diff options
| author | adnano <[email protected]> | 2020-09-28 02:13:46 -0400 |
|---|---|---|
| committer | adnano <[email protected]> | 2020-09-28 02:13:46 -0400 |
| commit | 5edecf01a255aed0a5f3297bd6c878f5a5ac26f6 (patch) | |
| tree | 6b90e918563f2843a40525cd3adb4b8903ea3f05 | |
| parent | Don't trim trailing slash from Handler patterns (diff) | |
| download | go-gemini-5edecf01a255aed0a5f3297bd6c878f5a5ac26f6.tar.xz go-gemini-5edecf01a255aed0a5f3297bd6c878f5a5ac26f6.zip | |
Update comments
| -rw-r--r-- | cert.go | 9 | ||||
| -rw-r--r-- | server.go | 4 |
2 files changed, 7 insertions, 6 deletions
@@ -98,10 +98,11 @@ func NewRawCertificate(host string, duration time.Duration) (crt, key []byte, er return } -// WriteCertificate writes the provided certificate and private key to name.crt + name.key -func WriteCertificate(name string, crt, key []byte) error { +// WriteCertificate writes the provided certificate and private key +// to path.crt and path.key respectively. +func WriteCertificate(path string, crt, key []byte) error { // Write the certificate - crtPath := name + ".crt" + crtPath := path + ".crt" crtOut, err := os.OpenFile(crtPath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600) if err != nil { return err @@ -111,7 +112,7 @@ func WriteCertificate(name string, crt, key []byte) error { } // Write the private key - keyPath := name + ".key" + keyPath := path + ".key" keyOut, err := os.OpenFile(keyPath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600) if err != nil { return err @@ -311,8 +311,8 @@ func CertificateNotAuthorized(rw *ResponseWriter, req *Request) { rw.WriteHeader(StatusCertificateNotAuthorized, "Certificate not authorized") } -// WithCertificate responds with CertificateRequired if the client did not -// provide a certificate, and calls f with the first ceritificate if they did. +// WithCertificate either responds with CertificateRequired if the client did +// not provide a certificate, or calls f with the first ceritificate provided. func WithCertificate(rw *ResponseWriter, req *Request, f func(*x509.Certificate)) { if len(req.TLS.PeerCertificates) == 0 { CertificateRequired(rw, req) |