consul/agent/connect/ca
Daniel Nephin b2f49279e2 ca: split Primary/Secondary Provider
To make it more clear which methods are necessary for each scenario. This can
also prevent problems which force all DCs to use the same Vault instance, which
is currently a problem.
2021-10-10 15:48:02 -04:00
..
common.go Format certificates properly (rfc7468) with a trailing new line (#10411) 2021-06-30 20:48:29 -04:00
mock_Provider.go Ensure that CA initialization does not block leader election. 2021-01-19 15:27:48 -05:00
provider.go ca: split Primary/Secondary Provider 2021-10-10 15:48:02 -04:00
provider_aws.go check expiry date of the root/intermediate before using it to sign a leaf (#10500) 2021-07-13 12:15:06 -04:00
provider_aws_test.go ca: use provider constructors to be more consistent 2021-07-12 14:04:34 -04:00
provider_consul.go connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots (#10330) 2021-07-13 11:12:07 -05:00
provider_consul_config.go Move IntermediateCertTTL to common CA config 2020-09-10 00:23:22 -07:00
provider_consul_test.go connect/ca: ensure edits to the key type/bits for the connect builtin CA will regenerate the roots (#10330) 2021-07-13 11:12:07 -05:00
provider_test.go ca: remove unused RotationPeriod field 2021-07-05 19:15:44 -04:00
provider_vault.go connect/ca: require new vault mount points when updating the key type/bits for the vault connect CA provider (#10331) 2021-07-13 11:11:46 -05:00
provider_vault_test.go ca: move provider creation into CAManager 2021-07-12 09:32:33 -04:00
testing.go ca: use provider constructors to be more consistent 2021-07-12 14:04:34 -04:00