open-consul/agent/connect
Mark Anderson 18193f2916
Support vault namespaces in connect CA (#12904)
* Support vault namespaces in connect CA

Follow on to some missed items from #12655

From an internal ticket "Support standard "Vault namespace in the
path" semantics for Connect Vault CA Provider"

Vault allows the namespace to be specified as a prefix in the path of
a PKI definition, but our usage of the Vault API includes calls that
don't support a namespaced key. In particular the sys.* family of
calls simply appends the key, instead of prefixing the namespace in
front of the path.

Unfortunately it is difficult to reliably parse a path with a
namespace; only vault knows what namespaces are present, and the '/'
separator can be inside a key name, as well as separating path
elements. This is in use in the wild; for example
'dc1/intermediate-key' is a relatively common naming schema.

Instead we add two new fields: RootPKINamespace and
IntermediatePKINamespace, which are the absolute namespace paths
'prefixed' in front of the respective PKI Paths.

Signed-off-by: Mark Anderson <manderson@hashicorp.com>
2022-05-04 19:41:55 -07:00
..
ca Support vault namespaces in connect CA (#12904) 2022-05-04 19:41:55 -07:00
authz.go Fixup acl.EnterpriseMeta 2022-04-05 15:11:49 -07:00
authz_test.go
common_names.go
csr.go ConnectCA.Sign gRPC Endpoint (#12787) 2022-04-14 14:26:14 +01:00
generate.go
generate_test.go
parsing.go
sni.go peering: Make Upstream peer-aware (#12900) 2022-04-29 18:12:51 -04:00
sni_test.go
testing_ca.go
testing_ca_test.go
testing_spiffe.go
uri.go
uri_agent.go Fixup acl.EnterpriseMeta 2022-04-05 15:11:49 -07:00
uri_agent_oss.go Fixup acl.EnterpriseMeta 2022-04-05 15:11:49 -07:00
uri_agent_oss_test.go
uri_service.go Fixup acl.EnterpriseMeta 2022-04-05 15:11:49 -07:00
uri_service_oss.go Fixup acl.EnterpriseMeta 2022-04-05 15:11:49 -07:00
uri_service_oss_test.go
uri_signing.go
uri_signing_test.go
uri_test.go
x509_patch.go
x509_patch_test.go