consul/agent/connect/ca
Alexander Scheel 2b90307f6d
Detect Vault 1.11+ import, update default issuer (#15253)
Consul used to rely on implicit issuer selection when calling Vault endpoints to issue new CSRs. Vault 1.11+ changed that behavior, which caused Consul to check the wrong (previous) issuer when renewing its Intermediate CA. This patch allows Consul to explicitly set a default issuer when it detects that the response from Vault is 1.11+.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
2022-11-17 16:29:49 -05:00
..
common.go Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
mock_Provider.go
provider.go Support vault namespaces in connect CA (#12904) 2022-05-04 19:41:55 -07:00
provider_aws.go Configure upstream TLS context with peer root certs (#13321) 2022-06-01 15:53:52 -06:00
provider_aws_test.go
provider_consul.go
provider_consul_config.go
provider_consul_test.go
provider_test.go
provider_vault.go Detect Vault 1.11+ import, update default issuer (#15253) 2022-11-17 16:29:49 -05:00
provider_vault_test.go Detect Vault 1.11+ import, update default issuer (#15253) 2022-11-17 16:29:49 -05:00
testing.go removes ioutil usage everywhere which was deprecated in go1.16 (#15297) 2022-11-10 10:26:01 -06:00