Skip to content

Conversation

@agunnerson-elastic
Copy link
Contributor

This allows specifying which CA authorities are allowed to issue certificates for subdomains or disallow issuing certificates entirely. This is disabled by default and is intended for situations where having valid TLS certificates is not necessary and it's not desirable to have a malicious IP (eg. phishing site) potentially appear more legitimate due to the valid certificate.

This commit includes a couple minor fixes:

  • _get_env_splitted() now calls split(..., 1) instead of split(..., 2), which actually produces up to 3 parts.
  • The individual _write("END") calls in various qtype handlers were replaced by a single write_end() call at the end of run()'s loop.

This allows specifying which CA authorities are allowed to issue
certificates for subdomains or disallow issuing certificates entirely.
This is disabled by default and is intended for situations where having
valid TLS certificates is not necessary and it's not desirable to have a
malicious IP (eg. phishing site) potentially appear more legitimate due
to the valid certificate.

This commit includes a couple minor fixes:

- _get_env_splitted() now calls split(..., 1) instead of split(..., 2),
  which actually produces up to 3 parts.
- The individual _write("END") calls in various qtype handlers were
  replaced by a single write_end() call at the end of run()'s loop.
@agunnerson-elastic
Copy link
Contributor Author

Thanks for reviewing the PR! I saw you committed a few fixes in master for the CI, so I've rebased the branch to pick those changes up.

@vanillajonathan vanillajonathan merged commit c892748 into exentriquesolutions:master Jun 4, 2025
0 of 5 checks passed
@vanillajonathan
Copy link
Collaborator

Thank you for your contribution!

@agunnerson-elastic agunnerson-elastic deleted the caa branch June 4, 2025 13:29
abbierwolf pushed a commit to abbierwolf/nip.io that referenced this pull request Aug 15, 2025
This allows specifying which CA authorities are allowed to issue
certificates for subdomains or disallow issuing certificates entirely.
This is disabled by default and is intended for situations where having
valid TLS certificates is not necessary and it's not desirable to have a
malicious IP (eg. phishing site) potentially appear more legitimate due
to the valid certificate.

This commit includes a couple minor fixes:

- _get_env_splitted() now calls split(..., 1) instead of split(..., 2),
  which actually produces up to 3 parts.
- The individual _write("END") calls in various qtype handlers were
  replaced by a single write_end() call at the end of run()'s loop.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants