For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
from __future__ import absolute_import | |
from __future__ import unicode_literals | |
from sslyze.concurrent_scanner import ConcurrentScanner, PluginRaisedExceptionScanResult | |
from sslyze.plugins.utils.certificate_utils import CertificateUtils | |
from sslyze.plugins.certificate_info_plugin import CertificateInfoScanCommand | |
from sslyze.plugins.session_renegotiation_plugin import SessionRenegotiationScanCommand |
For excessively paranoid client authentication.
Organization & Common Name: Some human identifier for this server CA.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
# With SSLyze 1.4.0, the code that performs connectivity testing with a server needs to be slightly changed: | |
# SSLyze before 1.4.0 | |
try: | |
server_info = ServerConnectivityInfo( | |
hostname='smtp.gmail.com', | |
port=587, | |
tls_wrapped_protocol=TlsWrappedProtocolEnum.STARTTLS_SMTP | |
) | |
server_info.test_connectivity_to_server() |
name | download_total | |
---|---|---|
AFNetworking | 61983241 | |
Fabric | 50998892 | |
Crashlytics | 49667729 | |
SDWebImage | 45471101 | |
Alamofire | 42097177 | |
CocoaLumberjack | 36071914 | |
Bolts | 35294870 | |
FirebaseInstanceID | 30277793 | |
FirebaseAnalytics | 30254593 |
import tweepy | |
from datetime import datetime, timedelta | |
consumer_key = '' | |
consumer_secret = '' | |
access_token = '' | |
access_secret = '' | |
auth = tweepy.OAuthHandler(consumer_key, consumer_secret) | |
auth.set_access_token(access_token, access_secret) |
import time | |
from invoke import task, Context | |
CMD_COMPOSE = "docker-compose -f docker-compose.dev.yml" | |
CMD_RUN_APP = f"{CMD_COMPOSE} run --rm app" | |
@task | |
def build(ctx): |