[Bps-public-commit] Net-IMAP-Server branch, master, updated. 1.37-3-ge94bf80

Alex Vandiver alexmv at bestpractical.com
Sun Jan 26 20:19:54 EST 2014


The branch, master has been updated
       via  e94bf809b6f828ed39ffac7496d0c48268a039f0 (commit)
       via  a1f364d2cbc571bcf0c9487f700c89b56c888854 (commit)
       via  9446ef0738944f2cc4f172eb225ae542adb996ca (commit)
      from  e1e3ddcf0e2395e2623fff84e4032f47cbc5e085 (commit)

Summary of changes:
 Changes                       |   6 ++-
 certs/server-cert.pem         | 108 ++++++++++++++++++++++++------------------
 certs/server-key.pem          |  43 +++++++++++------
 lib/Net/IMAP/Server.pm        |   2 +-
 t/lib/Net/IMAP/Server/Test.pm |   6 ++-
 5 files changed, 101 insertions(+), 64 deletions(-)

- Log -----------------------------------------------------------------
commit 9446ef0738944f2cc4f172eb225ae542adb996ca
Author: Alex Vandiver <alexmv at bestpractical.com>
Date:   Sun Jan 26 20:13:36 2014 -0500

    Update to non-expired certificates (good for 10 years)

diff --git a/certs/server-cert.pem b/certs/server-cert.pem
index 1fa0d6c..76247a8 100644
--- a/certs/server-cert.pem
+++ b/certs/server-cert.pem
@@ -1,62 +1,78 @@
 Certificate:
     Data:
         Version: 3 (0x2)
-        Serial Number:
-            c2:fa:b9:08:d7:a1:e1:a5
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=US, ST=Local Host, O=Internet Widgits Pty Ltd, CN=localhost
+        Serial Number: 9589475111614655190 (0x8514a8ce8a3daad6)
+    Signature Algorithm: sha1WithRSAEncryption
+        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
         Validity
-            Not Before: Feb 18 02:25:22 2007 GMT
-            Not After : Mar 20 02:25:22 2007 GMT
-        Subject: C=US, ST=Local Host, O=Internet Widgits Pty Ltd, CN=localhost
+            Not Before: Jan 27 01:06:54 2014 GMT
+            Not After : Jan 25 01:06:54 2024 GMT
+        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd
         Subject Public Key Info:
             Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ab:5c:51:5d:69:66:75:22:2b:d7:4b:5c:63:d3:
-                    f4:5e:ab:56:59:41:ac:41:5b:7c:89:42:8e:3b:44:
-                    88:cf:b4:0b:45:46:9e:ac:be:ab:cd:29:31:6b:6c:
-                    98:d6:67:5e:4b:7c:ec:66:6a:34:b8:20:84:21:fd:
-                    63:c5:da:f8:1c:63:68:f0:a4:2d:ca:e0:53:2d:9d:
-                    73:a7:90:88:eb:84:3e:c5:86:34:e1:4b:59:6c:f3:
-                    24:a0:4d:cb:27:85:b2:a2:f2:01:e2:e5:84:78:17:
-                    8a:45:02:41:4c:1a:43:d4:7b:b1:a7:be:b0:0c:db:
-                    e4:b3:8b:fa:41:2a:b7:b0:59
+                Public-Key: (2048 bit)
+                Modulus:
+                    00:d7:46:9c:27:4f:9c:7a:18:57:3b:6f:24:ac:b7:
+                    76:90:11:2a:f0:ff:70:9c:35:89:c3:a5:e2:3c:17:
+                    06:18:7c:e5:b3:e4:4f:c2:0d:0d:09:80:61:e5:4b:
+                    f5:25:2f:d2:ad:4d:3d:53:69:09:be:e0:af:fa:4c:
+                    e6:d9:3a:ad:94:f1:b2:5e:67:d9:7a:12:e9:b8:07:
+                    a3:cf:68:17:6b:1d:b1:44:99:ba:8c:7d:82:e0:d3:
+                    ee:b0:19:e7:4d:03:a2:6c:53:e7:c5:eb:4b:a8:a1:
+                    8e:e6:41:50:27:63:8f:5a:54:55:63:ed:a1:cf:95:
+                    66:97:2b:47:ca:8b:0f:8e:a0:00:1e:05:e4:11:35:
+                    f7:b9:fa:08:89:15:b5:7e:0b:a0:25:14:4b:d0:28:
+                    b7:eb:8f:4b:06:de:da:9b:e9:ca:83:9f:6b:73:18:
+                    1d:1b:e1:71:9d:92:4a:1c:9d:76:92:08:2b:d3:ef:
+                    4e:66:cc:be:f1:bb:b1:f4:75:a9:66:f1:bb:85:8e:
+                    b1:be:5d:c8:12:ea:1f:40:b0:2e:79:0e:08:ec:11:
+                    06:1a:52:f8:5d:1f:5c:95:32:a0:0e:a0:3c:21:86:
+                    2f:93:b2:af:c9:b3:ad:12:1d:a5:04:5c:6c:b6:09:
+                    ac:60:4c:5a:40:10:d8:28:24:87:c5:b8:6a:b4:f1:
+                    8e:7d
                 Exponent: 65537 (0x10001)
         X509v3 extensions:
             X509v3 Subject Key Identifier: 
-                49:71:2C:CC:28:DA:84:6C:D7:42:E1:8C:1D:28:BD:0A:CB:4E:7D:38
+                BD:27:38:21:D3:6A:61:E0:70:3F:05:A4:B1:19:B6:43:63:94:EA:EC
             X509v3 Authority Key Identifier: 
-                keyid:49:71:2C:CC:28:DA:84:6C:D7:42:E1:8C:1D:28:BD:0A:CB:4E:7D:38
-                DirName:/C=US/ST=Local Host/O=Internet Widgits Pty Ltd/CN=localhost
-                serial:C2:FA:B9:08:D7:A1:E1:A5
+                keyid:BD:27:38:21:D3:6A:61:E0:70:3F:05:A4:B1:19:B6:43:63:94:EA:EC
 
             X509v3 Basic Constraints: 
                 CA:TRUE
     Signature Algorithm: sha1WithRSAEncryption
-        2b:8a:5a:04:15:2c:52:dd:09:e3:5a:2a:8e:37:29:d4:f1:fe:
-        6d:88:fe:bf:91:84:b9:25:ba:ac:8d:ad:27:30:96:00:79:eb:
-        cb:fa:a0:df:4d:66:ee:9a:96:80:c1:81:49:db:37:86:c8:7c:
-        16:04:8c:3d:4c:25:c4:0a:94:f5:32:f3:59:67:2c:74:8f:93:
-        f6:b0:8e:3f:d6:49:49:48:a6:49:d1:c8:e6:01:5b:ca:89:a0:
-        5d:f3:6a:8e:2d:4a:87:31:81:93:93:4d:b2:4d:46:62:f8:35:
-        c1:03:7a:fc:2e:8f:60:59:ff:14:29:52:e2:52:5b:97:50:ab:
-        a7:24
+         64:9d:4a:e0:77:da:6b:ce:e6:6c:79:74:10:77:d8:39:1b:5c:
+         15:b3:cc:45:4e:d1:99:14:3b:45:19:d1:f8:6e:13:a8:33:de:
+         ef:42:cd:9d:4b:ab:c8:0e:c4:cf:49:ff:cd:6a:e3:68:94:68:
+         ef:32:19:ac:f2:2e:87:d1:24:3f:3b:73:1a:bf:ac:e8:ff:5d:
+         9a:c8:3d:d1:3a:e7:ce:ec:53:a9:b2:43:4d:2c:f8:1f:3c:97:
+         3e:fd:7d:dc:db:9b:10:06:ae:e8:99:07:60:0e:83:b9:e9:1c:
+         13:72:78:bb:3a:ca:69:93:64:bb:d6:72:4c:af:f8:d3:c2:25:
+         94:59:12:0a:97:c9:ba:62:9d:1b:4f:46:ff:76:c4:4a:81:48:
+         0f:d3:0f:20:d0:63:52:8c:ad:7b:13:3e:76:de:05:6a:0c:b7:
+         dc:7a:09:7a:c7:aa:b9:c2:be:ad:e0:0e:88:4c:6e:a6:6c:e5:
+         5a:56:39:f4:67:d4:21:e2:9e:b3:89:74:ed:d5:f5:b2:07:7b:
+         9e:01:7f:31:9b:f4:0e:24:39:0a:a8:d0:e4:ac:bc:10:42:c4:
+         c3:38:1d:cf:fd:e5:f7:df:98:55:00:1d:b8:82:9f:67:d7:48:
+         e1:8c:1a:53:20:0d:39:18:ad:b7:77:4a:30:16:d7:86:a1:1e:
+         51:b0:96:eb
 -----BEGIN CERTIFICATE-----
-MIIC7zCCAligAwIBAgIJAML6uQjXoeGlMA0GCSqGSIb3DQEBBQUAMFkxCzAJBgNV
-BAYTAlVTMRMwEQYDVQQIEwpMb2NhbCBIb3N0MSEwHwYDVQQKExhJbnRlcm5ldCBX
-aWRnaXRzIFB0eSBMdGQxEjAQBgNVBAMTCWxvY2FsaG9zdDAeFw0wNzAyMTgwMjI1
-MjJaFw0wNzAzMjAwMjI1MjJaMFkxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpMb2Nh
-bCBIb3N0MSEwHwYDVQQKExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxEjAQBgNV
-BAMTCWxvY2FsaG9zdDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAq1xRXWlm
-dSIr10tcY9P0XqtWWUGsQVt8iUKOO0SIz7QLRUaerL6rzSkxa2yY1mdeS3zsZmo0
-uCCEIf1jxdr4HGNo8KQtyuBTLZ1zp5CI64Q+xYY04UtZbPMkoE3LJ4WyovIB4uWE
-eBeKRQJBTBpD1Huxp76wDNvks4v6QSq3sFkCAwEAAaOBvjCBuzAdBgNVHQ4EFgQU
-SXEszCjahGzXQuGMHSi9CstOfTgwgYsGA1UdIwSBgzCBgIAUSXEszCjahGzXQuGM
-HSi9CstOfTihXaRbMFkxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpMb2NhbCBIb3N0
-MSEwHwYDVQQKExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxEjAQBgNVBAMTCWxv
-Y2FsaG9zdIIJAML6uQjXoeGlMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD
-gYEAK4paBBUsUt0J41oqjjcp1PH+bYj+v5GEuSW6rI2tJzCWAHnry/qg301m7pqW
-gMGBSds3hsh8FgSMPUwlxAqU9TLzWWcsdI+T9rCOP9ZJSUimSdHI5gFbyomgXfNq
-ji1KhzGBk5NNsk1GYvg1wQN6/C6PYFn/FClS4lJbl1CrpyQ=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 -----END CERTIFICATE-----
diff --git a/certs/server-key.pem b/certs/server-key.pem
index ba600d2..25404a0 100644
--- a/certs/server-key.pem
+++ b/certs/server-key.pem
@@ -1,15 +1,28 @@
------BEGIN RSA PRIVATE KEY-----
-MIICWwIBAAKBgQCrXFFdaWZ1IivXS1xj0/Req1ZZQaxBW3yJQo47RIjPtAtFRp6s
-vqvNKTFrbJjWZ15LfOxmajS4IIQh/WPF2vgcY2jwpC3K4FMtnXOnkIjrhD7FhjTh
-S1ls8ySgTcsnhbKi8gHi5YR4F4pFAkFMGkPUe7GnvrAM2+Szi/pBKrewWQIDAQAB
-AoGAaEez1A6yJRH4b/oSbUWs7neCAqsuck+ER9tSxsp8HznHqg7BvQoDbsRkqKTb
-lY4uGe4ZxnFXR72x6yVSNDN+zHjP29aSDNRl4Pn8mrQIfAL9hjHVwoi8rmWYjrKa
-hRsfBX+uSyVvcRwum+1xmsEXIMaDLhqI3i7Dj3aEyUIgzAECQQDWCezB/xpGLUur
-GN58deg0a9i1I0MvzTdhiduqjUFUlnrBDcp12bBITpsE5MIwF/+qpIWX7wFr2DR5
-LFBSO/dBAkEAzPR7endHbnF9JQP782g3tN+w7p80QZQY5mfJe6EPjsmAt3hVQ4bY
-A2hxGtCHErbGxjdnkU1bpqz0momlDszLGQJAO5mN5MMtRMdOH7mQEmYen6I8OMw1
-5DSnrDBgC5DD1VMFoYY+jyxryuagge9VJ2E3XwPq81CpO6d7jRZK02tBQQJAKavn
-0z2fU3BVvonx10qwUOFOayYJjO/cpDQj/jQAIssLlcIsq98l2oOIw6f0XrS086Ze
-M2fkI5502Vr1KW4wOQJASDFHxVXz3zN/2d8By93EA1ZuXe5YcX3zzPmpKkIQtO62
-dINHo+M2BYP4Ku3wME++dp4E29BNsIopoLILWHSCow==
------END RSA PRIVATE KEY-----
+-----BEGIN PRIVATE KEY-----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+-----END PRIVATE KEY-----

commit a1f364d2cbc571bcf0c9487f700c89b56c888854
Author: Alex Vandiver <alexmv at bestpractical.com>
Date:   Sun Jan 26 20:14:17 2014 -0500

    Verify the SSL certificate used for testing
    
    IO::Socket:SSL version 1.950 and above enforce SSL_VERIFY_PEER by
    default, which ensures that the server has a signed certificate.  As
    such, tests failed, since the certificate used in tests is self-signed.
    
    Explicitly pass the signing CA (itself) when connecting or starting TLS;
    this causes verification to succeed, which is essential to pass tests
    with IO::Socket::SSL 1.950 or above.

diff --git a/t/lib/Net/IMAP/Server/Test.pm b/t/lib/Net/IMAP/Server/Test.pm
index 2b95892..96b3374 100644
--- a/t/lib/Net/IMAP/Server/Test.pm
+++ b/t/lib/Net/IMAP/Server/Test.pm
@@ -66,6 +66,7 @@ sub connect {
         PeerAddr        => 'localhost',
         PeerPort        => SSL_PORT,
         Class           => "IO::Socket::SSL",
+        SSL_ca_file     => "certs/server-cert.pem",
         @_
     );
     my $socketclass = delete $args{Class};
@@ -118,7 +119,10 @@ sub connect_ok {
 
 sub start_tls {
     my $class = shift;
-    IO::Socket::SSL->start_SSL($class->get_socket);
+    IO::Socket::SSL->start_SSL(
+        $class->get_socket,
+        SSL_ca_file => "certs/server-cert.pem",
+    );
 }
 
 sub start_tls_ok {

commit e94bf809b6f828ed39ffac7496d0c48268a039f0
Author: Alex Vandiver <alexmv at bestpractical.com>
Date:   Sun Jan 26 20:18:56 2014 -0500

    Version 1.38 releng

diff --git a/Changes b/Changes
index a67ad7d..63590fb 100644
--- a/Changes
+++ b/Changes
@@ -1,6 +1,10 @@
 Revision history for Net-IMAP-Server
 
-1.37   Sun Jan 26 19:14:17 2013
+1.38   Sun Jan 26 20:16:17 2014
+        * Pass tests with IO::Socket::SSL 1.950 and above, which verify
+          server SSL certificates by default.
+
+1.37   Sun Jan 26 19:14:17 2014
         * Fix parsing par parenthesized expressions with recent
           Regexp::Common
 
diff --git a/lib/Net/IMAP/Server.pm b/lib/Net/IMAP/Server.pm
index e947392..f42ed94 100644
--- a/lib/Net/IMAP/Server.pm
+++ b/lib/Net/IMAP/Server.pm
@@ -9,7 +9,7 @@ use UNIVERSAL::require;
 use Coro;
 use 5.008_008;
 
-our $VERSION = '1.37';
+our $VERSION = '1.38';
 
 =head1 NAME
 

-----------------------------------------------------------------------



More information about the Bps-public-commit mailing list