Skip to content

Releases: akaoj/simpleca

Fix GCO issue

17 Oct 10:26
8879c6f
Compare
Choose a tag to compare

Because of the new compilation in the Alpine container, the simpleca binary could not be run on other distributions. The GCO_ENABLED flag set to 0 fixes this issue.

Also, a newer version of Go is used as well as better dependencies for the binary to be built with make.

Add subjectAltName for all certificates

17 Oct 09:52
ade79b4
Compare
Choose a tag to compare

1.2.1 (2018-10-17)

Buildchain

  • Use a Docker-make based workflow, so developers don't have to install anything on their machine to compile or test
    the code. Now you can git pull and make compile without having installed go and everything will work.

Bug fixes

  • Use SubjectAltName in addition to CommonName (see RFC 2818)

Add `init` and `rm` commands

12 Apr 20:45
7aa7577
Compare
Choose a tag to compare

1.2 (2018-04-12)

Improvements

  • Add an init command (issue #6).

    Usage:

    $ simpleca init
    Folder initialized, please edit the configuration.json file to fit your organization
    
  • Add a rm command (issue #10).

    Usage:

    $ simpleca rm client --name www.domain.com
    client keys and certificates deleted
    
  • Add this CHANGELOG.md (issue #15).

Bug fixes

  • Do not fail tests on master because of version (issue #13).

    A warning is displayed in red when building simpleca from a branch which does not match the current simpleca version
    but the tests don't fail anymore if the current branch is master.

Allow SANs

23 Mar 17:16
8eb7879
Compare
Choose a tag to compare

Allow multiple alternative names in the sign process.

Fix issue with intermediate certificates

21 Mar 18:06
4bee067
Compare
Choose a tag to compare
  • Update version to 1.0.1
  • Add makefiles for tests and build

First version of simpleca

07 Feb 20:52
Compare
Choose a tag to compare

This is the first official release of simpleca!

This version allows you to:

  • create root CAs
  • create intermediate CAs
  • create client keys
  • sign anything with anything (more likely: clients with intermediates and intermediates with root)

All generated keys are by default encrypted.
As of now, only RSA and ECDSA keys are supported (ECDSA being the default generated keys).

The build available is for x86_64 architecture only, but you may download the source files and go build on any architecture.