mirror of
https://github.com/pomerium/pomerium.git
synced 2025-07-19 17:50:17 +02:00
cryptutil: update CRL parsing
Move the parseCRLs() method from package 'authorize/evaluator' to 'pkg/cryptutil', replacing the existing DecodeCRL() method. This method will parse all CRLs found in the PEM input, rather than just the first. This removes our usage of the deprecated method x509.ParseDERCRL(). Update this method to return an error if there is non-PEM data found in the input, to satisfy the existing test that raw DER-encoded CRLs are not permitted. Delete the CRLFromBase64() and CRLFromFile() methods, as these are no longer used.
This commit is contained in:
parent
50e6cf7466
commit
2601debb22
6 changed files with 29 additions and 91 deletions
|
@ -127,7 +127,7 @@ func TestDownstreamMTLSSettingsValidate(t *testing.T) {
|
|||
{"bad CA file", DownstreamMTLSSettings{CAFile: "-"},
|
||||
"CA file: open -: no such file or directory"},
|
||||
{"bad CRL", DownstreamMTLSSettings{CRL: "dGhpc2lzZmluZQo="},
|
||||
"CRL: cryptutil: invalid crl, no X509 CRL block found"},
|
||||
"CRL: cryptutil: non-PEM data in CRL bundle"},
|
||||
{"bad CRL file", DownstreamMTLSSettings{CRLFile: "-"},
|
||||
"CRL file: open -: no such file or directory"},
|
||||
{"bad enforcement mode", DownstreamMTLSSettings{Enforcement: "whatever"},
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue