consul/agent/connect/ca
Daniel Nephin b92084b8e8 ca: reduce consul provider backend interface a bit
This makes it easier to fake, which will allow me to use the ConsulProvider as
an 'external PKI' to test a customer setup where the actual root CA is not
the root we use for the Consul CA.

Replaces a call to the state store to fetch the clusterID with the
clusterID field already available on the built-in provider.
2021-11-25 11:46:06 -05:00
..
common.go Format certificates properly (rfc7468) with a trailing new line (#10411) 2021-06-30 20:48:29 -04:00
mock_Provider.go Ensure that CA initialization does not block leader election. 2021-01-19 15:27:48 -05:00
provider.go ca: split Primary/Secondary Provider 2021-10-10 15:48:02 -04:00
provider_aws.go ca: accept only the cluster ID to SpiffeIDSigningForCluster 2021-11-16 16:57:21 -05:00
provider_aws_test.go plumb thru root cert tll to the aws ca provider (#11449) 2021-11-04 12:19:08 -07:00
provider_consul.go ca: reduce consul provider backend interface a bit 2021-11-25 11:46:06 -05:00
provider_consul_config.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_consul_test.go ca: reduce consul provider backend interface a bit 2021-11-25 11:46:06 -05:00
provider_test.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_vault.go ca: reduce consul provider backend interface a bit 2021-11-25 11:46:06 -05:00
provider_vault_test.go connect: Support auth methods for the vault connect CA provider (#11573) 2021-11-18 13:15:28 -07:00
testing.go ca: reduce consul provider backend interface a bit 2021-11-25 11:46:06 -05:00