Browse Source

Fix: new cert issuing is incorrectly delayed (#998)

* fix new cert issuing is incorrectly delayed

* apply lint

* revert cert duration & write cert issue/revoke info into log

* apply lint

Co-authored-by: Bhoppi Chaw <bhoppi#outlook,com>
Bhoppi Chaw 4 years ago
parent
commit
6d9c463b60
1 changed files with 12 additions and 1 deletions
  1. 12 1
      transport/internet/tls/config.go

+ 12 - 1
transport/internet/tls/config.go

@@ -67,7 +67,7 @@ func isCertificateExpired(c *tls.Certificate) bool {
 	}
 	}
 
 
 	// If leaf is not there, the certificate is probably not used yet. We trust user to provide a valid certificate.
 	// If leaf is not there, the certificate is probably not used yet. We trust user to provide a valid certificate.
-	return c.Leaf != nil && c.Leaf.NotAfter.Before(time.Now().Add(-time.Minute))
+	return c.Leaf != nil && c.Leaf.NotAfter.Before(time.Now().Add(time.Minute*2))
 }
 }
 
 
 func issueCertificate(rawCA *Certificate, domain string) (*tls.Certificate, error) {
 func issueCertificate(rawCA *Certificate, domain string) (*tls.Certificate, error) {
@@ -120,6 +120,9 @@ func getGetCertificateFunc(c *tls.Config, ca []*Certificate) func(hello *tls.Cli
 				cert := certificate
 				cert := certificate
 				if !isCertificateExpired(&cert) {
 				if !isCertificateExpired(&cert) {
 					newCerts = append(newCerts, cert)
 					newCerts = append(newCerts, cert)
+				} else if cert.Leaf != nil {
+					expTime := cert.Leaf.NotAfter.Format(time.RFC3339)
+					newError("old certificate for ", domain, " (expire on ", expTime, ") revoked").AtInfo().WriteToLog()
 				}
 				}
 			}
 			}
 
 
@@ -137,6 +140,14 @@ func getGetCertificateFunc(c *tls.Config, ca []*Certificate) func(hello *tls.Cli
 					newError("failed to issue new certificate for ", domain).Base(err).WriteToLog()
 					newError("failed to issue new certificate for ", domain).Base(err).WriteToLog()
 					continue
 					continue
 				}
 				}
+				parsed, err := x509.ParseCertificate(newCert.Certificate[0])
+				if err == nil {
+					newCert.Leaf = parsed
+					expTime := parsed.NotAfter.Format(time.RFC3339)
+					newError("new certificate for ", domain, " (expire on ", expTime, ") issued").AtInfo().WriteToLog()
+				} else {
+					newError("failed to parse new certificate for ", domain).Base(err).WriteToLog()
+				}
 
 
 				access.Lock()
 				access.Lock()
 				c.Certificates = append(c.Certificates, *newCert)
 				c.Certificates = append(c.Certificates, *newCert)