Bump github.com/aws/aws-sdk-go-v2/service/s3 from 1.98.0 to 1.99.0 in the aws-sdk-go group across 1 directory (#162)
Bumps the aws-sdk-go group with 1 update in the / directory: github.com/aws/aws-sdk-go-v2/service/s3.
Updates
github.com/aws/aws-sdk-go-v2/service/s3from 1.98.0 to 1.99.0Commits
159f4d2Release 2026-04-0750223dcRegenerated Clientsaf25337Update endpoints model277dc01Update API model22bc35cRelease 2026-04-069a35fedRegenerated Clients867b085Update endpoints model61d367cUpdate API model8560a07Release 2026-04-03a5aafdfRegenerated Clients- Additional commits viewable in compare view
Signed-off-by: dependabot[bot] support@github.com Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
crl-monitor
CRL-Monitor monitors CRLs.
It issues certificates, revokes them, and then looks for them to appear in CRLs. Each component runs as an AWS Lambda.
The
churnerruns periodically. On each run it issues a certificate, fetches and lints the certificate’s CRL URL, revokes the certificate, and stores its serial number and metadata for thecheckerto later verify that it shows up as revoked. It also checks previously seen serials. If they haven’t shown up in a CRL after a reasonable amount of time,checkerproduces an error.The
checkerruns in response to the upload of each new CRL shard in S3. It diffs the newly uploaded CRL shard against its previous version and verifies:The
checkeralso removes from database any certificates it sees, to indicate that their revocation has been published, so thechurnerwon’t alert about them It then marks as completed (deletes) anychurner-issued certificates that show up on the new CRL.Build and Deployment
This repository has two binaries named
checkerand two binaries namedchurner. The binaries undercmdare for local use and testing. The binaries underlambdaare for deployment to AWS Lambda. The key difference is that thelambda/binaries register a lambda handler (lambda.StartWithOptions()), which AWS then calls. That handler can return errors, and we have separate Cloudwatch monitoring that alerts when any errors are detected.The lambda binaries are built by a release workflow on GitHub Actions triggered by uploading a release tag (starting with
v). Those binaries are uploaded to S3 under a versioned path. They are then deployed to Lambda using Terraform (in another repository).Testing
Most of the tests are unittests and can be run with:
There is also an integration test for DynamoDB code. To run this, install Java and run:
Architecture Diagram