Updated EWF network and httpd libraries.

Updated features using ssl_2 and ssl_3 as obsolete and raise a
developer exception.
This commit is contained in:
jvelilla
2017-06-22 10:23:56 -03:00
parent 5c31905427
commit dbf5e76047
4 changed files with 47 additions and 10 deletions

View File

@@ -54,7 +54,20 @@ feature -- Secure connection Helpers
set_tls_protocol (v) set_tls_protocol (v)
end end
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_ssl_2_or_3
-- Set `ssl_protocol' with `Ssl_23'.
-- Protocol not supported anymore.
obsolete
"Use set_secure_protocol_to_tls_1_2 [2017-11-30]."
local
err: DEVELOPER_EXCEPTION
do
create err
err.set_description ("SSL_2 or SSL_3 are not supported anymore, upgrate to TLS set_secure_protocol_to_tls_1_2")
err.raise
end
set_secure_protocol_to_tls_1_0
-- Set `ssl_protocol' with `Tls_1_0'. -- Set `ssl_protocol' with `Tls_1_0'.
do do
set_secure_protocol ({SSL_PROTOCOL}.Tls_1_0) set_secure_protocol ({SSL_PROTOCOL}.Tls_1_0)

View File

@@ -26,7 +26,9 @@ feature -- Factory
create l_secure.make_client_by_port (a_port, a_host) create l_secure.make_client_by_port (a_port, a_host)
Result := l_secure Result := l_secure
if attached secure_protocol as l_prot then if attached secure_protocol as l_prot then
if l_prot.is_case_insensitive_equal ("tls_1_0") then if l_prot.is_case_insensitive_equal ("ssl_2_3") then
l_secure.set_secure_protocol_to_ssl_2_or_3
elseif l_prot.is_case_insensitive_equal ("tls_1_0") then
l_secure.set_secure_protocol_to_tls_1_0 l_secure.set_secure_protocol_to_tls_1_0
elseif l_prot.is_case_insensitive_equal ("tls_1_1") then elseif l_prot.is_case_insensitive_equal ("tls_1_1") then
l_secure.set_secure_protocol_to_tls_1_1 l_secure.set_secure_protocol_to_tls_1_1

View File

@@ -167,7 +167,7 @@ feature -- Element change
end end
set_socket_timeout (a_nb_seconds: like socket_timeout) set_socket_timeout (a_nb_seconds: like socket_timeout)
-- Set `socket_timeout' with `a_nb_seconds' -- Set `socket_timeout' with `a_nb_seconds'.
do do
socket_timeout := a_nb_seconds socket_timeout := a_nb_seconds
ensure ensure
@@ -175,7 +175,7 @@ feature -- Element change
end end
set_socket_recv_timeout (a_nb_seconds: like socket_recv_timeout) set_socket_recv_timeout (a_nb_seconds: like socket_recv_timeout)
-- Set `socket_recv_timeout' with `a_nb_seconds' -- Set `socket_recv_timeout' with `a_nb_seconds'.
do do
socket_recv_timeout := a_nb_seconds socket_recv_timeout := a_nb_seconds
ensure ensure
@@ -183,7 +183,7 @@ feature -- Element change
end end
set_keep_alive_timeout (a_seconds: like keep_alive_timeout) set_keep_alive_timeout (a_seconds: like keep_alive_timeout)
-- Set `keep_alive_timeout' with `a_seconds' -- Set `keep_alive_timeout' with `a_seconds'.
do do
keep_alive_timeout := a_seconds keep_alive_timeout := a_seconds
ensure ensure
@@ -191,7 +191,7 @@ feature -- Element change
end end
set_max_keep_alive_requests (nb: like max_keep_alive_requests) set_max_keep_alive_requests (nb: like max_keep_alive_requests)
-- Set `max_keep_alive_requests' with `nb' -- Set `max_keep_alive_requests' with `nb'.
do do
max_keep_alive_requests := nb max_keep_alive_requests := nb
ensure ensure
@@ -254,7 +254,7 @@ feature -- Element change
end end
mark_secure mark_secure
-- Set is_secure in True -- Set is_secure in True.
do do
set_is_secure (True) set_is_secure (True)
ensure ensure
@@ -287,7 +287,7 @@ feature -- Element change
end end
set_secure_protocol (a_version: NATURAL) set_secure_protocol (a_version: NATURAL)
-- Set `secure_protocol' with `a_version' -- Set `secure_protocol' with `a_version'.
do do
secure_protocol := a_version secure_protocol := a_version
ensure ensure
@@ -295,9 +295,11 @@ feature -- Element change
end end
set_secure_protocol_from_string (a_ssl_version: READABLE_STRING_GENERAL) set_secure_protocol_from_string (a_ssl_version: READABLE_STRING_GENERAL)
-- Set `secure_protocol' with `a_ssl_version' -- Set `secure_protocol' with `a_ssl_version'.
do do
if a_ssl_version.is_case_insensitive_equal ("tls_1_0") then if a_ssl_version.is_case_insensitive_equal ("ssl_2_3") then
set_secure_protocol_to_ssl_2_or_3
elseif a_ssl_version.is_case_insensitive_equal ("tls_1_0") then
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_tls_1_0
elseif a_ssl_version.is_case_insensitive_equal ("tls_1_1") then elseif a_ssl_version.is_case_insensitive_equal ("tls_1_1") then
set_secure_protocol_to_tls_1_1 set_secure_protocol_to_tls_1_1
@@ -312,6 +314,13 @@ feature -- Element change
feature -- SSL Helpers feature -- SSL Helpers
set_secure_protocol_to_ssl_2_or_3
-- Set `secure_protocol' with `Ssl_23'.
obsolete
"Use set_secure_protocol_to_tls_1_0 [2017-11-30]."
deferred
end
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_tls_1_0
-- Set `secure_protocol' with `Tls_1_0'. -- Set `secure_protocol' with `Tls_1_0'.
deferred deferred

View File

@@ -35,6 +35,19 @@ feature -- Access
feature -- SSL Helpers feature -- SSL Helpers
set_secure_protocol_to_ssl_2_or_3
-- Set `ssl_protocol' with `Ssl_23'.
-- Protocol not supported anymore.
obsolete
"Use set_secure_protocol_to_tls_1_2 [2017-11-30]."
local
err: DEVELOPER_EXCEPTION
do
create err
err.set_description ("SSL_2 or SSL_3 are not supported anymore, upgrate to TLS set_secure_protocol_to_tls_1_2")
err.raise
end
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_tls_1_0
-- Set `secure_protocol' with `Tls_1_0'. -- Set `secure_protocol' with `Tls_1_0'.
do do