1
0
mirror of https://github.com/certbot/certbot.git synced 2026-01-26 07:41:33 +03:00

moving everything server-side to server-ca directory

This commit is contained in:
Seth Schoen
2012-07-06 14:45:26 -07:00
parent 28c9f8fdf2
commit bd578f9796
9 changed files with 22 additions and 18 deletions

View File

@@ -2,23 +2,6 @@ In this directory are tools that will run on webservers for sysadmins to
automatically obtain their certs
Set CHOCOLATESERVER environment variable for "make deploy" and client.py!
chocolate.py - server-side, requires web.py (python-webpy),
PyCrypto (python-crypto) 2.3 (not 2.1!!), redis, python-redis,
python-protobuf, python-nss
probably wants to run under a web server like lighttpd with fastcgi
Set CHOCOLATESERVER environment variable for client.py!
client.py - experimental tool for making requests and parsing replies
chocolate_protocol.proto - protocol definition; needs protobuf-compiler
sni_challenge -
Assumes Apache server with name based virtual hosts is running
(for intended address).
Call perform_sni_cert_challenge(address, r, nonce) to do the whole
challenge.
Example code is given in main method
Right now requires full path specification of CSR/KEY in the Global
Variables (how should this be specified?)

View File

@@ -3,6 +3,7 @@ deploy: chocolate_protocol_pb2.py chocolate.py CSR.py pkcs10.py daemon.py
chocolate_protocol_pb2.py: chocolate_protocol.proto
protoc chocolate_protocol.proto --python_out=.
cp -p chocolate_protocol_pb2.py ../client-webserver/
clean:
rm -f *.pyc

View File

@@ -1,2 +1,22 @@
In this directory is a reference CA implementation of the Chocolate protocol,
DV and signing mechanism.
Set CHOCOLATESERVER environment variable for "make deploy"!
chocolate.py - server-side, requires web.py (python-webpy),
PyCrypto (python-crypto) 2.3 (not 2.1!!), redis, python-redis,
python-protobuf, python-nss
probably wants to run under a web server like lighttpd with fastcgi
chocolate_protocol.proto - protocol definition; needs protobuf-compiler
sni_challenge -
Assumes Apache server with name based virtual hosts is running
(for intended address).
Call perform_sni_cert_challenge(address, r, nonce) to do the whole
challenge.
Example code is given in main method
Right now requires full path specification of CSR/KEY in the Global
Variables (how should this be specified?)