consul/agent/connect/ca
Daniel Nephin b4080bc0dc ca: use the cluster ID passed to the primary
instead of fetching it from the state store.
2021-11-16 16:57:22 -05:00
..
common.go Format certificates properly (rfc7468) with a trailing new line (#10411) 2021-06-30 20:48:29 -04:00
mock_Provider.go Ensure that CA initialization does not block leader election. 2021-01-19 15:27:48 -05:00
provider.go ca: split Primary/Secondary Provider 2021-10-10 15:48:02 -04:00
provider_aws.go ca: accept only the cluster ID to SpiffeIDSigningForCluster 2021-11-16 16:57:21 -05:00
provider_aws_test.go plumb thru root cert tll to the aws ca provider (#11449) 2021-11-04 12:19:08 -07:00
provider_consul.go ca: use the cluster ID passed to the primary 2021-11-16 16:57:22 -05:00
provider_consul_config.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_consul_test.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_test.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_vault.go ca: accept only the cluster ID to SpiffeIDSigningForCluster 2021-11-16 16:57:21 -05:00
provider_vault_test.go Support Vault Namespaces explicitly in CA config (#11477) 2021-11-05 11:42:28 -05:00
testing.go ca: use provider constructors to be more consistent 2021-07-12 14:04:34 -04:00