Replace godep with vndr

Vndr has a simpler configuration and allows pointing to forked
packages. Additionally other docker projects are now using
vndr making vendoring in distribution more consistent.

Updates letsencrypt to use fork.
No longer uses sub-vendored packages.

Signed-off-by: Derek McGowan <derek@mcgstyle.net> (github: dmcgowan)
This commit is contained in:
Derek McGowan 2016-11-23 15:07:06 -08:00
parent 8f9abbd27f
commit a685e3fc98
No known key found for this signature in database
GPG key ID: F58C5D0A4405ACDB
265 changed files with 30150 additions and 19449 deletions

32
vendor/rsc.io/letsencrypt/lets.go generated vendored
View file

@ -8,6 +8,30 @@
// that can prove control over the given domain's DNS records or
// the servers pointed at by those records.
//
// Warning
//
// Like any other random code you find on the internet, this package should
// not be relied upon in important, production systems without thorough testing
// to ensure that it meets your needs.
//
// In the long term you should be using
// https://golang.org/x/crypto/acme/autocert instead of this package.
// Send improvements there, not here.
//
// This is a package that I wrote for my own personal web sites (swtch.com, rsc.io)
// in a hurry when my paid-for SSL certificate was expiring. It has no tests,
// has barely been used, and there is some anecdotal evidence that it does
// not properly renew certificates in a timely fashion, so servers that run for
// more than 3 months may run into trouble.
// I don't run this code anymore: to simplify maintenance, I moved the sites
// off of Ubuntu VMs and onto Google App Engine, configured with inexpensive
// long-term certificates purchased from cheapsslsecurity.com.
//
// This package was interesting primarily as an example of how simple the API
// for using LetsEncrypt.org could be made, in contrast to the low-level
// implementations that existed at the time. In that respect, it helped inform
// the design of the golang.org/x/crypto/acme/autocert package.
//
// Quick Start
//
// A complete HTTP/HTTPS web server using TLS certificates from LetsEncrypt.org,
@ -428,7 +452,9 @@ func (m *Manager) register(email string, prompt func(string) bool) error {
// Consequently, the state should be kept private.
func (m *Manager) Marshal() string {
m.init()
m.mu.Lock()
js, err := json.MarshalIndent(&m.state, "", "\t")
m.mu.Unlock()
if err != nil {
panic("unexpected json.Marshal failure")
}
@ -450,7 +476,9 @@ func (m *Manager) Unmarshal(enc string) error {
}
st.key = key
}
m.mu.Lock()
m.state = st
m.mu.Unlock()
for host, cert := range m.state.Certs {
c, err := cert.toTLS()
if err != nil {
@ -700,7 +728,7 @@ type tlsProvider struct {
}
func (p tlsProvider) Present(domain, token, keyAuth string) error {
cert, dom, err := acme.TLSSNI01ChallengeCertDomain(keyAuth)
cert, dom, err := acme.TLSSNI01ChallengeCert(keyAuth)
if err != nil {
return err
}
@ -713,7 +741,7 @@ func (p tlsProvider) Present(domain, token, keyAuth string) error {
}
func (p tlsProvider) CleanUp(domain, token, keyAuth string) error {
_, dom, err := acme.TLSSNI01ChallengeCertDomain(keyAuth)
_, dom, err := acme.TLSSNI01ChallengeCert(keyAuth)
if err != nil {
return err
}