Conversation
Signed-off-by: Henry Avetisyan <hga@yahooinc.com>
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request restores test cases that were temporarily removed due to a breaking change in Go's X.509 certificate parsing. The Go team has since addressed the issue, making these test cases relevant again. The changes primarily involve re-introducing test cases with certificates containing invalid email addresses to ensure continued compatibility. Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request re-introduces test cases for X.509 certificates with invalid email addresses, following a relaxation of validation rules in a dependency. The changes correctly add a test case to TestExtractInstanceIdValid to verify that instance ID extraction remains functional, and another to TestExtractServicePrincipalInValid to ensure principal extraction fails as expected for role certificates with invalid emails. The additions are logical and enhance test coverage appropriately.
Signed-off-by: Henry Avetisyan <hga@yahooinc.com>
Description
after golang developers introduced the strict domain checks in the 1.25.2 release, it caused way too production incidents so they actually rolled back that change and implemented a different one.
From the 1.25.3 release:
This release addresses breakage caused by a security patch included in Go 1.25.2
and 1.24.8, which enforced overly restrictive validation on the parsing of X.509
certificates. We've removed those restrictions while maintaining the security
fix that the initial release addressed.
We apologize for any issues this may have caused.
So we're adding back our test cases with certs with invalid email address
Contribution Checklist:
Attach Screenshots (Optional)