-
Notifications
You must be signed in to change notification settings - Fork 116
Description
Background
Support for the ED25519 key algorithm has been a community-requested feature for this provider for a while. The first issue we could track down was filed in May 2018 (#26). Since then, multiple contributors attempted to bridge this gap (#32 in Nov 2018, #59 in Oct 2019, #85 in Oct 2020).
We want to take this opportunity to thank all the contributors (@jbboehr, @kaidence, @invidian, @nikolay) for the PR they submitted, and also to apologize for the long delay in getting this set of functionalities added to this provider. HashiCorp has a policy to prioritize stability and bug-fixes over any new feature for our “utility providers”; but given the demand for this feature, we decided to look into this and see how we could fit ED25519 inside the feature set.
Proposal
To serve the community at our best, we want to provide a well-rounded implementation that adds support for ED25519. Specifically, we want it to match the same functionality coverage as per the currently-supported RSA and ECDSA.
The implementation will include changes to the following entities, so that they accept ED25519 as input in their algorithm / key_algorithm configuration fields:
Resources:
-
tls_private_key(tls_private_keyresource: adding support for ED25519 key algorithm #151)- Additional field:
private_key_openssh
- Additional field:
-
tls_cert_request(Adding support for ED25519 to all the*_certresources #173) -
tls_locally_signed_cert(Adding support for ED25519 to all the*_certresources #173) -
tls_self_signed_cert(Adding support for ED25519 to all the*_certresources #173)
Data sources:
-
tls_public_key(ED25519: updatingtls_public_keydata source #160)
As work proceeds, PRs will be linked back to this issue for full context.
References
Addresses: #26
Supersedes: #32
Supersedes: #59
Supersedes: #85