Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for SVIDs in the Pki Module #3830

Closed
zglozman opened this issue Jan 22, 2018 · 5 comments
Closed

Support for SVIDs in the Pki Module #3830

zglozman opened this issue Jan 22, 2018 · 5 comments

Comments

@zglozman
Copy link

When trying to receive a certificate using /pki/role/X/issue and specifying a spiffy SVID in one of the SAN names, the vault response that the spiffe:// is not in allowed syntax.

What would be an appropriate way to issue an X509 containing and spiffe svid?

Environment:

  • Vault Version:
  • Operating System/Architecture:

Vault Config File:

Startup Log Output:

Expected Behavior:

Actual Behavior:

Steps to Reproduce:

Important Factoids:

References:

@jefferai
Copy link
Member

jefferai commented Feb 5, 2018

Vault does not currently support custom URIs in SANs, sorry.

@jefferai jefferai closed this as completed Feb 5, 2018
@zglozman
Copy link
Author

zglozman commented Feb 5, 2018

I know that. What do you think would be the best way to implement it ? Would you guys accept a PR?

@jefferai
Copy link
Member

jefferai commented Feb 5, 2018

Sure, a PR would be good. We'd want to do a design review ahead of time since we'll want some controls around what URIs can be used. (I want to note, SVID SAN support is not sufficient for full SPIFFE functionality, since it also has custom extended key usages and some other things.)

If you are looking at code, I'd strongly suggest starting from #3889 since it does a lot of refactoring to support custom SANs.

@jefferai jefferai reopened this Feb 5, 2018
@jefferai
Copy link
Member

jefferai commented Feb 5, 2018

@zglozman opening this again for now for tracking while in discussion

@vishalnayak
Copy link
Member

Issues that are not reproducible and/or not had any interaction for a long time are stale issues. Sometimes even the valid issues remain stale lacking traction either by the maintainers or the community. In order to provide faster responses and better engagement with the community, we strive to keep the issue tracker clean and the issue count low. In this regard, our current policy is to close stale issues after 30 days. Closed issues will still be indexed and available for future viewers. If users feel that the issue is still relevant but is wrongly closed, we encourage reopening them.

Please refer to our contributing guidelines for details on issue lifecycle.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants