Skip to content

Releases: caddyserver/certmagic

v0.16.2

02 Aug 21:22
v0.16.2
8531018
Compare
Choose a tag to compare

This release primarily improves DNS challenges, making them more efficient and correct (mostly edge cases).

What's Changed

New Contributors

Full Changelog: v0.16.1...v0.16.2

v0.16.1

06 May 16:22
v0.16.1
049e605
Compare
Choose a tag to compare

Minor enhancement allowing customization of the propagation delay/timeout for DNS challenge.

Full Changelog: v0.16.0...v0.16.1

v0.16.0

25 Mar 17:10
v0.16.0
03cffeb
Compare
Choose a tag to compare

This release is hopefully one of the last major tags before a more stable CertMagic 1.0. It includes a number of breaking changes (for the better, I promise) -- so please pay attention:

  • ⚠️ All storage methods now require context.Context passed in. We also added it to CleanUpOwnLocks() and several other functions that end up calling Storage methods (e.g. CacheUnmanagedTLSCertificate()). Your editor, in combination with gopls (the Go language server) should be able to quickly tell you where context is missing.
  • ⚠️ Storage methods now return fs.ErrNotExist if a file or key is not found, instead of certmagic.ErrNotExist, which has been removed. (The io/fs package did not exist when CertMagic was first written.)
  • ⚠️ ACMEManager has been renamed to ACMEIssuer, and CertificateManager has been renamed to Manager. These renames make naming more consistent and accurate, and less confusing (since ACMEManager was not a CertificateManager, which is a new type).
  • Certificate events now provide more useful, actionable information. See #150.

I have personally submitted PRs to the more popular known storage implementations as a courtesy to help deal with the breaking changes.

The nuances of the logic in preparing for DNS challenges have changed slightly, hopefully it will work in more environments.

Thanks to all who contributed! Sorry for any inconvenience with the breaking changes; that's the joy of pre-1.0 libraries. We're almost there, though. It's been 5 years and we might finally be starting to get good at things.

What's Changed

New Contributors

Full Changelog: v0.15.4...v0.16.0

v0.15.4

08 Mar 20:12
v0.15.4
f60ce01
Compare
Choose a tag to compare

What's Changed

  • Fixed order of certificate loading so that private keys are loaded first by @sam-lord in #171
  • Managers: Ability to call GetCertificate from external certificate sources by @mholt in #163
  • Support OverrideDomain is DNS01Solver by @crccw in #160

New Contributors

Full Changelog: v0.15.3...v0.15.4

v0.15.3

01 Feb 20:48
v0.15.3
2f78e52
Compare
Choose a tag to compare

Enhanced OCSP stapling support. Fixed automatic replacement of revoked certificates for on-demand certificates and some other edge cases.

What's Changed

New Contributors

Full Changelog: v0.15.2...v0.15.3

v0.15.2

08 Nov 20:05
v0.15.2
f832018
Compare
Choose a tag to compare

Minor tweaks and a minor bug fix.

v0.15.0

30 Sep 19:28
v0.15.0
6b2f5f9
Compare
Choose a tag to compare

This release improves use at large scale:

  • Adjusted default internal throttle for ACME transactions from 20 every minute to 10 every 10 seconds. This should allow for higher throughput with busy clients without impacting CA networks too much.
  • Clarified in the docs that NextProtos needs to be set by you on a tls.Config if you are not using a CertMagic function that serves an application on top of TLS. In other words, if you're not using the HTTPS() function, you should set NextProtos to the proper values for your application. (This is not new, nor a change. Just a helpful note in the docs.)
  • Fixed a bug that affected a small subset of users with lots of on-demand certificates ( > 10,000) and some non-on-demand certificates that would cause the non-on-demand certificates to be evicted from the cache. They are now reloaded later if this happens. (Note: the non-on-demand certs must be managed; this won't work for manually-managed certs.)
  • ⚠️ Changed ManageSync() to take a context.Context as the first argument, so that synchronous operations can also be cancelled and cleaned up. This is a breaking change that may affect a small subset of users.

v0.14.3

26 Aug 20:56
v0.14.3
335551d
Compare
Choose a tag to compare

Fixes and improvements for some edge cases.

v0.14.0

12 Jun 20:16
v0.14.0
07f7d0d
Compare
Choose a tag to compare

A few fixes and enhancements:

  • An experimental feature was fixed that automatically replaces certificates which have been revoked. Now it actually works.
  • If a certificate is revoked specifically due to key compromise, the compromised key will be rotated and out and the replacement certificate will use a new key.
  • ObtainCert() and RenewCert() have been split into Sync and Async versions, similar to ManageSync() and ManageAsync(), to bring consistency to the exported API, as well as to make room for...
  • ... forced renewals, which is now a boolean argument passed into RenewCert*() methods. This will renew a certificate even if it is not expiring.
  • Obtain operations will reuse existing private keys if already in storage. It is still a no-op if all certificate assets (cert, key, and meta) are already in storage.
  • Improved logging of errors between issuers when obtaining and renewing certificates.
  • If DNS resolvers are explicitly configured, they will be used exclusively and not fall back to system resolvers. This makes the DNS challenge solvers work better in weird DNS setups.

v0.13.1

03 May 17:08
v0.13.1
a1d0012
Compare
Choose a tag to compare

Minor bug fix and dependency upgrade.