Overview
Comment: | Updated root CA certificate, the previous one expired, and made errors about this more informative |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
7241c0986cedff4f020022f3c9170bc4 |
User & Date: | rkeene on 2019-12-13 00:11:33 |
Other Links: | manifest | tags |
References
2020-05-12
| ||
15:08 | Commit [7241c0986c] broke writing because error messages were checked, fix the check and fix writing check-in: b5b196f3f3 user: rkeene tags: trunk | |
Context
2019-12-13
| ||
00:33 | Cleaned up code in preparation for Windows build check-in: fdf89fd103 user: rkeene tags: trunk | |
00:11 | Updated root CA certificate, the previous one expired, and made errors about this more informative check-in: 7241c0986c user: rkeene tags: trunk | |
00:10 | Updated to support tagging a package as beta when doing CPIO check-in: ecf92091f8 user: rkeene tags: trunk | |
Changes
Modified appfsd.tcl from [ced6c30241] to [15b349e52e].
︙ | ︙ | |||
275 276 277 278 279 280 281 | set ::appfs::init_called 1 # Add a default CA to list of trusted CAs lappend ::appfs::trusted_cas [::pki::x509::parse_cert { -----BEGIN CERTIFICATE----- MIIC7DCCAdSgAwIBAgIBATANBgkqhkiG9w0BAQUFADAvMRIwEAYDVQQKEwlSb3kg | | | | | | | | | | 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 | set ::appfs::init_called 1 # Add a default CA to list of trusted CAs lappend ::appfs::trusted_cas [::pki::x509::parse_cert { -----BEGIN CERTIFICATE----- MIIC7DCCAdSgAwIBAgIBATANBgkqhkiG9w0BAQUFADAvMRIwEAYDVQQKEwlSb3kg S2VlbmUxGTAXBgNVBAMTEEFwcEZTIEtleSBNYXN0ZXIwHhcNMTkxMjEyMjM1OTIz WhcNMzQxMjEyMjM1OTIzWjAvMRIwEAYDVQQKEwlSb3kgS2VlbmUxGTAXBgNVBAMT EEFwcEZTIEtleSBNYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQCq6uSK46yG5b6RJWwRlvw5glAnjsc1GiX3duXA0vG4qnKUnDtl/jcMmq2GMOB9 Iy1tjabEHA0MhW2j7Vwe/O9MLFJkJ30M1PVD7YZRRNaAsz3UWIKEjPI7BBc32KOm BL3CTXCCdzllL1HhVbnM5iCAmgHcg1DUk/EvWXvnEDxXRy2lV9mQsmDedrffY7Wl Or57nlczaMuPLpyRSkv75PAnjQJxT3sWlBpy+/H9ImudQdpJNf/FtxcqN7iDwH5B vIceYEtDVxFsvo5HOVkSl9jeo5E4Gpe3wyfRhoqB2UkaW1Kq0iH5R+00S760xQMx LL9L1duhu1dL7HsmEw7IeYURAgMBAAGjEzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJ KoZIhvcNAQEFBQADggEBAIQW2OHDS9rIZUqaFdRqthqhYxESi9Yz9SO1LHWJ6WyS edqkMIWnXaC2Gq8JTCLcIwK4VRvDqwuHz2TQj9cqbQ+FrnxtSM3kVXrsfehD4cqz pMNKfoi+XaPefB9YbSBbcI4IvOPbPHtZz9++pW5vUwKjp3BiA1xNL9x9SnoehMEd BQM75CMQckwmnlII1yhStRDCcgIaMpv7L6vutmvdvN0QMJKnX/5papLrdiHu1Nt7 bSf8agpRgIQKKSyuwFjp3zT8oeAzEzL4HdOBCveQ5EamCqvV6EDIuIR7b+4ZnYoL 3qh0YRO/9jrtb786iqWGexZ1JBjiSMhYA1CcvJtR/vQ= -----END CERTIFICATE----- }] # Load configuration file set config_file [file join $::appfs::cachedir config] if {[file exists $config_file]} { source $config_file |
︙ | ︙ | |||
734 735 736 737 738 739 740 | return -code error "Invalid or unacceptable path: $dir" } proc getattr {path} { array set pathinfo [_parsepath $path] array set retval [list] | > | > > | 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 | return -code error "Invalid or unacceptable path: $dir" } proc getattr {path} { array set pathinfo [_parsepath $path] array set retval [list] set fetchIndexError "no fetch error" if {[catch { ::appfs::getindex $pathinfo(hostname) ::appfs::getpkgmanifest $pathinfo(hostname) $pathinfo(package_sha1) } fetchIndexErrorRaw]} { set fetchIndexError $fetchIndexErrorRaw } set retval(path_type) $pathinfo(_type) switch -- $pathinfo(_type) { "toplevel" { set retval(type) directory |
︙ | ︙ | |||
894 895 896 897 898 899 900 | } } } } if {![info exists retval(type)]} { | | | 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 | } } } } if {![info exists retval(type)]} { return -code error "No such file or directory ($fetchIndexError)" } return [array get retval] } proc openpath {path mode} { array set pathinfo [_parsepath $path] |
︙ | ︙ |