Skip to content
#

acme

Here are 262 public repositories matching this topic...

bmw
bmw commented Feb 25, 2020

If you run mypy on Windows (or use --platform to make mypy behave like its on Windows), you'll get the following errors:

certbot/certbot/util.py:303: error: Name 'distro' is not defined
certbot/certbot/util.py:319: error: Name 'distro' is not defined
certbot/certbot/util.py:369: error: Name 'distro' is not defined
certbot/certbot/compat/filesystem.py:76: error: Module has no attribu
hmoffatt
hmoffatt commented Oct 24, 2019

When the hook script is run, $alias contains the real name of the certificate directory in $CERTDIR. This is useful to know when the domain is a wildcard like "*.my.com", but as far as I can tell it's not documented anywhere.

JulianCBC
JulianCBC commented Feb 17, 2020

You can use the AWS CLI config file to retrieve AWS credentials according to the Go SDK documentation here: https://docs.aws.amazon.com/sdk-for-go/v1/developer-guide/configuring-sdk.html

This allows the user to specify the credentials and region of their AWS account in "one" place and then use them in all tools using official AWS SDKs.

This information is very sparsely documented, so could y

cpu
cpu commented Dec 3, 2019

In letsencrypt/boulder#4585 we determine the table name for a db.ErrDatabaseOp generated during a Get, Insert, Update, or Delete based on the type of a holder argument interface{}.

This works pretty well but doesn't give the true table name based on how Gorp will map that type to a table.

@rolandshoemaker suggests:

Instead of deriving the table from th

certmagic
danlsgiga
danlsgiga commented Aug 7, 2019

What would you like to have changed?

Add support for DynamoDB as a cluster storage backend

Why is this feature a useful, necessary, and/or important addition to this project?

IMO, it allows people that don't want to manage a Consul cluster or shared filesystem to get the clustering feature on top of DynamoDB, which does not require much effort.

What alternatives are there, or what

certificates
dcow
dcow commented Jan 29, 2020

Section 8.2 of the ACME spec details exactly how client and server retry should be handled during a challenge validation. We should implement this part of the spec. Namely, retry state needs to be included in the challenge resource, client requests should be throttled, and we should set appropriate retry-after headers on the challenge resource response and include error information about the resul

jsha
jsha commented Feb 19, 2020

All of our sub-headings have internal anchors, for instance https://letsencrypt.org/docs/challenge-types/#dns-01-challenge. However, it's not easy for people to find and link directly to those. Right now you need to view the page source.

I think we should find a way to make it so that each sub-heading is a link you can click, or right-click and copy, that links to that internal anchor. Also, id

cyb3rwr3ck
cyb3rwr3ck commented Jan 15, 2020

Which version of python are you using?

3.8

What operating system and version of operating system are you using?

Debian 10.2

What version of sewer are you using?

0.7.9

What did you do? (be as detailed as you can)

Creating wildcard certificates for a sub domain a cloudflare (*.sub.example.com)

What did you expect to see/happen/not happen?

After the successful creation

Improve this page

Add a description, image, and links to the acme topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the acme topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.