Check-in [7241c0986c]
Overview
Comment:Updated root CA certificate, the previous one expired, and made errors about this more informative
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1:7241c0986cedff4f020022f3c9170bc4dd588342
User & Date: rkeene on 2019-12-13 00:11:33
Other Links: manifest | tags
References
2020-05-12
15:08
Commit [7241c0986c] broke writing because error messages were checked, fix the check and fix writing check-in: b5b196f3f3 user: rkeene tags: trunk
Context
2019-12-13
00:33
Cleaned up code in preparation for Windows build check-in: fdf89fd103 user: rkeene tags: trunk
00:11
Updated root CA certificate, the previous one expired, and made errors about this more informative check-in: 7241c0986c user: rkeene tags: trunk
00:10
Updated to support tagging a package as beta when doing CPIO check-in: ecf92091f8 user: rkeene tags: trunk
Changes

Modified appfsd.tcl from [ced6c30241] to [15b349e52e].

   275    275   
   276    276   		set ::appfs::init_called 1
   277    277   
   278    278   		# Add a default CA to list of trusted CAs
   279    279   		lappend ::appfs::trusted_cas [::pki::x509::parse_cert {
   280    280   -----BEGIN CERTIFICATE-----
   281    281   MIIC7DCCAdSgAwIBAgIBATANBgkqhkiG9w0BAQUFADAvMRIwEAYDVQQKEwlSb3kg
   282         -S2VlbmUxGTAXBgNVBAMTEEFwcEZTIEtleSBNYXN0ZXIwHhcNMTQxMTE3MjAxNzI4
   283         -WhcNMTkxMTE3MjAxNzI4WjAvMRIwEAYDVQQKEwlSb3kgS2VlbmUxGTAXBgNVBAMT
          282  +S2VlbmUxGTAXBgNVBAMTEEFwcEZTIEtleSBNYXN0ZXIwHhcNMTkxMjEyMjM1OTIz
          283  +WhcNMzQxMjEyMjM1OTIzWjAvMRIwEAYDVQQKEwlSb3kgS2VlbmUxGTAXBgNVBAMT
   284    284   EEFwcEZTIEtleSBNYXN0ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
   285    285   AQCq6uSK46yG5b6RJWwRlvw5glAnjsc1GiX3duXA0vG4qnKUnDtl/jcMmq2GMOB9
   286    286   Iy1tjabEHA0MhW2j7Vwe/O9MLFJkJ30M1PVD7YZRRNaAsz3UWIKEjPI7BBc32KOm
   287    287   BL3CTXCCdzllL1HhVbnM5iCAmgHcg1DUk/EvWXvnEDxXRy2lV9mQsmDedrffY7Wl
   288    288   Or57nlczaMuPLpyRSkv75PAnjQJxT3sWlBpy+/H9ImudQdpJNf/FtxcqN7iDwH5B
   289    289   vIceYEtDVxFsvo5HOVkSl9jeo5E4Gpe3wyfRhoqB2UkaW1Kq0iH5R+00S760xQMx
   290    290   LL9L1duhu1dL7HsmEw7IeYURAgMBAAGjEzARMA8GA1UdEwEB/wQFMAMBAf8wDQYJ
   291         -KoZIhvcNAQEFBQADggEBAKhO4ZSzYP37BqixNHKK9+gSeC6Fga85iLWhwpPW0kSl
   292         -z03hal80KZ+kPMzb8C52N283tQNAqJ9Q8akDPZxSzzMUVOGpGw2pJ7ZswKDz0ZTa
   293         -0edq/gdT/HrdegvNtDPc2jona5FVOYqwdcz5kbl1UWBaBp3VXUgcYjXSRaBK43Wd
   294         -cveiDUeZw7gHqRSN/AyYUCtJzWmvGsJuIFhMBonuz8jylhyMJCYJFT4iMUC8MNIw
   295         -niX1xx+Nu6fPV5ZZHj9rbhiBaLjm+tkDwtPgA3j2pxvHKYptuWxeYO+9DDNa9sCb
   296         -E5AnJIlOnd/tGe0Chf0sFQg+l9nNiNrWGgzdd9ZPJK4=
          291  +KoZIhvcNAQEFBQADggEBAIQW2OHDS9rIZUqaFdRqthqhYxESi9Yz9SO1LHWJ6WyS
          292  +edqkMIWnXaC2Gq8JTCLcIwK4VRvDqwuHz2TQj9cqbQ+FrnxtSM3kVXrsfehD4cqz
          293  +pMNKfoi+XaPefB9YbSBbcI4IvOPbPHtZz9++pW5vUwKjp3BiA1xNL9x9SnoehMEd
          294  +BQM75CMQckwmnlII1yhStRDCcgIaMpv7L6vutmvdvN0QMJKnX/5papLrdiHu1Nt7
          295  +bSf8agpRgIQKKSyuwFjp3zT8oeAzEzL4HdOBCveQ5EamCqvV6EDIuIR7b+4ZnYoL
          296  +3qh0YRO/9jrtb786iqWGexZ1JBjiSMhYA1CcvJtR/vQ=
   297    297   -----END CERTIFICATE-----
   298    298   }]
   299    299   
   300    300   		# Load configuration file
   301    301   		set config_file [file join $::appfs::cachedir config]
   302    302   		if {[file exists $config_file]} {
   303    303   			source $config_file
................................................................................
   734    734   		return -code error "Invalid or unacceptable path: $dir"
   735    735   	}
   736    736   
   737    737   	proc getattr {path} {
   738    738   		array set pathinfo [_parsepath $path]
   739    739   		array set retval [list]
   740    740   
   741         -		catch {
          741  +		set fetchIndexError "no fetch error"
          742  +		if {[catch {
   742    743   			::appfs::getindex $pathinfo(hostname)
   743    744   			::appfs::getpkgmanifest $pathinfo(hostname) $pathinfo(package_sha1)
          745  +		} fetchIndexErrorRaw]} {
          746  +			set fetchIndexError $fetchIndexErrorRaw
   744    747   		}
   745    748   
   746    749   		set retval(path_type) $pathinfo(_type)
   747    750   
   748    751   		switch -- $pathinfo(_type) {
   749    752   			"toplevel" {
   750    753   				set retval(type) directory
................................................................................
   894    897   					}
   895    898   				}
   896    899   
   897    900   			}
   898    901   		}
   899    902   
   900    903   		if {![info exists retval(type)]} {
   901         -			return -code error "No such file or directory"
          904  +			return -code error "No such file or directory ($fetchIndexError)"
   902    905   		}
   903    906   
   904    907   		return [array get retval]
   905    908   	}
   906    909   
   907    910   	proc openpath {path mode} {
   908    911   		array set pathinfo [_parsepath $path]