Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/certbot/certbot.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2022-10-14TSIG SOA query fix (#9408)Phil Martin
* Use the TSIG keyring for the initial SOA request Helps allow the use of keys in BIND ACLs to help certbot update the correct zone. Previously TSIG was only used for zone updates, rather than for both the authoritative SOA request and zone update. * Update CHANGELOG.md * Update AUTHORS.md * Workaround for mypy failure due to dnspython stubs As per https://github.com/certbot/certbot/pull/9408#issuecomment-1257868864 Co-authored-by: Alex Zorin <alex@zorin.id.au>
2022-08-13docs: add BunnyDNS to list of 3rd-party plugins (#9375)Matthew W. Thomas
* docs: add BunnyDNS to list of 3rd-party plugins You can find the plugin here: https://github.com/mwt/certbot-dns-bunny It's for [BunnyDNS](https://bunny.net/dns/). * Update AUTHORS.md
2022-07-27Clarify in docs that deletion does not revoke (#9348)Preston Locke
* Clarify in docs that deletion does not revoke * Add myself to AUTHORS.md * Move new paragraph below first note and change its wording
2022-07-08DEP: Pin version of cryptography (#9339)Shahar Naveh
* DEP: Pin version of cryptography * Added myself to authors:) Co-authored-by: Shahar Naveh <>
2022-06-30Add Signed Windows Installer Workflow (#9076)Alexis
* Add Code Signing action for Windows Installer * Clean up variable names and input * Amend and add to documentation per PR guidelines * Update tools/finish_release.py Co-authored-by: Brad Warren <bmw@users.noreply.github.com> * Update tools/finish_release.py Amend typo Co-authored-by: Brad Warren <bmw@users.noreply.github.com> * Amend release script for better work flow - SCP commands to upload and download unsigned & signed installers from CSS * Collapse spaces * Update tools/finish_release.py Co-authored-by: Brad Warren <bmw@users.noreply.github.com> * Create new windows signer function * Update Windows Installer Script - Update change log - add new function for signing and document - @TODO Streammline SSH session * Remove Azure and Github release methods - Methods moved to CSS - Reduced to a ssh function that triggers the process on a CSS * Amend Chnagelog and Remove Unneeded Deps * Update tools/finish_release.py Co-authored-by: Brad Warren <bmw@users.noreply.github.com> * Add Verison Fetch Function - For the purpose of snap releases - Add back package to dev extras for function * Chaneg path in ssh command * Amend release script * Amend the ssh command for CSS * Update tools/finish_release.py Co-authored-by: Brad Warren <bmw@users.noreply.github.com> * Update script with proper path and subprocess call * Update ssh command * Correct typo in path * Fix typo in path * Update certbot/CHANGELOG.md Co-authored-by: ohemorange <ebportnoy@gmail.com> * Remove missed conflict text Co-authored-by: Brad Warren <bmw@users.noreply.github.com> Co-authored-by: ohemorange <ebportnoy@gmail.com>
2022-06-29Update generated CSRs to create V1 CSRs (#9334)Amir Omidi
* Update generated CSRs to create V1 CSRs Per the RFC: https://datatracker.ietf.org/doc/html/rfc2986#section-4 Version 3 CSRs, as far as I can tell, are not a thing (yet). Relevant code in Go, for example: https://cs.opensource.google/go/go/+/refs/tags/go1.18.3:src/crypto/x509/x509.go;l=1979 * Update AUTHORS.md * Unit test for PR #9334 * Add a small comment explaining this line for future readers. * Add info to changelog Co-authored-by: Paul Buonopane <paul@namepros.com>
2022-05-13Cite Mozilla ssl-config in Apache/NGINX TLS configs (#8670) (#9295)amplifi
* Cite Mozilla ssl-config in Apache/nginx TLS configs (certbot#8670) * Update CHANGELOG * Add TLS config hashes to ALL_SSL_OPTIONS_HASHES * Update wording in CHANGELOG
2022-04-27If an installer is provided to certonly, restart after cert issuance (#9184)Will Greenberg
* If an installer is provided to certonly, restart after cert issuance * Add myself to AUTHORS.md * Handle certonly's "installer" error case * Handle interactive case, use lazy interpolation * fix trailing whitespace * fix whitespace in error message, re-raise exception * Handle cases where user specified an authenticator but no installer * make tox happy * Clarify comment in selection.py Co-authored-by: ohemorange <ebportnoy@gmail.com> * Add tests for the certonly installer changes Co-authored-by: ohemorange <ebportnoy@gmail.com>
2022-04-06Add subproblems to errors (#7046) (#9258)James Balazs
* Add subproblems to errors (#7046) * Fix can't assign attribute * Tidy up string representations of errors and add decoders for subproblems / identifiers * Add missing attributes to docstring * Move change to 1.27.0 in changelog
2021-11-30Added --issuance-timeout command line option (#9056)moratori
* Added --issuance-timeout command line option * clarification of command line option name,docstring and add tests * fix test case for python36 * improved the command line options
2021-01-14--preferred-chain: only match root name (#8596)Aaron Gable
* --preferred-chain: only match root name Currently, when certbot is given the `--preferred-chain='Some Name'` flag, it iterates through all alternate chains offered by the ACME server until it finds any certificate which has `'Some Name'` as its Issuer Common Name. Unfortunately, this means that if the desired alternate chain is a strict subset of any earlier chain (e.g. the default chain is 'EE <-- Int <-- Root1 <-- Root2', but the desired chain is 'EE <-- Int <-- Root1'), there is no name which can be provided by the user which will allow the client to select the desired chain. This change makes it so that the `find_chain_with_issuer` logic only cares about the Issuer Common Name found in the last certificate in each chain. In the example above, the user would then be able to get their desired chain by specifying `--preferred-chain='Root1'`: although that name appears in the default chain, it does not appear in the highest certificate of that chain. This change is technically backwards-incompatible. However, the only advice that has been given to users of certbot (and the only usecase that we believe has existed so far) involved setting the flag to a value that is the name of a root, not an intermediate, so we don't expect any real-world configurations or use-cases to be broken. Fixes #8577 * Update interfaces.py
2021-01-12Fix EC curve name typo in crypto_util (#8598)Daniel Almasi
* Fix EC curve name typo in crypto_util Fix typo of secp521r1 in crypto util module. - secp521r1 is to be supported by certbot, but a typo of "SECP521R1" in the input validation section of the make_key function results in an error being thrown * Add myself to authors.md Add myself to authors.md ^^ * Add test for secp521r1 key generation Add test for secp521r1 key generation to cli-tests
2020-12-17Fix fetch of existing records from Google DNS (#8521)Lorenzo Fundaró
* Fix fetch of existing records from Google DNS There has been many complaints regarding `certbot_dns_google` plugin failing with: * HTTP 412 - Precondition not met * HTTP 409 - Conflict See #6036. This PR fixes that situation. The bug lies on how we fetch the TXT records from google. For large amount of records the Google API paginates the result but we ignore the subsequent pages and assume that if the record is not in the first response then it doesn't exist. This leads to either HTTP 409, or HTTP 412 or both. In this PR we leverage the use of filters on the API to get exactly the records we are looking for. Apart from fixing the problem stated above, it has the extra benefit of making the process faster by reducing the amount of API calls and it doesn't require us to handle any pagination logic * Explain changes on CHANGELOG * Edit AUTHORS.md * make execute static * Update certbot/CHANGELOG.md Being more specific for which plugin this fix bug is meant for. Co-authored-by: alexzorin <alex@zor.io> * Fix if expression to be more python-idiomatic Co-authored-by: alexzorin <alex@zor.io> * Sort AUTHORS.md * Simplify tests Make rrs_mock modeling simpler and refactor * Revert "Simplify tests" This reverts commit 9de9623ba7466bf76a7d9075d4eba6980cbe0b62. * Reimplement conditional mock We still want to use a conditional mock by make it more simple to understand by using MagicMock. * Revert "Sort AUTHORS.md" This reverts commit b3aa35bcf16f393b2e08ca22278d4c0cfe6c7282. * Add name in AUTHORS.md Co-authored-by: alexzorin <alex@zor.io>
2020-11-04Implements support for ECDSA keys. Fixes #2163.test-ec_dsa_2163Mads Jensen
Thanks to @pahrohfit and @Tomoyuki-GH for previous efforts to implement suport for this. Co-Authored-By: Robert Dailey <rob@wargam.es> Co-Authored-By: Tomoyuki-GH <55397638+Tomoyuki-GH@users.noreply.github.com>
2020-08-27Support Register Unsafely in Update (#8212)Daniel Drexler
* Allow user to remove email using update command Fixes #3162. Slight change to control flow to replace current email addresses with an empty list. Also add appropriate result message when an email is removed. * Update ACME to allow update to remove fields - New field type "UnFalseyField" that treats all non-None fields as non-empty - Contact changed to new field type to allow sending of empty contact field - Certbot update adjusted to use tuple instead of None when empty - Test updated to check more logic - Unrelated type hint added to keep pycharm gods happy * Moved some mocks into decorators * Restore default to `contact` but do not serialize - Add `to_partial_json` and `fields_to_partial_json` to Registration - Store private variable noting if the value of the `contact` field was provided by the user. - Change message when updating without email to reflect removal of all contact info. - Add note in changelog that `update_account` with the `--register-unsafely-without-email` flag will remove contact from an account. * Reverse logic for field handling on serialization Now forcably add contact when serilizing, but go back to base `jose` field type. * Responding to Review - change out of date name - update several comments - update `from_data` function of `Registration` - Update test to remove superfluous mock * Responding to review - Change comments to make from_data more clear - Remove code worried about None (omitempty has got my back) - Update test to be more reliable - Add typing import with comment to avoid pylint bug
2020-07-19certbot_dns_linode: decrease the default propagation intervalȘtefan Talpalaru
«When you add or change DNS zones or records, your changes will now be reflected at our authoritative nameservers in under 60 seconds. This is down from the previous “every quarter hour” approach that we had for so long.» - https://www.linode.com/blog/linode/linode-turns-17/
2020-06-19tree-wide: use LooseVersion instead of StrictVersion (#8081)Florian Klink
According to `distutils/version.py`, StrictVersion is pretty strict in what version numbers to accept: > A version number consists of two or three dot-separated numeric > components, with an optional "pre-release" tag on the end. The > pre-release tag consists of the letter 'a' or 'b' followed by a number. This assumption already fails for some pretty basic python libraries itself, like setuptools, also available in `46.1.3.post20200610`, a completely valid version number according to https://www.python.org/dev/peps/pep-0440/#post-releases. There doesn't seem to be a particular reason on why StrictVersion has been used here, so let's use LooseVersion, to be compatible with these versions. Co-authored-by: Adrien Ferrand <adferrand@users.noreply.github.com>
2020-06-09Fix certbot.compat.filesystem documentation (#8058)Brian Heim
* Fix bad rst docstrings * AUTHORS.md: add Brian Heim Co-authored-by: ohemorange <ebportnoy@gmail.com>
2020-06-08Remove documentation for configuring ciphersuites (#8027) (#8056)Rasesh Patel
Issue #1123 discusses a feature that allows users to set the cipher security level. That feature wasn't built. It didn't provide enough user value to justify the corresponding increase in complexity. The feature request and the associated discussion threads were closed. However, the proposed API spec and the TODO section remained in the cipher docs. They're a vestige of that issue from olden days and this PR removes those last living traces... Fixes #8027.
2020-06-08AUTHORS.md: fix GH url for Brandon Kreisel (#8059)Brian Heim
2020-04-23reorganized error message when a user entered an invalid email addresstaixx046
2020-04-15Update URL for Mozilla SSL Configuration Generator (#7912)April King
2020-04-09Add minimal proxy support for OCSP verification (#7892)inejge
Translate a proxy specified by an environment variable ("http_proxy" or "HTTP_PROXY") into options recognized by "openssl ocsp". Support is limited to HTTP proxies which don't require authentication. Fixes #6150
2020-02-25Fixed typo & some trivial documentation changecumul0529
2020-02-23Add my name to AUTHORS.mdcumul0529
:)
2020-01-25dns-cloudflare: Implement limited-scope API Tokens (#7583)Cameron Steel
A while ago Cloudflare added support for limited-scope API Tokens in place of using a global API key, but support for them in cloudflare/python-cloudflare took a while to get through. In summary, this PR: - Implements token functionality through the INI file parameter `dns_cloudflare_api_token` (in addition to the traditional `dns_cloudflare_email` and `dns_cloudflare_api_key`). This needed a more advanced parameter validator than the built in `required_variables` mechanism. - Updates the docs to reflect the new option, needed token permissions, and version details of the `cloudflare` module * Update python-cloudflare version * Add Cloudflare API Token support to certbot-dns-cloudflare * Add token-specific errors to certbot-dns-cloudflare * Tidy up certbot-dns-cloudflare * Implement Cloudflare API Tokens in testing for certbot-dns-cloudflare(needs work) * Further tidying of certbot-dns-cloudflare * Update CHANGELOG with Cloudflare API Tokens implementation * Improve testing of certbot-dns-cloudflare * Improve certbot-dns-cloudflare test formatting * Further improve testing for certbot-dns-cloudflare * Change needed permissions for token * Add documentation regarding python-cloudflare version * Fix changelog, references to python-cloudflare and docs * Fix behaviour when domain does not match cloudflare root domain. Improve error handling. * Improve testing * Improve hints and error handling
2020-01-24Fix collections.abc imports for Python 3.9 (#7707)Hugo van Kemenade
* Fix collections.abc imports for Python 3.9 * Update AUTHORS.md * No longer ignore collections.abc deprecation warning * Update changelog * Remove outdated comment * Disabling no-name-in-module not needed as linting is on Python 3
2020-01-23fixes #1948 -- MD5 on FIPS systems (#7708)Josh McCullough
* use MD5 in non-security mode to get around FIPS issue * update CHANGELOG * add myself to AUTHORS * ignore hashlib params
2019-11-01Fix invalid escape sequence \. rebuild_dependencies.py (#7486)Mickaël Schoentgen
Signed-off-by: Mickaël Schoentgen <contact@tiger-222.fr>
2019-10-30Deprecation warnings for Python 3.4 (#7378)sydneyli
Fixes #7367 * Deprecation warnings for Python 3.4 users * CHANGELOG.md and AUTHORS.md * double equals typo
2019-10-08Remove --fast from the test farm tests (#7427)Andrzej Górski
2019-09-26Fix to run with Apache on RHEL 6 (#7401)Kenichi Maehashi
This PR fixes a regression in #7337 (0.38.0) that certbot cannot run with Apache on RHEL 6. In RHEL 6, `distro.linux_distribution()` returns `RedHatEnterpriseServer`. In RHEL 6: ```py >>> import distro >>> distro.linux_distribution() (u'RedHatEnterpriseServer', u'6.10', u'Santiago') >>> import platform >>> platform.linux_distribution() ('Red Hat Enterprise Linux Server', '6.10', 'Santiago') ``` In RHEL 7: ```py >>> import distro >>> distro.linux_distribution() ('Red Hat Enterprise Linux Server', '7.6', 'Maipo') >>> import platform >>> platform.linux_distribution() ('Red Hat Enterprise Linux Server', '7.6', 'Maipo') ``` * fix to run with Apache on RHEL 6 * fix docs
2019-08-07Merge pull request #7302 from certbot/rhel8_fix-with-testsBrad Warren
This PR builds off of #7240 to fix #7241. The code in certbot-auto is unchanged which I +1. Someone else should give it a 2nd review. For the code in the tests, you can see all tests passing (including test_tests.sh) at https://travis-ci.com/certbot/certbot/builds/122198270. I created #7301 to track removing the temporary code in test_leauto_upgrades.sh as suggested at #7282 (comment). One noteworthy thing here is I did not add the RHEL 8 AMI to the Apache tests due to #7273. This problem is not related to support in certbot-auto though, is an edge case, and I do not personally believe it should block this PR.
2019-08-06Update certbot-auto script to work with RHEL 8Michael Watters
/usr/bin/python no longer exists in RHEL 8. This patch updates the certbot-auto script to use python3 on nodes running RHEL 8. Also fixed a bug in the RPM_DIST_VERSION logic which would cause letsencrypt-auto to fail on servers running CentOS/RHEL 6.
2019-07-25acme: Implement authz deactivation (#7254)alexzorin
Resolves #4945. First PR in order to address #5116. * acme: Implement authz deactivation Resolves #4945 * update AUTHORS and CHANGELOG * typos in mypy annotations * formatting: missing newline * improve test_deactivate_authorization * improve deactivate_authorization * test: s/STATUS_INVALID/STATUS_DEACTIVATED/ * simplify dict to keyword argument * acme: add UpdateAuthorization * acme: use UpdateAuthorization in deactivate_authz and add mypy annotation This allows deactivate_authorization to succeed for both ACME v1 and v2 servers.
2019-06-04Add Adrien Ferrand to the authors list (#7119)Adrien Ferrand
2019-05-31Ignore editor backups when running hooks. (#7109)Felix Lechner
* Ignore editor backups when running hooks. When processing hooks, certbot also runs editor backups even though such files are outdated, clearly warranted correction and may quite possibly be defective. That behavior could lead to unexpected breakage, and perhaps even pose security risks---for example, if a previous script was careless with file permissions. As an aggravating factor, the backup runs after the corrected version and could unintentionally override a fix the user thought was properly implemented. This commit causes editor backup files ending in tilde (~) to be excluded when running hooks. Additional information can be found here: https://github.com/certbot/certbot/issues/7107 https://community.letsencrypt.org/t/editor-backup-files-executed-as-renewal-hooks/94750 * Add unit test for hook scripts with filenames ending in tilde. * Provide changelog entry for not running hook scripts ending in tilde. * Add Felix Lechner to the list of contributors.
2017-04-27make a list of contributors (#4508)Noah Swartz
* make a list of contributors * make all links websites * alphebetize and remove extra file * remove ref to contributors * add one more! * sort using linux sort command