Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(SIMP-5966) Provide header-free cacerts file #55

Merged
merged 2 commits into from
Jan 28, 2019

Conversation

lnemsick-simp
Copy link
Contributor

Updated the pki_cert_sync type to generate an aggregate
CA certificates with X.509 certificate headers removed,
cacerts_no_headers.pem, in addition to the existing
aggregate CA certificates file, cacerts.pem. This new
CA certificates file is useful for application that
cannot handle certificate headers.

In addition, as part of this provider work did the
following:

  • Fixed a bug in which the target directory mode was
    set to '755' instead of '0755'.
  • Fixed a bug in which the hash of cert <file, link> pairs
    returned by the provider's source() could contain the file
    set to 'nil'
  • Added link verification to the provider's source_insync?()
  • Added unit tests

SIMP-5966 #close

lnemsick-simp and others added 2 commits January 25, 2019 17:08
Updated the pki_cert_sync type to generate an aggregate
CA certificates with X.509 certificate headers removed,
cacerts_no_headers.pem, in addition to the existing
aggregate CA certificates file, cacerts.pem. This new
CA certificates file is useful for application that
cannot handle certificate headers.

In addition, as part of this provider work did the
following:
- Fixed a bug in which the target directory mode was
  set to '755' instead of '0755'.
- Fixed a bug in which the hash of cert <file, link> pairs
  returned by the provider's source() could contain the file
  set to 'nil'
- Added link verification to the provider's source_insync?()
- Added unit tests

SIMP-5966 #close
@trevor-vaughan trevor-vaughan merged commit b2f2a35 into simp:master Jan 28, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants