Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mco choria security provider eats exceptions #25

Open
vjanelle opened this issue Mar 5, 2019 · 0 comments
Open

mco choria security provider eats exceptions #25

vjanelle opened this issue Mar 5, 2019 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@vjanelle
Copy link
Member

vjanelle commented Mar 5, 2019

The validate routines in the choria TLS handling can eat the exception when openssl fails validation - it should capture the original message.

This is around the validate name / ca validation utilities - particularly if the name / identity doesn't match the CN/a SAN, mco will complain that the certificate "wasn't signed by the CA", which was false.

@ripienaar ripienaar added the enhancement New feature or request label Mar 5, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants