Enhance with pkiCert template to return full CA chain #1962
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is for Github issue #1961
This provides the
CAChain
data on thewith pkiCert
function. This is necessary to support rotation of a intermediary CA without causing service interruptions.Instead of using this template:
I can instead just use:
While similar, this has two critical benefits:
with secret
however now pulls a newca_chain
which causes a client certificate to be created that is{Leaf cert v1, Issuing CA V2}
. Since The leaf cert was issued by a different issuer (the previous one) the chain that vault-agent creates is invalid (Authority/signatures do not match).ca_chain
is returned on thewith pkiCert
, we no longer make a high number of API calls to vaultca_chain
endpoint.Without this code, we could not find a way to trust a single rootCA & support rotation of a intermediary CA/issuing CA.
This passes existing tests, and I've tested it manually using a self built version of the
vault 1.8.0-beta
code.This also retains backwards compatibility (CA object on
with pkiCert
does not change functionally.Please review!