mirror of
https://github.com/certimate-go/certimate.git
synced 2026-04-26 05:05:56 +03:00
[GH-ISSUE #839] [Feature] Custom Certificate Lifetime/Expiration #571
Labels
No labels
announcement
backlog
bug
declined
documentation
duplicate
enhancement
good first issue
good first issue
help wanted
invalid
pull-request
question
stale
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/certimate#571
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @FarrelF on GitHub (Jun 30, 2025).
Original GitHub issue: https://github.com/certimate-go/certimate/issues/839
功能描述 / Description
This feature allows users to issue TLS certificates with varying expirations, it is also supported by several CA providers among which Google Trust Services is capable of issuing certificates with expirations from the next 1 to 90 days since issued although a minimum of 3 days is recommended by them to prevent system clock skew.
This is not same as Let's Encrypt's
shortlivedprofile, which has a validity of only 6 days, as of yet Let's Encrypt does not able to issuing TLS certificates with varying expirations.请求动机 / Motivation
With varying expiration, this allows users to issue shorter TLS certificates by other supported CA, so that we not dependant on revocation system and when certificate renewal is fully automated, we should no need to use TLS certificate with excessively long lifetimes (like 3 months), as we can renew it on daily or weekly basis.
Another than that, the TLS certificate lifetime officially just reduced and it start from these dates:
So we can prepare to make fully automated TLS certificate renewal even using another CA as soon as possible before these date, being able to prepare it sooner would be better.
其他 / Miscellaneous
Lego seems can issue TLS certificates with varying expiration (
notBeforeandnotAfter) as you can see here https://github.com/go-acme/lego/issues/1714 and here (seelego help runandlego help renew), but this require users to specify an absolute date with RFC3339 format which is i'm afraid that these certificates will not be automatically renewed.acme.sh seems have better implementation for this, as you can see here acme.sh allows users to varying expiration with relative format, so we no need to input an complete date with RFC3339 format and these certificates can be renewed automatically before expired.
Thank you for this great app that helped me to fully automate my TLS certificates renewal 😊
贡献 / Contribution