File certbot.changes of Package certbot
-------------------------------------------------------------------
Wed Aug 6 05:21:01 UTC 2025 - ecsos <ecsos@opensuse.org> - 4.2.0
- Update to 4.2.0
* Added
- Added --eab-hmac-alg parameter to support custom HMAC algorithm for
External Account Binding. (#10281)
* Changed
- Catches and ignores errors during the directory fetch for ARI checking so
that these errors do not hinder the actual certificate issuance. (#10342)
- Removed the dependency on pytz. (#10350)
- Deprecated acme.crypto_util.probe_sni (#10386)
- Support for Python 3.9 was deprecated and will be removed in our next planned release. (#10390)
* Fixed
- The Certbot snap no longer sets the environment variable PYTHONPATH stopping
it from picking up Python files in the current directory and polluting the
environment for Certbot hooks written in Python. (#10176, #10257)
- Previously, we claimed to set FAILED_DOMAINS and RENEWED_DOMAINS env
variables for use by post-hooks when certificate renewals fail, but we were
not actually setting them. Now, we are. (#10259)
- Certbot now always uses the server value from the renewal configuration file
for ARI checks instead of the server value from the current invocation of
Certbot. This helps prevent ARI requests from going to the wrong server if
the user changes CAs. (#10339)
-------------------------------------------------------------------
Fri Jun 13 05:20:56 UTC 2025 - ecsos <ecsos@opensuse.org>
- Update to 4.1.1
* Fixed
- When a CA fails to issue a certificate after finalization, print the ACME error from the order
- No longer checks ARI during certbot --dry-run, because --dry-run uses staging when used
with let's encrypt but the cert was issued against the default server. This would emit
a scary warning, even though the cert would renew successfully.
- Contacting the CA to check ARI is now skipped for certificate lineages that
have autorenew set to False.
-------------------------------------------------------------------
Wed Jun 11 12:13:28 UTC 2025 - ecsos <ecsos@opensuse.org>
- Update to 4.1.0
* Added
- ACME Renewal Info (ARI) support. https://datatracker.ietf.org/doc/draft-ietf-acme-ari/
certbot renew will automatically check ARI when using an ACME server that supports it,
and may renew early based on the ARI information. For Let's Encrypt certificates this
will typically cause renewal at around 2/3rds of the certificate's lifetime, even if
the renew_before_expiry field of a lineage renewal config is set a later date.
* Changed
- Switched to src-layout from flat-layout to accommodate PEP 517 pip editable installs
- acme.client.ClientNetwork now makes the "key" parameter optional.
- Deprecated acme.challenges.TLSALPN01Response
- Deprecated acme.challenges.TLSALPN01
- Deprecated parameter alpn_protocols from acme.crypto_util.probe_sni
- Deprecated acme.crypto_util.SSLSocket
- Deprecated acme.standalone.TLSServer
- Deprecated acme.standalone.TLSALPN01Server
- Deprecated parameter enforce_openssl_binary_usage from certbot.ocsp.RevocationChecker.
- Dropped support for Python 3.9.0 and 3.9.1 for compatibility with newer
versions of the cryptography Python package. Python 3.9.2+ is still supported.
* Fixed
- Order finalization now catches orderNotReady response, polls until order status is
ready, and resubmits finalization request before polling for valid to download
certificate. This conforms to RFC 8555 more accurately and avoids race conditions where
all authorizations are fulfilled but order has not yet transitioned to ready state on
the server when the finalization request is sent. It also respects retry-after when
polling for finalization readiness.
- The --preferred-profile and --required-profile flags now have their values stored in
the renewal configuration so the same setting will be used on renewal.
- Fixed an unintended change introduced in 4.0.0 where renew_before_expiry could not be
shorter than certbot's default renewal time. If the server does not provide an ARI
response, renew_before_expiry will continue to override certbot's default. However,
an early ARI response will override a later renew_before_expiry time, to account for
notifications in case of certificate revocation, especially with the impending deprecation
of OCSP (https://letsencrypt.org/2024/12/05/ending-ocsp/). To force a later date, users
can replace certbot's default cron job and/or systemd timer with one of their own timing.
-------------------------------------------------------------------
Thu Apr 17 18:02:45 UTC 2025 - ecsos <ecsos@opensuse.org>
- Update to 4.0.0
* Added
- The --preferred-profile and --required-profile flags allow requesting a profile.
https://datatracker.ietf.org/doc/draft-aaron-acme-profiles/
* Changed
- Certificates now renew with 1/3rd of lifetime left (or 1/2 of lifetime left,
if the lifetime is shorter than 10 days). This is a change from a hardcoded
renewal at 30 days before expiration. The config field renew_before_expiry
still overrides this default.
- removed acme.crypto_util._pyopenssl_cert_or_req_all_names
- removed acme.crypto_util._pyopenssl_cert_or_req_san
- removed acme.crypto_util.dump_pyopenssl_chain
- removed acme.crypto_util.gen_ss_cert
- removed certbot.crypto_util.dump_pyopenssl_chain
- removed certbot.crypto_util.pyopenssl_load_certificate
* Fixed
- Moved RewriteEngine on directive added during apache http01 authentication
to the end of the virtual host, so that it overwrites any RewriteEngine off
directives that already exist and allows redirection to the challenge URL.
-------------------------------------------------------------------
Wed Mar 12 06:17:04 UTC 2025 - ecsos <ecsos@opensuse.org>
- Update to 3.3.0
* Changed
- The --register-unsafely-without-email flag is no longer needed in non-interactive mode.
- In interactive mode, pressing Enter at the email prompt will register without an email.
- deprecated acme.crypto_util.dump_pyopenssl_chain
- deprecated acme.crypto_util._pyopenssl_cert_or_req_all_names
- deprecated acme.crypto_util._pyopenssl_cert_or_req_san
- deprecated certbot.crypto_util.dump_pyopenssl_chain
- deprecated certbot.crypto_util.pyopenssl_load_certificate
* Fixed
- Fixed a bug introduced in Certbot 3.1.0 where OpenSSL environment variables
needed in our snap configuration were persisted in calls to external programs
like nginx which could cause them to fail to load OpenSSL.
-------------------------------------------------------------------
Wed Feb 12 11:09:52 UTC 2025 - ecsos <ecsos@opensuse.org>
- Update to 3.2.0
* Changed
- certbot-nginx now requires pyparsing>=2.4.7.
- certbot and its acme library now require cryptography>=43.0.0.
- certbot-nginx and our acme library now require pyOpenSSL>=25.0.0.
- Deprecated gen_ss_cert in acme.crypto_util as it uses deprecated
pyOpenSSL API.
- Add make_self_signed_cert to acme.crypto_util to replace `gen_ss_cert.
- Directory hooks are now run on all commands by default, not just renew
- Help output now shows False as default when it can be set via cli.ini instead of None
- Changed terms of service agreement text to have a newline after the TOS link
- certbot-cloudflare-dns is now pinned to version 2.19 of Cloudflare's python library
- Removed support for Linode API v3 which was sunset at the end of July 203.
* Fixed
- Private keys are now saved in PKCS#8 format instead of PKCS#1. Using PKCS#1
was a regression introduced in Certbot 3.1.0.
- Allow nginx plugin to parse non-breaking spaces in nginx configuration files.
- Honor --reuse-key when --allow-subset-of-names is set
- Fixed regression in symlink parsing on Windows that was introduced in Certbot 3.1.0.
- When adding ssl listen directives in nginx server blocks, IP addresses are now preserved.
- Nginx configurations can now have the http block in files other than the root (nginx.conf)
-------------------------------------------------------------------
Wed Feb 12 11:01:47 UTC 2025 - ecsos <ecsos@opensuse.org>
- Update to 3.1.0
* Changed
- Python 3.8 support was removed.
- certbot-dns-rfc2136's minimum required version of dnspython is now 2.6.1.
- Updated our Docker images to be based on Alpine Linux 3.20.
- Our runtime dependency on setuptools has been dropped from all Certbot components.
- Certbot's packages no longer depend on library importlib_resources.
* Fixed
- Included an OpenSSL library that was missing in our Certbot snap fixing
- crashes affecting 32-bit ARM users.
-------------------------------------------------------------------
Thu Nov 14 19:42:10 UTC 2024 - ecsos <ecsos@opensuse.org>
- Update to 3.0.1
* Changed
- The update_symlinks command was removed.
- The csr_dir and key_dir attributes on certbot.configuration.NamespaceConfig were removed.
- The --manual-public-ip-logging-ok command line flag was removed.
- The --dns-route53-propagation-seconds command line flag was removed.
- The certbot_dns_route53.authenticator module has been removed. This should
not affect any users of the plugin and instead would only affect developers
trying to develop on top of the old code.
- Support for Python 3.8 was deprecated and will be removed in our next planned release.
-------------------------------------------------------------------
Wed Nov 6 13:48:08 UTC 2024 - ecsos <ecsos@opensuse.org>
- Update to 3.0.0
* Changed
- The update_symlinks command was removed.
- The csr_dir and key_dir attributes on certbot.configuration.NamespaceConfig were removed.
- The --manual-public-ip-logging-ok command line flag was removed.
- The --dns-route53-propagation-seconds command line flag was removed.
- The certbot_dns_route53.authenticator module has been removed. This should
not affect any users of the plugin and instead would only affect developers
trying to develop on top of the old code.
- Support for Python 3.8 was deprecated and will be removed in our next planned
release.
-------------------------------------------------------------------
Thu Jun 6 19:12:25 UTC 2024 - ecsos <ecsos@opensuse.org>
- Update to 2.11.0
* Changed
- In anticipation of backwards incompatible changes, certbot-dns-cloudflare now
requires less than version 2.20 of Cloudflare's python library.
* Fixed
- Fixed a bug in Certbot where a CSR's SANs did not always follow the order of
the domain names that the user requested interactively. In some cases, the
resulting cert's common name might seem picked up randomly from the SANs
when it should be the first item the user had in mind.
-------------------------------------------------------------------
Thu Apr 4 09:22:40 UTC 2024 - ecsos <ecsos@opensuse.org>
- Update to 2.10.0
* Added
- The Python source packages which we upload to PyPI are
now also being uploaded to
our releases on GitHub where
we now also include a SHA256SUMS checksum file and a PGP signature for that
file.
-------------------------------------------------------------------
Fri Feb 9 07:52:28 UTC 2024 - ecsos <ecsos@opensuse.org>
- Update to 2.9.0
* Added
- Support for Python 3.12 was added.
* Fixed
- Updates joinpath syntax to only use one addition per call,
because the multiple inputs version was causing mypy errors on Python 3.10.
- Makes the reconfigure verb actually use the staging server
for the dry run to check the new configuration.
-------------------------------------------------------------------
Wed Dec 6 06:27:39 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.8.0
* Added
- Added support for Alpine Linux distribution when is used the apache plugin
* Changed
- Support for Python 3.7 was removed.
* Fixed
- Stop using the deprecated pkg_resources API included in setuptools.
-------------------------------------------------------------------
Wed Nov 1 15:53:34 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.7.4
-------------------------------------------------------------------
Wed Oct 25 16:41:30 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.7.3
-------------------------------------------------------------------
Fri Oct 20 11:32:43 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.7.2
-------------------------------------------------------------------
Tue Oct 10 16:11:46 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.7.1
-------------------------------------------------------------------
Wed Oct 4 19:38:55 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.7.0
-------------------------------------------------------------------
Mon Jun 12 08:02:46 UTC 2023 - ecsos <ecsos@opensuse.org>
- Update to 2.6.0
-------------------------------------------------------------------
Thu Sep 1 07:34:05 UTC 2022 - ecsos <ecsos@opensuse.org>
- Add requires python-charset-normalizer >= 2.0.0 and < 2.1.0
-------------------------------------------------------------------
Wed Feb 9 12:08:47 UTC 2022 - ecsos <ecsos@opensuse.org>
- Update to 1.23.0
* Added
- Added show_account subcommand, which will fetch the account information
from the ACME server and show the account details (account URL and, if
applicable, email address or addresses)
- We deprecated support for Python 3.6 in Certbot and its ACME library.
Support for Python 3.6 will be removed in the next major release of Certbot.
* Fixed
- GCP Permission list for certbot-dns-google in plugin documentation
- dns-digitalocean used the SOA TTL for newly created records, rather than 30 seconds.
- Revoking a certificate based on an ECDSA key can now be done with --key-path.
See GH #8569.
-------------------------------------------------------------------
Wed Dec 8 07:20:00 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.22.0
* Added
- Support for Python 3.10 was added to Certbot and all of its components.
- The function certbot.util.parse_loose_version was added to parse version
strings in the same way as the now deprecated distutils.version.LooseVersion
class from the Python standard library.
- Added --issuance-timeout. This option specifies how long (in seconds) Certbot will wait
for the server to issue a certificate.
* Changed
- The function certbot.util.get_strict_version was deprecated and will be
removed in a future release.
* Fixed
- Fixed an issue on Windows where the web.config created by Certbot would sometimes
conflict with preexisting configurations (#9088).
- Fixed an issue on Windows where the webroot plugin would crash when multiple domains
had the same webroot. This affected Certbot 1.21.0.
-------------------------------------------------------------------
Thu Nov 4 07:15:54 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.21.0
* Added
- Certbot will generate a web.config file on Windows in the challenge path
when the webroot plugin is used, if one does not exist. This web.config file
lets IIS serve challenge files while they do not have an extension.
* Changed
- We changed the PGP key used to sign the packages we upload to PyPI. Going
forward, releases will be signed with one of three different keys. All of
these keys are available on major key servers and signed by our previous PGP
key. The fingerprints of these new keys are:
o BF6BCFC89E90747B9A680FD7B6029E8500F7DB16
o 86379B4F0AF371B50CD9E5FF3402831161D1D280
o 20F201346BF8F3F455A73F9A780CC99432A28621
-------------------------------------------------------------------
Tue Oct 5 18:16:56 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.20.0
* Added
- Added --no-reuse-key. This remains the default behavior, but the flag may be
useful to unset the --reuse-key option on existing certificates.
* Fixed
- The certbot-dns-rfc2136 plugin in Certbot 1.19.0 inadvertently had an implicit
dependency on dnspython>=2.0. This has been relaxed to dnspython>=1.15.0.
-------------------------------------------------------------------
Wed Sep 8 05:44:06 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.19.0
* Added
- The certbot-dns-rfc2136 plugin always assumed the use of an IP address as the
target server, but this was never checked. Until now. The plugin raises an error
if the configured target server is not a valid IPv4 or IPv6 address.
- Our acme library now supports requesting certificates for IP addresses.
This feature is still unsupported by Certbot and Let's Encrypt.
* Changed
- Several attributes in certbot.display.util module are deprecated and will
be removed in a future release of Certbot. Any import of these attributes will
emit a warning to prepare the transition for developers.
- zope based interfaces in certbot.interfaces module are deprecated and will
be removed in a future release of Certbot. Any import of these interfaces will
emit a warning to prepare the transition for developers.
- We removed the dependency on chardet from our acme library. Except for when
downloading a certificate in an alternate format, our acme library now
assumes all server responses are UTF-8 encoded which is required by RFC 8555.
* Fixed
- Fixed parsing of Defined values in the Apache plugin to allow for = in the value.
- Fixed a relatively harmless crash when issuing a certificate with --quiet/-q.
- Drop certbot-repoze.sphinx.autointerface.patch because now in upstream.
-------------------------------------------------------------------
Wed Aug 4 10:11:23 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.18.0
* Added
- New functions that Certbot plugins can use to interact with the user have
been added to certbot.display.util. We plan to deprecate using IDisplay
with zope in favor of these new functions in the future.
- The Plugin, Authenticator and Installer classes are added to
certbot.interfaces module as alternatives to Certbot's current zope based
plugin interfaces. The API of these interfaces is identical, but they are
based on Python's abc module instead of zope. Certbot will continue to
detect plugins that implement either interface, but we plan to drop support
for zope based interfaces in a future version of Certbot.
- The class certbot.configuration.NamespaceConfig is added to the Certbot's
public API.
* Changed
- When self-validating HTTP-01 challenges using
acme.challenges.HTTP01Response.simple_verify, we now assume that the response
is composed of only ASCII characters. Previously we were relying on the
default behavior of the requests library which tries to guess the encoding of
the response which was error prone.
- acme: the .client.Client and .client.BackwardsCompatibleClientV2 classes
are now deprecated in favor of .client.ClientV2.
- The certbot.tests.patch_get_utility* functions have been deprecated.
Plugins should now patch certbot.display.util themselves in their tests or
use certbot.tests.util.patch_display_util as a temporary workaround.
- In order to simplify the transition to Certbot's new plugin interfaces, the
classes Plugin and Installer in certbot.plugins.common module and
certbot.plugins.dns_common.DNSAuthenticator now implement Certbot's new
plugin interfaces. The Certbot plugins based on these classes are now
automatically detected as implementing these interfaces.
- We added a dependency on chardet to our acme library so that it will be
used over charset_normalizer in newer versions of requests.
* Fixed
- The Apache authenticator no longer crashes with "Unable to insert label"
when encountering a completely empty vhost. This issue affected Certbot 1.17.0.
- Users of the Certbot snap on Debian 9 (Stretch) should no longer encounter an
"access denied" error when installing DNS plugins.
-------------------------------------------------------------------
Tue Jul 6 18:27:44 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.17.0
* Added
- Add Void Linux overrides for certbot-apache.
* Changed
- We changed how dependencies are specified between Certbot packages. For this
and future releases, higher level Certbot components will require that lower
level components are the same version or newer. More specifically, version X
of the Certbot package will now always require acme>=X and version Y of a
plugin package will always require acme>=Y and certbot=>Y. Specifying
dependencies in this way simplifies testing and development.
- The Apache authenticator now always configures virtual hosts which do not have
an explicit ServerName. This should make it work more reliably with the
default Apache configuration in Debian-based environments.
* Fixed
- When we increased the logging level on our nginx "Could not parse file" message,
it caused a previously-existing inability to parse empty files to become more
visible. We have now added the ability to correctly parse empty files, so that
message should only show for more significant errors.
- Add certbot-repoze.sphinx.autointerface.patch to fix docs and man build error for certbot itself.
Think there is an error with python-repoze.sphinx.autointerface package.
-------------------------------------------------------------------
Tue Jun 1 21:09:45 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.16.0
* Changed
- DNS plugins based on lexicon now require dns-lexicon >= v3.1.0
- Use UTF-8 encoding for renewal configuration files
- Windows installer now cleans up old Certbot dependency packages
before installing the new ones to avoid version conflicts.
- This release contains a substantial command-line UX overhaul,
based on previous user research. The main goal was to streamline
and clarify output. If you would like to see more verbose output, use
the -v or -vv flags. UX improvements are an iterative process and
the Certbot team welcomes constructive feedback.
- Functions certbot.crypto_util.init_save_key and certbot.crypto_util.init_save_csr,
whose behaviors rely on the global Certbot config singleton, are deprecated and will
be removed in a future release. Please use certbot.crypto_util.generate_key and
certbot.crypto_util.generate_csr instead.
* Fixed
- Fix TypeError due to incompatibility with lexicon >= v3.6.0
- Installers (e.g. nginx, Apache) were being restarted unnecessarily
after dry-run renewals.
- Colors and bold text should properly render in all supported
versions of Windows.
-------------------------------------------------------------------
Wed May 5 20:20:43 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.15.0
-------------------------------------------------------------------
Wed Apr 7 07:13:20 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.14.0
* Changed
- certbot-auto no longer checks for updates on any operating
system.
- The module acme.magic_typing is deprecated and will be
removed in a future release.
Please use the built-in module typing instead.
- The DigitalOcean plugin now creates TXT records for the
DNS-01 challenge with a lower 30s TTL.
* Fixed
Don't output an empty line for a hidden certificate when
certbot certificates is being used in combination with
--cert-name or -d.
-------------------------------------------------------------------
Thu Mar 4 08:34:19 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.13.0
* Changed
- CLI flags --os-packages-only, --no-self-upgrade, --no-bootstrap and --no-permissions-check,
which are related to certbot-auto, are deprecated and will be removed in a future release.
- Certbot no longer conditionally depends on an external mock module. Certbot's
test API will continue to use it if it is available for backwards
compatibility, however, this behavior has been deprecated and will be removed
in a future release.
- The acme library no longer depends on the security extras from requests
which was needed to support SNI in TLS requests when using old versions of
Python 2.
- Certbot and all of its components no longer depend on the library six.
- The update of certbot-auto itself is now disabled on all RHEL-like systems.
- When revoking a certificate by --cert-name, it is no longer necessary to specify the --server
if the certificate was obtained from a non-default ACME server.
- The nginx authenticator now configures all matching HTTP and HTTPS vhosts for the HTTP-01
challenge. It is now compatible with external HTTPS redirection by a CDN or load balancer.
-------------------------------------------------------------------
Wed Feb 3 06:42:23 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.12.0
* Changed
- The --preferred-chain flag now only checks the Issuer Common Name of the
topmost (closest to the root) certificate in the chain, instead of checking
every certificate in the chain.
See #8577.
- Support for Python 2 has been removed.
- In previous releases, we caused certbot-auto to stop updating its Certbot
installation. In this release, we are beginning to disable updates to the
certbot-auto script itself. This release includes Amazon Linux users, and all
other systems that are not based on Debian or RHEL. We plan to make this
change to the certbot-auto script for all users in the coming months.
* Fixed
- Fixed the apache component on openSUSE Tumbleweed which no longer provides
an apache2ctl symlink and uses apachectl instead.
- Fixed a typo in certbot/crypto_util.py causing an error upon
attempting secp521r1 key generation
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Jan 6 11:11:42 UTC 2021 - ecsos <ecsos@opensuse.org>
- Update to 1.11.0
* Changed
- We deprecated support for Python 2 in Certbot and its ACME library.
Support for Python 2 will be removed in the next planned release of Certbot.
- certbot-auto was deprecated on all systems. For more information
about this change, see
https://community.letsencrypt.org/t/certbot-auto-no-longer-works-on-debian-based-systems/139702/7.
- We deprecated support for Apache 2.2 in the certbot-apache plugin
and it will be removed in a future release of Certbot.
* Fixed
- The Certbot snap no longer loads packages installed via pip install --user.
This was unintended and DNS plugins should be installed via snap instead.
- certbot-dns-google would sometimes crash with HTTP 409/412 errors
when used with very large zones. See #6036.
- certbot-dns-google would sometimes crash with an HTTP 412 error if
preexisting records had an unexpected TTL, i.e.: different than
Certbot's default TTL for this plugin. See #8551.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Thu Dec 3 20:35:08 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.10.1
-------------------------------------------------------------------
Wed Dec 2 09:24:21 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.10.0
* Added
- Added timeout to DNS query function calls for dns-rfc2136 plugin.
- Confirmation when deleting certificates
- CLI flag --key-type has been added to specify 'rsa' or 'ecdsa' (default 'rsa').
- CLI flag --elliptic-curve has been added which takes an NIST/SECG elliptic curve.
Any of secp256r1, secp284r1 and secp521r1 are accepted values.
- The command certbot certficates lists the which type of the
private key that was used for the private key.
- Support for Python 3.9 was added to Certbot and all of its components.
* Changed
- certbot-auto was deprecated on Debian based systems.
- CLI flag --manual-public-ip-logging-ok is now a no-op, generates a
deprecation warning, and will be removed in a future release.
* Fixed
- Fixed a Unicode-related crash in the nginx plugin when running under Python 2.
- More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Oct 7 06:21:04 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.9.0
* Added
- --preconfigured-renewal flag, for packager use only.
See the packaging guide.
* Changed
- certbot-auto was deprecated on all systems except for those based on Debian or RHEL.
- Update the packaging instructions to promote usage of python -m pytest to test Certbot
instead of the deprecated python setup.py test setuptools approach.
- Reduced CLI logging when reloading nginx, if it is not running.
- Reduced CLI logging when handling some kinds of errors.
* Fixed
- Fixed server_name case-sensitivity in the nginx plugin.
- The minimum version of the acme library required by Certbot was corrected.
In the previous release, Certbot said it required acme>=1.6.0 when it
actually required acme>=1.8.0 to properly support removing contact
information from an ACME account.
- Upgraded the version of httplib2 used in our snaps and Docker images to add
support for proxy environment variables and fix the plugin for Google Cloud
DNS.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Sep 9 10:09:23 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.8.0
* Added
- Added the ability to remove email and phone contact information from an account
using update_account --register-unsafely-without-email
* Changed
- Support for Python 3.5 has been removed.
* Fixed
- The problem causing the Apache plugin in the Certbot snap on ARM systems to
fail to load the Augeas library it depends on has been fixed.
- The acme library can now tell the ACME server to clear contact information by passing an empty
tuple to the contact field of a Registration message.
- Fixed the *** stack smashing detected *** error in the Certbot snap on some systems.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Tue Aug 4 19:50:31 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.7.0
* Added
- Third-party plugins can be used without prefix (plugin_name instead of dist_name:plugin_name):
this concerns the plugin name, CLI flags, and keys in credential files.
The prefixed form is still supported but is deprecated, and will be removed in a future release.
- Added --nginx-sleep-seconds (default 1) for environments where nginx takes a long time to reload.
* Changed
- The Linode DNS plugin now waits 120 seconds for DNS propagation, instead of 1200,
due to https://www.linode.com/blog/linode/linode-turns-17/
- We deprecated support for Python 3.5 in Certbot and its ACME library.
Support for Python 3.5 will be removed in the next major release of Certbot.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Tue Jul 7 19:44:12 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.6.0
* Added
- Certbot snaps are now available for the arm64 and armhf architectures.
- Add minimal code to run Nginx plugin on NetBSD.
- Make Certbot snap find externally snapped plugins
- Function certbot.compat.filesystem.umask is a drop-in replacement for os.umask
implementing umask for both UNIX and Windows systems.
- Support for alternative certificate chains in the acme module.
- Added --preferred-chain <issuer CN>. If a CA offers multiple certificate chains,
it may be used to indicate to Certbot which chain should be preferred.
e.g. --preferred-chain "DST Root CA X3"
* Changed
- Allow session tickets to be disabled in Apache when mod_ssl is statically linked.
- Generalize UI warning message on renewal rate limits
- Certbot behaves similarly on Windows to on UNIX systems regarding umask, and
the umask 022 is applied by default: all files/directories are not writable by anyone
other than the user running Certbot and the system/admin users.
- Read acmev1 Let's Encrypt server URL from renewal config as acmev2 URL to prepare
for impending acmev1 deprecation.
* Fixed
- Cloudflare API Tokens may now be restricted to individual zones.
- Don't use StrictVersion, but LooseVersion to check version requirements with setuptools,
to fix some packaging issues with libraries respecting PEP404 for version string,
with doesn't match StrictVersion requirements.
- Certbot output doesn't refer to SSL Labs due to confusing scoring behavior.
- Fix paths when calling to programs outside of the Certbot Snap, fixing the apache and nginx
plugins on, e.g., CentOS 7.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Jun 3 08:16:48 UTC 2020 - ecsos <ecsos@opensuse.org>
- Run spec-cleaner.
-------------------------------------------------------------------
Wed Jun 3 07:58:17 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.5.0
* Added
- Require explicit confirmation of snap plugin permissions
before connecting.
* Changed
- Improved error message in apache installer when mod_ssl is
not available.
* Fixed
- Add support for OCSP responses which use a public key hash
ResponderID, fixing interoperability with Sectigo CAs.
- Fix TLS-ALPN test that fails when run with newer versions of
OpenSSL.
- More details about these changes can be found on our GitHub
repo.
-------------------------------------------------------------------
Wed May 6 06:52:37 UTC 2020 - ecsos <ecsos@opensuse.org>
- Update to 1.4.0
* Added
- Turn off session tickets for apache plugin by default when
appropriate.
- Added serial number of certificate to the output of certbot
certificates
- Expose two new environment variables in the authenticator and
cleanup scripts used by the manual plugin:
CERTBOT_REMAINING_CHALLENGES is equal to the number of
challenges remaining after the current challenge,
CERTBOT_ALL_DOMAINS is a comma-separated list of all domains
challenged for the current certificate.
- Added TLS-ALPN-01 challenge support in the acme library.
Support of this challenge in the Certbot client is planned to
be added in a future release.
- Added minimal proxy support for OCSP verification.
- On Windows, hooks are now executed in a Powershell shell
instead of a CMD shell, allowing both *.ps1 and *.bat as
valid scripts for Certbot.
* Changed
- Reorganized error message when a user entered an invalid
email address.
- Stop asking interactively if the user would like to add a
redirect.
- mock dependency is now conditional on Python 2 in all of our
packages.
- Deprecate certbot-auto on Gentoo, macOS, and FreeBSD.
* Fixed
- When using an RFC 8555 compliant endpoint, the acme library
no longer sends the resource field in any requests or the
type field when responding to challenges.
- Fix nginx plugin crash when non-ASCII configuration file is
being read (instead, the user will be warned that UTF-8 must
be used).
- Fix hanging OCSP queries during revocation checking - added
a 10 second timeout.
- Standalone servers now have a default socket timeout of
30 seconds, fixing cases where an idle connection can cause
the standalone plugin to hang.
- Parsing of the RFC 8555 application/pem-certificate-chain now
tolerates CRLF line endings. This should fix interoperability
with Buypass' services.
More details about these changes can be found on our GitHub
repo.
-------------------------------------------------------------------
Wed Mar 4 10:33:09 UTC 2020 - ecsos@opensuse.org
- Update to 1.3.0
* Added
- Added certbot.ocsp Certbot's API. The certbot.ocsp module can
be used to determine the OCSP status of certificates.
- Don't verify the existing certificate in
HTTP01Response.simple_verify, for compatibility with the
real-world ACME challenge checks.
* Changed
- Certbot will now renew certificates early if they have been
revoked according to OCSP.
- Fix acme module warnings when response Content-Type includes
params (e.g. charset).
- Fixed issue where webroot plugin would incorrectly raise
Read-only file system error when creating challenge
directories (issue #7165).
* Fixed
- More details about these changes can be found on our GitHub
repo.
-------------------------------------------------------------------
Thu Feb 6 09:13:27 UTC 2020 - ecsos@opensuse.org
- Update to 1.2.0
* Added
- Added support for Cloudflare's limited-scope API Tokens
* Changed
- Add directory field to error message when field is missing.
- If MD5 hasher is not available, try it in non-security mode
(fix for FIPS systems) -- #1948
- Disable old SSL versions and ciphersuites and remove
SSLCompression off setting to follow Mozilla recommendations
in Apache.
- Remove ECDHE-RSA-AES128-SHA from NGINX ciphers list now that
Windows 2008 R2 and Windows 7 are EOLed
- Support for Python 3.4 has been removed.
* Fixed
- Fix collections.abc imports for Python 3.9.
- More details about these changes can be found on our GitHub
repo.
-------------------------------------------------------------------
Wed Jan 15 16:39:54 UTC 2020 - ecsos@opensuse.org
- Update to 1.1.0
* Changed
- Removed the fallback introduced with 0.34.0 in acme to retry
a POST-as-GET request as a GET request when the targeted
ACME CA server seems to not support POST-as-GET requests.
- certbot-auto no longer supports architectures other than
x86_64 on RHEL 6 based systems. Existing certbot-auto
installations affected by this will continue to work, but
they will no longer receive updates. To install a newer
version of Certbot on these systems, you should update your
OS.
- Support for Python 3.4 in Certbot and its ACME library is
deprecated and will be removed in the next release of
Certbot. certbot-auto users on x86_64 systems running RHEL 6
or derivatives will be asked to enable Software Collections
(SCL) repository so Python 3.6 can be installed. certbot-auto
can enable the SCL repo for you on CentOS 6 while users on
other RHEL 6 based systems will be asked to do this manually.
-------------------------------------------------------------------
Wed Dec 4 11:45:11 UTC 2019 - ecsos@opensuse.org
- Update to 1.0.0
* Removed
- The docs extras for the certbot-apache and certbot-nginx
packages have been removed.
* Changed
- certbot-auto has deprecated support for systems using
OpenSSL 1.0.1 that are not running on x86-64. This primarily
affects RHEL 6 based systems.
- Certbot's config_changes subcommand has been removed
- certbot.plugins.common.TLSSNI01 has been removed.
- Deprecated attributes related to the TLS-SNI-01 challenge in
acme.challenges and acme.standalone have been removed.
- The functions certbot.client.view_config_changes,
certbot.main.config_changes,
certbot.plugins.common.Installer.view_config_changes,
certbot.reverter.Reverter.view_config_changes, and
certbot.util.get_systemd_os_info have been removed
- Certbot's register --update-registration subcommand has been
removed
- When possible, default to automatically configuring
the webserver so all requests redirect to secure HTTPS access.
This is mostly relevant when running Certbot in
non-interactive mode. Previously, the default was to not
redirect all requests.
-------------------------------------------------------------------
Wed Nov 6 18:47:34 UTC 2019 - ecsos@opensuse.org
- Update to 0.40.1
* Changed
- Added back support for Python 3.4 to Certbot components and
certbot-auto due to a bug when requiring Python 2.7 or 3.5+
on RHEL 6 based systems.
- Changes from 0.40.0
* Changed
- We deprecated support for Python 3.4 in Certbot and its ACME
library. Support for Python 3.4 will be removed in the next
major release of Certbot. certbot-auto users on RHEL 6 based
systems will be asked to enable Software Collections (SCL)
repository so Python 3.6 can be installed. certbot-auto can
enable the SCL repo for you on CentOS 6 while users on other
RHEL 6 based systems will be asked to do this manually.
- --server may now be combined with --dry-run. Certbot will, as
before, use the staging server instead of the live server when
--dry-run is used.
- --dry-run now requests fresh authorizations every time,
fixing the issue where it was prone to falsely reporting
success.
- Updated certbot-dns-google to depend on newer versions of
google-api-python-client and oauth2client.
- The OS detection logic again uses distro library for
Linux OSes
- certbot.plugins.common.TLSSNI01 has been deprecated and will
be removed in a future release.
- CLI flags --tls-sni-01-port and --tls-sni-01-address have
been removed.
- The values tls-sni and tls-sni-01 for the
--preferred-challenges flag are no longer accepted.
- Removed the flags: --agree-dev-preview, --dialog,
and --apache-init-script
- acme.standalone.BaseRequestHandlerWithLogging and
acme.standalone.simple_tls_sni_01_server have been deprecated
and will be removed in a future release of the library.
-------------------------------------------------------------------
Thu Oct 3 15:01:02 UTC 2019 - ecsos@opensuse.org
- Update to 0.39.0
* Added
- Support for Python 3.8 was added to Certbot and all of its
components.
- Support for CentOS 8 was added to certbot-auto.
* Changed
- Don't send OCSP requests for expired certificates
- Return to using platform.linux_distribution instead of
distro.linux_distribution in OS fingerprinting for
Python < 3.8
- Updated the Nginx plugin's TLS configuration to keep support
for some versions of IE11.
* Fixed
- Fixed OS detection in the Apache plugin on RHEL 6.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Sep 25 16:54:32 UTC 2019 - ecsos@opensuse.org
- Update to 0.38.0
* Added
- Disable session tickets for Nginx users when appropriate.
* Changed
- If Certbot fails to rollback your server configuration, the
error message links to the Let's Encrypt forum. Change the
link to the Help category now that the Server category has
been closed.
- Replace platform.linux_distribution with
distro.linux_distribution as a step towards Python 3.8
support in Certbot.
* Fixed
- Fixed OS detection in the Apache plugin on Scientific Linux.
More details about these changes can be found on our GitHub repo.
- Changes from 0.37.2
- Stop disabling TLS session tickets in Nginx as it caused TLS
failures on some systems.
More details about these changes can be found on our GitHub repo.
- Changes from 0.37.1
* Fixed
- Stop disabling TLS session tickets in Apache as it caused TLS
failures on some systems.
More details about these changes can be found on our GitHub repo.
- Changes from 0.37.0
* Added
- Turn off session tickets for apache plugin by default
- acme: Authz deactivation added to acme module.
* Changed
- Follow updated Mozilla recommendations for Nginx
ssl_protocols, ssl_ciphers, and ssl_prefer_server_ciphers
* Fixed
- Fix certbot-auto failures on RHEL 8.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Sat Jul 27 09:42:29 UTC 2019 - ecsos@opensuse.org
- update to 0.36.0
* Added
- Turn off session tickets for nginx plugin by default
- Added missing error types from RFC8555 to acme
* Changed
- Support for Ubuntu 14.04 Trusty has been removed.
- Update the 'manage your account' help to be more generic.
- The error message when Certbot's Apache plugin is unable to
modify your Apache configuration has been improved.
- Certbot's config_changes subcommand has been deprecated and
will be removed in a future release.
- certbot config_changes no longer accepts a --num parameter.
- The functions
certbot.plugins.common.Installer.view_config_changes and
certbot.reverter.Reverter.view_config_changes have been
deprecated and will be removed in a future release.
* Fixed
- Replace some unnecessary platform-specific line separation.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Thu Jun 27 11:45:16 UTC 2019 - ecsos@opensuse.org
- update to 0.35.1
* Fixed
- Support for specifying an authoritative base domain in our
dns-rfc2136 plugin has been removed. This feature was added
in our last release but had a bug which caused the plugin to
fail so the feature has been removed until it can be added
properly.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than
its version number was:
certbot-dns-rfc2136
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Thu Jun 6 15:44:58 UTC 2019 - ecsos@opensuse.org
- update to 0.35.0
* Added
- dns_rfc2136 plugin now supports explicitly specifing an
authorative base domain for cases when the automatic method
does not work (e.g. Split horizon DNS)
* Fixed
- Renewal parameter webroot_path is always saved, avoiding some
regressions when webroot authenticator plugin is invoked with
no challenge to perform.
- Certbot now accepts OCSP responses when an explicit
authorized responder, different from the issuer, is used to
sign OCSP responses.
- Scripts in Certbot hook directories are no longer executed
when their filenames end in a tilde.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
certbot
certbot-dns-rfc2136
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Sun May 12 08:27:14 UTC 2019 - ecsos@opensuse.org
- update to 0.34.2
* Fixed
- certbot-auto no longer writes a check_permissions.py script
at the root of the filesystem.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only changes in this release were to
certbot-auto.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Tue May 7 14:03:54 UTC 2019 - ecsos@opensuse.org
- update to 0.34.1
* Fixed
- certbot-auto no longer prints a blank line when there are no
permissions problems.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only changes in this release were to
certbot-auto.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Sun May 5 16:14:15 UTC 2019 - ecsos@opensuse.org
- update to 0.34.0
* Changed
- Apache plugin now tries to restart httpd on Fedora using
systemctl if a configuration test error is detected.
This has to be done due to the way Fedora now generates the
self signed certificate files upon first restart.
- Updated Certbot and its plugins to improve the handling of
file system permissions on Windows as a step towards adding
proper Windows support to Certbot.
- Updated urllib3 to 1.24.2 in certbot-auto.
- Removed the fallback introduced with 0.32.0 in acme to retry
a challenge response with a keyAuthorization if sending the
response without this field caused a malformed error to be
received from the ACME server.
- Linode DNS plugin now supports api keys created from their
new panel at cloud.linode.com
- Adding a warning noting that future versions of Certbot will
automatically configure the webserver so that all requests
redirect to secure HTTPS access. You can control this
behavior and disable this warning with the --redirect
and --no-redirect flags.
- certbot-auto now prints warnings when run as root with
insecure file system permissions. If you see these messages,
you should fix the problem by following the instructions at
https://community.letsencrypt.org/t/certbot-auto-deployment-best-practices/91979/,
however, these warnings can be disabled as necessary with
the flag --no-permissions-check.
- acme module uses now a POST-as-GET request to retrieve the
registration from an ACME v2 server
- Convert the tsig algorithm specified in the
certbot_dns_rfc2136 configuration file to all uppercase
letters before validating. This makes the value in the config
case insensitive.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
acme
certbot
certbot-apache
certbot-dns-cloudflare
certbot-dns-cloudxns
certbot-dns-digitalocean
certbot-dns-dnsimple
certbot-dns-dnsmadeeasy
certbot-dns-gehirn
certbot-dns-google
certbot-dns-linode
certbot-dns-luadns
certbot-dns-nsone
certbot-dns-ovh
certbot-dns-rfc2136
certbot-dns-route53
certbot-dns-sakuracloud
certbot-nginx
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Fri Apr 5 22:59:57 UTC 2019 - ecsos@opensuse.org
- update to 0.33.1
* Fixed
- A bug causing certbot-auto to print warnings or crash on some
RHEL based systems has been resolved.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only changes in this release were to
certbot-auto.
More details about these changes can be found on our GitHub repo.
- Changes from 0.33.0
* Added
- Fedora 29+ is now supported by certbot-auto. Since Python 2.x
is on a deprecation path in Fedora, certbot-auto will install
and use Python 3.x on Fedora 29+.
- CLI flag --https-port has been added for Nginx plugin
exclusively, and replaces --tls-sni-01-port. It defines the
HTTPS port the Nginx plugin will use while setting up a new
SSL vhost. By default the HTTPS port is 443.
* Changed
- Support for TLS-SNI-01 has been removed from all official
Certbot plugins.
- Attributes related to the TLS-SNI-01 challenge in
acme.challenges and acme.standalone modules are deprecated
and will be removed soon.
- CLI flags --tls-sni-01-port and --tls-sni-01-address are now
no-op, will generate a deprecation warning if used, and will
be removed soon.
- Options tls-sni and tls-sni-01 in --preferred-challenges flag
are now no-op, will generate a deprecation warning if used,
and will be removed soon.
- CLI flag --standalone-supported-challenges has been removed.
* Fixed
- Certbot uses the Python library cryptography for OCSP when
cryptography>=2.5 is installed. We fixed a bug in Certbot
causing it to interpret timestamps in the OCSP response as
being in the local timezone rather than UTC.
- Issue causing the default CentOS 6 TLS configuration to
ignore some of the HTTPS VirtualHosts created by Certbot.
mod_ssl loading is now moved to main http.conf for this
environment where possible.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
acme
certbot
certbot-apache
certbot-nginx
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Apr 3 10:46:01 UTC 2019 - ecsos@opensuse.org
- update to 0.32.0
* Added
- If possible, Certbot uses built-in support for OCSP from
recent cryptography versions instead of the OpenSSL binary:
as a consequence Certbot does not need the OpenSSL binary to
be installed anymore if cryptography>=2.5 is installed.
* Changed
- Certbot and its acme module now depend on josepy>=1.1.0 to
avoid printing the warnings described at
https://github.com/certbot/josepy/issues/13.
- Apache plugin now respects CERTBOT_DOCS environment variable
when adding command line defaults.
- The running of manual plugin hooks is now always included in
Certbot's log output.
- Tests execution for certbot, certbot-apache and certbot-nginx
packages now relies on pytest.
- An ACME CA server may return a Retry-After HTTP header on
authorization polling, as specified in the ACME protocol,
to indicate when the next polling should occur. Certbot now
reads this header if set and respect its value.
- The acme module avoids sending the keyAuthorization field in
the JWS payload when responding to a challenge as the field
is not included in the current ACME protocol. To ease the
migration path for ACME CA servers, Certbot and its acme
module will first try the request without the
keyAuthorization field but will temporarily retry the request
with the field included if a malformed error is received.
This fallback will be removed in version 0.34.0.
* Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than
its version number was:
acme
certbot
certbot-apache
certbot-nginx
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Sat Mar 10 13:05:18 UTC 2019 - ecsos@opensuse.org
- Switch to python_subpackage.
-------------------------------------------------------------------
Sat Mar 9 11:55:14 UTC 2019 - ecsos@opensuse.org
- Drop package letshelp-certbot because it should not be packaged.
-------------------------------------------------------------------
Fri Feb 8 12:22:12 UTC 2019 - ecsos@opensuse.org
- update to 0.31.0
* Added
- Avoid reprocessing challenges that are already validated when
a certificate is issued.
- Support for initiating (but not solving end-to-end)
TLS-ALPN-01 challenges with the acme module.
* Changed
- Certbot's official Docker images are now based on Alpine
Linux 3.9 rather than 3.7. The new version comes with
OpenSSL 1.1.1.
- Lexicon-based DNS plugins are now fully compatible with
Lexicon 3.x (support on 2.x branch is maintained).
- Apache plugin now attempts to configure all VirtualHosts
matching requested domain name instead of only a single one
when answering the HTTP-01 challenge.
* Fixed
- Fixed accessing josepy contents through acme.jose when the
full acme.jose path is used.
- Clarify behavior for deleting certs as part of revocation.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
acme
certbot
certbot-apache
certbot-dns-cloudxns
certbot-dns-dnsimple
certbot-dns-dnsmadeeasy
certbot-dns-gehirn
certbot-dns-linode
certbot-dns-luadns
certbot-dns-nsone
certbot-dns-ovh
certbot-dns-sakuracloud
More details about these changes can be found on our GitHub repo.
- Rebase certbot-fix_constants.patch
-------------------------------------------------------------------
Tue Jan 29 18:36:57 UTC 2019 - ecsos@opensuse.org
- update to 0.30.2
* Fixed
- Update the version of setuptools pinned in certbot-auto to
40.6.3 to solve installation problems on newer OSes.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, this release only affects certbot-auto.
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Fri Jan 25 14:18:13 UTC 2019 - ecsos@opensuse.org
- update to 0.30.1
* Fixed
- Always download the pinned version of pip in pipstrap to
address breakages
- Rename old,default.conf to old-and-default.conf to address
commas in filenames breaking recent versions of pip.
- Add VIRTUALENV_NO_DOWNLOAD=1 to all calls to virtualenv to
address breakages from venv downloading the latest pip
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than
its version number was:
certbot-apache
More details about these changes can be found on our GitHub repo.
-------------------------------------------------------------------
Wed Jan 23 12:03:38 UTC 2019 - ecsos@opensuse.org
- Change server and challenge in cli.ini to up-to-date values.
-------------------------------------------------------------------
Wed Jan 2 23:57:12 UTC 2019 - ecsos@opensuse.org
- update to 0.30.0
* Added
- Added the `update_account` subcommand for account management
commands.
* Changed
- Copied account management functionality from the `register`
subcommand to the `update_account` subcommand.
- Marked usage `register --update-registration` for deprecation
and removal in a future release.
* Fixed
- Older modules in the josepy library can now be accessed
through acme.jose like it could in previous versions of acme.
This is only done to preserve backwards compatibility and
support for doing this with new modules in josepy will not be
added. Users of the acme library should switch to using
josepy directly if they haven't done so already.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
acme
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/63?closed=1
-------------------------------------------------------------------
Thu Dec 6 16:00:15 UTC 2018 - ecsos@opensuse.org
- update to 0.29.1
- changes from 0.29.0
* Added
- Noninteractive renewals with certbot renew (those not started
from a terminal) now randomly sleep 1-480 seconds before
beginning work in order to spread out load spikes on the
server side.
- Added External Account Binding support in cli and acme
library. Command line arguments --eab-kid and --eab-hmac-key
added.
* Changed
- Private key permissioning changes: Renewal preserves existing
group mode & gid of previous private key material. Private
keys for new lineages (i.e. new certs, not renewed) default
to 0o600.
* Fixed
- Update code and dependencies to clean up Resource and
Deprecation Warnings.
- Only depend on imgconverter extension for Sphinx >= 1.6
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than
its version number was:
acme
certbot
certbot-apache
certbot-dns-cloudflare
certbot-dns-digitalocean
certbot-dns-google
certbot-nginx
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/62?closed=1
-------------------------------------------------------------------
Thu Nov 8 22:24:07 UTC 2018 - ecsos@opensuse.org
- update to 0.28.0
* Added
- revoke accepts --cert-name, and doesn't accept both
--cert-name and --cert-path.
- Use the ACMEv2 newNonce endpoint when a new nonce is needed,
and newNonce is available in the directory.
* Changed
- Removed documentation mentions of #letsencrypt IRC on
Freenode.
- Write README to the base of (config-dir)/live directory
- --manual will explicitly warn users that earlier challenges
should remain in place when setting up subsequent challenges.
- Warn when using deprecated acme.challenges.TLSSNI01
- Log warning about TLS-SNI deprecation in Certbot
- Stop preferring TLS-SNI in the Apache, Nginx, and standalone
plugins
- OVH DNS plugin now relies on Lexicon>=2.7.14 to support HTTP
proxies
- Default time the Linode plugin waits for DNS changes to
propogate is now 1200 seconds.
* Fixed
- Match Nginx parser update in allowing variable names to start
with ${.
- Fix ranking of vhosts in Nginx so that all port-matching
vhosts come first
- Correct OVH integration tests on machines without internet
access.
- Stop caching the results of ipv6_info in http01.py
- Test fix for Route53 plugin to prevent boto3 making outgoing
connections.
- The grammar used by Augeas parser in Apache plugin was
updated to fix various parsing errors.
- The CloudXNS, DNSimple, DNS Made Easy, Gehirn, Linode,
LuaDNS, NS1, OVH, and Sakura Cloud DNS plugins are now
compatible with Lexicon 3.0+.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
acme
certbot
certbot-apache
certbot-dns-cloudxns
certbot-dns-dnsimple
certbot-dns-dnsmadeeasy
certbot-dns-gehirn
certbot-dns-linode
certbot-dns-luadns
certbot-dns-nsone
certbot-dns-ovh
certbot-dns-route53
certbot-dns-sakuracloud
certbot-nginx
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/59?closed=1
-------------------------------------------------------------------
Tue Sep 11 12:41:49 UTC 2018 - ecsos@opensuse.org
- update to 0.27.1
* Fixed
* Fixed parameter name in OpenSUSE overrides for default
parameters in the Apache plugin.
Certbot on OpenSUSE works again.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
certbot-apache
More details about these changes can be found on our GitHub
repo: https://github.com/certbot/certbot/milestone/60?closed=1
- changes from 0.27.0
* Added
- The Apache plugin now accepts the parameter --apache-ctl
which can be used to configure the path to the Apache control
script.
* Changed
- When using acme.client.ClientV2
(or acme.client.BackwardsCompatibleClientV2 with an ACME
server that supports a newer version of the ACME protocol),
an acme.errors.ConflictError will be raised if you try to
create an ACME account with a key that has already been used.
Previously, a JSON parsing error was raised in this scenario
when using the library with Let's Encrypt's ACMEv2 endpoint.
* Fixed
- When Apache is not installed, Certbot's Apache plugin no
longer prints messages about being unable to find apachectl
to the terminal when the plugin is not selected.
- If you're using the Apache plugin with the --apache-vhost-root
flag set to a directory containing a disabled virtual host
for the domain you're requesting a certificate for, the
virtual host will now be temporarily enabled if necessary
to pass the HTTP challenge.
- The documentation for the Certbot package can now be built
using Sphinx 1.6+.
- You can now call query_registration without having to first
call new_account on acme.client.ClientV2 objects.
- The requirement of setuptools>=1.0 has been removed from
certbot-dns-ovh.
- Names in certbot-dns-sakuracloud's tests have been updated
to refer to Sakura Cloud rather than NS1 whose plugin
certbot-dns-sakuracloud was based on.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only package with changes other than its
version number was:
acme
certbot
certbot-apache
certbot-dns-ovh
certbot-dns-sakuracloud
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/57?closed=1
-------------------------------------------------------------------
Tue Sep 11 09:57:02 UTC 2018 - dmueller@suse.com
- remove unused python-pep8 dependency
- use %%license
-------------------------------------------------------------------
Wed Jul 25 17:40:12 UTC 2018 - ecsos@opensuse.org
- update to 0.26.1
- No changelog from upstream
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/58?closed=1
-------------------------------------------------------------------
Mon Jul 16 14:48:14 UTC 2018 - ecsos@opensuse.org
- update to 0.26.0
* Added
- A new security enhancement which we're calling AutoHSTS has
been added to Certbot's Apache plugin. This enhancement
configures your webserver to send a HTTP Strict Transport
Security header with a low max-age value that is slowly
increased over time. The max-age value is not increased to
a large value until you've successfully managed to renew your
certificate.
This enhancement can be requested with the --auto-hsts flag.
- New official DNS plugins have been created for Gehirn
Infrastracture Service, Linode, OVH, and Sakura Cloud.
These plugins can be found on our Docker Hub page at
https://hub.docker.com/u/certbot and on PyPI.
- The ability to reuse ACME accounts from Let's Encrypt's
ACMEv1 endpoint on Let's Encrypt's ACMEv2 endpoint has been
added.
- Certbot and its components now support Python 3.7.
- Certbot's install subcommand now allows you to interactively
choose which certificate to install from the list of
certificates managed by Certbot.
- Certbot now accepts the flag --no-autorenew which causes any
obtained certificates to not be automatically renewed when it
approaches expiration.
- Support for parsing the TLS-ALPN-01 challenge has been added
back to the acme library.
* Changed
- Certbot's default ACME server has been changed to
Let's Encrypt's ACMEv2 endpoint. By default, this server
will now be used for both new certificate lineages and
renewals.
- The Nginx plugin is no longer marked labeled as an "Alpha"
version.
- The prepare method of Certbot's plugins is no longer called
before running "Updater" enhancements that are run on every
invocation of certbot renew.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only packages with functional changes
were:
- acme
- certbot
- certbot-apache
- certbot-dns-gehirn
- certbot-dns-linode
- certbot-dns-ovh
- certbot-dns-sakuracloud
- certbot-nginx
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/55?closed=1
- rebase certbot-fix_constants.patch
-------------------------------------------------------------------
Wed Jun 13 17:51:32 UTC 2018 - ecsos@opensuse.org
- update to 0.25.1
* Fixed
- TLS-ALPN-01 support has been removed from our acme library.
Using our current dependencies, we are unable to provide
a correct implementation of this challenge so we decided
to remove it from the library until we can provide proper
support.
- Issues causing test failures when running the tests in the
acme package with pytest<3.0 has been resolved.
- certbot-nginx now correctly depends on acme>=0.25.0.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only packages with changes other than
their version number were:
- acme
- certbot-nginx
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/56?closed=1
- update to 0.25.0
* Added
- Support for the ready status type was added to acme. Without
this change, Certbot and acme users will begin encountering
errors when using Let's Encrypt's ACMEv2 API starting on
June 19th for the staging environment and July 5th for
production.
See https://community.letsencrypt.org/t/acmev2-order-ready-status/62866
for more information.
- Certbot now accepts the flag --reuse-key which will cause the
same key to be used in the certificate when the lineage is
renewed rather than generating a new key.
- You can now add multiple email addresses to your ACME account
with Certbot by providing a comma separated list of emails
to the --email flag.
- Support for Let's Encrypt's upcoming TLS-ALPN-01 challenge
was added to acme. For more information,
see https://community.letsencrypt.org/t/tls-alpn-validation-method/63814/1.
- acme now supports specifying the source address to bind to
when sending outgoing connections. You still cannot specify
this address using Certbot.
- If you run Certbot against Let's Encrypt's ACMEv2 staging
server but don't already have an account registered at that
server URL, Certbot will automatically reuse your staging
account from Let's Encrypt's ACMEv1 endpoint if it exists.
- Interfaces were added to Certbot allowing plugins to be
called at additional points. The GenericUpdater interface
allows plugins to perform actions every time certbot renew is
run, regardless of whether any certificates are due for
renewal, and the RenewDeployer interface allows plugins to
perform actions when a certificate is renewed.
See certbot.interfaces for more information.
* Changed
- When running Certbot with --dry-run and you don't already
have a staging account, the created account does not contain
an email address even if one was provided to avoid expiration
emails from Let's Encrypt's staging server.
- certbot-nginx does a better job of automatically detecting
the location of Nginx's configuration files when run on
BSD based systems.
- acme now requires and uses pytest when running tests with
setuptools with python setup.py test.
- certbot config_changes no longer waits for user input before
exiting.
* Fixed
- Misleading log output that caused users to think that
Certbot's standalone plugin failed to bind to a port when
performing a challenge has been corrected.
- An issue where certbot-nginx would fail to enable HSTS if
the server block already had an add_header directive has been
resolved.
- certbot-nginx now does a better job detecting the server
block to base the configuration for TLS-SNI challenges on.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only packages with functional changes
were:
- acme
- certbot
- certbot-apache
- certbot-nginx
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/54?closed=1
-------------------------------------------------------------------
Thu May 3 14:52:33 UTC 2018 - ecsos@opensuse.org
- update to 0.24.0
* Added
- certbot now has an enhance subcommand which allows you to
configure security enhancements like HTTP to HTTPS redirects,
OCSP stapling, and HSTS - without reinstalling a certificate.
- certbot-dns-rfc2136 now allows the user to specify the port
to use to reach the DNS server in its credentials file.
- acme now parses the wildcard field included in authorizations
so it can be used by users of the library.
* Changed
- certbot-dns-route53 used to wait for each DNS update to
propagate before sending the next one, but now it sends all
updates before waiting which speeds up issuance for multiple
domains dramatically.
- Certbot's official Docker images are now based on Alpine
Linux 3.7 rather than 3.4 because 3.4 has reached its
end-of-life.
- We've doubled the time Certbot will spend polling
authorizations before timing out.
- The level of the message logged when Certbot is being used
with non-standard paths warning that crontabs for renewal
included in Certbot packages from OS package managers may not
work has been reduced. This stops the message from being
written to stderr every time certbot renew runs.
* Fixed
- certbot-auto now works with Python 3.6.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only packages with changes other than
their version number were:
acme
certbot
certbot-apache
certbot-dns-digitalocean (only style improvements to tests)
certbot-dns-rfc2136
-------------------------------------------------------------------
Sat Apr 14 14:27:18 UTC 2018 - ecsos@opensuse.org
- update to 0.23.0
* Added
- Support for OpenResty was added to the Nginx plugin.
* Changed
- The timestamps in Certbot's logfiles now use the system's
local time zone rather than UTC.
- Certbot's DNS plugins that use Lexicon now rely on
Lexicon>=2.2.1 to be able to create and delete multiple
TXT records on a single domain.
- certbot-dns-google's test suite now works without an internet
connection.
* Fixed
- Removed a small window that if during which an error
occurred, Certbot wouldn't clean up performed challenges.
- The parameters default and ipv6only are now removed from
listen directives when creating a new server block in the
Nginx plugin.
- server_name directives enclosed in quotation marks in Nginx
are now properly supported.
- Resolved an issue preventing the Apache plugin from starting
Apache when it's not currently running on RHEL and Gentoo
based systems.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only packages with changes other than
their version number were:
certbot
certbot-apache
certbot-dns-cloudxns
certbot-dns-dnsimple
certbot-dns-dnsmadeeasy
certbot-dns-google
certbot-dns-luadns
certbot-dns-nsone
certbot-dns-rfc2136
certbot-nginx
More details about these changes can be found on our GitHub repo:
https://github.com/certbot/certbot/milestone/50?closed=1
-------------------------------------------------------------------
Thu Mar 22 23:14:55 UTC 2018 - ecsos@opensuse.org
- update to 0.22.2
* Fixed
- A type error introduced in 0.22.1 that would occur during
challenge cleanup when a Certbot plugin raises an exception
while trying to complete the challenge was fixed.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the
time being, however, the only packages with changes other than
their version number were:
certbot
More details about these changes can be found on our GitHub
repo: https://github.com/certbot/certbot/milestone/53?closed=1
- changes from 0.22.1
* Changed
- The ACME server used with Certbot's --dry-run and --staging
flags is now Let's Encrypt's ACMEv2 staging server which
allows people to also test ACMEv2 features with these flags.
* Fixed
- The HTTP Content-Type header is now set to the correct value
during certificate revocation with new versions of the ACME
protocol.
- When using Certbot with Let's Encrypt's ACMEv2 server,
it would add a blank line to the top of chain.pem and between
the certificates in fullchain.pem for each lineage.
These blank lines have been removed.
- Resolved a bug that caused Certbot's --allow-subset-of-names
flag not to work.
- Fixed a regression in acme.client.Client that caused the
class to not work when it was initialized without
a ClientNetwork which is done by some of the other projects
using our ACME library.
Despite us having broken lockstep, we are continuing to release
new versions of all Certbot components during releases for the t
ime being, however, the only packages with changes other than
their version number were:
acme
certbot
More details about these changes can be found on our GitHub
repo: https://github.com/certbot/certbot/milestone/51?closed=1
-------------------------------------------------------------------
Wed Mar 14 11:24:47 UTC 2018 - ecsos@opensuse.org
- update to 0.22.0
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Sat Jan 27 09:54:29 UTC 2018 - ecsos@opensuse.org
- update to 0.21.1
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Mon Dec 11 18:18:50 UTC 2017 - ecsos@opensuse.org
- update to 0.20.0
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Sat Oct 7 10:09:28 UTC 2017 - ecsos@opensuse.org
- update to 0.19.0
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Mon Oct 2 11:34:36 UTC 2017 - jengelh@inai.de
- Trim filler wording from description. Replace U+2019 (quote) by
apostrophe. Wrap long lines.
Replace old RPM macros and commands.
-------------------------------------------------------------------
Sat Sep 23 08:35:27 UTC 2017 - ecsos@opensuse.org
- update to 0.18.2
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Wed Sep 20 11:43:14 UTC 2017 - ecsos@opensuse.org
- BuildRequires for python-pyOpenSSL set to 17.0 because of
convert python-acme into singlespec
-------------------------------------------------------------------
Mon Sep 11 21:19:17 UTC 2017 - ecsos@opensuse.org
- update to 0.18.1
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Fri Aug 25 06:07:01 UTC 2017 - ecsos@opensuse.org
- On request from upstream switch server parameter in cli.ini from
staging to production server.
- Change description in README.SUSE.
-------------------------------------------------------------------
Fri Aug 11 15:49:53 UTC 2017 - ecsos@opensuse.org
- update to 0.17.0
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
- update patch certbot-cli.ini.patch
- remove deprecated parameter --standalone-supported-challenges
- change preferred-challenges = tls-sni-01 to
preferred-challenges = tls-sni as in documentation
-------------------------------------------------------------------
Fri Jul 7 08:26:14 UTC 2017 - ecsos@opensuse.org
- update to 0.16.0
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
-------------------------------------------------------------------
Sun Jun 11 08:50:48 UTC 2017 - ecsos@opensuse.org
- update to 0.15.0
See https://github.com/certbot/certbot/blob/master/CHANGELOG.md
and https://github.com/certbot/certbot/milestone/37?closed=1
-------------------------------------------------------------------
Wed Jun 7 21:05:04 UTC 2017 - ecsos@opensuse.org
- add missing domain parameter in cli.ini
-------------------------------------------------------------------
Wed Jun 7 10:43:48 UTC 2017 - ecsos@opensuse.org
- add missing dependency to python-future
- rework README.SUSE and certbot.cron
-------------------------------------------------------------------
Thu Jun 1 17:02:12 UTC 2017 - ecsos@opensuse.org
- update to 0.14.2
See https://github.com/certbot/certbot/milestone/40?closed=1
-------------------------------------------------------------------
Wed May 17 16:19:32 UTC 2017 - ecsos@opensuse.org
- update to 0.14.1
See https://github.com/certbot/certbot/milestone/39?closed=1
-------------------------------------------------------------------
Tue May 16 11:59:56 UTC 2017 - ecsos@opensuse.org
- fix build error in Tumbleweed
-------------------------------------------------------------------
Mon May 15 18:14:55 UTC 2017 - ecsos@opensuse.org
- update t 0.14.0
See https://github.com/certbot/certbot/milestone/35?closed=1
-------------------------------------------------------------------
Tue Apr 25 22:15:35 UTC 2017 - ecsos@opensuse.org
- update to 0.13.0
See https://github.com/certbot/certbot/milestone/34?closed=1
-------------------------------------------------------------------
Mon Mar 27 07:06:35 UTC 2017 - ecsos@opensuse.org
- insert BuildRequires: python-packaging to prevent build errors
for Leap 42.1
-------------------------------------------------------------------
Mon Mar 6 12:34:31 UTC 2017 - ecsos@opensuse.org
- change require version to python-requests >= 2.10
-------------------------------------------------------------------
Fri Mar 3 19:50:36 UTC 2017 - ecsos@opensuse.org
- update to 0.12.0
See https://github.com/certbot/certbot/milestone/31?closed=1
-------------------------------------------------------------------
Wed Feb 8 23:18:58 UTC 2017 - ecsos@opensuse.org
- update to 0.11.1
See https://github.com/certbot/certbot/milestone/33?closed=1
- update to 0.11.0
See https://github.com/certbot/certbot/milestone/28?closed=1
-------------------------------------------------------------------
Sat Jan 28 12:52:25 UTC 2017 - ecsos@opensuse.org
- update to 0.10.2
See https://github.com/certbot/certbot/milestone/32?closed=1
-------------------------------------------------------------------
Tue Jan 17 16:12:05 UTC 2017 - ecsos@opensuse.org
- update to 0.10.1
See https://github.com/certbot/certbot/milestone/29?closed=1
-------------------------------------------------------------------
Wed Jan 11 22:18:41 UTC 2017 - ecsos@opensuse.org
- update to 0.10.0
See https://github.com/certbot/certbot/milestone/24?closed=1
-------------------------------------------------------------------
Fri Jan 6 13:52:43 UTC 2017 - ecsos@opensuse.org
- rework README.SUSE
- fix sporadic build errors in doc section
-------------------------------------------------------------------
Tue Nov 1 08:54:17 UTC 2016 - ecsos@opensuse.org
- change certbot-cli.ini.patch
The flag standalone-supported-challenges is deprecated.
It is now preferred-challenges instead.
-------------------------------------------------------------------
Thu Oct 20 16:34:26 UTC 2016 - ecsos@opensuse.org
- update to 0.9.3
See https://github.com/certbot/certbot/milestone/27?closed=1
- update to 0.9.2
See https://github.com/certbot/certbot/milestone/26?closed=1
- update to 0.9.1
See https://github.com/certbot/certbot/milestone/25?closed=1
-------------------------------------------------------------------
Wed Oct 5 21:27:57 UTC 2016 - ecsos@opensuse.org
- update to 0.9.0
See https://github.com/certbot/certbot/milestone/22?closed=1
-------------------------------------------------------------------
Mon Aug 1 08:07:42 UTC 2016 - ecsos@opensuse.org
- python-requests >= 2.0 is required by certbot
-------------------------------------------------------------------
Fri Jul 15 06:58:38 UTC 2016 - matwey.kornilov@gmail.com
- psutils >= 2.2.1 is required by certbot 0.8.1:
File "/usr/lib/python2.7/site-packages/pkg_resources.py", line 639, in resolve
raise DistributionNotFound(req)
pkg_resources.DistributionNotFound: psutil>=2.2.1
-------------------------------------------------------------------
Sat Jun 18 15:05:03 UTC 2016 - ecsos@opensuse.org
- update to 0.8.1
-------------------------------------------------------------------
Sun Jun 5 17:44:23 UTC 2016 - ecsos@opensuse.org
- update to 0.8.0
-------------------------------------------------------------------
Tue May 31 22:35:46 UTC 2016 - ecsos@opensuse.org
- update to 0.7.0
-------------------------------------------------------------------
Sat May 14 16:00:16 UTC 2016 - ecsos@opensuse.org
- rename packge letsencrypt to new name certbot
- change letsencrypt to certbot in spec file
- obsolete letsencrypt in spec
- Add patch certbot-fix_constants.patch to fix path locations from
letsencrypt to certbot
- update to 0.6.0
-------------------------------------------------------------------
Fri Apr 8 18:10:13 UTC 2016 - ecsos@opensuse.org
- update to 0.5.0
-------------------------------------------------------------------
Wed Mar 9 14:31:26 UTC 2016 - jweberhofer@weberhofer.at
- The /etc/letsencrypt/keys directory must exclusively be readable
by root
-------------------------------------------------------------------
Wed Mar 9 14:15:54 UTC 2016 - jweberhofer@weberhofer.at
- Fixed version dependency to python-setuptools
-------------------------------------------------------------------
Mon Mar 7 15:41:57 UTC 2016 - ecsos@opensuse.org
- update to 0.4.2
-------------------------------------------------------------------
Tue Mar 1 15:50:45 UTC 2016 - ecsos@opensuse.org
- update to 0.4.1
-------------------------------------------------------------------
Sun Feb 14 09:53:59 UTC 2016 - ecsos@opensuse.org
- clean spec
- don't build python-acme anymore, use seperate package instead
because of correct errors in man and to run test within package
building
- move cli.ini changes from spec to patch file
- insert cron file
-------------------------------------------------------------------
Thu Feb 11 17:14:45 UTC 2016 - ecsos@opensuse.org
- update to 0.4.0
-------------------------------------------------------------------
Fri Jan 29 20:21:30 UTC 2016 - ecsos@opensuse.org
- update to 0.3.0
-------------------------------------------------------------------
Tue Jan 19 16:16:55 UTC 2016 - ecsos@opensuse.org
- update to 0.2.0
- remove no more needed versionstag patch
-------------------------------------------------------------------
Fri Jan 1 14:28:50 UTC 2016 - ecsos@opensuse.org
- add patch for versionstag mismatch
-------------------------------------------------------------------
Fri Dec 18 19:57:19 UTC 2015 - ecsos@opensuse.org
- update to 0.1.1
-------------------------------------------------------------------
Sun Dec 13 22:35:24 UTC 2015 - ecsos@opensuse.org
- update cli.ini parameters
-------------------------------------------------------------------
Fri Dec 4 16:01:08 UTC 2015 - ecsos@opensuse.org
- change from nighly git version to latest beta version 0.1.0
-------------------------------------------------------------------
Sat Sep 5 15:12:13 UTC 2015 - ecsos@opensuse.org
- add man pages
- add python-letsencrypt-apache and python-letsencrypt-nginx
-------------------------------------------------------------------
Fri Sep 4 16:03:05 UTC 2015 - ecsos@opensuse.org
- add missing requirements
-------------------------------------------------------------------
Fri Aug 7 09:32:14 UTC 2015 - ecsos@opensuse.org
- inititial version: developer preview