aboutsummaryrefslogtreecommitdiff
path: root/certificate
diff options
context:
space:
mode:
authorAdnan Maolood <[email protected]>2021-03-04 16:40:16 -0500
committerAdnan Maolood <[email protected]>2021-03-04 16:40:25 -0500
commitde0b93a4f6f5df309816a8cf718c8325a1bb619d (patch)
treeeec8393fe3486970d006aec3817d9fbdaad51999 /certificate
parentcertificate: Remove Subject from CreateOptions (diff)
downloadgo-gemini-de0b93a4f6f5df309816a8cf718c8325a1bb619d.tar.xz
go-gemini-de0b93a4f6f5df309816a8cf718c8325a1bb619d.zip
certificate.Store: Allow using '*' in DNSNames
This isn't exactly a valid DNSName, but it reduces the number of certificates that need to be created. Clients should either accept it or skip checking DNSNames.
Diffstat (limited to 'certificate')
-rw-r--r--certificate/store.go21
1 files changed, 10 insertions, 11 deletions
diff --git a/certificate/store.go b/certificate/store.go
index 536c3f6..ed95561 100644
--- a/certificate/store.go
+++ b/certificate/store.go
@@ -33,10 +33,9 @@ type Store struct {
// The provided scope is suitable for use in a certificate's DNSNames.
CreateCertificate func(scope string) (tls.Certificate, error)
- scopes map[string]struct{}
- certs map[string]tls.Certificate
- path string
- mu sync.RWMutex
+ certs map[string]tls.Certificate
+ path string
+ mu sync.RWMutex
}
// Register registers the provided scope with the certificate store.
@@ -48,10 +47,10 @@ type Store struct {
func (s *Store) Register(scope string) {
s.mu.Lock()
defer s.mu.Unlock()
- if s.scopes == nil {
- s.scopes = make(map[string]struct{})
+ if s.certs == nil {
+ s.certs = make(map[string]tls.Certificate)
}
- s.scopes[scope] = struct{}{}
+ s.certs[scope] = tls.Certificate{}
}
// Add registers the certificate for the given scope.
@@ -105,24 +104,24 @@ func (s *Store) write(scope string, cert tls.Certificate) error {
// Get is suitable for use in a gemini.Server's GetCertificate field.
func (s *Store) Get(hostname string) (*tls.Certificate, error) {
s.mu.RLock()
- _, ok := s.scopes[hostname]
+ cert, ok := s.certs[hostname]
if !ok {
// Try wildcard
wildcard := strings.SplitN(hostname, ".", 2)
if len(wildcard) == 2 {
hostname = "*." + wildcard[1]
- _, ok = s.scopes[hostname]
+ cert, ok = s.certs[hostname]
}
}
if !ok {
// Try "*"
- _, ok = s.scopes["*"]
+ hostname = "*"
+ cert, ok = s.certs[hostname]
}
if !ok {
s.mu.RUnlock()
return nil, errors.New("unrecognized scope")
}
- cert := s.certs[hostname]
s.mu.RUnlock()
// If the certificate is empty or expired, generate a new one.