Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release x509 0.9.0 #15712

Merged
merged 2 commits into from
Jan 22, 2020
Merged

Release x509 0.9.0 #15712

merged 2 commits into from
Jan 22, 2020

Conversation

hannesm
Copy link
Member

@hannesm hannesm commented Jan 22, 2020

CHANGES:

CHANGES:

* BREAKING add a whitelist of hash algorithms used for signatures. The default
  whitelist is the SHA-2 family (without SHA-224), Validation.valid_ca{,s} use
  all algorithms as default
  reported by @emillon in mirleft/ocaml-x509#123, fixed in mirleft/ocaml-x509#128
* BREAKING Certificate.hostnames and Signing_request.hostnames (new) return a
  set of [`Wildcard|`Strict] * [`host] Domain_name.t (Certificate.Host_set.t)
  reported by @mmaker in mirleft/ocaml-x509#88, fixed in mirleft/ocaml-x509#127
* BREAKING mirleft/ocaml-x509#127 Signing_request.sign returns a result type now, an error is
  returned if the signing request was not properly signed
* BREAKING mirleft/ocaml-x509#127 Validation.{verify_chain_of_trust, trust_key_fingerprint,
  trust_cert_fingerptint} and the type Authenticator.t changed, no longer use
  of a Certificate.host, but instead a [`host] Domain_name.t (previously, it was
  a pair)
* BUGFIX support AlgorithmIdentifier of RSA signature algorithms with parameter
  not present
  reported by @Ulrar in mirleft/ocaml-x509#108, fixed in mirleft/ocaml-x509#129
* BUGFIX mirleft/ocaml-x509#127 preserve a signed signing request (Country in a DN sometimes uses
  a non-utf8 string encoding)
* remove deprecation from Validation.trust_cert_fingerprint and
  Authenticator.server_cert_fingerprint
  requested by @mben-romdhane in mirleft/ocaml-x509#125, fixed in mirleft/ocaml-x509#126
* Certificate.signature_algorithm, CRL.signature_algorithm, and
  Signing_request.signature_algorithm are now provided, returning a
  ([`RSA|`ECDSA] * Nocrypto.Hash.hash) option
  requested by @psafont in mirleft/ocaml-x509#123, fixed in mirleft/ocaml-x509#128
@hannesm
Copy link
Member Author

hannesm commented Jan 22, 2020

CI failures are about lwt 5.0.0 not being compatible with tls -- if lwt is enabled and tests as well -- the expression conflicts: [ "lwt" {with-test & >= "5.0.0"} ] does not seem to get properly picked up by CI.

from my point of view, this PR is good to be merged.

@kit-ty-kate
Copy link
Member

Sounds good indeed. Thanks a lot!

@kit-ty-kate kit-ty-kate merged commit 4e38e96 into ocaml:master Jan 22, 2020
@hannesm hannesm deleted the release-x509-0.9.0 branch January 22, 2020 18:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants