Blame SOURCES/golang-1.15-warnCN.patch

66c09a
diff --git a/src/crypto/x509/verify.go b/src/crypto/x509/verify.go
66c09a
index 50f4d4a..121fd1b 100644
66c09a
--- a/src/crypto/x509/verify.go
66c09a
+++ b/src/crypto/x509/verify.go
66c09a
@@ -20,6 +20,9 @@ import (
66c09a
 
66c09a
 // ignoreCN disables interpreting Common Name as a hostname. See issue 24151.
66c09a
 var ignoreCN = !strings.Contains(os.Getenv("GODEBUG"), "x509ignoreCN=0")
66c09a
+// if using Common Name as a hostname is enabled via x509ignoreCN=0,
66c09a
+// warnCN enables a warning whenever Common Name is interpreted as a hostname.
66c09a
+var warnCN = strings.Contains(os.Getenv("GODEBUG"), "x509warnCN=1")
66c09a
 
66c09a
 type InvalidReason int
66c09a
 
66c09a
@@ -1078,6 +1081,10 @@ func (c *Certificate) VerifyHostname(h string) error {
66c09a
 	names := c.DNSNames
66c09a
 	if c.commonNameAsHostname() {
66c09a
 		names = []string{c.Subject.CommonName}
66c09a
+		if warnCN {
66c09a
+			fmt.Fprintf(os.Stderr, "x509: Warning - certificate relies on legacy Common Name field. " +
66c09a
+				"Using CN without SAN is deprecated and will not work in future versions.\n")
66c09a
+		}
66c09a
 	}
66c09a
 
66c09a
 	candidateName := toLowerCaseASCII(h) // Save allocations inside the loop.