55 "encoding/base64"
66 b64 "encoding/base64"
77 "encoding/json"
8- "encoding/pem"
98 "fmt"
109 "io"
1110 "net/http"
@@ -117,8 +116,7 @@ func (b *keyfactorBackend) pathFetchCert(ctx context.Context, req *logical.Reque
117116 var serial , contentType string
118117 var certEntry , revokedEntry * logical.StorageEntry
119118 var funcErr error
120- var certificate []byte
121- var block pem.Block
119+ var certificate string
122120 var revocationTime int64
123121 response = & logical.Response {
124122 Data : map [string ]interface {}{},
@@ -131,7 +129,6 @@ func (b *keyfactorBackend) pathFetchCert(ctx context.Context, req *logical.Reque
131129 b .Logger ().Debug ("fetching cert, path = " + req .Path )
132130
133131 serial = data .Get ("serial" ).(string )
134- pemType := "CERTIFICATE"
135132
136133 if len (serial ) == 0 {
137134 response = logical .ErrorResponse ("The serial number must be provided" )
@@ -156,13 +153,9 @@ func (b *keyfactorBackend) pathFetchCert(ctx context.Context, req *logical.Reque
156153 goto reply
157154 }
158155
159- block = pem.Block {
160- Type : pemType ,
161- Bytes : certEntry .Value ,
162- }
163-
164- certificate = []byte (strings .TrimSpace (string (pem .EncodeToMemory (& block ))))
156+ b .Logger ().Debug ("fetched certEntry.Value = " , certEntry .Value )
165157
158+ certificate = string (certEntry .Value )
166159 revokedEntry , funcErr = fetchCertBySerial (ctx , req , "revoked/" , serial )
167160 if funcErr != nil {
168161 switch funcErr .(type ) {
@@ -509,19 +502,6 @@ func revokeCert(ctx context.Context, b *keyfactorBackend, req *logical.Request,
509502 }
510503 b .Logger ().Info ("certEntry key = " + certEntry .Key )
511504 b .Logger ().Info ("certEntry value = " + string (certEntry .Value ))
512- // cert, err := x509.ParseCertificate(certEntry.Value)
513- // if err != nil {
514- // return nil, errwrap.Wrapf("error parsing certificate: {{err}}", err)
515- // }
516- // if cert == nil {
517- // return nil, fmt.Errorf("got a nil certificate")
518- // }
519-
520- // Add a little wiggle room because leases are stored with a second
521- // granularity
522- // if cert.NotAfter.Before(time.Now().Add(2 * time.Second)) {
523- // return nil, nil
524- // }
525505
526506 currTime := time .Now ()
527507 revInfo .CertificateBytes = certEntry .Value
@@ -540,14 +520,6 @@ func revokeCert(ctx context.Context, b *keyfactorBackend, req *logical.Request,
540520
541521 }
542522
543- // crlErr := buildCRL(ctx, b, req, false)
544- // switch crlErr.(type) {
545- // case errutil.UserError:
546- // return logical.ErrorResponse(fmt.Sprintf("Error during CRL building: %s", crlErr)), nil
547- // case errutil.InternalError:
548- // return nil, errwrap.Wrapf("error encountered during CRL building: {{err}}", crlErr)
549- // }
550-
551523 resp := & logical.Response {
552524 Data : map [string ]interface {}{
553525 "revocation_time" : revInfo .RevocationTime ,
0 commit comments