view tests/test-encode.out @ 12592:f2937d6492c5 stable

url: verify correctness of https server certificates (issue2407) Pythons SSL module verifies that certificates received for HTTPS are valid according to the specified cacerts, but it doesn't verify that the certificate is for the host we connect to. We now explicitly verify that the commonName in the received certificate matches the requested hostname and is valid for the time being. This is a minimal patch where we try to fail to the safe side, but we do still rely on Python's SSL functionality and do not try to implement the standards fully and correctly. CRLs and subjectAltName are not handled and proxies haven't been considered. This change might break connections to some sites if cacerts is specified and the certificates (by our definition) isn't correct. The workaround is to disable cacerts which in most cases isn't much worse than it was before with cacerts.
author Mads Kiilerich <mads@kiilerich.com>
date Fri, 01 Oct 2010 00:46:59 +0200
parents a474f950357b
children
line wrap: on
line source

%% no changes
%% no changes
%% check contents in repo are encoded
this is a test
THIS IS A TEST
%% check committed content was decoded
this is a test
this is a test
2 files updated, 0 files merged, 0 files removed, 0 files unresolved
%% check decoding of our new working dir copy
this is a test
this is a test
%% check hg cat operation
this is a test
this is a test
this is a test
this is a test