Skip to content
This repository has been archived by the owner on Jan 4, 2021. It is now read-only.

(#518) valid_certificate?: use OpenSSL::X509::Store for checking certificates #517

Merged

Conversation

mateusz-gozdek-sociomantic
Copy link
Contributor

Instead of OpenSSL::X509::Certificate, as Store allows for validation
against CA bundle, which is required when you roll new CA certificate.

I am not sure if this is wanted behaviour, but it seems to work when you have multiple certificates in ca.pem file.

Closes #518

@ripienaar
Copy link
Collaborator

Neat. Mind opening a ticket for this etc as per the contribution guides?

@mateusz-gozdek-sociomantic mateusz-gozdek-sociomantic changed the title valid_certificate?: use OpenSSL::X509::Store for checking certificates (#518) valid_certificate?: use OpenSSL::X509::Store for checking certificates Jul 11, 2018
@mateusz-gozdek-sociomantic
Copy link
Contributor Author

Neat. Mind opening a ticket for this etc as per the contribution guides?

Done. Sorry, I rushed a little bit with a PR :)

…checking certificates

Instead of OpenSSL::X509::Certificate, as Store allows for validation
against CA bundle, which is required when you roll new CA certificate.

Closes choria-legacy#518
@mateusz-gozdek-sociomantic
Copy link
Contributor Author

Updated to use OpenSSL::X509::StoreError instead of OpenSSL::X509::CertificateError.

@ripienaar ripienaar merged commit 1287434 into choria-legacy:master Jul 11, 2018
@ripienaar
Copy link
Collaborator

thank you!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants