mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-31 02:28:09 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			93 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			93 lines
		
	
	
		
			1.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package pki
 | |
| 
 | |
| import (
 | |
| 	"strings"
 | |
| 	"sync"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/hashicorp/vault/logical"
 | |
| 	"github.com/hashicorp/vault/logical/framework"
 | |
| )
 | |
| 
 | |
| // Factory creates a new backend implementing the logical.Backend interface
 | |
| func Factory(conf *logical.BackendConfig) (logical.Backend, error) {
 | |
| 	b := Backend()
 | |
| 	if err := b.Setup(conf); err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	return b, nil
 | |
| }
 | |
| 
 | |
| // Backend returns a new Backend framework struct
 | |
| func Backend() *backend {
 | |
| 	var b backend
 | |
| 	b.Backend = &framework.Backend{
 | |
| 		Help: strings.TrimSpace(backendHelp),
 | |
| 
 | |
| 		PathsSpecial: &logical.Paths{
 | |
| 			Unauthenticated: []string{
 | |
| 				"cert/*",
 | |
| 				"ca/pem",
 | |
| 				"ca_chain",
 | |
| 				"ca",
 | |
| 				"crl/pem",
 | |
| 				"crl",
 | |
| 			},
 | |
| 
 | |
| 			LocalStorage: []string{
 | |
| 				"revoked/",
 | |
| 				"crl",
 | |
| 				"certs/",
 | |
| 			},
 | |
| 		},
 | |
| 
 | |
| 		Paths: []*framework.Path{
 | |
| 			pathListRoles(&b),
 | |
| 			pathRoles(&b),
 | |
| 			pathGenerateRoot(&b),
 | |
| 			pathGenerateIntermediate(&b),
 | |
| 			pathSetSignedIntermediate(&b),
 | |
| 			pathSignIntermediate(&b),
 | |
| 			pathConfigCA(&b),
 | |
| 			pathConfigCRL(&b),
 | |
| 			pathConfigURLs(&b),
 | |
| 			pathSignVerbatim(&b),
 | |
| 			pathSign(&b),
 | |
| 			pathIssue(&b),
 | |
| 			pathRotateCRL(&b),
 | |
| 			pathFetchCA(&b),
 | |
| 			pathFetchCAChain(&b),
 | |
| 			pathFetchCRL(&b),
 | |
| 			pathFetchCRLViaCertPath(&b),
 | |
| 			pathFetchValid(&b),
 | |
| 			pathFetchListCerts(&b),
 | |
| 			pathRevoke(&b),
 | |
| 			pathTidy(&b),
 | |
| 		},
 | |
| 
 | |
| 		Secrets: []*framework.Secret{
 | |
| 			secretCerts(&b),
 | |
| 		},
 | |
| 
 | |
| 		BackendType: logical.TypeLogical,
 | |
| 	}
 | |
| 
 | |
| 	b.crlLifetime = time.Hour * 72
 | |
| 
 | |
| 	return &b
 | |
| }
 | |
| 
 | |
| type backend struct {
 | |
| 	*framework.Backend
 | |
| 
 | |
| 	crlLifetime       time.Duration
 | |
| 	revokeStorageLock sync.RWMutex
 | |
| }
 | |
| 
 | |
| const backendHelp = `
 | |
| The PKI backend dynamically generates X509 server and client certificates.
 | |
| 
 | |
| After mounting this backend, configure the CA using the "pem_bundle" endpoint within
 | |
| the "config/" path.
 | |
| `
 | 
