consul/agent/connect/ca
Alexander Scheel 2b90307f6d
Detect Vault 1.11+ import, update default issuer (#15253)
Consul used to rely on implicit issuer selection when calling Vault endpoints to issue new CSRs. Vault 1.11+ changed that behavior, which caused Consul to check the wrong (previous) issuer when renewing its Intermediate CA. This patch allows Consul to explicitly set a default issuer when it detects that the response from Vault is 1.11+.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
2022-11-17 16:29:49 -05:00
..
common.go Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
mock_Provider.go chore: upgrade mockery to v2 and regenerate (#12836) 2022-04-21 09:48:21 -05:00
provider.go Support vault namespaces in connect CA (#12904) 2022-05-04 19:41:55 -07:00
provider_aws.go Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
provider_aws_test.go ca/provider: remove ActiveRoot from Provider 2022-01-27 13:07:37 -05:00
provider_consul.go ca: cleanup validateSetIntermediate 2022-02-17 18:21:30 -05:00
provider_consul_config.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_consul_test.go ca/provider: remove ActiveRoot from Provider 2022-01-27 13:07:37 -05:00
provider_test.go Vendor in rpc mono repo for net/rpc fork, go-msgpack, msgpackrpc. (#12311) 2022-02-14 09:45:45 -08:00
provider_vault.go Detect Vault 1.11+ import, update default issuer (#15253) 2022-11-17 16:29:49 -05:00
provider_vault_test.go Detect Vault 1.11+ import, update default issuer (#15253) 2022-11-17 16:29:49 -05:00
testing.go removes ioutil usage everywhere which was deprecated in go1.16 (#15297) 2022-11-10 10:26:01 -06:00