summaryrefslogtreecommitdiffstats
path: root/base/java-tools/src/com
diff options
context:
space:
mode:
authorFraser Tweedale <ftweedal@redhat.com>2016-06-14 12:19:25 +1000
committerFraser Tweedale <ftweedal@redhat.com>2016-06-15 11:41:04 +1000
commit41aef5254c20301851716ef46b614d185b33a87b (patch)
tree6a8f086130e5703f37c2764f29ad28fd216d551f /base/java-tools/src/com
parent4c6049e0df753e8bf9beca0a54a18481f7eee72f (diff)
downloadpki-41aef5254c20301851716ef46b614d185b33a87b.tar.gz
pki-41aef5254c20301851716ef46b614d185b33a87b.tar.xz
pki-41aef5254c20301851716ef46b614d185b33a87b.zip
Do not attempt cert update unless signing key is present
If an authority entry is read with the authoritySerial attribute, and the serial differs from the known serial or the serial was previously unknown, Dogtag attempts to update the certificate in the NSSDB. The procedure is carried out during initialisation, and if it fails an exception is thrown, causing the CA to remain unknown. If the signing key is not yet in the NSSDB, the update is certain to fail. This can happen e.g. if CA is created on one clone while another clone is down. When the other clone comes up, it will immediately see the authoritySerial and trigger this scenario. To avoid this scenario, only attempt to update the certificate if the signing unit initialisation completed successfully, implying the presence of the signing key. Fixes: https://fedorahosted.org/pki/ticket/2359
Diffstat (limited to 'base/java-tools/src/com')
0 files changed, 0 insertions, 0 deletions