-
Notifications
You must be signed in to change notification settings - Fork 236
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Certificate Chain when using ListenAndServeTLS #4
Comments
I got around this by adding |
yep, thanks zowens. we had been adding certificates separately to the certificate store manually ( sadbox: okay to close the ticket or is there something else you'd like us to do? |
I could take a look at making something to detect whether it's a chain or not, just depends on what @jtolds would like. In the mean time I'll just manually add the chain. |
It would be nice to have something nicer for people used to the Go lib behavior. If that's something you'd like to do I'd be happy to pull it in. |
I might be willing to do this. What if Based on the basic PEM "spec" found here, my proposed solution would be to split the PEM into its sections using a multiline regex like this: |
go's standard library actually already has a PEM parser which seems fine to use (http://golang.org/pkg/encoding/pem/), but that sounds good to me lunixbochs |
I do like the idea of using Go's internal one, but the next step feels a little weird. I guess we could use the internal DER format they generate, or re-marshal the individual certs as PEM? I think it's adding an abstraction + place to fail, and I don't know where |
yeah i think the DER format isn't internal or go-specific here, it should just be something openssl can understand as-is, though the openssl der operations are super undocumented cause openssl docs suck. we use a few of them in a few places, i think they're the i2d and d2i type operations? |
This should be fixed by #21, though someone should test it. |
Closing due to inactivity. |
pass build flags on Solaris/Illumos
When I use a certificate chain in ListenAndServeTLS it doesn't seem to serve up any more than the first certificate. This works properly using the stdlib's ListenAndServeTLS.
The text was updated successfully, but these errors were encountered: