Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle multiple matching issuers in OCSP requests #16848

Merged

Conversation

stevendpclark
Copy link
Contributor

Select the first issuer that matches our request hashes and has the OCSP signing usage enabled. This might not match the exact issuer id that issued the certificate but the signatures will be okay.

This should resolve the comment brought up by @kitography in PR#16723. Thanks again for identifying this issue in the review!

 - Select the first issuer that matches our request hashes and has
   the OCSP signing usage enabled. This might not match the exact
   issuer id that issued the certificate but the signatures will be
   okay.
Copy link
Contributor

@kitography kitography left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This code looks excellent, I have some nits on the later half of the test

builtin/logical/pki/ocsp_test.go Outdated Show resolved Hide resolved
builtin/logical/pki/ocsp_test.go Outdated Show resolved Hide resolved
builtin/logical/pki/ocsp_test.go Outdated Show resolved Hide resolved
@stevendpclark stevendpclark merged commit 14cd842 into main Aug 24, 2022
@stevendpclark stevendpclark deleted the stevendpclark/vault-7900-ocsp-multiple-issuer-matching branch August 24, 2022 13:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants