tls-checker 1.1.1 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 436c913ebd77a63c430df1dc3a365d4458c58cdd4e6070d3db7aed7ead5ddb95
|
|
4
|
+
data.tar.gz: 5e23c16c3717c32fb6d558f0d5fc5f48d61bbcf50e36e76ca0418752e913a0e0
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 5e9e9015b20136f0b7e0ceba16ea67415af17fc8efbfe4282ee97da238039081567a99126c5b71cffa24e13e8d1088d58193d5efda7a15dc7be1b137a1aa8764
|
|
7
|
+
data.tar.gz: 39ae43f8abeeb2e8258a82657eeee08f38bb0fc75af554da7d66e7cd5421ef97419c5421cbabda86737b65fb8e83bfdb2bca959e5b5d46e16e97d2e77ad4bea1
|
data/CHANGELOG.md
CHANGED
|
@@ -5,6 +5,12 @@ All notable changes to this project will be documented in this file.
|
|
|
5
5
|
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
|
|
6
6
|
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
|
|
7
7
|
|
|
8
|
+
## [1.2.0]
|
|
9
|
+
|
|
10
|
+
- Skip completely TLSA check if a connexion certificate cannot be fetched;
|
|
11
|
+
- Do not generate an event when a connexion to a remote service is not
|
|
12
|
+
possible.
|
|
13
|
+
|
|
8
14
|
## [1.1.1]
|
|
9
15
|
|
|
10
16
|
- Handle Errno::EHOSTUNREACH exceptions gracefully when attempting to fetch a
|
|
@@ -17,6 +23,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
17
23
|
- Make it possible to test services using an IP address;
|
|
18
24
|
- Report validity of certificates when a TLSA record is found in the DNS.
|
|
19
25
|
|
|
20
|
-
[Unreleased]: https://github.com/smortex/tls-checker/compare/v1.
|
|
26
|
+
[Unreleased]: https://github.com/smortex/tls-checker/compare/v1.2.0...HEAD
|
|
27
|
+
[1.2.0]: https://github.com/smortex/tls-checker/compare/v1.1.1...v1.2.0
|
|
21
28
|
[1.1.1]: https://github.com/smortex/tls-checker/compare/v1.1.0...v1.1.1
|
|
22
29
|
[1.1.0]: https://github.com/smortex/tls-checker/compare/v1.0.0...v1.1.0
|
data/exe/tls-checker
CHANGED
|
@@ -5,8 +5,6 @@ require 'json'
|
|
|
5
5
|
require 'optparse'
|
|
6
6
|
require 'tls-checker'
|
|
7
7
|
|
|
8
|
-
factory = TLSChecker::CertificateCheckerFactory.new
|
|
9
|
-
|
|
10
8
|
options = {
|
|
11
9
|
output: $stdout,
|
|
12
10
|
}
|
|
@@ -19,8 +17,10 @@ OptionParser.new do |opts|
|
|
|
19
17
|
end
|
|
20
18
|
end.parse!
|
|
21
19
|
|
|
22
|
-
|
|
23
|
-
|
|
20
|
+
factory = TLSChecker::CertificateCheckerFactory.new
|
|
21
|
+
|
|
22
|
+
ARGV.each do |specification|
|
|
23
|
+
factory.certificate_checkers_for(specification).each do |checker|
|
|
24
24
|
options[:output].puts checker.to_e.to_json
|
|
25
25
|
end
|
|
26
26
|
end
|
|
@@ -25,6 +25,7 @@ module TLSChecker
|
|
|
25
25
|
]
|
|
26
26
|
rescue IPAddr::InvalidAddressError
|
|
27
27
|
certificate_checkers = @resolver.getaddresses(hostname).map { |ip| CertificateChecker.new(hostname, ip, port, starttls) }
|
|
28
|
+
certificate_checkers.select!(&:check)
|
|
28
29
|
|
|
29
30
|
factory = TLSACheckerFactory.new
|
|
30
31
|
|
data/lib/tls-checker/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: tls-checker
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.2.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Romain Tartière
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: exe
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2019-03-
|
|
11
|
+
date: 2019-03-04 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: internet_security_event
|