-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Update to swift-certificates 0.4.0 #6316
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
5f1ee20
to
1982f4c
Compare
9a1cffe
to
311730d
Compare
8d58894
to
de9cbd0
Compare
@@ -310,6 +308,66 @@ struct CMSSignatureProvider: SignatureProviderProtocol { | |||
throw SigningError.unableToValidateSignature("\(error)") | |||
} | |||
} | |||
|
|||
func extractSigningEntity( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@neonichu Implemented extractSigningEntity
as part of this PR
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nice, thanks!
b2ee4a5
to
e462768
Compare
e462768
to
4d9e8ab
Compare
macOS cmake build failing with:
Trying to fix with apple/swift-certificates#67, which means we will need another |
Update: to fix cmake build for macOS requires new |
- Adjust code - Re-enable `SigningTests.testCMSCheckCertificateRevocationStatus` - Implement `SignatureProvider.extractSigningEntity` - Rework disabling of certificate expiry check - Update `OCSPPolicy` usage
4d9e8ab
to
f17a122
Compare
@swift-ci please smoke test |
@swift-ci please test Windows platform |
This breaks the Windows build as the new release of swift-certificates is not portable to non-Darwin platforms. |
SigningTests.testCMSCheckCertificateRevocationStatus
SignatureProvider.extractSigningEntity
OCSPPolicy
usage