- 09 Nov, 2021 6 commits
-
-
Vincent Pelletier authored
-
Vincent Pelletier authored
As seen at least on cryptography 35.0.0 . Ideally this should be on a 63 or 64bits cutoff, but somehow the breakage is a lot lower. Bug reported upstream: https://github.com/pyca/cryptography/issues/6573
-
Vincent Pelletier authored
Because: - Non-blocking lock acquisition does not work with a context manager. - subprocess is not a context manager in python 2.7 .
-
Boxiang Sun authored
-
Boxiang Sun authored
-
Vincent Pelletier authored
The test should not need to sanitise the environment of this test in particular (if we do not trust the environment then there would be a lot more to sanitise for the python part of the test as well), and the intent was just to add the CAUCASE_PYTHON variable so caucase.sh runs the expected python executable and not one possibly picked from PATH. So copy environment, edit the copy and pass this to the caucase.sh subprocess.
-
- 08 Nov, 2021 1 commit
-
-
Vincent Pelletier authored
-
- 20 Oct, 2021 3 commits
-
-
Vincent Pelletier authored
-
Vincent Pelletier authored
Fixes cli.updater crashing when one of the locally-stored CA is expired. Also, explicitly raise when there are CAs in the local trust store but all fail loading.
-
Vincent Pelletier authored
If an unverifiable CRL is present (ex: its CA expired), then it can be ignored in the computation of the next wake-up time. Also, factorise with similar code in client.CaucaseClient.updateCRLFile .
-
- 07 Oct, 2021 3 commits
-
-
Vincent Pelletier authored
Preserve py2.7 compatibility. Also, make pylint happier with the result.
-
Vincent Pelletier authored
-
Vincent Pelletier authored
-
- 07 Apr, 2021 2 commits
-
-
Vincent Pelletier authored
Otherwise, the expired CA causes an error when it is being loaded, before the time comparison. Also, CRL signed by that CA also causes an error (as its signature cannot be checked). Catch these errors so the corresponding unusable PEMs are discarded.
-
Vincent Pelletier authored
Make python3 resource leak detector happy.
-
- 22 Feb, 2021 1 commit
-
-
Vincent Pelletier authored
Prevent the (very unlikely at a 10MB given the manipulated data structures) risk of a partial read accidentally containing producing a well-formed result. Also, only accept base-10 content lengths.
-
- 15 Feb, 2021 2 commits
-
-
Vincent Pelletier authored
This fixes late-trust-bootstrap clients' ability to trust certificates issued by an older CA.
-
Vincent Pelletier authored
Emit Certificate Revocation Lists signed by all valid CAs. Apparently openssl (or at least how it is used in stunnel4) fails to validate a certificate when CRL validation is enabled and the key which signed the CRL differs from the key which signed the certificate. Also, add Authority Key Identifier CRL extension, required to be standard- compliant. Also, fix revocation entry expiration: the RFC requires them to be kept at least one renewal cycle after the certificate's expiration. As a consequence of this whole change: - the protocol for retrieving the curren CRL changes to return the concatenated list of CRLs, which breaks the CRL distribution (...but the distributed CRLs were invalid anyway) - stop storing the CRL PEM in caucased's database so that it gets re-generated with fresh code. As caucased is not expected to be restarted very often, the extra CRL generation on every start should not make a difference.
-
- 03 Feb, 2021 5 commits
-
-
Vincent Pelletier authored
datetime.datetime.fromtimestamp applies timezones, which is unintended. Fixes a time drift on revoked certificates.
-
Vincent Pelletier authored
-
Vincent Pelletier authored
Also, this provides a handy location to log all queries when debugging. Also, some minor cleanups.
-
Vincent Pelletier authored
So they can be reused for more PEM-encoded types.
-
Vincent Pelletier authored
-
- 02 Feb, 2021 8 commits
-
-
Vincent Pelletier authored
-
Vincent Pelletier authored
-
Vincent Pelletier authored
-
Vincent Pelletier authored
-
Vincent Pelletier authored
Because this is not the job of an import/export tool.
-
Vincent Pelletier authored
-
Vincent Pelletier authored
-
Vincent Pelletier authored
bad-option-value has an effect on the "disable" line, but somehow none on the "enable" line. So remove it altogether.
-
- 01 Feb, 2021 3 commits
-
-
Vincent Pelletier authored
python2.7 with pylint 1.9.5 python3.9 with pylint 2.6.0 Also, reduce the script of unused argument silencing.
-
Vincent Pelletier authored
It is redundant, but regular runner output does not display the test class.
-
Vincent Pelletier authored
Thanks, modern pylint !
-
- 29 Jan, 2021 2 commits
-
-
Vincent Pelletier authored
Otherwise, client certificates issued before a new CA is used get rejected once the new CA becomes current.
-
Vincent Pelletier authored
This extension is required by rfc5280 (see section 5.2.1) but was overlooked.
-
- 25 Nov, 2020 4 commits
-
-
Vincent Pelletier authored
-
Vincent Pelletier authored
The result only changes when CA certificates are reloaded, so prepare this valuein _loadCAKeyPairList.
-
Vincent Pelletier authored
"expires" takes an absolute date, "max-age" takes a number of seconds until expiration. So switch to "max-age": according to Mozilla Developer Network, it is supported by all major browsers, and by IE since version 8.
-
Vincent Pelletier authored
-