-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix a wrong WebDAV Warning with self-signed-certs #8181
Conversation
Occuring in the admin interface
The inspection completed: 1 updated code elements |
🚀 Test Passed. 🚀 |
#7045 ( |
Good catch 👍 |
There is no need to extent class OC_DavClient - Sabre_DAV_Client has already a method for this: https://github.com/fruux/sabre-dav/blob/1.7.11/lib/Sabre/DAV/Client.php#L127 |
@DeepDiver1975 |
The power of Open Source: submit a pull request! 😉 |
@mmattel Thanks for the clarification - I did not realize the slight difference between the two constants |
@DeepDiver1975 and wait about a year until this is merged into owncloud's third-party repo and for owncloud8, for this to be released? This is sort of a quickfix. |
❓ Did I say this will not be merged? Hold your horses! But we need to interact with upstream projects |
With "this" I mean an updated release of sabredav. Let's say:
= 1½ year for this single, little fix. I'll file a PR to sabredav though. |
Nothing more was requested - THX |
@DeepDiver1975 this isn't wanted upstream, see fruux/sabre-dav#437. So this is the way to do this in OC. |
Quite expected - right? 😉 |
👍 |
Fix a wrong WebDAV Warning with self-signed-certs
@Kondou-ger I had a chat with @evert a while ago from fruux and he wrote me that the verifyPeer usage will be discouraged and on a long run taken out for sabredav forcing programers to do it on their own. snip... As you have written the above implementation for CURLOPT_SSL_VERIFYHOST in OC, would you mind extending this for the CURLOPT_SSL_VERIFYPEER parameter setup, then we will not be dependent on future sabredav changes. The current handling of using verifyPeer should be taken out and a curl call like the one you did for verifyHost should be taken in. |
There's nothing wrong with using self-signed certificates. You should provide a facility for people to use them, by actually supporting self-signed certificates ;) In a controlled environment, using self-signed certificates makes a lot of sense imho. In some ways it's actually more secure, because you don't have to trust SSL root certificate businesses. |
Please let us seperate two things: 1.) let´s implement the CURLOPT_SSL_VERIFYPEER setting making Owncloud futureproof and less dependent on possible changes in sabredav as described above. I really would appreciate the help of Kondou-ger. ad 2. I had a self signed certificate and have now a signed one of CA-Cert (*.domain.com) and still have the problem that this message pop´s up. |
Well, to not go with this workaround and @DeepDiver1975 has OCs SabreDav been updated in the last 4 months? I don't think so, because this workaround will not work anymore in newer versions of sabredav, and will result in breakage … |
And besides that, IIRC there was a PR that moved this test to the client side, instead of the server side, making this entirely superfluous. @PVince81 I think you've worked on that, didn't you? |
Yes, here #7051 (still WIP) |
Occuring in the admin interface