Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/certbot/certbot.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2017-06-08Release 0.15.0v0.15.00.15.xBrad Warren
2017-06-02Remove reference to .new in Nginx's SSL options. (#4769)Brad Warren
2017-06-01Refactor nginx file update mechanism in preparation for working with apache ↵ohemorange
plugin (#4720) * move install_ssl_options_conf functionality to common * add no cover * compute current hash instead of saving * make current hash be computed; switch to list of all canonical hashes * put message directly into assertion * don't pass logger * add docstring * Add unit tests for certbot.plugins.common.install_ssl_options_conf
2017-05-23Update options-ssl-nginx.conf in`prepare` if it hasn't been manually ↵ohemorange
modified (#4689) Fixes #4559. * Update options-ssl-nginx.conf in prepare, if it hasn't been modified. * add previous options-ssl-nginx.conf hashes * InstallSslOptionsConfTest * remove .new file and only print warning once * save digest to /etc/letsencrypt * add comment reminding devs to update hashes * add comment and test for sha256sum * treat hash file as text file because python3 * move constants and rename hidden digest file
2017-05-16Allow Nginx to insert include files with comments inside (#4666)ohemorange
* add failing test case * allow include files to insert comments * lint
2017-05-05Bump version to 0.15.0Brad Warren
2017-05-05Release 0.14.0v0.14.0Brad Warren
2017-05-03Add a test for #4557 (#4609)ohemorange
2017-05-03Switch to using include directive for Nginx constants (#4557)ohemorange
* Switch to using include directive for Nginx constants * remove deprecated comment * give better error message when attempting to insert an existing directive * make code more readable * add docstrings * allow a duplicated directive if it's identical * comment out precisely repeated directives * add comments
2017-05-02Add lockfile (#4449)Brad Warren
* add lock_file * cleanup lock file * Add LockFile tests * add lock_dir * add lock_dir_until_exit * add set_up_core_dir and move lock_dir_until_exit * Move lock_and_call to certbot.test.util * Add lock to Apache * Add lock to the Nginx plugin * Improve permissions error message * sort plugins * add test_prepare_order * provide more actionable permissions error * Document and catch use of OSError * don't lock a directory twice * add conditional dependency on ordereddict * Add lock_test * expand sorted plugins comment * Add lock_test to lint * make make_lineage more conventional and flexible * enhance lock_test.py * add lock_test to tox * Readd success message * make py26 happy * add test_acquire_without_deletion
2017-04-29Tell the world we're Python 3 compatible (#4568)Brad Warren
* Mention python 3 support in setup.py * Build universal (py2 and py3 compatible) wheels * Mention Python 3.3+ support in docs * we work on python 3.6 too
2017-04-27fix for issue 4132: increasing server_names_hash_bucket_size if necessary ↵yomna
(#4496) * increases server_names_hash_bucket_size if it's too low in your nginx conf * switching from k,v pairwise indices -> inner_line * simply using bucket_directive
2017-04-27Allow empty nginx blocks (#4555)ohemorange
* modify test config file to allow valid config that fails to parse in parser.py * make failing tests pass by fixing the problem
2017-04-14Fix nginx integration tests on Python 3Yen Chi Hsuan
2017-04-06Candidate 0.13.0 (#4475)Erica Portnoy
* Release 0.13.0 * Bump version to 0.14.0
2017-03-31Remove unused default parameter (#4447)Erica Portnoy
* Remove unnecessary, nonexistent default
2017-03-30Add additional Nginx parsing test case (#4440)Erica Portnoy
2017-03-28Update Nginx ciphersuites to use Mozilla Intermediate (#4426)Erica Portnoy
* Update Nginx ciphersuites to use Mozilla intermediate * update tests to match new behavior
2017-03-25Fix nginx parser (#4296)Erica Portnoy
* rewrite nginx parser to allow everything that nginx does * also make changes in tls_sni_01.py * add test case with * allow embedded variables * allow empty ${} variable * fix quotes * un-special case if * update all tests to reflect current parsing * escape in QuotedString after merge * add test cases for variable weirdness that are almost certainly nginx bugs * update regex for correct variable rules * close paren doesn't invoke last_space * Make test file valid Nginx syntax
2017-03-18Don't save keys/csr on dry run (#4380)Daniel Huang
* Don't save keys/csr on dry run (#2495) * Replace assertIsNone for py26 * Fix config defaults for compat tests
2017-03-18Merge pull request #4347 from kernelpanek/masterErica Portnoy
Fixes nginxparser to allow multiline quoted strings
2017-03-17Python 3 compatibility for all tests (#4358)Yen Chi Hsuan
2017-03-16If we fail to reload Nginx, write to temporary files instead of piping ↵Erica Portnoy
output (#4333) Due to issues with piping and Nginx on Arch.
2017-03-15New switch for QuotedStrings allows retainer of quotes but my test failsRichard Panek
2017-03-15Don't unquote the results of the parsekernelpanek
2017-03-15Fixes issue when parsing an Nginx configuration file containing multiline ↵kernelpanek
quoted strings
2017-03-10Build wheels correctly for Python 2.6 (#4313)Brad Warren
* stop conditionally pinning mock version in acme * stop conditionally pinning mock version in certbot * stop conditionally pinning mock version in apache * stop conditionally pinning mock version in nginx * stop conditionally pinning mock version in letshelp * stop conditionally pinning mock version in compatibility-test
2017-03-03Candidate 0.12.0 (#4286)Erica Portnoy
* Release 0.12.0 * Bump version to 0.13.0
2017-02-28Fix direct usages of the root logger (#4236)Damien Tournoud
Some code uses `logging.debug` and `logging.info` instead of the file-specific logger in `logger.debug` and `logger.info`.
2017-02-28Don't crash on listen unix: (#4259)Erica Portnoy
Fixes #4225. * don't crash on listen unix: * correctly merge #4221
2017-02-23Show error details for the nginx config parser (#4221)silverwind
Nginx parser errors now include helpful details on where parsing has actually failed. Related: https://github.com/certbot/certbot/issues/3798
2017-02-01Bump version to 0.12.0Brad Warren
2017-02-01Release 0.11.0v0.11.0Brad Warren
2017-02-01Adding checking name validity to the Apache plugin (#3639)Amjad Mashaal
2017-01-27Spelling (#4101)Josh Soref
* spelling: action * spelling: artifacts * spelling: asymmetric * spelling: attempts * spelling: bizarre * spelling: certbot * spelling: certificate * spelling: certainly * spelling: challenge * spelling: client * spelling: collated * spelling: correct * spelling: considered * spelling: custom * spelling: distinguish * spelling: encoding * spelling: enhancement * spelling: equivalent * spelling: execution * spelling: existence * spelling: failed * spelling: handshake * spelling: hyphen * spelling: initialized * spelling: initialization * spelling: interpretation * spelling: letsencrypt * spelling: multiline * spelling: multipart * spelling: necessary * spelling: otherwise * spelling: output * spelling: overridden * spelling: positives * spelling: preferable * spelling: progress * spelling: recommended * spelling: referring * spelling: relativity * spelling: request * spelling: requiring * spelling: separate * spelling: source * spelling: specified * spelling: standard * spelling: successfully * spelling: unparseable * spelling: useful
2017-01-11Release 0.10.0 (#4022)Brad Warren
* Release 0.10.0 * Bump version to 0.11.0
2017-01-11Break on failure to deploy cert (#4003)Erica Portnoy
* Break on failure to deploy cert * Add error message for unable to install cert * Add unit test
2017-01-10pyparsing.restOfLine is not a function, don't call it (#3989)Ondřej Surý
2016-12-14Fix certbox-nginx address equality check (#3886)Clif Houck
0.0.0.0, *, and '' are equivalent hosts to nginx. Changes Addr object's equality testing to treat them as equal. Fixes #3855
2016-12-09make our linter happy (#3881)Brad Warren
2016-12-07Parallalelise nosetests from tox (#3836)Peter Eckersley
* Parallalelise nosetests from tox * Parallelise even more things, break even more things * Now unbreak all the tests that aren't ready for ||ism * Try to pass tests! - Remove non-working hack in reporter_test - also be selective about ||ism in the cover environment * Try again * certbot-apache tests also work, given enough time * Nginx may need more time in Travis's cloud * Unbreak reporter_test under ||ism * More timeout * Working again? * This goes way faster * Another big win * Split a couple more large test suites * A last improvement * More ||ism! * ||ise lint too * Allow nosetests to figure out how many cores to use * simplify merge * Mark the new CLI tests as ||izable * Simplify reporter_test changes * Rationalise ||ism flags * Re-up coverage * Clean up reporter tests * Stop modifying testdata during tests * remove unused os
2016-12-06Mark Nginx vhosts as ssl when any vhost is on ssl at that address (#3856)Erica Portnoy
* Move parse_server to be a method of NginxParser * add super equal method to more correctly check addr equality in nginx should we support ipv6 in nginx in the future * add addr:normalized_tuple method * mark addresses listening sslishly due to another server block listening sslishly on that address * test turning on ssl globally * add docstring * lint and remove extra file
2016-12-06Refactor cli_test.py and main_test.py (#3828)Blake Griffith
* Begin breaking out cli_test.py * simplify main * refactor porse tests * move determine account tests to main_test.py * move duplicate cert test to main_test.py * move cli stuff out of the way * add test_renewal.py * move error test into error_handler_test.py * move test_read_file * move test_no_gui out of MainTest * move test_install_abspath to parsetest * Move main tests into main_test.py * move cli tests back into cli_test.py * clean up cli_test.py * move punycode test to util_test.py * Fix NameError from missing plugins_disco * Fix linting errors * test_renewal.py -> renewal_test.py * rm not_cli_test.py * Move main._handle_exception test to main_test.py * Move renewal import in renewal_test.py from @ohemorange comments * certbot.tests.test_util -> certbot.tests.util * Fix issues from rebasing. * Fix testing issue with option_was_set * fix linting issue
2016-11-09Remove get_all_certs_keys() from Apache and Nginx (#3768)Nick Fong
- Remove get_all_certs_keys() implementation in - certbot-apache/certbot_apache/configurator.py - Remove corresponding tests for get_all_certs_keys() in - certbot-apache/certbot_apache/tests/configurator_test.py - Remove get_all_certs_keys() implementation in - certbot-nginx/certbot_nginx/configurator.py - certbot-nginx/certbot_nginx/parser.py - Remove corresponding tests for get_all_certs_keys() in: - certbot-nginx/certbot_nginx/tests/configurator_test.py - certbot-nginx/certbot_nginx/tests/parser_test.py Resolves #3762
2016-11-08Don't re-add redirects if one exists (#3751)Erica Portnoy
* Don't re-add redirects if one exists * coverage * make coverage happy * don't re-add comment, and clean code
2016-11-08Fix writing pem files with Python3 (#3757)kaiyou
* Standardize arguments name for mode and chmod in the util API * Handle OpenSSL pem as bytes objects only for Python3 compatibility * Handle OpenSSL pem as bytes objects only (remaining bits) * Manipulate bytes objects only when testing PEM-related functions * Fix argument order when calling util.unique_file
2016-10-21Allow certbot to get a cert for default_servers (#3652)Erica Portnoy
* Allow certbot to get a cert for default_servers * Add to_string method for not printing default_server
2016-10-11Mark parsed Nginx addresses as listening sslishly when an ssl on directive ↵Erica Portnoy
is included in the server block. (#3607)
2016-10-05Release Certbot 0.9.0 (#3583)Brad Warren
* Release 0.9.0 * Bump version to 0.10.0
2016-09-30Update Nginx redirect enhancement process to modify appropriate blocks (#3546)Erica Portnoy
* Cache the vhost we find during nginx deployment for OCSP enhancement. * Refactor to pass domain into enhancement functions * Add https redirect to most name-matching block listening non-sslishly. * Redirect enhancement chooses the vhost most closely matching target_name that is listening to port 80 without using ssl. * Add default listen 80 directive when it is implicitly defined