-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Auto encrypt k8s #6944
Auto encrypt k8s #6944
Conversation
Codecov Report
@@ Coverage Diff @@
## master #6944 +/- ##
==========================================
+ Coverage 65.35% 65.62% +0.27%
==========================================
Files 447 443 -4
Lines 53603 53304 -299
==========================================
- Hits 35031 34981 -50
+ Misses 14362 14105 -257
- Partials 4210 4218 +8
Continue to review full report at Codecov.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for sharing your PR, this makes sense to me!
72f5a0a
to
e7ed588
Compare
7df318c
to
45a6c90
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
looks good to me! only left suggestion of places to add comments inline
45a6c90
to
6e2f4f9
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This mostly looks good to me, made a couple suggestions inline but they're not blocking.
agent/connect/csr.go
Outdated
extensions ...pkix.Extension) (string, error) { | ||
return CreateCSRWithSAN(uri, commonName, privateKey, nil, nil, extensions...) | ||
} | ||
|
||
// CreateCSR returns a CA CSR to sign the given service along with the PEM-encoded |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
// CreateCSR returns a CA CSR to sign the given service along with the PEM-encoded | |
// CreateCACSR returns a CA CSR to sign the given service along with the PEM-encoded |
Since auto_encrypt certs are being used to serve HTTPS (#6489) they should have sensible
Subject Alternative Name
set instead of only providing the spiffe id. And there is a way to configure additional DNSSAN and IPSAN which will be used by the agent when requesting auto_encrypt certs. Note the following cert, which hasconsul.io
and192.168.1.1
set.Todo: