@@ -1847,17 +1847,17 @@ func (wfe *WebFrontEndImpl) orderForDisplay(
18471847 // identifiers and authorizations slices and not the slices or the mutations
18481848 // below could mutate the order in the database, causing data races.
18491849 result := acme.Order {
1850- Status : order .Order . Status ,
1851- Error : order .Order . Error ,
1852- Expires : order .Order . Expires ,
1853- Identifiers : slices .Clone (order .Order . Identifiers ),
1854- Profile : order .Order . Profile ,
1855- Finalize : order .Order . Finalize ,
1856- NotBefore : order .Order . NotBefore ,
1857- NotAfter : order .Order . NotAfter ,
1858- Authorizations : slices .Clone (order .Order . Authorizations ),
1859- Certificate : order .Order . Certificate ,
1860- Replaces : order .Order . Replaces ,
1850+ Status : order .Status ,
1851+ Error : order .Error ,
1852+ Expires : order .Expires ,
1853+ Identifiers : slices .Clone (order .Identifiers ),
1854+ Profile : order .Profile ,
1855+ Finalize : order .Finalize ,
1856+ NotBefore : order .NotBefore ,
1857+ NotAfter : order .NotAfter ,
1858+ Authorizations : slices .Clone (order .Authorizations ),
1859+ Certificate : order .Certificate ,
1860+ Replaces : order .Replaces ,
18611861 }
18621862
18631863 // Randomize the order of the order authorization URLs as well as the order's
@@ -2892,11 +2892,12 @@ func (wfe *WebFrontEndImpl) RevokeCert(
28922892
28932893 // Handle the revocation request according to how it is authenticated, or if
28942894 // the authentication type is unknown, error immediately
2895- if authType == embeddedKeyID {
2895+ switch authType {
2896+ case embeddedKeyID :
28962897 prob = wfe .revokeCertByKeyID (parsedJWS , request )
2897- } else if authType == embeddedJWK {
2898+ case embeddedJWK :
28982899 prob = wfe .revokeCertByJWK (parsedJWS , request )
2899- } else {
2900+ default :
29002901 prob = acme .MalformedProblem ("Malformed JWS, no KeyID or embedded JWK" )
29012902 }
29022903 if prob != nil {
0 commit comments