On Wed, Sep 02, 2015 at 01:02:39PM -0700, Gurucharan Shetty wrote:
> When --certificate option is provided, we currently use
> SSL_CTX_use_certificate_chain_file() function to add
> that certificate. If our single certificate file had multiple
> certificates (as a chain), all of them would get added and sent
> to the remote peer. But once you call
> SSL_CTX_use_certificate_chain_file(), any future calls to
> SSL_CTX_add_extra_chain_cert() (called when --peer-ca-cert option
> is used) had no effect.
> 
> Since our man pages and INSTALL.SSL.md say that --certificate
> is used to specify one certificate and additional certificates
> are sent via --peer-ca-cert, this commit changes
> SSL_CTX_use_certificate_chain_file() use to
> SSL_CTX_use_certificate_file(). With this, additional certificates
> can now be added via --peer-ca-cert option.
> 
> The test case added with this commit would fail without the
> above changes.
> 
> Signed-off-by: Gurucharan Shetty <gshe...@nicira.com>

The use of "command pwd" is puzzling here, does it have something to do
with Windows?  But I thought we'd fixed the problem that ovs-pki had
with Windows, so is it necessary?

    +AT_SETUP([peer ca cert])
    +AT_KEYWORDS([ovs-vsctl ssl])
    +AT_SKIP_IF([test "$HAVE_OPENSSL" = no])
    +PKIDIR=`command pwd`

The &&s and \s here are a little puzzling too.  Do they do something
useful?  (Should we be checking return values by using AT_CHECK?)

    $OVS_PKI -B 1024 init && \
    $OVS_PKI -B 1024 req+sign vsctl switch && \
    $OVS_PKI -B 1024 req+sign ovsdbserver controller

I see why the initial execution of ovs-vsctl ignores the output, but
could the post-bootstrap connection check the output?  It would be a
better test if it did.

Thanks,

Ben.
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to