boulder
boulder copied to clipboard
An ACME-based certificate authority, written in Go.
Signed-off-by: Abirdcfly
Using the tables and gRPC methods added in #5947 we should implement immediate renewals for impacted certificates whose renewals are managed by ARI aware clients.
Bumps [github.com/aws/smithy-go](https://github.com/aws/smithy-go) from 1.12.0 to 1.12.1. Release notes Sourced from github.com/aws/smithy-go's releases. Release (v1.12.1) Module Highlights github.com/aws/smithy-go: v1.12.1 Bug Fix: Fixes a bug where JSON object keys were not escaped....
Hi, it's me again. The ACME RFC describes the "detail" field of errors as being human-readable. I understand that your stance is to avoid clients relying on implementation-specifics, but I...
For some reason ROCSPStage3 was enabled without also enabling ROCSP Stages 1 and 2. Fix the oversight so we're actually running all of the first three ROCSP stages in config-next...
We have `test.ThrowawayCert()` specifically to generate certs for use in tests. We use it extensively in precertificates_test.go, but not in sa_test.go, presumably because that code is older and predates the...
The draft makes two major changes from what we currently have implemented: - changes the format of the GET url - adds the POST functionality to mark a certificate as...
We want ARI to be able to do dynamic load smoothing. Based on past traffic patterns and expectations for future patterns, it can recommend renewal windows for certs that will...
Right now checked_redis_source uses sa.SelectCertificateStatus to get a status to check against. However, it only needs a few fields: status, revokedReason, and revokedAt. We can make our query only touch...