def db_serialize(session, tid): c = ConfigFactory(session, tid).get_val(u'https_chain') if len(c) == 0: return {'name': 'chain', 'set': False} x509 = load_certificate(FILETYPE_PEM, c) expr_date = format_cert_expr_date(x509.get_notAfter()) return { 'name': 'chain', 'issuer': tls.parse_issuer_name(x509), 'expiration_date': datetime_to_ISO8601(expr_date), 'set': True, }
def db_serialize(store): c = PrivateFactory(store).get_val('https_cert') if len(c) == 0: return {'name': 'cert', 'set': False} x509 = crypto.load_certificate(FILETYPE_PEM, c) expr_date = format_cert_expr_date(x509.get_notAfter()) return { 'name': 'cert', 'issuer': tls.parse_issuer_name(x509), 'expiration_date': datetime_to_ISO8601(expr_date), 'set': True, }
def db_serialize(session, tid): c = ConfigFactory(session, tid).get_val('https_chain') if len(c) == 0: return {'name': 'chain', 'set': False} x509 = crypto.load_certificate(crypto.FILETYPE_PEM, c) expr_date = letsencrypt.convert_asn1_date(x509.get_notAfter()) return { 'name': 'chain', 'issuer': tls.parse_issuer_name(x509), 'expiration_date': expr_date, 'set': True, }
def test_get_issuer_name(self): test_cases = [ ('invalid/le-staging-chain.pem', 'Fake LE Root X1'), ('invalid/glbc_le_stage_cert.pem', 'Fake LE Intermediate X1'), ('invalid/expired_cert.pem', 'Zintermediate'), ('valid/cert.pem', 'Whistleblowing Solutions I.S. S.r.l.'), ] for cert_path, issuer_name in test_cases: p = os.path.join(self.test_data_dir, cert_path) with open(p, 'r') as f: x509 = crypto.load_certificate(FILETYPE_PEM, f.read()) res = tls.parse_issuer_name(x509) self.assertEqual(res, issuer_name)
def db_serialize(session, tid): c = ConfigFactory(session, tid).get_val('https_cert') if not c: return { 'name': 'cert', 'set': False } log.err(c) c = """{}""".format(c) x509 = crypto.load_certificate(crypto.FILETYPE_PEM, c) expr_date = letsencrypt.convert_asn1_date(x509.get_notAfter()) return { 'name': 'cert', 'issuer': tls.parse_issuer_name(x509), 'expiration_date': expr_date, 'set': True, }