-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
enable auto-tidy expired issuers in vault (as CA) #17138
Conversation
a372770
to
33ed9e8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@eikenb : Left some thoughts on log message copy and docs updates. Thanks for the finishing touches here! I also like that we now have a pattern to reference for testing against different Vault versions (when we expect the behavior to differ).
@eikenb : I'm good with this PR, but I can't approve on behalf of eng. Can you request a review from a ZTS eng team member? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Submitting to clear my previous "request changes" review. I'm happy with this, but someone from eng needs to give an eng review.
My comments have been satisfied, but I'm not an eng reviewer. Waiting on eng reviewer.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Correct me if I'm missing some context behind the decision, but I think this should be called once during setupIntermediatePKIPath
, since it's a one-time operation.
As-is, we're adding a network call and possibly unactionable INFO log to a hotpath (leaf cert generation) which might get noisy if there are many service registrations.
AFAIK We could change those log messages from INFO to DEBUG as that'd raise it above the default settings. |
I think |
@kisunji .. I'll take a look at those code paths tomorrow and move the call if it looks like that will work. Thanks! |
@kisunji .. I verified your idea and am going to update my PR for that. I thought I had checked that path but I must have got off track as some point. Thanks again. |
@kisunji .. code and test updated. Ready for another look. |
When using vault as a CA and generating the local signing cert, try to enable the pki endpoint's auto-tidy feature with it set to tidy expired issuers.
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
Co-authored-by: Jared Kirschner <85913323+jkirschner-hashicorp@users.noreply.github.com>
3b94649
to
ff5a593
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
small comment on the return vals but will preapprove!
ad0a150
to
f32687d
Compare
When using vault as a CA and generating the local signing cert, try to enable the pki endpoint's auto-tidy feature with it set to tidy expired issuers.