Commit Graph

81 Commits

Author SHA1 Message Date
Roland Shoemaker d9d537f7f4 Add location header to /acme/new-reg if key is already in use 2015-07-06 18:40:40 +01:00
Richard Barnes ff192330f8 Propagate nonce errors through WFE 2015-06-23 13:15:09 -07:00
Roland Shoemaker f21dc2e146 Merge branch 'master' into wfe-logging 2015-06-19 17:00:05 -07:00
Roland Shoemaker f228ac41f5 Add connection logging to the WFE 2015-06-19 16:47:54 -07:00
Brad Warren 4655447a35 Reformatted error messages 2015-06-19 14:47:45 -07:00
Brad Warren 426b03b7de Final cleanup 2015-06-19 14:09:09 -07:00
Roland Shoemaker 403af37a39 Hide Authorization.Expires field when uninitialized 2015-06-17 18:34:30 -07:00
J.C. Jones 41f5788c77 Correct most `go lint` warnings. (274 -> 5) 2015-06-16 22:18:28 -05:00
Roland Shoemaker 01c41c1bd0 Merge pull request #354 from letsencrypt/344-internal_server_errors
Resolves Issue #344: Only send InternalServerError when needed
2015-06-15 15:57:04 -07:00
Jacob Hoffman-Andrews 80d5e50e42 Enable revocation by account key.
In addition to cert private key. This required modifying the GetCertificate*
functions to return core.Certificate instead of certificate bytes.
2015-06-15 12:33:50 -07:00
J.C. Jones 1474b7f21f Resolves Issue #344: Only send InternalServerError when needed
Basically, just send InternalServerError when it indicates an internal state
was broken.
2015-06-13 00:21:44 -05:00
Richard Barnes 615366636a Send CORS headers 2015-06-11 22:26:16 -04:00
Richard Barnes d398bd962a Send an Allow header whenever we send 405 2015-06-11 22:12:01 -04:00
J.C. Jones 2ad15a4a85 Issue #309: Produce OCSP Responses immediately upon issuance, if at all possible.
This approach performs a best-effort generation of the first OCSP response during
certificate issuance. In the event that OCSP generation fails, it logs a warning at
the Boulder-CA console, but returns successfully since the Certificate was itself
issued.
2015-06-11 11:31:04 -05:00
Richard Barnes 8289a6d2fa Make tests pass 2015-06-09 17:43:16 -04:00
Roland Shoemaker 573e35ed56 Disallow multiple registrations with same key (and fix all related tests) 2015-06-04 20:21:59 +01:00
James 'J.C.' Jones a3521bcb61 Merge pull request #277 from rolandshoemaker/check-cert
Check generated certificate matches CSR
2015-06-03 22:10:35 -07:00
Roland Shoemaker 78e621c95f further review fixes 2015-06-03 00:27:08 +01:00
bifurcation 04479eca5c Merge pull request #291 from letsencrypt/fix-revocation
Revert change to revocation from #275
2015-06-02 17:52:35 -04:00
Jacob Hoffman-Andrews 7a60d431d6 Revert "Supporess the 'expires' field in public Authorizations"
This reverts commit d47b7c12ac.

Conflicts:
	core/objects.go
	wfe/web-front-end.go
2015-06-02 12:02:05 -07:00
Jacob Hoffman-Andrews 026cb424fc Revert "Replace RevokeCertficate with something more in line with the spec"
This reverts commit b1bad40fe6.

Conflicts:
	wfe/web-front-end.go
2015-06-02 10:45:54 -07:00
Roland Shoemaker 51890a9626 Move cert-csr check to boulder/core and review fixes 2015-06-02 17:56:28 +01:00
Roland Shoemaker c830921b5a WFE test comment cleanup 2015-06-01 16:39:21 +01:00
Roland Shoemaker 0048453fc8 remove JWS request generation cruft 2015-06-01 16:15:38 +01:00
Roland Shoemaker 33df806d25 wfe test fixes + DNSNames and CommonName cleanup 2015-06-01 15:01:24 +01:00
Roland Shoemaker e5bf16711c Add generated cert checks 2015-06-01 14:00:49 +01:00
Richard Barnes b1bad40fe6 Replace RevokeCertficate with something more in line with the spec 2015-06-01 02:11:10 -04:00
Richard Barnes d47b7c12ac Supporess the 'expires' field in public Authorizations 2015-06-01 02:08:47 -04:00
Richard Barnes 7f8f12c91b Fixing broken WFE tests due to agreement checking 2015-06-01 02:08:47 -04:00
Richard Barnes a188c2c775 Fixing some additional cases from #265 2015-05-31 16:16:25 -04:00
Richard Barnes 466154cc61 Merge master 2015-05-31 16:13:06 -04:00
Richard Barnes 457f71a512 Merge master 2015-05-31 16:03:43 -04:00
Richard Barnes c0bacc3fb6 Add more detailed error code reporting 2015-05-31 15:58:08 -04:00
Roland Shoemaker c8d001b3fb better MockCA IssueCertificate argument name 2015-05-31 20:47:18 +01:00
Roland Shoemaker 94a3a1effb fix mock bug 2015-05-31 20:33:44 +01:00
Roland Shoemaker 170012808c Remove invalid openssl signature comment 2015-05-31 20:21:03 +01:00
Roland Shoemaker c67b4393a1 HandlePath work around 2015-05-31 11:37:14 +01:00
Roland Shoemaker 4afa15201b Merge remote-tracking branch 'upstream/master' into wfe-tests 2015-05-31 11:33:05 +01:00
Roland Shoemaker 62d25cffe0 review cleanup 2015-05-31 11:32:55 +01:00
Roland Shoemaker e563e831d2 store random cert as hex 2015-05-30 21:38:39 +01:00
Richard Barnes ba8b84ef09 Another couple of test fixes 2015-05-30 14:41:18 -04:00
Roland Shoemaker b2f78525dc gofmt 2015-05-30 19:00:42 +01:00
Roland Shoemaker c6b51176a2 add *even* more header checks 2015-05-30 18:59:01 +01:00
Roland Shoemaker 0493c8e4ff add actual header checks 2015-05-30 18:44:48 +01:00
Roland Shoemaker 78bbc3e2e5 Add header checks 2015-05-30 18:37:43 +01:00
Roland Shoemaker 20e36a9dff full IssueCertificate test 2015-05-30 18:36:03 +01:00
J.C. Jones 1fd691564d Fix broken test, only run integration tests if unit tests pass. 2015-05-28 08:35:13 -07:00
J.C. Jones bc3acca096 Resolved Issue #230
- Move setting the core.Registration.Key field from RA.NewRegistration to
  WFE.NewRegistration to avoid a chicken-and-egg problem.
- Note: I kept the RPC wrapper object even though it now only has one field.
  Seems like it's a good practice to use wrapper objects, even though we don't
  everywhere.
2015-05-26 14:44:15 -07:00
Roland Shoemaker 74ecad349b Merge upstream/master 2015-05-20 13:03:43 -07:00
Roland Shoemaker 0f4f17e82b make sure user has agreed before any subsequent actions 2015-05-20 12:58:14 -07:00