Load existing CRLs on startup and after invalidate (#17138)
* Load existing CRLs on startup and after invalidate * changelog
This commit is contained in:
parent
2231f588a5
commit
2152a933ff
|
@ -14,6 +14,9 @@ func Factory(ctx context.Context, conf *logical.BackendConfig) (logical.Backend,
|
|||
if err := b.Setup(ctx, conf); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
if err := b.populateCRLs(ctx, conf.StorageView); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return b, nil
|
||||
}
|
||||
|
||||
|
|
|
@ -82,6 +82,12 @@ func (b *backend) pathLogin(ctx context.Context, req *logical.Request, data *fra
|
|||
return nil, err
|
||||
}
|
||||
|
||||
if b.crls == nil {
|
||||
if err := b.populateCRLs(ctx, req.Storage); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
var matched *ParsedCert
|
||||
if verifyResp, resp, err := b.verifyCredentials(ctx, req, data); err != nil {
|
||||
return nil, err
|
||||
|
|
|
@ -0,0 +1,3 @@
|
|||
```release-note:bug
|
||||
auth/cert: Vault does not initially load the CRLs in cert auth unless the read/write CRL endpoint is hit.
|
||||
```
|
Loading…
Reference in New Issue