Davanum Srinivas 94bc9ceef1 Fixup certificates and skip failing test
Using cfssl to regenerate fresh certificates:
rm *
echo '{"CN":"CA","key":{"algo":"rsa","size":2048}}' | cfssl gencert
-initca - | cfssljson -bare ca -
echo '{"signing":{"default":{"expiry":"43800h","usages":["signing","key
encipherment","server auth","client auth"]}}}' > ca-config.json
export ADDRESS=127.0.0.1,::1,localhost
export NAME=server
echo
'{"CN":"'$NAME'","hosts":["127.0.0.1"],"key":{"algo":"rsa","size":2048}}'
| cfssl gencert -config=ca-config.json -ca=ca.pem -ca-key=ca-key.pem
-hostname="$ADDRESS" - | cfssljson -bare $NAME
export ADDRESS=
export NAME=client
echo
'{"CN":"'$NAME'","hosts":["127.0.0.1"],"key":{"algo":"rsa","size":2048}}'
| cfssl gencert -config=ca-config.json -ca=ca.pem -ca-key=ca-key.pem
-hostname="$ADDRESS" - | cfssljson -bare $NAME
cp ca.pem ca.crt ;
cp ca-key.pem ca.key;
cp client.pem certificate.crt ;
cp client-key.pem privatekey.key ;

Also the results from the related bug show that there is currently no
solution to make self-signed certificates work in conjunction with
raw IPv6 addresses consistently, so we skip the failing test.

Related-Bug: 1656329
Change-Id: I160108059e17122035d8d914c5157b7ce3ada3a5
2018-04-10 14:47:19 +00:00
2018-02-28 01:49:45 +08:00
2017-03-03 00:03:22 +00:00
2017-12-02 19:29:33 +01:00

Team and repository tags

image

oslo.service -- Library for running OpenStack services

Latest Version

Downloads

oslo.service provides a framework for defining new long-running services using the patterns established by other OpenStack applications. It also includes utilities long-running applications might need for working with SSL or WSGI, performing periodic operations, interacting with systemd, etc.

Description
Library for running OpenStack services
Readme 5.6 MiB
Languages
Python 100%