| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
| |
* Don't load system certificates by default when any other ``ca_certs``, ``ca_certs_dir`` or ``ssl_context`` parameters are specified.
* Remove Authorization header regardless of case when redirecting to cross-site. (Issue #1510)
* Add support for IPv6 addresses in subjectAltName section of certificates. (Issue #1269)
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* test_https: fix intermediate certificates format
Fixes #1419
They were generated using this script:
import trustme
root_ca = trustme.CA.from_pem(
'dummyserver/certs/cacert.pem',
'dummyserver/certs/cacert.key')
child_ca = root_ca.create_child_ca()
server_cert = child_ca.issue_server_cert('LocalClient')
server_cert.private_key_and_cert_chain_pem.write_to_path("server.pem")
While modifying trustme 0.4.0 dev to add this from_pem function:
@classmethod
def from_pem(cls, cert_path, key_path):
ca = cls()
ca.parent_cert = None
with open(cert_path, 'rb') as f:
data = f.read()
ca._certificate = x509.load_pem_x509_certificate(
data, backend=default_backend())
constraints = ca._certificate.extensions.get_extension_for_oid(
ExtensionOID.BASIC_CONSTRAINTS)
with open(key_path, 'rb') as f:
data = f.read()
ca._private_key = load_pem_private_key(
data, password=None, backend=default_backend())
ca.cert_pem = Blob(ca._certificate.public_bytes(Encoding.PEM))
return ca
* test_https: accept different macOS error
Fixes #1422
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Revert "Fix test_client_no_intermediate on macOS 10.13+ (#1412)"
This reverts commit 6ef3c06249b7144838b6701c6e9adfa76650ccea. The test
was supposed to test a missing intermediate CA, but after that change it
was testing a missing root CA.
* Stop testing known bad test on macOS 10.13
macOS 10.13 (used by Travis) rejects serial numbers which are more than
36 bytes long, and those tests use certificates with 38 bytes serial
numbers.
|
| |
|
|
| |
used for SNI/hostname verification. (#1397)
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* update dummyserver /certificate endpoint to return a json dict of the
subject of the client certificate used to connect (needed for py26
compatibility)
* update test_client_intermediate to use assertDictEquals to test the
returned certificate info from /certificate
* update test_client_no_intermediate to call request with retries=False,
as certificate authentication failure isn't something that will
resolve itself through retries.
tests currently pass on py26, py27, py34, py35, and py36 on my mac.
|
| |
|
|
|
| |
+ Where applicable, using implicit line continuations
+ Moved certificate serial number constant to a more central location
|
| | |
|
| | |
|
| |
|
|
| |
certificate tests
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
| |
Fixes #1112
Test fixes are due to the fact that SSLErrors are now wrapped in
a MaxRetryError.
|
| |
|
|
|
|
| |
This test is decorated with `@onlyPy279OrNewer`, so any code within
its body that only runs on versions older than 2.7.9 will never
be executed. This patch removes this dead code.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Running the tests locally was throwing up a lot of warnings of
the form:
ResourceWarning: unclosed <ssl.SSLSocket fd=16,
family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6,
laddr=('::1', 61145, 0, 0), raddr=('::1', 61134, 0, 0)>
This patch tries to reduce the number of `ResourceWarning`s that
are emitted by the `with_dummyserver` tests.
|
| |\ |
|
| | | |
|
| | | |
|
| |/ |
|
| | |
|
| |\ |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| |/ |
|
| |
|
|
| |
new systems don't have SSLv3 anymore breaking the tests
|
| |
|
|
|
|
| |
This test sucks because it assumes that SSLv3 will be present on the
system. There's no guarantee of that. Rewrite the test to test more
directly.
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
| |
This test no longer applies because we've unified the PyOpenSSL and
standard library logic. The standard library does not load the default
verify locations: that means, neither does PyOpenSSL anymore.
We can reconsider that decision (I quite like the logic used by
PyOpenSSL), but right now we're unifying the logic and so this test no
longer makes any sense.
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|