-
Notifications
You must be signed in to change notification settings - Fork 18k
x/crypto/acme/autocert: revokePending with nil client #25581
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@costela I think this piece of code was yours. Any ideas how I can help debug? |
FYI, if I pass the client from the parameters to verify() through to revokePending rather than using m.Client then everything works. |
revokePending assumes the Client field of the manager has been populated, but this might not be true. Use the client passed to the parent verify() function instead. Fixes golang/go#25581
I opened a PR that fixes it, but I didn't dig into why the assumption that m.Client is populated did not hold up. |
Change https://golang.org/cl/114817 mentions this issue: |
Change https://golang.org/cl/114801 mentions this issue: |
Fixes a bug introduced in golang.org/cl/100078 where incorrect ACME client was used, causing nil pointer dereference. The change also improves related tests, removing code paths diverging in testing. Fixes golang/go#25581 Change-Id: I8c5531fcc5814a5a64f14911c0ad86c476a76d2f Reviewed-on: https://go-review.googlesource.com/114817 Reviewed-by: Filippo Valsorda <filippo@golang.org>
Fixes a bug introduced in golang.org/cl/100078 where incorrect ACME client was used, causing nil pointer dereference. The change also improves related tests, removing code paths diverging in testing. Fixes golang/go#25581 Change-Id: I8c5531fcc5814a5a64f14911c0ad86c476a76d2f Reviewed-on: https://go-review.googlesource.com/114817 Reviewed-by: Filippo Valsorda <filippo@golang.org>
Fixes a bug introduced in golang.org/cl/100078 where incorrect ACME client was used, causing nil pointer dereference. The change also improves related tests, removing code paths diverging in testing. Fixes golang/go#25581 Change-Id: I8c5531fcc5814a5a64f14911c0ad86c476a76d2f Reviewed-on: https://go-review.googlesource.com/114817 Reviewed-by: Filippo Valsorda <filippo@golang.org>
Fixes a bug introduced in golang.org/cl/100078 where incorrect ACME client was used, causing nil pointer dereference. The change also improves related tests, removing code paths diverging in testing. Fixes golang/go#25581 Change-Id: I8c5531fcc5814a5a64f14911c0ad86c476a76d2f Reviewed-on: https://go-review.googlesource.com/114817 Reviewed-by: Filippo Valsorda <filippo@golang.org>
Fixes a bug introduced in golang.org/cl/100078 where incorrect ACME client was used, causing nil pointer dereference. The change also improves related tests, removing code paths diverging in testing. Fixes golang/go#25581 Change-Id: I8c5531fcc5814a5a64f14911c0ad86c476a76d2f Reviewed-on: https://go-review.googlesource.com/114817 Reviewed-by: Filippo Valsorda <filippo@golang.org>
Fixes a bug introduced in golang.org/cl/100078 where incorrect ACME client was used, causing nil pointer dereference. The change also improves related tests, removing code paths diverging in testing. Fixes golang/go#25581 Change-Id: I8c5531fcc5814a5a64f14911c0ad86c476a76d2f Reviewed-on: https://go-review.googlesource.com/114817 Reviewed-by: Filippo Valsorda <filippo@golang.org>
What version of Go are you using (
go version
)?1.10.1
x/crypto commit: 159ae71
Does this issue reproduce with the latest release?
This is one commit away from master, nothing relevant looks changed
What operating system and processor architecture are you using (
go env
)?amd64 linux
What did you do?
I have a web service that uses autocert. It was old code that used to work but stopped working since the whole TLS-SNI-deprecation thing, so I had a few runs where I tried to create a certificate for a new domain and it failed. I modified the code to tie in HTTPHandler so that the HTTP-01 challenge would work and re-ran it.
The code is basically:
It crashes with the following when I access it over https
What did you expect to see?
I expected a certificate to get issued and life to be easy.
What did you see instead?
The above panic.
If I made some mistake I would also expect a normal error, not a nil pointer deep inside autocert. My usage is so simple though, so I don't think this is my fault.
The text was updated successfully, but these errors were encountered: