-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
automate update of certifi #30
Comments
That's really just up to the TravisCI owner: https://docs.travis-ci.com/user/cron-jobs/ I don't know a good solution but I'm very interested in something that's automatic! (while safe). |
i think it should be feasible to create a release directly sent to hex.pm one tagged. I will have a look |
looking at #32 i wonder if we could not have some kind of warning system included in certifi instead of rebuilding it:
Thoughts? |
I think a @daily build of master that cuts a minor release if there's a non-empty git diff (so no user interaction) would be best. |
Two things to consider in the scope of this Issue: a. automatic updates via This Issue requires a refresh 😄 |
Regarding 2., which now seems closer to the complete objective (getting rid of Travis CI), how does this affect 1.? Do we still want
|
Is this still an issue? I see the repo is now using github actions but doesn't have an action for a daily check of certs to make an update. My suggestion would be an action that runs daily and opens a PR with the update. That would then notify the maintainers of changes, allowing them to cut a release to hex after merging, while not being an automatic publish to hex that could go wrong :) |
Thanks for the suggestion but I don't want any automatic build using github actions or anything requiring an external service not in my control or better user control. I have developed some new service that will be soon available to handle such updates and do it directly from any release system and notify the user. It's already deployed for customers, i will open it ASAP. Then maybe there will be a way to use github actions to do it though I am focusing in ensuring users doesn't depend on any external dependency for their build and updates. |
Cool. But I would argue it isn't really an external service since it is the same service hosting the code and running the CI already :). And it is just a daily job to diff and open a PR if necessary, sounds like overkill to require an actual external service with full control for that. Using this method is also what I found |
@tsloughter, as of late Sep'21, https://github.com/g-andrade/tls_certificate_check/pulls?q=is%3Apr+is%3Aclosed is doing what I believe is what you're suggesting. Maybe |
Yea, looks like it. |
Right. We can do that indeed. There are not that many updates (unless you're trying to do weird stuff in incorporating the certificates) so that should work. By itself I think it should also be interresting to not rely totally on mkcert.org but that a second step. I will work on a change during the week unless someone take care of it first. |
If an action can be triggerred by a webhook then maybe we can pass also some information to validate automatically that the bundle signature is OK during tests and then automatically trigger a release. There is no need for an intermediate action to merge a PR since I already have an automatic way to be notified when the bundle is updated. I will look if we can do that way. |
We're currently encountering a show-stopper as letsencrypt root CA expired as of 30-09-2021 and it is impossible to make HTTPS requests to sites signed with acme's generated letsencrypt certificates. An update of this library is very important! |
@neuromantik33 what version your library is using? also please open a separate issue for it please. Current cert bundle include "ISGR Root X1" so it should pass.
|
we should automate the update of certifi to make sure we are using the last updates from Mozilla.
cc @fenollp
The text was updated successfully, but these errors were encountered: