acme
Here are 442 public repositories matching this topic...
-
Updated
Apr 8, 2022 - Shell
-
Updated
Apr 5, 2022 - Shell
-
Updated
Apr 7, 2022 - Shell
-
Updated
Apr 3, 2022 - Go
-
Updated
Apr 9, 2022 - Go
The recommendation is to set Cache-Control: private, no-store on any endpoint with sensitive information. Because while you can protect the traffic with TLS, you also need to keep sensitive information out of a client's (unencrypted) HTTP cache. I'm not sure how relevant this is to the API context of step-ca though—I've never seen an HTTP client library that caches content. But I guess the poi
-
Updated
Mar 25, 2022 - Go
-
Updated
Apr 1, 2021 - Go
-
Updated
Mar 25, 2022 - Shell
-
Updated
Apr 8, 2022 - C#
Add tests
Beyonce said it best. If you like it then you shoulda put a test on it. Scenarios I like:
- Cert is created with right DN
- Cert is stored to X509Store after creation
- Cert request is not resubmitted
- Handles failures gracefully
- HTTP challenge/response works as expected
- Certificate renewal when cert is about to expiration
-
Updated
Apr 3, 2022 - Go
-
Updated
Apr 9, 2022 - PowerShell
-
Updated
Dec 30, 2019 - Dockerfile
-
Updated
Mar 31, 2022 - Go
-
Updated
Jun 23, 2021 - Shell
-
Updated
Nov 21, 2021 - PHP
-
Updated
Mar 23, 2022 - Shell
As @rjkroege mentioned in rjkroege/edwood#288 tokenizing the results of the getarg function would allow for more robust parsing of the given arguments.
-
Updated
Feb 16, 2022 - Go
-
Updated
Feb 14, 2022 - C
-
Updated
Oct 1, 2021 - Perl
-
Updated
Mar 22, 2021 - Vim script
-
Updated
Feb 17, 2022 - Go
Improve this page
Add a description, image, and links to the acme topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the acme topic, visit your repo's landing page and select "manage topics."


In all of our current uses of
os.umaskorfilesystem.umask, we always temporarily set it to a different value and then restore it using atry/finallyblock. I expect this pattern to continue.Because of that, why don't we create a simple function in
certbot.utilthat can be used as a context manager to set umask to a value and restore it to its previous value when exiting thewithblo