boulder
boulder copied to clipboard
An ACME-based certificate authority, written in Go.
Bumps the aws group with 3 updates in the / directory: [github.com/aws/aws-sdk-go-v2](https://github.com/aws/aws-sdk-go-v2), [github.com/aws/aws-sdk-go-v2/config](https://github.com/aws/aws-sdk-go-v2) and [github.com/aws/aws-sdk-go-v2/service/s3](https://github.com/aws/aws-sdk-go-v2). Updates `github.com/aws/aws-sdk-go-v2` from 1.30.3 to 1.30.4 Commits 1d44177 Release 2024-08-15 bab4916 Regenerated Clients 2d4ecf5 Update...
Bumps the otel group with 3 updates in the / directory: [go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc](https://github.com/open-telemetry/opentelemetry-go-contrib), [go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp](https://github.com/open-telemetry/opentelemetry-go-contrib) and [go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc](https://github.com/open-telemetry/opentelemetry-go). Updates `go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc` from 0.52.0 to 0.54.0 Release notes Sourced from go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc's releases. Release v1.29.0/v0.54.0/v0.23.0/v0.9.0/v0.4.0/v0.2.0/v0.1.0 Overview...
Have our gRPC server interceptor check for excessive clock skew between its own clock and gRPC client clocks. Do this by taking advantage of the client request timestamp that most...
Cleanup `CheckRenewalExemptionAtWFE` feature flag,it now determines exemption based on the `isRenewal` parameter. fixes: #7511
We are subject to several requirements regarding the time, including but not limited to: - notBefore must be within 48 hours of the time of signing; and - validations cannot...
We plan to horizontally shard our database in the new future, directing data into shards based on shard keys. It's very likely that our shard key will include the registration...
Batch unpause and pause requests.
Add a feature flag which, if enabled and the cert has a validity period less than 7 days, results in OCSP and CRL info being omitted from the cert.
Have the release action write the checksums to a file whose name matches the name of the boulder deb and rpm files whose checksums it contains. This prevents name-collision errors...