open-consul/agent/connect/ca
Iryna Shustava bd3fb0d0e9
connect: Support auth methods for the vault connect CA provider (#11573)
* Support vault auth methods for the Vault connect CA provider
* Rotate the token (re-authenticate to vault using auth method) when the token can no longer be renewed
2021-11-18 13:15:28 -07:00
..
common.go Format certificates properly (rfc7468) with a trailing new line (#10411) 2021-06-30 20:48:29 -04:00
mock_Provider.go Ensure that CA initialization does not block leader election. 2021-01-19 15:27:48 -05:00
provider.go ca: split Primary/Secondary Provider 2021-10-10 15:48:02 -04:00
provider_aws.go ca: accept only the cluster ID to SpiffeIDSigningForCluster 2021-11-16 16:57:21 -05:00
provider_aws_test.go plumb thru root cert tll to the aws ca provider (#11449) 2021-11-04 12:19:08 -07:00
provider_consul.go ca: use the cluster ID passed to the primary 2021-11-16 16:57:22 -05:00
provider_consul_config.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_consul_test.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_test.go add root_cert_ttl option for consul connect, vault ca providers (#11428) 2021-11-02 11:02:10 -07:00
provider_vault.go connect: Support auth methods for the vault connect CA provider (#11573) 2021-11-18 13:15:28 -07:00
provider_vault_test.go connect: Support auth methods for the vault connect CA provider (#11573) 2021-11-18 13:15:28 -07:00
testing.go ca: use provider constructors to be more consistent 2021-07-12 14:04:34 -04:00