consul/.changelog
R.B. Boyer 39e4ae25ac
connect: connect CA Roots in the primary datacenter should use a SigningKeyID derived from their local intermediate (#9428)
This fixes an issue where leaf certificates issued in primary
datacenters using Vault as a Connect CA would be reissued very
frequently (every ~20 seconds) because the logic meant to detect root
rotation was errantly triggering.

The hash of the rootCA was being compared against a hash of the
intermediateCA and always failing. This doesn't apply to the Consul
built-in CA provider because there is no intermediate in use in the
primary DC.

This is reminiscent of #6513
2021-02-08 13:18:51 -06:00
..
2020-10-09 10:51:37 -04:00
2020-10-13 18:16:33 -04:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-06 23:15:29 +02:00
2020-08-12 11:21:54 -05:00
2020-08-28 23:01:04 +02:00
2020-09-15 13:33:55 -07:00
2020-09-14 14:16:47 -06:00
2020-09-10 18:53:36 +02:00
2020-09-02 10:48:11 -05:00
2020-09-15 10:05:23 -07:00
2020-09-25 12:03:49 -04:00
2020-10-20 16:42:06 -04:00
2020-10-09 08:01:55 -07:00
2020-10-07 10:22:40 -05:00
2020-12-30 14:09:50 -06:00
2020-11-11 11:33:38 -06:00
2020-11-09 17:29:06 -05:00
2020-11-17 10:35:56 -05:00
2020-11-13 14:31:14 -08:00
2020-11-20 18:23:01 +01:00
2020-11-30 17:27:39 +00:00
2021-01-05 13:05:42 -05:00
2021-01-20 18:18:46 +00:00
2021-01-29 16:08:39 +00:00
2020-10-09 22:44:51 -04:00