Releases: moepman/acertmgr
Releases · moepman/acertmgr
1.1.2
1.1.1
Changes since 1.1.0:
- Add configuration option validate_ari so RFC9773 checks can be optionally disabled
- acme.v2: Run check only if renewalInfo is available in endpoint discovery
- acme: fix default return in ARI prototype
1.1.0
Changes since 1.0.6:
- github: fix job permissions
- github: bump softprops/action-gh-release to v2
- Implement RFC9773 ARI protocol for authority.v2
- Fix log issues when a certificate does not have a CN defined and has only SANs instead (like when using LE's tlsserver profile)
- Fix TypeError: Remove explicitly creating a timedelta-Object as substracting two datetimes already results in one.
- Add support for the Automated Certificate Management Environment (ACME) Profiles Extension
- github: use id-token for pypi instead of user & pw
- Allow ttl_days to be specified as a fraction of total certificate lifetime
1.0.6
Changes since 1.0.5:
- version: bump to 1.0.6
- Add support for cryptography>=42 utc timestamps
- add missing requirements to the github action
- fix compatibility issue with stdeb
- fix deprecated github action and adjust for new build enadjust for new build env
1.0.5
Changes since 1.0.4:
- Update github action workflow to build debian packages with gzip format for older OS versions
- Github Action: Update to newer github action syntax/standards, change image to ubuntu-latest, change pypi-publish to supported version and check if we have credentials to publish at all
- Allow multiple sets of the same domain to defined in a single config file (necessary for multiple certs using different key_algorithm) in a list style notation (lists of maps)
- Fix idna conversion for force-renew (probably broken since the IDNA cleanup)
- Unify key_algorithm handling for elipic curves (change naming to ECC but stay backwards compatible)
- Fix LOG_REPLACEMENTS determination when multiple domain sets exist and we are on a newer version of python
- Update config id if we have a key algorithm set to allow for multiple certs with different algorithms for the same set of domains
- Instantiate HashAlgorithm in OCSPRequestBuilder
- Clarify expected authority format (at least for v2) and add an example
- logging: Add real counterparts of IDNA-mapped domains in brackets
- configuration: Simplify too complex IDNA conversion
- certs already contain idna domain names
1.0.4
Changes since 1.0.3.1:
- acertmgr/v2: Handle CA certificate chains properly
- CI: Build on Ubuntu 18.04 while we are Python 2 compatbile and OS version is not EOL
- standalone: Fix multiple challange handlers on same port
1.0.3.1
Changes since 1.0.3:
- GitHub Actions: use current setuptools and wheel
- GitHub Actions: twine upload via pypa/gh-action-pypi-publish
- reformat setup.py
- GitHub Actions: unify whitespace style
1.0.3
Changes
- tools: Fix IDNA handler (again)
- acertmgr: Add a OCSP validation to certificate verification
- tools: make pem file writable by owner before tryting to write
- Generate proper dependencies on deb Packages
- Use Github Actions for automated building and release