boulder/test/ocsp
Aaron Gable dab8a71b0e
Use new RA methods from WFE revocation path (#5983)
Simplify the WFE `RevokeCertificate` API method in three ways:
- Remove most of the logic checking if the requester is authorized to
  revoke the certificate in question (based on who is making the
  request, what authorizations they have, and what reason they're
  requesting). That checking is now done by the RA. Instead, simply
  verify that the JWS is authenticated.
- Remove the hard-to-read `authorizedToRevoke` callbacks, and make the
  `revokeCertBySubscriberKey` (nee `revokeCertByKeyID`) and
  `revokeCertByCertKey` (nee `revokeCertByJWK`) helpers much more
  straight-line in their execution logic.
- Call the RA's new `RevokeCertByApplicant` and `RevokeCertByKey` gRPC
  methods, rather than the deprecated `RevokeCertificateWithReg`.

This change, without any flag flips, should be invisible to the
end-user. It will slightly change some of our log message formats.
However, by now relying on the new RA gRPC revocation methods, this
change allows us to change our revocation policies by enabling the
`AllowDoubleRevocation` and `MozRevocationReasons` feature flags, which
affect the behavior of those new helpers.

Fixes #5936
2022-03-28 14:14:11 -07:00
..
checkocsp Add multi-issuer support to ocsp-responder (#5154) 2020-11-10 09:21:09 -08:00
helper Use new RA methods from WFE revocation path (#5983) 2022-03-28 14:14:11 -07:00
ocsp_forever Fix shadowing assignments inside closures (#5944) 2022-02-16 14:33:17 -08:00
README.md Add checkocsp and ocsp_forever. (#2632) 2017-04-05 12:05:06 -07:00

README.md

This directory contains two utilities for checking ocsp.

"checkocsp" is a command-line tool to check the OCSP response for a certificate or a list of certificates.

"ocsp_forever" is a similar tool that runs as a daemon and continually checks OCSP for a list of certificates, and exports Prometheus stats.

Both of these are useful for monitoring a Boulder instance. "checkocsp" is also useful for debugging.