Date: Sun, 29 May 2016 14:17:17 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 209836] security/letsencrypt.sh regression in 2016Q2 Message-ID: <bug-209836-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D209836 Bug ID: 209836 Summary: security/letsencrypt.sh regression in 2016Q2 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: fk@fabiankeil.de CC: sascha@root-login.org Flags: maintainer-feedback?(sascha@root-login.org) CC: sascha@root-login.org security/letsencrypt.sh is currently broken in the 2016Q2 branch: $ /usr/local/bin/letsencrypt.sh -c Processing www.electrobsd.org + Checking domain name(s) of existing cert... unchanged. + Checking expire date of existing cert... + Valid till Jun 24 16:13:00 2016 GMT (Less than 30 days). Renewing! + Signing domains... + Generating signing request... + Requesting challenge for www.electrobsd.org... $ echo $? 1 The relevant upstream bug report is: https://github.com/lukas2511/letsencrypt.sh/pull/202 The problem was fixed in r415739 by upgrading the port to 0.2.0. The commit should be applied to the 2016Q2 branch as well. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-209836-13>