Can you explain a bit more on what you're looking for in terms of a test plan?
As the SRU states, it's been in upstream for nearly a year, and backported to Debian and RHEL (EPEL) already as well (for something like 6 months). Therefore it's received widespread real-world testing.
I've also manually verified that without this patch, CSRs generated by the package raise an exception on parsing with pyca/cryptography 40, but with the patch they are parsed successfully. pyca/cryptography enforces validity of CSR version.
Hi Steve,
Can you explain a bit more on what you're looking for in terms of a test plan?
As the SRU states, it's been in upstream for nearly a year, and backported to Debian and RHEL (EPEL) already as well (for something like 6 months). Therefore it's received widespread real-world testing.
I've also manually verified that without this patch, CSRs generated by the package raise an exception on parsing with pyca/cryptography 40, but with the patch they are parsed successfully. pyca/cryptography enforces validity of CSR version.