-06-285
| | | | | | | | | | (Useful when dual-stack IPv4/IPv6 is not supported.) Also, change the default to listen to a UNIX-domain socket </var/run/lacme.socket>. Moreover temporary iptables rules are no longer installed. Hosts without a public HTTP daemon listening on port 80 need to set the 'listen' option to [::] and/or 0.0.0.0, and possibly set the 'iptables' option to Yes.
* new-cert: create certificate files atomically.Guilhem Moulin2017-02-242
|
* new-cert: mark basicConstraints and keyUsage x509v3 extensions as critical ↵Guilhem Moulin2017-02-222
| | | | | | | in the CSR. Boulder's issue #565 "Golang errors on extensions marked critical" was fixed upstream, cf. https://github.com/letsencrypt/boulder/issues/565 .
* Changelog: prefix bugfixes with '+'.Guilhem Moulin2017-02-221
|
* new-cert: new CLI option "min-days"Guilhem Moulin2017-02-193
|
* new-cert: sort section names if not passed explicitely.Guilhem Moulin2017-02-192
|
* Ensure lacme's config file descriptor has the FD_CLOEXEC bit set.Guilhem Moulin2017-02-192
|
* config-cert: import the default section of files already read.Guilhem Moulin2017-02-192
|
* wibbleGuilhem Moulin2017-02-192
|
* s/lacme-certs.d/lacme-certs.conf.d/upstream/0.2Guilhem Moulin2016-12-055
|
* "config-certs" now points to a list of files or directories.Guilhem Moulin2016-12-055
|
* s/fd-conn/conn-fd/Guilhem Moulin2016-12-052
|
* Prepare new release.Guilhem Moulin2016-12-031
|