Lukas Schauer
12877bb238
throw error with information about OCSP deprecation if certificate doesn't indicate OCSP support
2025-07-05 11:13:45 +02:00
Lukas Schauer
ad43e250b2
allow KEEP_GOING to also skip over ocsp stapling errors, update ocsp error message with a hint about deprecation on some CAs
2025-07-05 10:55:33 +02:00
Lukas Schauer
8e9e5ef9c7
also allow setting KEEP_GOING as a config option
2025-07-05 10:54:29 +02:00
Lukas Schauer
ce9eb300e2
implemented domain validation timeout
2025-06-17 19:51:27 +02:00
Lukas Schauer
9cfcd66f15
small addition to 0.7.2 changelog
2025-05-18 02:28:57 +02:00
Lukas Schauer
73bb54a4b2
updated changelog
2025-05-18 02:16:14 +02:00
Lukas Schauer
0290338853
post-v0.7.2-release
2025-05-18 01:36:16 +02:00
Lukas Schauer
fcca67b53c
release v0.7.2
2025-05-18 01:34:32 +02:00
Lukas Schauer
cf9e6a33fd
Allow for automatic deletion of old files
2025-05-02 15:00:48 +02:00
Lukas Schauer
bec154f070
Added a configuration parameter to allow for timeouts during order processing ( fixes #955 )
2025-05-02 14:42:57 +02:00
Lukas Schauer
200cd68e7e
updated changelog
2025-04-14 19:49:31 +02:00
Lukas Schauer
1a1cb94a61
added changelog + default config entries for certificate profile selection
2025-04-14 18:41:38 +02:00
Lukas Schauer
4ea5081640
renew certificates with 32 days remaining (instead of 30) to avoid issues with monthly cronjobs ( fixes #963 )
2025-04-11 10:33:07 +02:00
Lukas Schauer
35bfea55b6
increase dehydrated version for git master use
2022-10-31 15:46:07 +01:00
Lukas Schauer
ea84199863
release 0.7.1 (it finally happened!)
2022-10-31 15:12:38 +01:00
Lukas Schauer
ad3f08084c
implemented rfc 8738 support
2022-04-06 22:23:43 +02:00
Lukas Schauer
b347bc9086
added some changes to changelog
2021-10-31 22:58:06 +01:00
Lukas Schauer
316054ad1c
Do not revalidate authorizations on forced renewal
...
This commit introduces a new cli argument `--force-validation` which,
when used in combination with `--force` ignores valid domain
authorizations and forces a revalidation.
This has been implemented since at least LE seems to have changed some
behavior on valid authorizations. Only the previously validated
authorization-type is reusable, causing dehydrated to error out when
changing from recently validated authorization types while still trying
to force-renew certificates for whatever reason (e.g. changing algorithms).
2020-12-12 03:01:59 +01:00
Lukas Schauer
3a7795589b
bump changelog for new draft releases
2020-12-10 16:56:13 +01:00
Lukas Schauer
082da2527c
preparing for release 0.7.0
2020-12-10 16:54:26 +01:00
Lukas Schauer
cb7fb82beb
use secp384r1 as default (instead of rsa, fixes #651 )
2020-12-10 16:01:54 +01:00
Lukas Schauer
c670c18299
added display-terms to changelog+readme
2020-11-13 20:49:18 +01:00
Lukas Schauer
7dfde364a3
added support for requesting preferred-chain instead of default chain
2020-11-13 20:36:51 +01:00
Daniel Molkentin
60cb678e3b
add more CAs, now that support for CA presets is implemented
...
- letsencrypt-test (LE staging CA)
- buypass (verified to work with the new json parsing, see #653 )
- buypass-test analogously
2020-09-27 20:41:34 +02:00
Lukas Schauer
74c136905b
readme+changelog
2020-09-14 18:24:01 +02:00
Lukas Schauer
bb5a1473d1
merged temporary json.sh into dehydrated, fixed authorization "pending" loop
2020-07-04 21:51:32 +02:00
Lukas Schauer
42047fdf11
added changelog
2020-04-28 21:10:22 +02:00
Lukas Schauer
f60f2f81e8
release 0.6.5 (fixed apiv1 compatibility...)
2019-06-26 12:29:39 +02:00
Lukas Schauer
4f358e22f4
release 0.6.4 (fixed account id handling, again)
2019-06-25 15:28:09 +02:00
Lukas Schauer
f9d0b1bd70
release 0.6.3
2019-06-25 12:50:45 +02:00
Lukas Schauer
444cea4669
Revert "cleanup: removed api version 1 support ( closes #510 )"
...
Since a few CAs out there actually seem to (only) support ACME v1 I
decided to revert the removal and keep ACME v1 around, at least until
it eventually becomes a bigger inconvenience to maintain.
This reverts commit aadf7d5e64 .
2019-03-04 23:11:07 +01:00
Lukas Schauer
aadf7d5e64
cleanup: removed api version 1 support ( closes #510 )
2019-03-03 20:32:10 +01:00
Lukas Schauer
e4a32acbe2
new hook: sync_cert ( closes #609 )
2019-03-03 20:22:41 +01:00
Lukas Schauer
1c77730373
call exit_hook with error message ( fixes #630 )
2019-03-03 20:08:18 +01:00
Lukas Schauer
e623fcc024
implement POST-as-GET ( closes #626 )
2019-03-03 20:00:13 +01:00
Lukas Schauer
fba49ba28e
implemented initial support for tls-alpn-01 verification
2018-07-26 04:44:29 +02:00
Lukas Schauer
2a8af8fda7
made ocsp refresh interval configurable
2018-05-07 03:31:43 +02:00
Lukas Schauer
b5dddd7a2b
prepare for next version
2018-04-27 13:08:44 +02:00
Lukas Schauer
ce3d658377
release 0.6.2
2018-04-25 23:22:40 +02:00
Lukas Schauer
2533931cf1
don't walk certificate chain for ACMEv2 (certificate contains chain by default)
2018-03-14 18:54:51 +01:00
Lukas Schauer
e374d21d45
prepare for next version
2018-03-13 20:59:20 +01:00
Lukas Schauer
70d261a729
release v0.6.1
2018-03-13 20:57:52 +01:00
Lukas Schauer
947dbb9e29
use new acme-v02 endpoint by default
2018-03-13 20:48:42 +01:00
Lukas Schauer
8a414e55bc
prepare for next version
2018-03-11 20:22:38 +01:00
Lukas Schauer
fd3fc8af62
release 0.6.0
2018-03-11 20:19:25 +01:00
Lukas Schauer
be252c7db9
updated changelog
2018-02-06 23:22:53 +01:00
Lukas Schauer
dec5ad5840
read url to terms of service from ca directory
2018-02-06 21:58:42 +01:00
Lukas Schauer
63854b752b
New hook: generate_csr (see example hook script for more information, implements #475 , replaces #377 )
2018-02-06 20:57:33 +01:00
Lukas Schauer
afba7c694c
moved deploy_challenge to earlier loop so it works with multiple challenge tokens on the same identifier (important for wildcard certificate), fixed array-name, removed hook-chain warning
2018-01-28 19:48:25 +01:00
Lukas Schauer
ec5dbcc816
updated changelog
2018-01-28 06:14:44 +01:00