On Thu, 19 Jun 2025 at 15:56, Graham Leggett <minf...@sharp.fm.invalid>
wrote:

> On 18 Jun 2025, at 22:39, minfrin (via GitHub) <g...@apache.org> wrote:
>
> > minfrin opened a new pull request, #8:
> > URL: https://github.com/apache/serf/pull/8
> >
> >   - Add serf_ssl_cert_uri_set(), a callback to set the URL of a
> certificate store.
> >
> >   - Use the OSSL_STORE API from OpenSSL to read certificates and keys.
> Certs and keys are read from a URL instead of a file path. The default URL
> scheme is file:.
> >
> >   - Keep fallback support for the existing
> serf_ssl_client_cert_provider_set() callback, which reads exclusively from
> a local PKCS12 file.
> >
> >   - Support full intermediate certificate handling. Previously whatever
> was in the PKCS12 file was blindly passed to the the server on the
> assumption the administrator had pre-done the work constructing the
> certificate chain. Now we make no assumption as to the size of the
> certificate store, if a Windows personal certificate store of a MacOS
> keychain is used, we search for the most appropriate leaf certificate that
> matches what is requested by the server.
> >
> >   - Update test cases to handle both URIs and PKCS12 files.
> >
> >   Note: tests will fail on modern unix until reference to now-removed
> MD5 is fixed. This test failure is unrelated.
>
> Hi Graham,

I didn't look at the patch yet, but I have general concern: serf doesn't
depend on OpenSSL. E.g. it may use Crypto API on Windows in future. So I
think we should avoid exposing OpenSSL in public serf API. Is it possible
to abstract URI somehow? Maybe some kind of flag?

-- 
Ivan Zhakov

Reply via email to