<feed xmlns='http://www.w3.org/2005/Atom'>
<title>interimap/tests/run, branch debian/0.5.7-4</title>
<subtitle>Fast bidirectional synchronization for QRESYNC-capable IMAP servers</subtitle>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/'/>
<entry>
<title>interimap, pullimap: Ensure DB and statefiles are created with mode 0600.</title>
<updated>2022-02-23T22:43:58+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2022-02-23T21:30:45+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=2447861913835637bbf49d96728ce9ac6ab0ae22'/>
<id>2447861913835637bbf49d96728ce9ac6ab0ae22</id>
<content type='text'>
It wasn't the case for interimap(1), see https://bugs.debian.org/608604 …
Fortunately we create $XDG_DATA_HOME/interimap with a secure mode, but
there is no reason to have the DB world-readable.  Since we can't rely
on SQLITE_OPEN_CREATE for secure mode we use sysopen(,,O_CREAT,0600).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It wasn't the case for interimap(1), see https://bugs.debian.org/608604 …
Fortunately we create $XDG_DATA_HOME/interimap with a secure mode, but
there is no reason to have the DB world-readable.  Since we can't rely
on SQLITE_OPEN_CREATE for secure mode we use sysopen(,,O_CREAT,0600).
</pre>
</div>
</content>
</entry>
<entry>
<title>Don't assume Net::IMAP::InterIMAP is always in @INC.</title>
<updated>2022-02-23T20:23:55+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2022-02-22T23:35:41+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=eeed44617b8b2bf4c941f6de334a9006804615fb'/>
<id>eeed44617b8b2bf4c941f6de334a9006804615fb</id>
<content type='text'>
And make the installation path configurable at `make` time.  Moreover,
adjust the 'test' target so the site directory and interimap/pullimap
path are configurable with INTERIMAP_I and INTERIMAP_PATH respectively.
That way one can run `tests/run foo` to check the source, `make test` to
check what's been built, and we also have the possibility to check the
installed program e.g. for autopkgtests.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
And make the installation path configurable at `make` time.  Moreover,
adjust the 'test' target so the site directory and interimap/pullimap
path are configurable with INTERIMAP_I and INTERIMAP_PATH respectively.
That way one can run `tests/run foo` to check the source, `make test` to
check what's been built, and we also have the possibility to check the
installed program e.g. for autopkgtests.
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: use stock OpenSSL config except for tests/tls-protocols.</title>
<updated>2020-12-17T12:47:09+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-17T12:47:09+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=30c2bc3c362a4eb6b35560cff0bd95404360fe22'/>
<id>30c2bc3c362a4eb6b35560cff0bd95404360fe22</id>
<content type='text'>
It's best to use a stock (clean) environment when possible.  We only
need to test TLS protocol version &lt;1.2 for tests/tls-protocols.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It's best to use a stock (clean) environment when possible.  We only
need to test TLS protocol version &lt;1.2 for tests/tls-protocols.
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: use default locations for trusted CA certificates when neither CAfile nor CApath are set.</title>
<updated>2020-12-13T17:44:18+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-13T16:43:52+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=8c43ed9baa905d907a6aad77de2282a852ba69a9'/>
<id>8c43ed9baa905d907a6aad77de2282a852ba69a9</id>
<content type='text'>
In particular, OpenSSL's default locations can be overridden by the
SSL_CERT_FILE resp. SSL_CERT_DIR environment variables, see
SSL_CTX_load_verify_locations(3ssl).

This bumps the minimum OpenSSL version to 1.1.0 (when SSL_verify is
used).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In particular, OpenSSL's default locations can be overridden by the
SSL_CERT_FILE resp. SSL_CERT_DIR environment variables, see
SSL_CTX_load_verify_locations(3ssl).

This bumps the minimum OpenSSL version to 1.1.0 (when SSL_verify is
used).
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: supply our own OpenSSL configuration file with MinProtocol=None.</title>
<updated>2020-12-11T17:44:13+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-11T17:28:32+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=ed263d4a380036b654525ee268db615c17d0d216'/>
<id>ed263d4a380036b654525ee268db615c17d0d216</id>
<content type='text'>
So we can test TLSv1 as well, not just TLSv1.2 and later.

Also, explicitly set ssl_min_protocol=TLSv1 in the Dovecot configuration
file (the default as of 2.3.11.3), hence running TLS tests now require
Dovecot 2.3 or later.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
So we can test TLSv1 as well, not just TLSv1.2 and later.

Also, explicitly set ssl_min_protocol=TLSv1 in the Dovecot configuration
file (the default as of 2.3.11.3), hence running TLS tests now require
Dovecot 2.3 or later.
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: `mv tests/snippets tests/config`</title>
<updated>2020-12-11T17:32:43+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-11T16:57:22+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=b99cd2fd12bc3a2c6b858e65182a47a4ef27dba2'/>
<id>b99cd2fd12bc3a2c6b858e65182a47a4ef27dba2</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>libinterimap: make SSL_verify check the hostname as well.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T18:39:10+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=265f133600e9812726a52ea3067409ed3578e882'/>
<id>265f133600e9812726a52ea3067409ed3578e882</id>
<content type='text'>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
More precisely, ensure that the certificate Subject Alternative Name
(SAN) or Subject CommonName (CN) matches the hostname or IP literal
specified by the 'host' option.  Previously it was only verifying the
chain of trust.

This bumps the minimum Net::SSLeay version to 1.83 and OpenSSL version
1.0.2.
</pre>
</div>
</content>
</entry>
<entry>
<title>test suite: always generate new certificates on `make test`.</title>
<updated>2020-12-11T10:20:41+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-12-10T13:34:48+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=26e5c04abfb81bdcbd4d89d9f9329b8433920b26'/>
<id>26e5c04abfb81bdcbd4d89d9f9329b8433920b26</id>
<content type='text'>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In addition, sign test certificates with the same root CA.  Hence
running `make test` now requires OpenSSL 1.1.1 or later.
</pre>
</div>
</content>
</entry>
<entry>
<title>Upgrade URLs to secure HTTP.</title>
<updated>2020-08-04T00:35:05+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2020-08-04T00:35:05+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=11cd204852f665670b5d4271eab86a3d9f5e5624'/>
<id>11cd204852f665670b5d4271eab86a3d9f5e5624</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>tests/run: Don't redirect stderr by process substitution.</title>
<updated>2019-12-15T02:39:04+00:00</updated>
<author>
<name>Guilhem Moulin</name>
<email>guilhem@fripost.org</email>
</author>
<published>2019-12-15T02:38:59+00:00</published>
<link rel='alternate' type='text/html' href='http://git.guilhem.org/interimap/commit/?id=49d7a90c159b12173ce202fb9b101465b87da96c'/>
<id>49d7a90c159b12173ce202fb9b101465b87da96c</id>
<content type='text'>
This seems to cause timing issues.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This seems to cause timing issues.
</pre>
</div>
</content>
</entry>
</feed>
