This project is mirrored from https://gitee.com/NQL886/vault.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 29 Apr, 2022 7 commits
  2. 28 Apr, 2022 1 commit
    • kitography's avatar
      Kitography/vault 5474 rebase (#15150) · b0ad7295
      kitography authored
      
      * These parts work (put in signature so that backend wouldn't break, but missing fields, desc, etc.)
      
      * Import and Generate API calls w/ needed additions to SDK.
      
      * make fmt
      
      * Add Help/Sync Text, fix some of internal/exported/kms code.
      
      * Fix PEM/DER Encoding issue.
      
      * make fmt
      
      * Standardize keyIdParam, keyNameParam, keyTypeParam
      
      * Add error response if key to be deleted is in use.
      
      * replaces all instances of "default" in code with defaultRef
      
      * Updates from Callbacks to Operations Function with explicit forwarding.
      
      * Fixes a panic with names not being updated everywhere.
      
      * add a logged error in addition to warning on deleting default key.
      
      * Normalize whitespace upon importing keys.
      Authored-by: default avatarAlexander Scheel <alexander.m.scheel@gmail.com>
      
      * Fix isKeyInUse functionality.
      
      * Fixes tests associated with newline at end of key pem.
      b0ad7295
  3. 26 Apr, 2022 7 commits
    • Alexander Scheel's avatar
      Update PKI to new Operations framework (#15180) · 40417d16
      Alexander Scheel authored
      
      The backend Framework has updated Callbacks (used extensively in PKI) to
      become deprecated; Operations takes their place and clarifies forwarding
      of requests.
      
      We switch to the new format everywhere, updating some bad assumptions
      about forwarding along the way. Anywhere writes are handled (that should
      be propagated to all nodes in all clusters), we choose to forward the
      request all the way up to the performance primary cluster's primary
      node. This holds for issuers/keys, roles, and configs (such as CRL
      config, which is globally set for all clusters despite all clusters
      having their own separate CRL).
      Signed-off-by: default avatarAlexander Scheel <alex.scheel@hashicorp.com>
      40417d16
    • Alexander Scheel's avatar
    • Alexander Scheel's avatar
    • Alexander Scheel's avatar
      Expand NotAfter limit enforcement behavior · f864a9c8
      Alexander Scheel authored
      
      Vault previously strictly enforced NotAfter/ttl values on certificate
      requests, erring if the requested TTL extended past the NotAfter date of
      the issuer. In the event of issuing an intermediate, this behavior was
      ignored, instead permitting the issuance.
      
      Users generally do not think to check their issuer's NotAfter date when
      requesting a certificate; thus this behavior was generally surprising.
      
      Per RFC 5280 however, issuers need to maintain status information
      throughout the life cycle of the issued cert. If this leaf cert were to
      be issued for a longer duration than the parent issuer, the CA must
      still maintain revocation information past its expiration.
      
      Thus, we add an option to the issuer to change the desired behavior:
      
       - err, to err out,
       - permit, to permit the longer NotAfter date, or
       - truncate, to silently truncate the expiration to the issuer's
         NotAfter date.
      
      Since expiration of certificates in the system's trust store are not
      generally validated (when validating an arbitrary leaf, e.g., during TLS
      validation), permit should generally only be used in that case. However,
      browsers usually validate intermediate's validity periods, and thus
      truncate should likely be used (as with permit, the leaf's chain will
      not validate towards the end of the issuance period).
      Signed-off-by: default avatarAlexander Scheel <alex.scheel@hashicorp.com>
      f864a9c8
    • Alexander Scheel's avatar
    • Alexander Scheel's avatar
      Allow explicit issuer override on roles · 09f483d8
      Alexander Scheel authored
      
      When a role is used to generate a certificate (such as with the sign/
      and issue/ legacy paths or the legacy sign-verbatim/ paths), we prefer
      that issuer to the one on the request. This allows operators to set an
      issuer (other than default) for requests to be issued against,
      effectively making the change no different from the users' perspective
      as it is "just" a different role name.
      Signed-off-by: default avatarAlexander Scheel <alex.scheel@hashicorp.com>
      09f483d8
    • Alexander Scheel's avatar
      Update CA Chain to report entire chain · 6533bf92
      Alexander Scheel authored
      
      This merges the ca_chain JSON field (of the /certs/ca_chain path) with
      the regular certificate field, returning the root of trust always. This
      also affects the non-JSON (raw) endpoints as well.
      
      We return the default issuer's chain here, rather than all known issuers
      (as that may not form a strict chain).
      Signed-off-by: default avatarAlexander Scheel <alex.scheel@hashicorp.com>
      6533bf92
  4. 25 Apr, 2022 1 commit
  5. 22 Apr, 2022 4 commits
  6. 21 Apr, 2022 5 commits
  7. 20 Apr, 2022 15 commits