Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fixes updb enrollment, underlying error types changed #383

Merged
merged 2 commits into from
May 4, 2023

Conversation

andrewpmartinez
Copy link
Member

Instead of checking for specific error types, try blindly to ensure success.

Instead of checking for specific error types, try blindly to ensure
success.
@andrewpmartinez andrewpmartinez requested a review from a team as a code owner April 28, 2023 14:31
ziti/enroll/enroll.go Outdated Show resolved Hide resolved
ziti/enroll/enroll.go Outdated Show resolved Hide resolved
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we have any doc that states explicitly you will now need to include the entire chain in the cas store if you're using a third party 'verifiable' CA? Before, it'd use the OS trust store and now it exclusively fetches the certificates every time, which is fine, but we need to make sure people know that they need to add the full chain of trust for this to work now, assuming I'm understanding this change correcctly

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This only changes the error detection. Prior to this, the code checked for specific error types, which have changed with golang upgrades. This change removes the type assertions and looks for any error.

Other than that, I do not believe any behavior has changed.

@andrewpmartinez andrewpmartinez merged commit d00dac5 into main May 4, 2023
2 checks passed
@andrewpmartinez andrewpmartinez deleted the fix.updb.enroll branch May 4, 2023 14:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants