Skip to content

Commit

Permalink
Backport of Add notes on the PKI cert generation forwarding regressio…
Browse files Browse the repository at this point in the history
…n into stable-website (#13817)

This pull request was automerged via backport-assistant
  • Loading branch information
hc-github-team-secure-vault-core authored Jan 27, 2022
1 parent 42a6d06 commit 3a40060
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 0 deletions.
1 change: 1 addition & 0 deletions website/content/docs/upgrading/upgrade-to-1.8.x.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ Notes](https://golang.org/doc/go1.16) for full details. Of particular note:

@include 'entity-alias-mapping.mdx'

@include 'pki-forwarding-bug.mdx'
## Known Issues

- MSSQL integrations (storage and secrets engine) will crash with a "panic: not implemented" error
Expand Down
2 changes: 2 additions & 0 deletions website/content/docs/upgrading/upgrade-to-1.9.x.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -95,6 +95,8 @@ respects the order of suites given in `tls_cipher_suites`.

See [this blog post](https://go.dev/blog/tls-cipher-suites) for more information.

@include 'pki-forwarding-bug.mdx'

## Known Issues

### Identity Token Backend Key Rotations
Expand Down
10 changes: 10 additions & 0 deletions website/content/partials/pki-forwarding-bug.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
## PKI Certificate Generation Forwarding Regression

A bug introduced in Vault 1.8 causes certificate generation requests to the PKI secrets engine made on a performance
secondary node to be forwarded to the cluster's primary node. The resulting certificates are stored on the primary node,
and thus visible to list and read certificate requests only on the primary node rather than the secondary node as
intended. Furthermore, if a certificate is subsequently revoked on a performance secondary node, the secondary's
certificate revocation list is updated, rather than the primary's where the certificate is stored. This bug is fixed
in Vault 1.8.8 and 1.9.3.
Certificates issued after the fix are correctly stored locally to the performance secondary.

0 comments on commit 3a40060

Please sign in to comment.