delete ca.RevokeCertificate
Also, delete the unused core.CertificateAuthorityDatabase while we're here. Fixes #1319
This commit is contained in:
parent
42e984b5ae
commit
f6473efcc2
|
|
@ -218,12 +218,6 @@ func (ca *CertificateAuthorityImpl) GenerateOCSP(xferObj core.OCSPSigningRequest
|
|||
return ocspResponse, err
|
||||
}
|
||||
|
||||
// RevokeCertificate revokes the trust of the Cert referred to by the provided Serial.
|
||||
func (ca *CertificateAuthorityImpl) RevokeCertificate(serial string, reasonCode core.RevocationCode) (err error) {
|
||||
err = ca.SA.MarkCertificateRevoked(serial, reasonCode)
|
||||
return err
|
||||
}
|
||||
|
||||
// IssueCertificate attempts to convert a CSR into a signed Certificate, while
|
||||
// enforcing all policies. Names (domains) in the CertificateRequest will be
|
||||
// lowercased before storage.
|
||||
|
|
|
|||
|
|
@ -29,10 +29,6 @@ func (ca *mockCA) GenerateOCSP(xferObj core.OCSPSigningRequest) (ocsp []byte, er
|
|||
return
|
||||
}
|
||||
|
||||
func (ca *mockCA) RevokeCertificate(serial string, reasonCode core.RevocationCode) (err error) {
|
||||
return
|
||||
}
|
||||
|
||||
type mockPub struct {
|
||||
sa core.StorageAuthority
|
||||
}
|
||||
|
|
|
|||
|
|
@ -12,7 +12,6 @@ import (
|
|||
"time"
|
||||
|
||||
jose "github.com/letsencrypt/boulder/Godeps/_workspace/src/github.com/letsencrypt/go-jose"
|
||||
gorp "github.com/letsencrypt/boulder/Godeps/_workspace/src/gopkg.in/gorp.v1"
|
||||
)
|
||||
|
||||
// A WebFrontEnd object supplies methods that can be hooked into
|
||||
|
|
@ -83,7 +82,6 @@ type RegistrationAuthority interface {
|
|||
type CertificateAuthority interface {
|
||||
// [RegistrationAuthority]
|
||||
IssueCertificate(x509.CertificateRequest, int64) (Certificate, error)
|
||||
RevokeCertificate(string, RevocationCode) error
|
||||
GenerateOCSP(OCSPSigningRequest) ([]byte, error)
|
||||
}
|
||||
|
||||
|
|
@ -133,12 +131,6 @@ type StorageAuthority interface {
|
|||
StorageAdder
|
||||
}
|
||||
|
||||
// CertificateAuthorityDatabase represents an atomic sequence source
|
||||
type CertificateAuthorityDatabase interface {
|
||||
IncrementAndGetSerial(*gorp.Transaction) (int64, error)
|
||||
Begin() (*gorp.Transaction, error)
|
||||
}
|
||||
|
||||
// Publisher defines the public interface for the Boulder Publisher
|
||||
type Publisher interface {
|
||||
SubmitToCT([]byte) error
|
||||
|
|
|
|||
|
|
@ -42,7 +42,6 @@ const (
|
|||
MethodNewCertificate = "NewCertificate" // RA
|
||||
MethodUpdateRegistration = "UpdateRegistration" // RA, SA
|
||||
MethodUpdateAuthorization = "UpdateAuthorization" // RA
|
||||
MethodRevokeCertificate = "RevokeCertificate" // CA
|
||||
MethodRevokeCertificateWithReg = "RevokeCertificateWithReg" // RA
|
||||
MethodAdministrativelyRevokeCertificate = "AdministrativelyRevokeCertificate" // RA
|
||||
MethodOnValidationUpdate = "OnValidationUpdate" // RA
|
||||
|
|
@ -704,19 +703,6 @@ func NewCertificateAuthorityServer(rpc Server, impl core.CertificateAuthority) (
|
|||
return
|
||||
})
|
||||
|
||||
rpc.Handle(MethodRevokeCertificate, func(req []byte) (response []byte, err error) {
|
||||
var revokeReq revokeCertificateRequest
|
||||
err = json.Unmarshal(req, &revokeReq)
|
||||
if err != nil {
|
||||
// AUDIT[ Error Conditions ] 9cc4d537-8534-4970-8665-4b382abe82f3
|
||||
errorCondition(MethodRevokeCertificate, err, req)
|
||||
return
|
||||
}
|
||||
|
||||
err = impl.RevokeCertificate(revokeReq.Serial, revokeReq.ReasonCode)
|
||||
return
|
||||
})
|
||||
|
||||
rpc.Handle(MethodGenerateOCSP, func(req []byte) (response []byte, err error) {
|
||||
var xferObj core.OCSPSigningRequest
|
||||
err = json.Unmarshal(req, &xferObj)
|
||||
|
|
@ -767,23 +753,6 @@ func (cac CertificateAuthorityClient) IssueCertificate(csr x509.CertificateReque
|
|||
return
|
||||
}
|
||||
|
||||
// RevokeCertificate sends a request to revoke a certificate
|
||||
func (cac CertificateAuthorityClient) RevokeCertificate(serial string, reasonCode core.RevocationCode) (err error) {
|
||||
var revokeReq revokeCertificateRequest
|
||||
revokeReq.Serial = serial
|
||||
revokeReq.ReasonCode = reasonCode
|
||||
|
||||
data, err := json.Marshal(revokeReq)
|
||||
if err != nil {
|
||||
// AUDIT[ Error Conditions ] 9cc4d537-8534-4970-8665-4b382abe82f3
|
||||
errorCondition(MethodRevokeCertificate, err, revokeReq)
|
||||
return
|
||||
}
|
||||
|
||||
_, err = cac.rpc.DispatchSync(MethodRevokeCertificate, data)
|
||||
return
|
||||
}
|
||||
|
||||
// GenerateOCSP sends a request to generate an OCSP response
|
||||
func (cac CertificateAuthorityClient) GenerateOCSP(signRequest core.OCSPSigningRequest) (resp []byte, err error) {
|
||||
data, err := json.Marshal(signRequest)
|
||||
|
|
|
|||
Loading…
Reference in New Issue