myacme


Namemyacme JSON
Version 0.1.1 PyPI version JSON
download
home_pagehttps://declassed.art/repository/myacme
SummaryMyACME client library and command line tool
upload_time2023-01-26 17:35:49
maintainer
docs_urlNone
authorAXY
requires_python>=3.7
license
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # MyACME client library and CLI tools




This ACME client might be considered stable, given that I have been using it since 2021 in manual mode.
However, it's still beta for the following reasons:
* Automation and some major changes were done recently.
* Needs more testing. For me, a sole user, this is lazy process because problems
  may happen only each 2-3 months. Or may not.
* Authorization needs revising, there are some XXX/TODOs.
* Certificate revocation is not implemented yet.
* CLI needs some utility commands.

## Introduction

This yet another ACME client emerged for fwo reasons:
* I had no my own LE account yet and needed a certificate for my mail server.
  A few clients I tried required email for some reason, although ACME protocol defines contacts as optional.
  It was odd to ask an email when I had no mail server yet.
  Later on I discovered an option in certbot that makes email optional, but here's another reason:
* Certbot was too complicated for me to extend for my very basic needs. I wanted a simple tool and choosing
  a way to waste my time I preferred to learn RFC 8555 instead of certbot internals.

So, this client is written from scratch by studying https://tools.ietf.org/html/rfc8555
and trying out Let's Encrypt staging and production environments.
It is based on `requests` and `cryptography` packages.

## Installation

```shell
pip install myacme
```


## Command-line ACME client

### Account creation

Before applying to certificate issuance you need an account on the ACME server.

The following command generates private key and creates an account:

```shell
myacme create account ak=my-account-key.pem
```

You can generate my-account-key.pem with other tools, `openssl` for example.
The above command will use your existing key then.

The default ACME server is Let's Encrypt https://acme-v02.api.letsencrypt.org/directory
You can specify your own server by providing its directory URL:

```shell
myacme create account ak=my-account-key.pem acme=https://my.acme.com/directory
```

Or, you can use a predefined URL, one of:

* le: Let's Encrypt directory, this is the default
* le-staging: Let's Encrypt staging environment.

Example:

```shell
myacme create account ak=my-account-key.pem acme=le-staging
```

The email is not necessary to create an account. However you can provide one or more:

```shell
myacme create account ak=my-account-key.pem \
    email=john.doe@example.com email=sarah.connor@example.com
```

If you run the above command for an existing account it will change contact emails.


### Update account

Change account key:

```shell
myacme update account ak=my-account-key.pem new-ak=new-account-key.pem
```

Same here, new account key may already exist. If not, it will be generated.


### Account deactivation

If you no longer need an account you can deactivate it:

```shell
myacme deactivate account ak=my-account-key.pem
```

### Manually applying for certificate issuance

If you already have a CSR, you can get the certificate with a single command:

```shell
myacme certificate ak=my-account-key.pem csr=my-csr.pem cert=my-cert.pem
```

You'll have to prove you own your domain. This command will print instructions how to do that.

If you got a temporary error, such as network error or server error, you can run the above command repeatedly.
The state of appliance process is saved to a file <domain-name>.myacme.json in the current directory.

If you don't have a CSR but do have already generated private key (with `openssl` command, for example),
`myacme` will automatically generate a CSR for the issuance process:

```shell
myacme certificate ak=my-account-key.pem \
    dom=example.com dom=www.example.com \
    private-key=my-key.pem cert=my-cert.pem
```

The CSR will be saved only in the state filename, you can extract it with
`myacme get csr` command (see below).

Finally, if you have neither CSR, nor private key, `myacme` will generate everything for you:

```shell
myacme certificate ak=my-account-key.pem \
    dom=example.com dom=www.example.com \
    private-key=my-key.pem cert=my-cert.pem
```

Yes, this is exactly the same command as above. This simply checks your
`my-key.pem` and if it does not exist, the key will be automatically generated
and written to that file.


### Automated certificate management

Directory layout:

```
/etc/myacme/
    config.yaml
    account-key.pem
    <domain>/
        previous/
        config.yaml            -- optional per-domain settings
        <domain>.myacme.json
        <domain>.cert.pem
        <domain>.key.pem
```

`/etc/myacme` is somewhat arbitrary location, it could be any directory of your choice.
Mind file permissions and try to avoid running `myacme` as root.

The following command should be run daily:

```shell
myacme manage dir=/etc/myacme
```

This will check certificates and apply for re-issuance for expiring ones.

Here's a sample config.yaml:

```yaml
acme: le  # optional ACME server directory URL
account_key: account-key.pem

expiring_days: 7  # optional: days before expiring to start renewal

filenames:  # optional, here are defaults:
    certificate: '{domain}.cert.pem'
    key:         '{domain}.key.pem'

cert_domains:  # optional list of domains per certificate, {domain} is substituted
               # with actual domain name; default is single domain name
    - '{domain}'
    - '*.{domain}'

csr_fields:  # optional additional fields for CSR
    - 'Country Name': 'US'
    - 'State or Province Name': 'California'

authz:  # domain ownership validation parameters
        # substitutions:
        # {domain}:          primary domain name, leading wildcard, if any, is stripped
        # {idna_domain}:     primary domain name, in IDNA encoding; leading wildcard, if any, is stripped
        # {subdomain}:       list of subdomains, see a note below
        # {idna_subdomain}:  list subdomains in IDNA encoding, see a note below
        # {token}:           domain validation token
        # {key}:             domain validation key for http-01
        # {key_digest}:      domain validation key digest for dns-01

    dns-01:
        setup:
            - 'myacme-zonefile /etc/bind/primary/{subdomain[1]} add-acme-challenge {domain} {key_digest}'
            - 'rndc reload {idna_subdomain[1]}'
            - sleep 10
        cleanup:
            - 'myacme-zonefile /etc/bind/primary/{subdomain[1]} del-acme-challenge {domain} {key_digest}'
            - 'rndc reload {idna_subdomain[1]}'

    http-01:
        setup:
            - 'mkdir -p /var/www/{domain}/.well-known/acme-challenge'
            - 'echo {key} >/var/www/{domain}/.well-known/acme-challenge/{token}'
        cleanup:
            - 'rm /var/www/{domain}/.well-known/acme-challenge/{token}'

deploy:  # optional deployment commands; possible substitutions: {domain}, {idna_domain},
         # {directory}, and {filenames[...]}, e.g. filenames[certificate], filenames[key]
    - 'chmod 600 {directory}/{filenames[certificate]}'
    - 'chmod 600 {directory}/{filenames[key]}'
    - 'cp {directory}/{filenames[certificate]} {directory}/{filenames[key]} /etc/nginx/certificates/'

finalize:  # commands to execute after some or all certificates are renewed
    - 'nginx -s reload'
```


## MyACME library

The library provides the following basic classes:

* `MyAcmeClient`: the main class provides account management and basic methods for ACME requests
* `MyAcmeOrder`: this class implements certificate issuance state machine
* `MyAcmeStateFS`: this class implements saving the state of certificate issuance to file system
* `MyAcmeAuthzManual`: this implementation prints instructions for domain validation and waits for user input
* `MyAcmeAuthzScript`: this class invokes scripts for domain validation according to provided configuration
* `MyAcmeError`: the basic exception
* `MyAcmeHttpError`: ACME HTTP exception

Helper functions:

* `get_certificate_validity_period`
* `idna_decode`
* `idna_encode`

Although this library can generate private keys and CSRs, you can provide your own ones in PEM format.

### How to use

The first step is to instantiate `MyAcmeClient` class with a directory URL:

```python
my_acme = MyAcmeClient('https://acme-v02.api.letsencrypt.org/directory')
```

To apply for certificates, you should have an account on the ACME server.
The account is identified by client's public key.
The account is identified ONLY by client's public key. Contact emails are optional.

If you have no account key yet, there's a method to generate it for you:

```python
account_key = my_acme.generate_account_key()
```

The `account_key` is a key pair, containing both public and private keys
in PEM format, as bytes. You should permanently save the account key somewhere:

```python
with open('my-account-key.pem', 'wb') as f:
    f.write(account_key)
```

If you aleady have an account key, you should provide it explicitly:

```python
with open('my-account-key.pem', 'rb') as f:
    my_acme.account_key = f.read()
```

or:

```python
with open('my-account-key.pem', 'rb') as f:
    my_account_key = f.read()
my_acme = MyAcmeClient('https://acme-v02.api.letsencrypt.org/directory', my_account_key)
```

Once `account_key` is set, you can create an account on the ACME server, if it was not created yet:

```python
acme.create_account()
```

This method can accept the list of contact URLs in the form "mailto:admin@example.org".
By default contacts is an empty list.

It's desirable to permanently save account URL, along with account key somewhere:

```python
saved_account_url = my_acme.account_url
```

This is because this URL is needed for subsequent requests and if not saved,
the client has to issue extra request to obtain it.

This URL should be restored after instantiation of `MyAcmeClient`:

```python
my_acme.account_url = saved_account_url
```


### How to apply for certificate issuance

Create an authenticator:

```python
authenticator = MyAcmeAuthzManual()
```

Create state object:

```python
state = MyAcmeStateFS('example.com', '~/.myacme-state')
```

Apply for a certificate:

```python
order = acme.process_order('example.com', authenticator, state)
```

You can provide your own private key:

```python
order = acme.process_order('example.com', authenticator, state, private_key=example_com_key)
```

Auto-generated CSR contains only COMMON_NAME field and optionally SAN extension.
You can provide more fields:

```python
order = acme.process_order('example.com', authenticator, state, csr_fields={
    'Country Name': 'US',
    'State or Province Name': 'California'
})
```

Field names are transformed to x509 names by converting them to upper case and replacing spaces
with underscores. Here are most used names, for the full list see `cryptography.x509.oid.NameOID`:

```
COUNTRY_NAME             2-letter country code
LOCALITY_NAME            e.g. city
STATE_OR_PROVINCE_NAME
STREET_ADDRESS
ORGANIZATION_NAME        e.g. company
ORGANIZATIONAL_UNIT_NAME e.g. section
EMAIL_ADDRESS
```

Alternatively you can provide your own CSR. Private key is unnecessary because CSR is already signed:

```python
order = acme.process_order('example.com', authenticator, state, csr=example_com_csr)
```

Finally, you should save your certificate somewhere:

```python
certificate = order.get_certificate()
with open('my-certificate.pem', 'wb') as f:
    f.write(certificate)
```

If you not provided private key, you should also save auto-generated one:

```python
private_key = order.get_private_key()
with open('private.key', 'wb') as f:
    f.write(private_key)
```

### Internationalized domain names

MyACME accepts and returns all domain names as strings so they may contain non-ASCII characters.
Domain names are encoded and decoded as necessary.

### The complete example

```python
my_domain = 'example.com'
with open('my-account-key.pem', 'rb') as f:
    my_account_key = f.read()
my_acme = MyAcmeClient('https://acme-v02.api.letsencrypt.org/directory', my_account_key)
authenticator = MyAcmeAuthzManual()
state = MyAcmeStateFS(my_domain, '~/.myacme-state')
order = acme.process_order(my_domain, authenticator, state)
if not order:
    print('Cannot get certificate')  # XXX reason?
else:
    certificate = order.get_certificate()
    with open('my-certificate.pem', 'wb') as f:
        f.write(certificate)
    private_key = order.get_private_key()
    with open('private.key', 'wb') as f:
        f.write(private_key)
```




            

Raw data

            {
    "_id": null,
    "home_page": "https://declassed.art/repository/myacme",
    "name": "myacme",
    "maintainer": "",
    "docs_url": null,
    "requires_python": ">=3.7",
    "maintainer_email": "",
    "keywords": "",
    "author": "AXY",
    "author_email": "axy@declassed.art",
    "download_url": "https://files.pythonhosted.org/packages/2b/21/569da2d29370e815d71b765549ca217825f56191c487cdfbdd2c4510356a/myacme-0.1.1.tar.gz",
    "platform": null,
    "description": "# MyACME client library and CLI tools\n\n\n\n\nThis ACME client might be considered stable, given that I have been using it since 2021 in manual mode.\nHowever, it's still beta for the following reasons:\n* Automation and some major changes were done recently.\n* Needs more testing. For me, a sole user, this is lazy process because problems\n  may happen only each 2-3 months. Or may not.\n* Authorization needs revising, there are some XXX/TODOs.\n* Certificate revocation is not implemented yet.\n* CLI needs some utility commands.\n\n## Introduction\n\nThis yet another ACME client emerged for fwo reasons:\n* I had no my own LE account yet and needed a certificate for my mail server.\n  A few clients I tried required email for some reason, although ACME protocol defines contacts as optional.\n  It was odd to ask an email when I had no mail server yet.\n  Later on I discovered an option in certbot that makes email optional, but here's another reason:\n* Certbot was too complicated for me to extend for my very basic needs. I wanted a simple tool and choosing\n  a way to waste my time I preferred to learn RFC 8555 instead of certbot internals.\n\nSo, this client is written from scratch by studying https://tools.ietf.org/html/rfc8555\nand trying out Let's Encrypt staging and production environments.\nIt is based on `requests` and `cryptography` packages.\n\n## Installation\n\n```shell\npip install myacme\n```\n\n\n## Command-line ACME client\n\n### Account creation\n\nBefore applying to certificate issuance you need an account on the ACME server.\n\nThe following command generates private key and creates an account:\n\n```shell\nmyacme create account ak=my-account-key.pem\n```\n\nYou can generate my-account-key.pem with other tools, `openssl` for example.\nThe above command will use your existing key then.\n\nThe default ACME server is Let's Encrypt https://acme-v02.api.letsencrypt.org/directory\nYou can specify your own server by providing its directory URL:\n\n```shell\nmyacme create account ak=my-account-key.pem acme=https://my.acme.com/directory\n```\n\nOr, you can use a predefined URL, one of:\n\n* le: Let's Encrypt directory, this is the default\n* le-staging: Let's Encrypt staging environment.\n\nExample:\n\n```shell\nmyacme create account ak=my-account-key.pem acme=le-staging\n```\n\nThe email is not necessary to create an account. However you can provide one or more:\n\n```shell\nmyacme create account ak=my-account-key.pem \\\n    email=john.doe@example.com email=sarah.connor@example.com\n```\n\nIf you run the above command for an existing account it will change contact emails.\n\n\n### Update account\n\nChange account key:\n\n```shell\nmyacme update account ak=my-account-key.pem new-ak=new-account-key.pem\n```\n\nSame here, new account key may already exist. If not, it will be generated.\n\n\n### Account deactivation\n\nIf you no longer need an account you can deactivate it:\n\n```shell\nmyacme deactivate account ak=my-account-key.pem\n```\n\n### Manually applying for certificate issuance\n\nIf you already have a CSR, you can get the certificate with a single command:\n\n```shell\nmyacme certificate ak=my-account-key.pem csr=my-csr.pem cert=my-cert.pem\n```\n\nYou'll have to prove you own your domain. This command will print instructions how to do that.\n\nIf you got a temporary error, such as network error or server error, you can run the above command repeatedly.\nThe state of appliance process is saved to a file <domain-name>.myacme.json in the current directory.\n\nIf you don't have a CSR but do have already generated private key (with `openssl` command, for example),\n`myacme` will automatically generate a CSR for the issuance process:\n\n```shell\nmyacme certificate ak=my-account-key.pem \\\n    dom=example.com dom=www.example.com \\\n    private-key=my-key.pem cert=my-cert.pem\n```\n\nThe CSR will be saved only in the state filename, you can extract it with\n`myacme get csr` command (see below).\n\nFinally, if you have neither CSR, nor private key, `myacme` will generate everything for you:\n\n```shell\nmyacme certificate ak=my-account-key.pem \\\n    dom=example.com dom=www.example.com \\\n    private-key=my-key.pem cert=my-cert.pem\n```\n\nYes, this is exactly the same command as above. This simply checks your\n`my-key.pem` and if it does not exist, the key will be automatically generated\nand written to that file.\n\n\n### Automated certificate management\n\nDirectory layout:\n\n```\n/etc/myacme/\n    config.yaml\n    account-key.pem\n    <domain>/\n        previous/\n        config.yaml            -- optional per-domain settings\n        <domain>.myacme.json\n        <domain>.cert.pem\n        <domain>.key.pem\n```\n\n`/etc/myacme` is somewhat arbitrary location, it could be any directory of your choice.\nMind file permissions and try to avoid running `myacme` as root.\n\nThe following command should be run daily:\n\n```shell\nmyacme manage dir=/etc/myacme\n```\n\nThis will check certificates and apply for re-issuance for expiring ones.\n\nHere's a sample config.yaml:\n\n```yaml\nacme: le  # optional ACME server directory URL\naccount_key: account-key.pem\n\nexpiring_days: 7  # optional: days before expiring to start renewal\n\nfilenames:  # optional, here are defaults:\n    certificate: '{domain}.cert.pem'\n    key:         '{domain}.key.pem'\n\ncert_domains:  # optional list of domains per certificate, {domain} is substituted\n               # with actual domain name; default is single domain name\n    - '{domain}'\n    - '*.{domain}'\n\ncsr_fields:  # optional additional fields for CSR\n    - 'Country Name': 'US'\n    - 'State or Province Name': 'California'\n\nauthz:  # domain ownership validation parameters\n        # substitutions:\n        # {domain}:          primary domain name, leading wildcard, if any, is stripped\n        # {idna_domain}:     primary domain name, in IDNA encoding; leading wildcard, if any, is stripped\n        # {subdomain}:       list of subdomains, see a note below\n        # {idna_subdomain}:  list subdomains in IDNA encoding, see a note below\n        # {token}:           domain validation token\n        # {key}:             domain validation key for http-01\n        # {key_digest}:      domain validation key digest for dns-01\n\n    dns-01:\n        setup:\n            - 'myacme-zonefile /etc/bind/primary/{subdomain[1]} add-acme-challenge {domain} {key_digest}'\n            - 'rndc reload {idna_subdomain[1]}'\n            - sleep 10\n        cleanup:\n            - 'myacme-zonefile /etc/bind/primary/{subdomain[1]} del-acme-challenge {domain} {key_digest}'\n            - 'rndc reload {idna_subdomain[1]}'\n\n    http-01:\n        setup:\n            - 'mkdir -p /var/www/{domain}/.well-known/acme-challenge'\n            - 'echo {key} >/var/www/{domain}/.well-known/acme-challenge/{token}'\n        cleanup:\n            - 'rm /var/www/{domain}/.well-known/acme-challenge/{token}'\n\ndeploy:  # optional deployment commands; possible substitutions: {domain}, {idna_domain},\n         # {directory}, and {filenames[...]}, e.g. filenames[certificate], filenames[key]\n    - 'chmod 600 {directory}/{filenames[certificate]}'\n    - 'chmod 600 {directory}/{filenames[key]}'\n    - 'cp {directory}/{filenames[certificate]} {directory}/{filenames[key]} /etc/nginx/certificates/'\n\nfinalize:  # commands to execute after some or all certificates are renewed\n    - 'nginx -s reload'\n```\n\n\n## MyACME library\n\nThe library provides the following basic classes:\n\n* `MyAcmeClient`: the main class provides account management and basic methods for ACME requests\n* `MyAcmeOrder`: this class implements certificate issuance state machine\n* `MyAcmeStateFS`: this class implements saving the state of certificate issuance to file system\n* `MyAcmeAuthzManual`: this implementation prints instructions for domain validation and waits for user input\n* `MyAcmeAuthzScript`: this class invokes scripts for domain validation according to provided configuration\n* `MyAcmeError`: the basic exception\n* `MyAcmeHttpError`: ACME HTTP exception\n\nHelper functions:\n\n* `get_certificate_validity_period`\n* `idna_decode`\n* `idna_encode`\n\nAlthough this library can generate private keys and CSRs, you can provide your own ones in PEM format.\n\n### How to use\n\nThe first step is to instantiate `MyAcmeClient` class with a directory URL:\n\n```python\nmy_acme = MyAcmeClient('https://acme-v02.api.letsencrypt.org/directory')\n```\n\nTo apply for certificates, you should have an account on the ACME server.\nThe account is identified by client's public key.\nThe account is identified ONLY by client's public key. Contact emails are optional.\n\nIf you have no account key yet, there's a method to generate it for you:\n\n```python\naccount_key = my_acme.generate_account_key()\n```\n\nThe `account_key` is a key pair, containing both public and private keys\nin PEM format, as bytes. You should permanently save the account key somewhere:\n\n```python\nwith open('my-account-key.pem', 'wb') as f:\n    f.write(account_key)\n```\n\nIf you aleady have an account key, you should provide it explicitly:\n\n```python\nwith open('my-account-key.pem', 'rb') as f:\n    my_acme.account_key = f.read()\n```\n\nor:\n\n```python\nwith open('my-account-key.pem', 'rb') as f:\n    my_account_key = f.read()\nmy_acme = MyAcmeClient('https://acme-v02.api.letsencrypt.org/directory', my_account_key)\n```\n\nOnce `account_key` is set, you can create an account on the ACME server, if it was not created yet:\n\n```python\nacme.create_account()\n```\n\nThis method can accept the list of contact URLs in the form \"mailto:admin@example.org\".\nBy default contacts is an empty list.\n\nIt's desirable to permanently save account URL, along with account key somewhere:\n\n```python\nsaved_account_url = my_acme.account_url\n```\n\nThis is because this URL is needed for subsequent requests and if not saved,\nthe client has to issue extra request to obtain it.\n\nThis URL should be restored after instantiation of `MyAcmeClient`:\n\n```python\nmy_acme.account_url = saved_account_url\n```\n\n\n### How to apply for certificate issuance\n\nCreate an authenticator:\n\n```python\nauthenticator = MyAcmeAuthzManual()\n```\n\nCreate state object:\n\n```python\nstate = MyAcmeStateFS('example.com', '~/.myacme-state')\n```\n\nApply for a certificate:\n\n```python\norder = acme.process_order('example.com', authenticator, state)\n```\n\nYou can provide your own private key:\n\n```python\norder = acme.process_order('example.com', authenticator, state, private_key=example_com_key)\n```\n\nAuto-generated CSR contains only COMMON_NAME field and optionally SAN extension.\nYou can provide more fields:\n\n```python\norder = acme.process_order('example.com', authenticator, state, csr_fields={\n    'Country Name': 'US',\n    'State or Province Name': 'California'\n})\n```\n\nField names are transformed to x509 names by converting them to upper case and replacing spaces\nwith underscores. Here are most used names, for the full list see `cryptography.x509.oid.NameOID`:\n\n```\nCOUNTRY_NAME             2-letter country code\nLOCALITY_NAME            e.g. city\nSTATE_OR_PROVINCE_NAME\nSTREET_ADDRESS\nORGANIZATION_NAME        e.g. company\nORGANIZATIONAL_UNIT_NAME e.g. section\nEMAIL_ADDRESS\n```\n\nAlternatively you can provide your own CSR. Private key is unnecessary because CSR is already signed:\n\n```python\norder = acme.process_order('example.com', authenticator, state, csr=example_com_csr)\n```\n\nFinally, you should save your certificate somewhere:\n\n```python\ncertificate = order.get_certificate()\nwith open('my-certificate.pem', 'wb') as f:\n    f.write(certificate)\n```\n\nIf you not provided private key, you should also save auto-generated one:\n\n```python\nprivate_key = order.get_private_key()\nwith open('private.key', 'wb') as f:\n    f.write(private_key)\n```\n\n### Internationalized domain names\n\nMyACME accepts and returns all domain names as strings so they may contain non-ASCII characters.\nDomain names are encoded and decoded as necessary.\n\n### The complete example\n\n```python\nmy_domain = 'example.com'\nwith open('my-account-key.pem', 'rb') as f:\n    my_account_key = f.read()\nmy_acme = MyAcmeClient('https://acme-v02.api.letsencrypt.org/directory', my_account_key)\nauthenticator = MyAcmeAuthzManual()\nstate = MyAcmeStateFS(my_domain, '~/.myacme-state')\norder = acme.process_order(my_domain, authenticator, state)\nif not order:\n    print('Cannot get certificate')  # XXX reason?\nelse:\n    certificate = order.get_certificate()\n    with open('my-certificate.pem', 'wb') as f:\n        f.write(certificate)\n    private_key = order.get_private_key()\n    with open('private.key', 'wb') as f:\n        f.write(private_key)\n```\n\n\n\n",
    "bugtrack_url": null,
    "license": "",
    "summary": "MyACME client library and command line tool",
    "version": "0.1.1",
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "dc774c229ed60f893b2f5f566fb6cdc32a04fab9b18bc10c15236085aba224e1",
                "md5": "238be9aa9b6b1752b83536bd0402fb7b",
                "sha256": "ab5f45c8e11c85ec90664f79b1cabf9ddd4c43fcccb48cac8f4fdfa2046ed74b"
            },
            "downloads": -1,
            "filename": "myacme-0.1.1-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "238be9aa9b6b1752b83536bd0402fb7b",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.7",
            "size": 23924,
            "upload_time": "2023-01-26T17:35:47",
            "upload_time_iso_8601": "2023-01-26T17:35:47.272136Z",
            "url": "https://files.pythonhosted.org/packages/dc/77/4c229ed60f893b2f5f566fb6cdc32a04fab9b18bc10c15236085aba224e1/myacme-0.1.1-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "2b21569da2d29370e815d71b765549ca217825f56191c487cdfbdd2c4510356a",
                "md5": "4228a733ac18486ffeb83e54b1379d91",
                "sha256": "0045fe5e9c5ed90c59834c085d11c5cc59903a668132b02c87076dd7683f9105"
            },
            "downloads": -1,
            "filename": "myacme-0.1.1.tar.gz",
            "has_sig": false,
            "md5_digest": "4228a733ac18486ffeb83e54b1379d91",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.7",
            "size": 27294,
            "upload_time": "2023-01-26T17:35:49",
            "upload_time_iso_8601": "2023-01-26T17:35:49.511590Z",
            "url": "https://files.pythonhosted.org/packages/2b/21/569da2d29370e815d71b765549ca217825f56191c487cdfbdd2c4510356a/myacme-0.1.1.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-01-26 17:35:49",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "lcname": "myacme"
}
        
AXY
Elapsed time: 0.03803s