Skip to content

Commit 3a03e86

Browse files
authored
Standardize all proto import names (letsencrypt#4970)
We previously used mixed case names for proto imports (e.g. both `caPB` and `rapb`), sometimes in the same file. This change standardizes on the all-lowercase spelling, which was predominant throughout the codebase.
1 parent 7876120 commit 3a03e86

File tree

14 files changed

+89
-89
lines changed

14 files changed

+89
-89
lines changed

ca/ca.go

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import (
3232
"golang.org/x/crypto/ocsp"
3333

3434
ca_config "github.com/letsencrypt/boulder/ca/config"
35-
caPB "github.com/letsencrypt/boulder/ca/proto"
35+
capb "github.com/letsencrypt/boulder/ca/proto"
3636
"github.com/letsencrypt/boulder/core"
3737
corepb "github.com/letsencrypt/boulder/core/proto"
3838
csrlib "github.com/letsencrypt/boulder/csr"
@@ -429,7 +429,7 @@ var ocspStatusToCode = map[string]int{
429429
}
430430

431431
// GenerateOCSP produces a new OCSP response and returns it
432-
func (ca *CertificateAuthorityImpl) GenerateOCSP(ctx context.Context, req *caPB.GenerateOCSPRequest) (*caPB.OCSPResponse, error) {
432+
func (ca *CertificateAuthorityImpl) GenerateOCSP(ctx context.Context, req *capb.GenerateOCSPRequest) (*capb.OCSPResponse, error) {
433433
var issuer *internalIssuer
434434
var serial *big.Int
435435
// Once the feature is enabled we need to support both RPCs that include
@@ -486,10 +486,10 @@ func (ca *CertificateAuthorityImpl) GenerateOCSP(ctx context.Context, req *caPB.
486486
if err == nil {
487487
ca.signatureCount.With(prometheus.Labels{"purpose": "ocsp"}).Inc()
488488
}
489-
return &caPB.OCSPResponse{Response: ocspResponse}, err
489+
return &capb.OCSPResponse{Response: ocspResponse}, err
490490
}
491491

492-
func (ca *CertificateAuthorityImpl) IssuePrecertificate(ctx context.Context, issueReq *caPB.IssueCertificateRequest) (*caPB.IssuePrecertificateResponse, error) {
492+
func (ca *CertificateAuthorityImpl) IssuePrecertificate(ctx context.Context, issueReq *capb.IssueCertificateRequest) (*capb.IssuePrecertificateResponse, error) {
493493
serialBigInt, validity, err := ca.generateSerialNumberAndValidity()
494494
if err != nil {
495495
return nil, err
@@ -516,7 +516,7 @@ func (ca *CertificateAuthorityImpl) IssuePrecertificate(ctx context.Context, iss
516516
}
517517

518518
status := string(core.OCSPStatusGood)
519-
ocspResp, err := ca.GenerateOCSP(ctx, &caPB.GenerateOCSPRequest{
519+
ocspResp, err := ca.GenerateOCSP(ctx, &capb.GenerateOCSPRequest{
520520
CertDER: precertDER,
521521
Status: &status,
522522
})
@@ -557,7 +557,7 @@ func (ca *CertificateAuthorityImpl) IssuePrecertificate(ctx context.Context, iss
557557
return nil, err
558558
}
559559

560-
return &caPB.IssuePrecertificateResponse{
560+
return &capb.IssuePrecertificateResponse{
561561
DER: precertDER,
562562
}, nil
563563
}
@@ -584,7 +584,7 @@ func (ca *CertificateAuthorityImpl) IssuePrecertificate(ctx context.Context, iss
584584
// final certificate, but this is just a belt-and-suspenders measure, since
585585
// there could be race conditions where two goroutines are issuing for the same
586586
// serial number at the same time.
587-
func (ca *CertificateAuthorityImpl) IssueCertificateForPrecertificate(ctx context.Context, req *caPB.IssueCertificateForPrecertificateRequest) (core.Certificate, error) {
587+
func (ca *CertificateAuthorityImpl) IssueCertificateForPrecertificate(ctx context.Context, req *capb.IssueCertificateForPrecertificateRequest) (core.Certificate, error) {
588588
emptyCert := core.Certificate{}
589589
precert, err := x509.ParseCertificate(req.DER)
590590
if err != nil {
@@ -654,7 +654,7 @@ func (ca *CertificateAuthorityImpl) generateSerialNumberAndValidity() (*big.Int,
654654
return serialBigInt, validity, nil
655655
}
656656

657-
func (ca *CertificateAuthorityImpl) issuePrecertificateInner(ctx context.Context, issueReq *caPB.IssueCertificateRequest, serialBigInt *big.Int, validity validity) ([]byte, error) {
657+
func (ca *CertificateAuthorityImpl) issuePrecertificateInner(ctx context.Context, issueReq *capb.IssueCertificateRequest, serialBigInt *big.Int, validity validity) ([]byte, error) {
658658
csr, err := x509.ParseCertificateRequest(issueReq.Csr)
659659
if err != nil {
660660
return nil, err

ca/ca_test.go

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import (
3232
"golang.org/x/crypto/ocsp"
3333

3434
ca_config "github.com/letsencrypt/boulder/ca/config"
35-
caPB "github.com/letsencrypt/boulder/ca/proto"
35+
capb "github.com/letsencrypt/boulder/ca/proto"
3636
"github.com/letsencrypt/boulder/cmd"
3737
"github.com/letsencrypt/boulder/core"
3838
corepb "github.com/letsencrypt/boulder/core/proto"
@@ -348,7 +348,7 @@ func TestIssuePrecertificate(t *testing.T) {
348348
req, err := x509.ParseCertificateRequest(testCase.csr)
349349
test.AssertNotError(t, err, "Certificate request failed to parse")
350350

351-
issueReq := &caPB.IssueCertificateRequest{Csr: testCase.csr, RegistrationID: &arbitraryRegID}
351+
issueReq := &capb.IssueCertificateRequest{Csr: testCase.csr, RegistrationID: &arbitraryRegID}
352352

353353
var certDER []byte
354354
response, err := ca.IssuePrecertificate(ctx, issueReq)
@@ -456,7 +456,7 @@ func TestMultipleIssuers(t *testing.T) {
456456
nil)
457457
test.AssertNotError(t, err, "Failed to remake CA")
458458

459-
issuedCert, err := ca.IssuePrecertificate(ctx, &caPB.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID})
459+
issuedCert, err := ca.IssuePrecertificate(ctx, &capb.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID})
460460
test.AssertNotError(t, err, "Failed to issue certificate")
461461

462462
cert, err := x509.ParseCertificate(issuedCert.DER)
@@ -481,14 +481,14 @@ func TestOCSP(t *testing.T) {
481481
nil)
482482
test.AssertNotError(t, err, "Failed to create CA")
483483

484-
issueReq := caPB.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID}
484+
issueReq := capb.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID}
485485

486486
cert, err := ca.IssuePrecertificate(ctx, &issueReq)
487487
test.AssertNotError(t, err, "Failed to issue")
488488
parsedCert, err := x509.ParseCertificate(cert.DER)
489489
test.AssertNotError(t, err, "Failed to parse cert")
490490
status := string(core.OCSPStatusGood)
491-
ocspResp, err := ca.GenerateOCSP(ctx, &caPB.GenerateOCSPRequest{
491+
ocspResp, err := ca.GenerateOCSP(ctx, &capb.GenerateOCSPRequest{
492492
CertDER: cert.DER,
493493
Status: &status,
494494
})
@@ -500,7 +500,7 @@ func TestOCSP(t *testing.T) {
500500
test.AssertEquals(t, parsed.SerialNumber.Cmp(parsedCert.SerialNumber), 0)
501501

502502
// Test that signatures are checked.
503-
_, err = ca.GenerateOCSP(ctx, &caPB.GenerateOCSPRequest{
503+
_, err = ca.GenerateOCSP(ctx, &capb.GenerateOCSPRequest{
504504
CertDER: append(cert.DER, byte(0)),
505505
Status: &status,
506506
})
@@ -543,7 +543,7 @@ func TestOCSP(t *testing.T) {
543543

544544
// ocspResp2 is a second OCSP response for `cert` (issued by caCert), and
545545
// should be signed by caCert.
546-
ocspResp2, err := ca.GenerateOCSP(ctx, &caPB.GenerateOCSPRequest{
546+
ocspResp2, err := ca.GenerateOCSP(ctx, &capb.GenerateOCSPRequest{
547547
CertDER: append([]byte(nil), cert.DER...),
548548
Status: &status,
549549
})
@@ -553,7 +553,7 @@ func TestOCSP(t *testing.T) {
553553

554554
// newCertOcspResp is an OCSP response for `newCert` (issued by newIssuer),
555555
// and should be signed by newIssuer.
556-
newCertOcspResp, err := ca.GenerateOCSP(ctx, &caPB.GenerateOCSPRequest{
556+
newCertOcspResp, err := ca.GenerateOCSP(ctx, &capb.GenerateOCSPRequest{
557557
CertDER: newCert.DER,
558558
Status: &status,
559559
})
@@ -631,7 +631,7 @@ func TestInvalidCSRs(t *testing.T) {
631631

632632
t.Run(testCase.name, func(t *testing.T) {
633633
serializedCSR := mustRead(testCase.csrPath)
634-
issueReq := &caPB.IssueCertificateRequest{Csr: serializedCSR, RegistrationID: &arbitraryRegID}
634+
issueReq := &capb.IssueCertificateRequest{Csr: serializedCSR, RegistrationID: &arbitraryRegID}
635635
_, err = ca.IssuePrecertificate(ctx, issueReq)
636636

637637
test.Assert(t, berrors.Is(err, testCase.errorType), "Incorrect error type returned")
@@ -666,7 +666,7 @@ func TestRejectValidityTooLong(t *testing.T) {
666666
test.AssertNotError(t, err, "Failed to parse time")
667667
testCtx.fc.Set(future)
668668
// Test that the CA rejects CSRs that would expire after the intermediate cert
669-
_, err = ca.IssuePrecertificate(ctx, &caPB.IssueCertificateRequest{Csr: NoCNCSR, RegistrationID: &arbitraryRegID})
669+
_, err = ca.IssuePrecertificate(ctx, &capb.IssueCertificateRequest{Csr: NoCNCSR, RegistrationID: &arbitraryRegID})
670670
test.AssertError(t, err, "Cannot issue a certificate that expires after the intermediate certificate")
671671
test.Assert(t, berrors.Is(err, berrors.InternalServer), "Incorrect error type returned")
672672
}
@@ -842,7 +842,7 @@ func TestIssueCertificateForPrecertificate(t *testing.T) {
842842
test.AssertNotError(t, err, "Failed to create CA")
843843

844844
orderID := int64(0)
845-
issueReq := caPB.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID, OrderID: &orderID}
845+
issueReq := capb.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID, OrderID: &orderID}
846846
precert, err := ca.IssuePrecertificate(ctx, &issueReq)
847847
test.AssertNotError(t, err, "Failed to issue precert")
848848
parsedPrecert, err := x509.ParseCertificate(precert.DER)
@@ -863,7 +863,7 @@ func TestIssueCertificateForPrecertificate(t *testing.T) {
863863
}
864864

865865
test.AssertNotError(t, err, "Failed to marshal SCT")
866-
cert, err := ca.IssueCertificateForPrecertificate(ctx, &caPB.IssueCertificateForPrecertificateRequest{
866+
cert, err := ca.IssueCertificateForPrecertificate(ctx, &capb.IssueCertificateForPrecertificateRequest{
867867
DER: precert.DER,
868868
SCTs: sctBytes,
869869
RegistrationID: &arbitraryRegID,
@@ -929,10 +929,10 @@ func TestIssueCertificateForPrecertificateDuplicateSerial(t *testing.T) {
929929
}
930930

931931
orderID := int64(0)
932-
issueReq := caPB.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID, OrderID: &orderID}
932+
issueReq := capb.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID, OrderID: &orderID}
933933
precert, err := ca.IssuePrecertificate(ctx, &issueReq)
934934
test.AssertNotError(t, err, "Failed to issue precert")
935-
_, err = ca.IssueCertificateForPrecertificate(ctx, &caPB.IssueCertificateForPrecertificateRequest{
935+
_, err = ca.IssueCertificateForPrecertificate(ctx, &capb.IssueCertificateForPrecertificateRequest{
936936
DER: precert.DER,
937937
SCTs: sctBytes,
938938
RegistrationID: &arbitraryRegID,
@@ -960,7 +960,7 @@ func TestIssueCertificateForPrecertificateDuplicateSerial(t *testing.T) {
960960
nil)
961961
test.AssertNotError(t, err, "Failed to create CA")
962962

963-
_, err = errorca.IssueCertificateForPrecertificate(ctx, &caPB.IssueCertificateForPrecertificateRequest{
963+
_, err = errorca.IssueCertificateForPrecertificate(ctx, &capb.IssueCertificateForPrecertificateRequest{
964964
DER: precert.DER,
965965
SCTs: sctBytes,
966966
RegistrationID: &arbitraryRegID,
@@ -1039,7 +1039,7 @@ func TestPrecertOrphanQueue(t *testing.T) {
10391039
}
10401040

10411041
var one int64 = 1
1042-
_, err = ca.IssuePrecertificate(context.Background(), &caPB.IssueCertificateRequest{
1042+
_, err = ca.IssuePrecertificate(context.Background(), &capb.IssueCertificateRequest{
10431043
RegistrationID: &one,
10441044
OrderID: &one,
10451045
Csr: CNandSANCSR,
@@ -1227,7 +1227,7 @@ func TestIssuePrecertificateLinting(t *testing.T) {
12271227
testCtx.logger.Clear()
12281228

12291229
// Attempt to issue a pre-certificate
1230-
_, err = ca.IssuePrecertificate(ctx, &caPB.IssueCertificateRequest{
1230+
_, err = ca.IssuePrecertificate(ctx, &capb.IssueCertificateRequest{
12311231
Csr: CNandSANCSR,
12321232
RegistrationID: &arbitraryRegID,
12331233
})
@@ -1265,7 +1265,7 @@ func TestGenerateOCSPWithIssuerID(t *testing.T) {
12651265
issuerID := int64(666)
12661266
serial := "DEADDEADDEADDEADDEADDEADDEADDEADDEAD"
12671267
status := string(core.OCSPStatusGood)
1268-
_, err = ca.GenerateOCSP(context.Background(), &caPB.GenerateOCSPRequest{
1268+
_, err = ca.GenerateOCSP(context.Background(), &capb.GenerateOCSPRequest{
12691269
IssuerID: &issuerID,
12701270
Serial: &serial,
12711271
Status: &status,
@@ -1274,18 +1274,18 @@ func TestGenerateOCSPWithIssuerID(t *testing.T) {
12741274

12751275
// GenerateOCSP with feature enabled + req contains good IssuerID
12761276
issuerID = idForIssuer(ca.defaultIssuer.cert)
1277-
_, err = ca.GenerateOCSP(context.Background(), &caPB.GenerateOCSPRequest{
1277+
_, err = ca.GenerateOCSP(context.Background(), &capb.GenerateOCSPRequest{
12781278
IssuerID: &issuerID,
12791279
Serial: &serial,
12801280
Status: &status,
12811281
})
12821282
test.AssertNotError(t, err, "GenerateOCSP failed")
12831283

12841284
// GenerateOCSP with feature enabled + req doesn't contain IssuerID
1285-
issueReq := caPB.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID}
1285+
issueReq := capb.IssueCertificateRequest{Csr: CNandSANCSR, RegistrationID: &arbitraryRegID}
12861286
cert, err := ca.IssuePrecertificate(ctx, &issueReq)
12871287
test.AssertNotError(t, err, "Failed to issue")
1288-
_, err = ca.GenerateOCSP(context.Background(), &caPB.GenerateOCSPRequest{
1288+
_, err = ca.GenerateOCSP(context.Background(), &capb.GenerateOCSPRequest{
12891289
CertDER: cert.DER,
12901290
Status: &status,
12911291
})

cmd/admin-revoker/main_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import (
1313
"time"
1414

1515
"github.com/jmhodges/clock"
16-
caPB "github.com/letsencrypt/boulder/ca/proto"
16+
capb "github.com/letsencrypt/boulder/ca/proto"
1717
"github.com/letsencrypt/boulder/core"
1818
"github.com/letsencrypt/boulder/goodkey"
1919
blog "github.com/letsencrypt/boulder/log"
@@ -31,8 +31,8 @@ type mockCA struct {
3131
mocks.MockCA
3232
}
3333

34-
func (ca *mockCA) GenerateOCSP(ctx context.Context, req *caPB.GenerateOCSPRequest) (*caPB.OCSPResponse, error) {
35-
return &caPB.OCSPResponse{}, nil
34+
func (ca *mockCA) GenerateOCSP(ctx context.Context, req *capb.GenerateOCSPRequest) (*capb.OCSPResponse, error) {
35+
return &capb.OCSPResponse{}, nil
3636
}
3737

3838
func TestRevokeBatch(t *testing.T) {

cmd/boulder-ca/main.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ import (
1616

1717
"github.com/letsencrypt/boulder/ca"
1818
ca_config "github.com/letsencrypt/boulder/ca/config"
19-
caPB "github.com/letsencrypt/boulder/ca/proto"
19+
capb "github.com/letsencrypt/boulder/ca/proto"
2020
"github.com/letsencrypt/boulder/cmd"
2121
"github.com/letsencrypt/boulder/core"
2222
"github.com/letsencrypt/boulder/features"
@@ -195,15 +195,15 @@ func main() {
195195
caSrv, caListener, err := bgrpc.NewServer(c.CA.GRPCCA, tlsConfig, serverMetrics, clk)
196196
cmd.FailOnError(err, "Unable to setup CA gRPC server")
197197
caWrapper := bgrpc.NewCertificateAuthorityServer(cai)
198-
caPB.RegisterCertificateAuthorityServer(caSrv, caWrapper)
198+
capb.RegisterCertificateAuthorityServer(caSrv, caWrapper)
199199
go func() {
200200
cmd.FailOnError(cmd.FilterShutdownErrors(caSrv.Serve(caListener)), "CA gRPC service failed")
201201
}()
202202

203203
ocspSrv, ocspListener, err := bgrpc.NewServer(c.CA.GRPCOCSPGenerator, tlsConfig, serverMetrics, clk)
204204
cmd.FailOnError(err, "Unable to setup CA gRPC server")
205205
ocspWrapper := bgrpc.NewCertificateAuthorityServer(cai)
206-
caPB.RegisterOCSPGeneratorServer(ocspSrv, ocspWrapper)
206+
capb.RegisterOCSPGeneratorServer(ocspSrv, ocspWrapper)
207207
go func() {
208208
cmd.FailOnError(cmd.FilterShutdownErrors(ocspSrv.Serve(ocspListener)),
209209
"OCSPGenerator gRPC service failed")

cmd/boulder-publisher/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ import (
1212
"github.com/letsencrypt/boulder/features"
1313
bgrpc "github.com/letsencrypt/boulder/grpc"
1414
"github.com/letsencrypt/boulder/publisher"
15-
pubPB "github.com/letsencrypt/boulder/publisher/proto"
15+
pubpb "github.com/letsencrypt/boulder/publisher/proto"
1616
)
1717

1818
type config struct {
@@ -93,7 +93,7 @@ func main() {
9393
grpcSrv, l, err := bgrpc.NewServer(c.Publisher.GRPC, tlsConfig, serverMetrics, clk)
9494
cmd.FailOnError(err, "Unable to setup Publisher gRPC server")
9595
gw := bgrpc.NewPublisherServerWrapper(pubi)
96-
pubPB.RegisterPublisherServer(grpcSrv, gw)
96+
pubpb.RegisterPublisherServer(grpcSrv, gw)
9797

9898
go cmd.CatchSignals(logger, grpcSrv.GracefulStop)
9999

cmd/boulder-ra/main.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import (
88
"time"
99

1010
akamaipb "github.com/letsencrypt/boulder/akamai/proto"
11-
caPB "github.com/letsencrypt/boulder/ca/proto"
11+
capb "github.com/letsencrypt/boulder/ca/proto"
1212
"github.com/letsencrypt/boulder/cmd"
1313
"github.com/letsencrypt/boulder/core"
1414
"github.com/letsencrypt/boulder/ctpolicy"
@@ -17,11 +17,11 @@ import (
1717
"github.com/letsencrypt/boulder/goodkey"
1818
bgrpc "github.com/letsencrypt/boulder/grpc"
1919
"github.com/letsencrypt/boulder/policy"
20-
pubPB "github.com/letsencrypt/boulder/publisher/proto"
20+
pubpb "github.com/letsencrypt/boulder/publisher/proto"
2121
"github.com/letsencrypt/boulder/ra"
2222
rapb "github.com/letsencrypt/boulder/ra/proto"
2323
sapb "github.com/letsencrypt/boulder/sa/proto"
24-
vaPB "github.com/letsencrypt/boulder/va/proto"
24+
vapb "github.com/letsencrypt/boulder/va/proto"
2525
)
2626

2727
type config struct {
@@ -145,16 +145,16 @@ func main() {
145145
cmd.FailOnError(err, "Unable to create VA client")
146146
vac := bgrpc.NewValidationAuthorityGRPCClient(vaConn)
147147

148-
caaClient := vaPB.NewCAAClient(vaConn)
148+
caaClient := vapb.NewCAAClient(vaConn)
149149

150150
caConn, err := bgrpc.ClientSetup(c.RA.CAService, tlsConfig, clientMetrics, clk)
151151
cmd.FailOnError(err, "Unable to create CA client")
152-
cac := bgrpc.NewCertificateAuthorityClient(caPB.NewCertificateAuthorityClient(caConn))
152+
cac := bgrpc.NewCertificateAuthorityClient(capb.NewCertificateAuthorityClient(caConn))
153153

154154
var ctp *ctpolicy.CTPolicy
155155
conn, err := bgrpc.ClientSetup(c.RA.PublisherService, tlsConfig, clientMetrics, clk)
156156
cmd.FailOnError(err, "Failed to load credentials and create gRPC connection to Publisher")
157-
pubc := bgrpc.NewPublisherClientWrapper(pubPB.NewPublisherClient(conn))
157+
pubc := bgrpc.NewPublisherClientWrapper(pubpb.NewPublisherClient(conn))
158158

159159
var apc akamaipb.AkamaiPurgerClient
160160
var issuerCert *x509.Certificate

cmd/boulder-va/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import (
1010
"github.com/letsencrypt/boulder/features"
1111
bgrpc "github.com/letsencrypt/boulder/grpc"
1212
"github.com/letsencrypt/boulder/va"
13-
vaPB "github.com/letsencrypt/boulder/va/proto"
13+
vapb "github.com/letsencrypt/boulder/va/proto"
1414
)
1515

1616
type config struct {
@@ -165,7 +165,7 @@ func main() {
165165
cmd.FailOnError(err, "Unable to setup VA gRPC server")
166166
err = bgrpc.RegisterValidationAuthorityGRPCServer(grpcSrv, vai)
167167
cmd.FailOnError(err, "Unable to register VA gRPC server")
168-
vaPB.RegisterCAAServer(grpcSrv, vai)
168+
vapb.RegisterCAAServer(grpcSrv, vai)
169169
cmd.FailOnError(err, "Unable to register CAA gRPC server")
170170

171171
go cmd.CatchSignals(logger, grpcSrv.GracefulStop)

0 commit comments

Comments
 (0)