boulder/wfe2
Aaron Gable 1837aa9ef2
Return alreadyRevoked for duplicate revocations (#5108)
If two revocation requests for the same cert arrive in rapid
succession, it is possible for one of them to complete in the
time between the other one's initial check (that the cert isn't
revoked already) and final database update. This causes
the db update to fail, and the request to end in a 500.

Other methods, such as new account registration, have a
three-step "check for duplicates, update db, if that failed
check for duplicates again" flow. This change updates the
cert revocation handlers to have a similar flow.

It returns the RFC 8555 `alreadyRevoked` from wfe2, to
match the error code returned by the initial duplicate
check. It returns the non-standardized 409 Conflict from
wfe, to match the code returned by that frontend's initial
duplicate check.

Fixes #5107
2020-10-06 15:05:34 -07:00
..
test Fix various WFE2 bugs. (#3292) 2017-12-19 13:13:29 -08:00
README.md Duplicate WFE to WFE2. (#2839) 2017-07-05 13:32:45 -07:00
stale.go core: move to proto3 (#5063) 2020-08-31 17:58:32 -07:00
stale_test.go core: move to proto3 (#5063) 2020-08-31 17:58:32 -07:00
stats.go Switch away from old style statsd metrics wrappers (#4606) 2019-12-18 11:08:25 -05:00
verify.go Limit request body size. (#4866) 2020-06-12 12:02:49 -07:00
verify_test.go Limit request body size. (#4866) 2020-06-12 12:02:49 -07:00
wfe.go Return alreadyRevoked for duplicate revocations (#5108) 2020-10-06 15:05:34 -07:00
wfe_test.go wfe: reject empty identifiers in new-authz and new-order (#5089) 2020-09-15 09:42:33 -07:00

README.md

WFE v2

The wfe2 package is copied from the wfe package in order to implement the "ACME v2" API. This design choice was made to facilitate a clean separation between v1 and v2 code and to support running a separate API process on a different port alongside the v1 API process.