Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of Refactor OCSP client to support better retries into release/1.13.x #19352

Conversation

hc-github-team-secure-vault-core
Copy link
Collaborator

Backport

This PR is auto-generated from #19345 to be assessed for backporting due to the inclusion of the label backport/1.13.x.

The below text is copied from the body of the original PR.


Mirror NSS's GET-vs-POST selection criteria, wherein GET is preferred over POST (as the former might be a response from a cached CDN entry, whereas the latter might hit a live responder). However, only accept it if it definitively says "Good" or "Revoked" -- trigger a POST request when an unknown or failure status is seen.


Because existing Vault PKI engines respond with a parse error, and not Method Not Allowed, this would probably be useful to backport to 1.13, which is the first release with OCSP support.


Overview of commits

@hc-github-team-secure-vault-core hc-github-team-secure-vault-core force-pushed the backport/cipherboy-add-ocsp-post-param/violently-precious-griffon branch 2 times, most recently from 8c33bc7 to 6c88677 Compare February 24, 2023 18:18
@cipherboy cipherboy enabled auto-merge (squash) February 24, 2023 18:23
@cipherboy cipherboy added this to the 1.13.0 milestone Feb 24, 2023
@cipherboy cipherboy added bug Used to indicate a potential bug auth/cert Authentication - certificates labels Feb 24, 2023
@cipherboy cipherboy merged commit 8545876 into release/1.13.x Feb 24, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auth/cert Authentication - certificates bug Used to indicate a potential bug
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants