Author: dsahlberg
Date: Sat Jun 21 09:31:09 2025
New Revision: 1926615

URL: http://svn.apache.org/viewvc?rev=1926615&view=rev
Log:
Remove inconsistent trailing witespace. No functional change.

* test/certs/create_certs.py
  (*): As above

Modified:
    serf/trunk/test/certs/create_certs.py

Modified: serf/trunk/test/certs/create_certs.py
URL: 
http://svn.apache.org/viewvc/serf/trunk/test/certs/create_certs.py?rev=1926615&r1=1926614&r2=1926615&view=diff
==============================================================================
--- serf/trunk/test/certs/create_certs.py (original)
+++ serf/trunk/test/certs/create_certs.py Sat Jun 21 09:31:09 2025
@@ -9,9 +9,9 @@
 #   to you under the Apache License, Version 2.0 (the
 #   "License"); you may not use this file except in compliance
 #   with the License.  You may obtain a copy of the License at
-# 
+#
 #     http://www.apache.org/licenses/LICENSE-2.0
-# 
+#
 #   Unless required by applicable law or agreed to in writing,
 #   software distributed under the License is distributed on an
 #   "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
@@ -21,9 +21,9 @@
 # ===================================================================
 #
 
-# This script creates the private keys and certificates required for 
+# This script creates the private keys and certificates required for
 # running the serf test suite.
-# 
+#
 # It should be run from the test/certs folder without arguments.
 # Certificates will be created in the test/certs folder, private keys in the
 # test/certs/private folder.
@@ -47,11 +47,11 @@ def create_key(keyfile='', passphrase=No
     key = crypto.PKey()
     key.generate_key(KEY_ALGO, KEY_SIZE)
     if passphrase:
-        open(keyfile, "wt").write(crypto.dump_privatekey(crypto.FILETYPE_PEM, 
-                                                         key, KEY_CIPHER, 
+        open(keyfile, "wt").write(crypto.dump_privatekey(crypto.FILETYPE_PEM,
+                                                         key, KEY_CIPHER,
                                                          passphrase))
     else:
-        open(keyfile, "wt").write(crypto.dump_privatekey(crypto.FILETYPE_PEM, 
+        open(keyfile, "wt").write(crypto.dump_privatekey(crypto.FILETYPE_PEM,
                                                          key))
 
     return key
@@ -62,7 +62,7 @@ def create_pkcs12(clientkey, clientcert,
     pkcs12.set_certificate(clientcert)
     pkcs12.set_privatekey(clientkey)
     pkcs12.set_ca_certificates([issuer])
-    open(pkcs12file, "wt").write(pkcs12.export(passphrase=passphrase, 
+    open(pkcs12file, "wt").write(pkcs12.export(passphrase=passphrase,
                                                iter=2048, maciter=2048))
 
 def create_crl(revokedcert, cakey, cacert, crlfile, next_crl_days=VALID_DAYS):
@@ -87,13 +87,13 @@ def create_crl(revokedcert, cakey, cacer
     open(crlfile, "wt").write(exported)
 
 # subjectAltName
-def create_cert(subjectkey, certfile, issuer=None, issuerkey=None, country='', 
-                state='', city='', org='', ou='', cn='', email='', ca=False, 
+def create_cert(subjectkey, certfile, issuer=None, issuerkey=None, country='',
+                state='', city='', org='', ou='', cn='', email='', ca=False,
                 valid_before=0, days_valid=VALID_DAYS, subjectAltName=None,
                 ocsp_responder_url=None, ocsp_signer=False):
     '''
     Create a X509 signed certificate.
-    
+
     subjectAltName
         Array of fully qualified subject alternative names (use OpenSSL 
syntax):
         For a DNS entry, use: ['DNS:localhost']. Other options are 'email', 
'URI', 'IP'.
@@ -103,15 +103,15 @@ def create_cert(subjectkey, certfile, is
     cert.set_version(3-1) # version 3, starts at 0
     cert.get_subject().C  = country
     cert.get_subject().ST = state
-    cert.get_subject().L  = city 
-    cert.get_subject().O  = org 
+    cert.get_subject().L  = city
+    cert.get_subject().O  = org
     cert.get_subject().OU = ou
     if cn:
         cert.get_subject().CN = cn
     cert.get_subject().emailAddress = email
     cert.set_serial_number(SERIAL_NUMBER)
     cert.set_pubkey(subjectkey)
-    
+
     cert.gmtime_adj_notBefore(valid_before * 24 * 3600)
     cert.gmtime_adj_notAfter(days_valid * 24 * 3600)
 
@@ -119,7 +119,7 @@ def create_cert(subjectkey, certfile, is
         issuer = cert # self signed
         issuerkey = subjectkey
     cert.set_issuer(issuer.get_subject())
-    
+
     if ca:
         cert.add_extensions([
             crypto.X509Extension("basicConstraints", False,
@@ -128,7 +128,7 @@ def create_cert(subjectkey, certfile, is
                                  subject=cert)
             ])
         cert.add_extensions([
-            crypto.X509Extension("authorityKeyIdentifier", False, 
+            crypto.X509Extension("authorityKeyIdentifier", False,
                                  "keyid:always", issuer=issuer)
             ])
 
@@ -149,7 +149,7 @@ def create_cert(subjectkey, certfile, is
 
     cert.sign(issuerkey, SIGN_ALGO)
 
-    open(certfile, "wt").write(crypto.dump_certificate(crypto.FILETYPE_PEM, 
+    open(certfile, "wt").write(crypto.dump_certificate(crypto.FILETYPE_PEM,
                                                        cert))
     return cert
 
@@ -158,11 +158,11 @@ if __name__ == '__main__':
     # This key will be used to sign the intermediate CA certificate
     rootcakey = create_key('private/serfrootcakey.pem', 'serftest')
 
-    rootcacert = create_cert(subjectkey=rootcakey, 
+    rootcacert = create_cert(subjectkey=rootcakey,
                              certfile='serfrootcacert.pem',
-                             country='BE', state='Antwerp', city='Mechelen', 
-                             org='In Serf we trust, Inc.', 
-                             ou='Test Suite Root CA', cn='Serf Root CA', 
+                             country='BE', state='Antwerp', city='Mechelen',
+                             org='In Serf we trust, Inc.',
+                             ou='Test Suite Root CA', cn='Serf Root CA',
                              email='serfroo...@example.com', ca=True)
 
     # intermediate CA key pair and certificate
@@ -171,40 +171,40 @@ if __name__ == '__main__':
 
     cacert = create_cert(subjectkey=cakey, certfile='serfcacert.pem',
                          issuer=rootcacert, issuerkey=rootcakey,
-                         country='BE', state='Antwerp', city='Mechelen', 
-                         org='In Serf we trust, Inc.', 
-                         ou='Test Suite CA', cn='Serf CA', 
+                         country='BE', state='Antwerp', city='Mechelen',
+                         org='In Serf we trust, Inc.',
+                         ou='Test Suite CA', cn='Serf CA',
                          email='ser...@example.com', ca=True)
 
     # server key pair
     # server certificate, no errors
     serverkey = create_key('private/serfserverkey.pem', 'serftest')
 
-    servercert = create_cert(subjectkey=serverkey, 
+    servercert = create_cert(subjectkey=serverkey,
                              certfile='serfservercert.pem',
                              issuer=cacert, issuerkey=cakey,
-                             country='BE', state='Antwerp', city='Mechelen', 
-                             org='In Serf we trust, Inc.', 
-                             ou='Test Suite Server', cn='localhost', 
+                             country='BE', state='Antwerp', city='Mechelen',
+                             org='In Serf we trust, Inc.',
+                             ou='Test Suite Server', cn='localhost',
                              email='serfser...@example.com')
 
     # server certificate that expired a year ago
-    expiredcert = create_cert(subjectkey=serverkey, 
+    expiredcert = create_cert(subjectkey=serverkey,
                               certfile='serfserver_expired_cert.pem',
                               issuer=cacert, issuerkey=cakey,
-                              country='BE', state='Antwerp', city='Mechelen', 
-                              org='In Serf we trust, Inc.', 
-                              ou='Test Suite Server', cn='localhost', 
+                              country='BE', state='Antwerp', city='Mechelen',
+                              org='In Serf we trust, Inc.',
+                              ou='Test Suite Server', cn='localhost',
                               email='serfser...@example.com',
                               days_valid=-365)
 
     # server certificate that will be valid in 10 years
-    expiredcert = create_cert(subjectkey=serverkey, 
+    expiredcert = create_cert(subjectkey=serverkey,
                               certfile='serfserver_future_cert.pem',
                               issuer=cacert, issuerkey=cakey,
                               country='BE', state='Antwerp', city='Mechelen',
-                              org='In Serf we trust, Inc.', 
-                              ou='Test Suite Server', cn='localhost', 
+                              org='In Serf we trust, Inc.',
+                              ou='Test Suite Server', cn='localhost',
                               email='serfser...@example.com',
                               valid_before=10*365)
 
@@ -245,19 +245,19 @@ if __name__ == '__main__':
     # client key pair and certificate
     clientkey = create_key('private/serfclientkey.pem', 'serftest')
 
-    clientcert = create_cert(subjectkey=clientkey, 
+    clientcert = create_cert(subjectkey=clientkey,
                              certfile='serfclientcert.pem',
                              issuer=cacert, issuerkey=cakey,
-                             country='BE', state='Antwerp', city='Mechelen', 
-                             org='In Serf we trust, Inc.', 
-                             ou='Test Suite Client', cn='Serf Client', 
+                             country='BE', state='Antwerp', city='Mechelen',
+                             org='In Serf we trust, Inc.',
+                             ou='Test Suite Client', cn='Serf Client',
                              email='serfcli...@example.com')
 
-    clientpkcs12 = create_pkcs12(clientkey, clientcert, cacert, 
+    clientpkcs12 = create_pkcs12(clientkey, clientcert, cacert,
                                  'serfclientcert.p12', 'serftest')
 
-    # Note that this creates a v1 CRL file without extensions set, and with 
+    # Note that this creates a v1 CRL file without extensions set, and with
     # MD5 hash. Not ideal, but pyOpenSSL doesn't support more than this.
-    # 
+    #
     # crl
     crl = create_crl(servercert, cakey, cacert, 'serfservercrl.pem')


Reply via email to