open-vault/builtin/logical/pki
Alexander Scheel f34a93a560 Clean up behavior of If-Modified-Since header (#16929)
* Issuer renames should invalidate CRL cache times

When an issuer is renamed (or rather, two issuers' names are swapped in
quick succession), this is akin to the earlier identified default issuer
update condition. So, when any issuer is updated, go ahead and trigger
the invalidation logic.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Fix handling of delta CRL If-Modified-Since

The If-Modified-Since PR was proposed prior to the Delta CRL changes and
thus didn't take it into account. This follow-up commit fixes that,
addressing If-Modified-Since semantics for delta CRL fetching and
ensuring an accurate number is stored.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-30 13:25:36 -04:00
..
cmd/pki
backend.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
backend_test.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
ca_test.go
ca_util.go
cert_util.go Support for generating Delta CRLs (#16773) 2022-08-29 11:37:09 -04:00
cert_util_test.go
chain_test.go Cleanup changes around issuer revocation (#16874) 2022-08-25 11:36:37 -04:00
chain_util.go Fix CodeQL Errors - check allocation is smaller than 2^30 (#16869) 2022-08-26 13:26:11 -04:00
config_util.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
crl_test.go Support for generating Delta CRLs (#16773) 2022-08-29 11:37:09 -04:00
crl_util.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
fields.go
integation_test.go
key_util.go
managed_key_util.go
ocsp.go Add ocsp_expiry configuration field to PKI crl config (#16888) 2022-08-25 16:01:39 -04:00
ocsp_test.go Add ocsp_expiry configuration field to PKI crl config (#16888) 2022-08-25 16:01:39 -04:00
path_config_ca.go
path_config_crl.go Support for generating Delta CRLs (#16773) 2022-08-29 11:37:09 -04:00
path_config_urls.go
path_fetch.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
path_fetch_issuers.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
path_fetch_keys.go
path_intermediate.go
path_issue_sign.go
path_manage_issuers.go
path_manage_keys.go
path_manage_keys_test.go
path_revoke.go
path_roles.go
path_roles_test.go
path_root.go
path_sign_issuers.go
path_tidy.go Let PKI tidy associate revoked certs with their issuers (#16871) 2022-08-26 10:13:45 -07:00
secret_certs.go
storage.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00
storage_migrations.go Add an OCSP responder to Vault's PKI plugin (#16723) 2022-08-22 14:06:15 -04:00
storage_migrations_test.go
storage_test.go Add an OCSP responder to Vault's PKI plugin (#16723) 2022-08-22 14:06:15 -04:00
test_helpers.go Add an OCSP responder to Vault's PKI plugin (#16723) 2022-08-22 14:06:15 -04:00
util.go Clean up behavior of If-Modified-Since header (#16929) 2022-08-30 13:25:36 -04:00