Roland Shoemaker
d9d537f7f4
Add location header to /acme/new-reg if key is already in use
2015-07-06 18:40:40 +01:00
Richard Barnes
ff192330f8
Propagate nonce errors through WFE
2015-06-23 13:15:09 -07:00
Roland Shoemaker
f21dc2e146
Merge branch 'master' into wfe-logging
2015-06-19 17:00:05 -07:00
Roland Shoemaker
f228ac41f5
Add connection logging to the WFE
2015-06-19 16:47:54 -07:00
Brad Warren
4655447a35
Reformatted error messages
2015-06-19 14:47:45 -07:00
Brad Warren
426b03b7de
Final cleanup
2015-06-19 14:09:09 -07:00
Roland Shoemaker
403af37a39
Hide Authorization.Expires field when uninitialized
2015-06-17 18:34:30 -07:00
J.C. Jones
41f5788c77
Correct most `go lint` warnings. (274 -> 5)
2015-06-16 22:18:28 -05:00
Roland Shoemaker
01c41c1bd0
Merge pull request #354 from letsencrypt/344-internal_server_errors
...
Resolves Issue #344 : Only send InternalServerError when needed
2015-06-15 15:57:04 -07:00
Jacob Hoffman-Andrews
80d5e50e42
Enable revocation by account key.
...
In addition to cert private key. This required modifying the GetCertificate*
functions to return core.Certificate instead of certificate bytes.
2015-06-15 12:33:50 -07:00
J.C. Jones
1474b7f21f
Resolves Issue #344 : Only send InternalServerError when needed
...
Basically, just send InternalServerError when it indicates an internal state
was broken.
2015-06-13 00:21:44 -05:00
Richard Barnes
615366636a
Send CORS headers
2015-06-11 22:26:16 -04:00
Richard Barnes
d398bd962a
Send an Allow header whenever we send 405
2015-06-11 22:12:01 -04:00
J.C. Jones
2ad15a4a85
Issue #309 : Produce OCSP Responses immediately upon issuance, if at all possible.
...
This approach performs a best-effort generation of the first OCSP response during
certificate issuance. In the event that OCSP generation fails, it logs a warning at
the Boulder-CA console, but returns successfully since the Certificate was itself
issued.
2015-06-11 11:31:04 -05:00
Richard Barnes
8289a6d2fa
Make tests pass
2015-06-09 17:43:16 -04:00
Roland Shoemaker
573e35ed56
Disallow multiple registrations with same key (and fix all related tests)
2015-06-04 20:21:59 +01:00
James 'J.C.' Jones
a3521bcb61
Merge pull request #277 from rolandshoemaker/check-cert
...
Check generated certificate matches CSR
2015-06-03 22:10:35 -07:00
Roland Shoemaker
78e621c95f
further review fixes
2015-06-03 00:27:08 +01:00
bifurcation
04479eca5c
Merge pull request #291 from letsencrypt/fix-revocation
...
Revert change to revocation from #275
2015-06-02 17:52:35 -04:00
Jacob Hoffman-Andrews
7a60d431d6
Revert "Supporess the 'expires' field in public Authorizations"
...
This reverts commit d47b7c12ac .
Conflicts:
core/objects.go
wfe/web-front-end.go
2015-06-02 12:02:05 -07:00
Jacob Hoffman-Andrews
026cb424fc
Revert "Replace RevokeCertficate with something more in line with the spec"
...
This reverts commit b1bad40fe6 .
Conflicts:
wfe/web-front-end.go
2015-06-02 10:45:54 -07:00
Roland Shoemaker
51890a9626
Move cert-csr check to boulder/core and review fixes
2015-06-02 17:56:28 +01:00
Roland Shoemaker
c830921b5a
WFE test comment cleanup
2015-06-01 16:39:21 +01:00
Roland Shoemaker
0048453fc8
remove JWS request generation cruft
2015-06-01 16:15:38 +01:00
Roland Shoemaker
33df806d25
wfe test fixes + DNSNames and CommonName cleanup
2015-06-01 15:01:24 +01:00
Roland Shoemaker
e5bf16711c
Add generated cert checks
2015-06-01 14:00:49 +01:00
Richard Barnes
b1bad40fe6
Replace RevokeCertficate with something more in line with the spec
2015-06-01 02:11:10 -04:00
Richard Barnes
d47b7c12ac
Supporess the 'expires' field in public Authorizations
2015-06-01 02:08:47 -04:00
Richard Barnes
7f8f12c91b
Fixing broken WFE tests due to agreement checking
2015-06-01 02:08:47 -04:00
Richard Barnes
a188c2c775
Fixing some additional cases from #265
2015-05-31 16:16:25 -04:00
Richard Barnes
466154cc61
Merge master
2015-05-31 16:13:06 -04:00
Richard Barnes
457f71a512
Merge master
2015-05-31 16:03:43 -04:00
Richard Barnes
c0bacc3fb6
Add more detailed error code reporting
2015-05-31 15:58:08 -04:00
Roland Shoemaker
c8d001b3fb
better MockCA IssueCertificate argument name
2015-05-31 20:47:18 +01:00
Roland Shoemaker
94a3a1effb
fix mock bug
2015-05-31 20:33:44 +01:00
Roland Shoemaker
170012808c
Remove invalid openssl signature comment
2015-05-31 20:21:03 +01:00
Roland Shoemaker
c67b4393a1
HandlePath work around
2015-05-31 11:37:14 +01:00
Roland Shoemaker
4afa15201b
Merge remote-tracking branch 'upstream/master' into wfe-tests
2015-05-31 11:33:05 +01:00
Roland Shoemaker
62d25cffe0
review cleanup
2015-05-31 11:32:55 +01:00
Roland Shoemaker
e563e831d2
store random cert as hex
2015-05-30 21:38:39 +01:00
Richard Barnes
ba8b84ef09
Another couple of test fixes
2015-05-30 14:41:18 -04:00
Roland Shoemaker
b2f78525dc
gofmt
2015-05-30 19:00:42 +01:00
Roland Shoemaker
c6b51176a2
add *even* more header checks
2015-05-30 18:59:01 +01:00
Roland Shoemaker
0493c8e4ff
add actual header checks
2015-05-30 18:44:48 +01:00
Roland Shoemaker
78bbc3e2e5
Add header checks
2015-05-30 18:37:43 +01:00
Roland Shoemaker
20e36a9dff
full IssueCertificate test
2015-05-30 18:36:03 +01:00
J.C. Jones
1fd691564d
Fix broken test, only run integration tests if unit tests pass.
2015-05-28 08:35:13 -07:00
J.C. Jones
bc3acca096
Resolved Issue #230
...
- Move setting the core.Registration.Key field from RA.NewRegistration to
WFE.NewRegistration to avoid a chicken-and-egg problem.
- Note: I kept the RPC wrapper object even though it now only has one field.
Seems like it's a good practice to use wrapper objects, even though we don't
everywhere.
2015-05-26 14:44:15 -07:00
Roland Shoemaker
74ecad349b
Merge upstream/master
2015-05-20 13:03:43 -07:00
Roland Shoemaker
0f4f17e82b
make sure user has agreed before any subsequent actions
2015-05-20 12:58:14 -07:00