open-vault/website/content/docs
Alexander Scheel 43e722c69a
Let PKI tidy associate revoked certs with their issuers (#16871)
* Refactor tidy steps into two separate helpers

This refactors the tidy go routine into two separate helpers, making it
clear where the boundaries of each are: variables are passed into these
method and concerns are separated. As more operations are rolled into
tidy, we can continue adding more helpers as appropriate. Additionally,
as we move to make auto-tidy occur, we can use these as points to hook
into periodic tidying.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Refactor revInfo checking to helper

This allows us to validate whether or not a revInfo entry contains a
presently valid issuer, from the existing mapping. Coupled with the
changeset to identify the issuer on revocation, we can begin adding
capabilities to tidy to update this association, decreasing CRL build
time and increasing the performance of OCSP.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Refactor issuer fetching for revocation purposes

Revocation needs to gracefully handle using the old legacy cert bundle,
so fetching issuers (and parsing them) needs to be done slightly
differently than other places. Refactor this from revokeCert into a
common helper that can be used by tidy.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Allow tidy to associate revoked certs, issuers

When revoking a certificate, we need to associate the issuer that signed
its certificate back to the revInfo entry. Historically this was
performed during CRL building (and still remains so), but when running
without CRL building and with only OCSP, performance will degrade as the
issuer needs to be found each time.

Instead, allow the tidy operation to take over this role, allowing us to
increase the performance of OCSP and CRL in this scenario, by decoupling
issuer identification from CRL building in the ideal case.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add tests for tidy updates

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add changelog entry

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add documentation on new tidy parameter, metrics

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Refactor tidy config into shared struct

Finish adding metrics, status messages about new tidy operation.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-26 10:13:45 -07:00
..
agent Docs: Agent parameters: error_on_missing_key & exit_on_retry_failure (#14902) 2022-08-26 11:27:36 -04:00
audit Audit device: Clarifications based on feedback (#16881) 2022-08-26 09:19:49 -04:00
auth adds documentation for enabling mutual TLS with the CloudFoundry API (#16857) 2022-08-23 16:20:21 -07:00
commands Mount paths case-sensitivity (#16743) 2022-08-17 09:57:47 -07:00
concepts Docs: Client Count Concept clarity. (#16795) 2022-08-24 12:56:54 -07:00
configuration Update google-cloud-storage backend documentation (#14455) 2022-08-26 09:59:40 -05:00
deprecation
enterprise The "DELETE API" links to a nonexistent subsection of the /sys/license/status page from 1.11.x onwards. Not sure if the suggestion to restart the service should remain in this edit - I found a restart of all Vault servers cleared this message where other attempts failed - happy to remove it if preferred, though. (#16895) 2022-08-26 09:07:10 -07:00
faq
get-started
internals Let PKI tidy associate revoked certs with their issuers (#16871) 2022-08-26 10:13:45 -07:00
platform Add VAULT_ASSUMED_ROLE_ARN parameter to VLE docs (#16677) 2022-08-23 11:33:36 -07:00
plugins
release-notes
secrets updated usage example (#9081) 2022-08-24 09:03:30 -04:00
upgrading
browser-support.mdx
glossary.mdx
index.mdx
install.mdx
partnerships.mdx
use-cases.mdx vault documentation: updated use cases doc (#16783) 2022-08-18 15:00:12 -07:00
what-is-vault.mdx