-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support SKI in non-CA certificates #13
Comments
Here are requirements that OpenShift Origin sets for etcd client certificates
Specifically |
In |
Agreed that RFC 5280 says that the subject key ID SHOULD be included in end entity certificates. We could just change the code to always add it. But out of an abundance of caution let's put it behind an option. How about, in the subject_key_id: true to force a key ID. Default if cert_signing enabled is true, otherwise false. |
I'm also looking for more options as @matthewvalimaki. What is blocking me from switching fully to this provider is lack of (mentioned) @SpencerBrown any updates on this topic? |
I have the same issue with kubernetes certs. #31 |
Support for |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
I would like existing SKI support to be extended to non-CA certificates. For RFC see https://tools.ietf.org/html/rfc5280#section-4.2.1.2. While the RFC says it is mandatory for CA's the way I read it they suggest using SKI with end entity certificates as well.
I came across this with etcd & OpenShift Origin combination where the etcd keys have SKI in the non-CA certificate.
Terraform Version
Terraform v0.11.3
The text was updated successfully, but these errors were encountered: