diff options
author | konstantin-b <konstantin-b@yandex-team.ru> | 2022-02-10 16:50:44 +0300 |
---|---|---|
committer | Daniil Cherednik <dcherednik@yandex-team.ru> | 2022-02-10 16:50:44 +0300 |
commit | 8051c146c2522c597bb0743cb37c8cc8612895dc (patch) | |
tree | 5d5cb817648f650d76cf1076100726fd9b8448e8 | |
parent | dec33fe4a0192d8918e7d310decc1e556d6acb3a (diff) | |
download | ydb-8051c146c2522c597bb0743cb37c8cc8612895dc.tar.gz |
Restoring authorship annotation for <konstantin-b@yandex-team.ru>. Commit 2 of 2.
-rw-r--r-- | build/rules/go/vendor.policy | 10 | ||||
-rw-r--r-- | library/cpp/actors/interconnect/interconnect_stream.cpp | 26 |
2 files changed, 18 insertions, 18 deletions
diff --git a/build/rules/go/vendor.policy b/build/rules/go/vendor.policy index 3655542d53..3e9c0acada 100644 --- a/build/rules/go/vendor.policy +++ b/build/rules/go/vendor.policy @@ -23,11 +23,11 @@ ALLOW .* -> vendor/github.com/openconfig/gnmi ALLOW .* -> vendor/k8s.io/client-go/discovery ALLOW .* -> vendor/k8s.io/client-go/discovery/fake ALLOW .* -> vendor/k8s.io/client-go/kubernetes -ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client -ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/azure -ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/exec -ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/gcp -ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/oidc +ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client +ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/azure +ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/exec +ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/gcp +ALLOW .* -> vendor/k8s.io/client-go/plugin/pkg/client/auth/oidc ALLOW .* -> vendor/k8s.io/client-go/rest ALLOW .* -> vendor/k8s.io/client-go/testing ALLOW .* -> vendor/k8s.io/client-go/tools/auth diff --git a/library/cpp/actors/interconnect/interconnect_stream.cpp b/library/cpp/actors/interconnect/interconnect_stream.cpp index 843f78c162..158ebc9e1d 100644 --- a/library/cpp/actors/interconnect/interconnect_stream.cpp +++ b/library/cpp/actors/interconnect/interconnect_stream.cpp @@ -287,23 +287,23 @@ namespace NInterconnect { if (certificate) { std::unique_ptr<BIO, TDeleter> bio(BIO_new_mem_buf(certificate.data(), certificate.size())); Y_VERIFY(bio); - - // first certificate in the chain is expected to be a leaf + + // first certificate in the chain is expected to be a leaf std::unique_ptr<X509, TDeleter> cert(PEM_read_bio_X509(bio.get(), nullptr, nullptr, nullptr)); Y_VERIFY(cert, "failed to parse certificate"); ret = SSL_CTX_use_certificate(Ctx.get(), cert.get()); Y_VERIFY(ret == 1); - - // loading additional certificates in the chain, if any - while(true) { - X509 *ca = PEM_read_bio_X509(bio.get(), nullptr, nullptr, nullptr); - if (ca == nullptr) { - break; - } - ret = SSL_CTX_add0_chain_cert(Ctx.get(), ca); - Y_VERIFY(ret == 1); - // we must not free memory if certificate was added successfully by SSL_CTX_add0_chain_cert - } + + // loading additional certificates in the chain, if any + while(true) { + X509 *ca = PEM_read_bio_X509(bio.get(), nullptr, nullptr, nullptr); + if (ca == nullptr) { + break; + } + ret = SSL_CTX_add0_chain_cert(Ctx.get(), ca); + Y_VERIFY(ret == 1); + // we must not free memory if certificate was added successfully by SSL_CTX_add0_chain_cert + } } if (privateKey) { std::unique_ptr<BIO, TDeleter> bio(BIO_new_mem_buf(privateKey.data(), privateKey.size())); |