Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Detect Vault 1.11+ import, update default issuer (#15253) #15437

Merged
merged 4 commits into from
Nov 18, 2022

Commits on Nov 17, 2022

  1. Detect Vault 1.11+ import, update default issuer (#15253)

    Consul used to rely on implicit issuer selection when calling Vault endpoints to issue new CSRs. Vault 1.11+ changed that behavior, which caused Consul to check the wrong (previous) issuer when renewing its Intermediate CA. This patch allows Consul to explicitly set a default issuer when it detects that the response from Vault is 1.11+.
    
    Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
    Co-authored-by: Chris S. Kim <ckim@hashicorp.com>
    cipherboy and kisunji committed Nov 17, 2022
    Configuration menu
    Copy the full SHA
    ebe4102 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    47e0de5 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    aeddbe1 View commit details
    Browse the repository at this point in the history

Commits on Nov 18, 2022

  1. Configuration menu
    Copy the full SHA
    5a5dda2 View commit details
    Browse the repository at this point in the history