Certificate that doesn't go through the chain is not fatal, just send the warning over json.

This commit is contained in:
Eugene Bujak 2019-02-12 21:14:23 +03:00 committed by Eugene Bujak
parent 30050bf278
commit 57a33654f7
2 changed files with 3 additions and 2 deletions

View File

@ -74,6 +74,7 @@ type tlsConfig struct {
StatusCertificate string `yaml:"status_cert" json:"status_cert,omitempty"`
StatusKey string `yaml:"status_key" json:"status_key,omitempty"`
Warning string `yaml:"warning" json:"warning,omitempty"`
WarningValidation string `yaml:"warning_validation" json:"warning_validation,omitempty"`
}
// initialize to default values, will be changed later when reading config or parsing command line

View File

@ -1147,8 +1147,8 @@ func validateCertificates(data tlsConfig) (tlsConfig, error) {
mainCert := parsedCerts[0]
_, err := mainCert.Verify(opts)
if err != nil {
// TODO: let self-signed certs through
return data, errorx.Decorate(err, "Your certificate does not verify")
// let self-signed certs through
data.WarningValidation = fmt.Sprintf("Your certificate does not verify: %s", err)
}
// spew.Dump(chains)