txacme icon indicating copy to clipboard operation
txacme copied to clipboard

Twisted client for the ACME (Automatic Certificate Management Environment) protocol

Results 42 txacme issues
Sort by recently updated
recently updated
newest added

Resolves #32. Right now there's no testing for this, I'm pushing this up atm to get feedback on whether this looks about right to most people. /cc @glyph --- This...

It seems to be common practice to store certificates or the directories that contain them with restrictive file permissions (e.g. `0600`). The official `certbot` client seems to do this (or...

enhancement
help wanted

This is one of the common DNS providers we should support. See also #45.

enhancement

This is going to be a tough one since `acme` doesn't implement dns-01 yet (see certbot/certbot#2061) and there's no Route 53 implementation for Twisted anywhere. Open questions: 1. Should we...

enhancement

This is perhaps a "nice to have" but the infrastructure is there for it so I thought I'd mention it. In HAProxy 1.7, it's possible to specify multiple certificates for...

enhancement

`AutoTLSEndpoint` is public, but the endpoint parser operates at a higher level with functionality that is not exported publicly except via the string parser.

enhancement

txacme should supply something to allow implementers of `ICertificateStore` to test their implementations. I think the existing tests for DirectoryStore probably cover all of the invariants we need, so adapting...

enhancement

Inspired by https://www.crc.id.au/using-centralised-management-with-lets-encrypt/. The basic idea is to delegate or CNAME `_acme-challenge` from all of your domains to the LE issuing service, similar to the http-01-with-redirects scenario, but for dns-01.

enhancement

Authorizations may last for much longer than certificates, we should check to see if a new authorization is in fact needed before authorizing.

enhancement

We should have these to go along with the other integration tests.

enhancement