certificate-checker 1.1.0 → 1.2.0
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 22c1759c8e76b6aa70ade23bf0bcc4c3266f9f33e87742e37862715e73969545
|
4
|
+
data.tar.gz: 0501b9217c517e251e7de1e5cc643dc7168bfbd79a7930db311d453f47667d31
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 99e11cebeb129e4a5b3474966bb6460f6ee4ba31ca507d1f3d95b1baef29123146738634d944d7ca70dbeaeb357da9428d69b962e068614c2e441299414f44f6
|
7
|
+
data.tar.gz: ca2730c55c9d3c5cd08f2f7672ba936a70b8526494d569342c462968298c66ae701dc1b53b14b1fda4f7001f9e4e3dee9838be78141f0d9ac1ff69750413ae98
|
data/CHANGELOG.md
CHANGED
@@ -5,15 +5,24 @@ All notable changes to this project will be documented in this file.
|
|
5
5
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
6
6
|
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
7
7
|
|
8
|
+
## [1.2.0]
|
9
|
+
### Added
|
10
|
+
|
11
|
+
- Add `--ignore-nonexistent` argument to not emit diagnostic message when the
|
12
|
+
passed filename does not exist.
|
13
|
+
|
8
14
|
## [1.1.0]
|
15
|
+
### Changed
|
9
16
|
|
10
17
|
- Use certificate issuer and subject rather than file line to identify a
|
11
18
|
certificate in a certificate file.
|
12
19
|
|
13
20
|
## [1.0.1]
|
21
|
+
### Fixed
|
14
22
|
|
15
23
|
- Fix on Debian Stretch.
|
16
24
|
|
17
|
-
[Unreleased]: https://github.com/smortex/tls-checker/compare/v1.
|
25
|
+
[Unreleased]: https://github.com/smortex/tls-checker/compare/v1.2.0...HEAD
|
26
|
+
[1.2.0]: https://github.com/smortex/tls-checker/compare/v1.1.0...v1.2.0
|
18
27
|
[1.1.0]: https://github.com/smortex/tls-checker/compare/v1.0.1...v1.1.0
|
19
28
|
[1.0.1]: https://github.com/smortex/tls-checker/compare/v1.0.0...v1.0.1
|
data/exe/certificate-checker
CHANGED
@@ -5,8 +5,6 @@ require 'json'
|
|
5
5
|
require 'optparse'
|
6
6
|
require 'certificate-checker'
|
7
7
|
|
8
|
-
factory = CertificateChecker::CertificateCheckerFactory.new
|
9
|
-
|
10
8
|
options = {
|
11
9
|
output: $stdout,
|
12
10
|
}
|
@@ -17,8 +15,14 @@ OptionParser.new do |opts|
|
|
17
15
|
opts.on('-o', '--output=FILE', 'Write to FILE') do |f|
|
18
16
|
options[:output] = File.open(f, File::CREAT | File::APPEND | File::LOCK_EX)
|
19
17
|
end
|
18
|
+
|
19
|
+
opts.on('--[no-]ignore-nonexistent', 'Ignore nonexistent files and arguments') do |v|
|
20
|
+
options[:ignore_nonexistent] = v
|
21
|
+
end
|
20
22
|
end.parse!
|
21
23
|
|
24
|
+
factory = CertificateChecker::CertificateCheckerFactory.new(options)
|
25
|
+
|
22
26
|
ARGV.each do |arg|
|
23
27
|
factory.certificate_checkers_for(arg).each do |checker|
|
24
28
|
options[:output].puts checker.to_e.to_json
|
@@ -12,7 +12,7 @@ module CertificateChecker
|
|
12
12
|
elsif File.exist?(path)
|
13
13
|
search_file(path)
|
14
14
|
else
|
15
|
-
warn "No such file or directory @ #{self.class.name}##{__callee__} - #{path}"
|
15
|
+
warn "No such file or directory @ #{self.class.name}##{__callee__} - #{path}" unless @config[:ignore_nonexistent]
|
16
16
|
[]
|
17
17
|
end
|
18
18
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: certificate-checker
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.2.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Romain Tartière
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2020-02-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: internet_security_event
|
@@ -126,7 +126,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
126
126
|
- !ruby/object:Gem::Version
|
127
127
|
version: '0'
|
128
128
|
requirements: []
|
129
|
-
|
129
|
+
rubyforge_project:
|
130
|
+
rubygems_version: 2.7.6.2
|
130
131
|
signing_key:
|
131
132
|
specification_version: 4
|
132
133
|
summary: Report expired/about to expires certificates in a directory tree.
|