Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Fix] Add subject and ingress address to subject alt names #39

Merged
merged 1 commit into from
Sep 19, 2023

Conversation

gboutry
Copy link
Contributor

@gboutry gboutry commented Sep 19, 2023

Description

Fix #37

Services reaching Vault from inside K8S (no external addressing) use the loadbalancer primitives offered by K8S.

Adding to Subject Alt Names:

  • Service name as DNS SAN
  • Ingress address (ClusterIP) as IP SAN

Checklist:

  • My code follows the style guidelines of this project
  • I have performed a self-review of my own code
  • I have made corresponding changes to the documentation
  • I have added tests that validate the behaviour of the software
  • I validated that new and existing unit tests pass locally with my changes
  • Any dependent changes have been merged and published in downstream modules

Notes

I'm not sure that's the right way to handle, since current TLS handling does not handle scaling, TLS management will most likely evolve. Happy to discard if that's not wished.

Services reaching Vault from inside the K8S (no external addressing) use
the loadbalancer primitives offered by K8S.

Adding to Subject Alt Names:
- Service name as DNS SAN
- Ingress address (ClusterIP) as IP SAN
@gboutry gboutry requested a review from a team as a code owner September 19, 2023 09:12
Copy link
Collaborator

@gruyaume gruyaume left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall looks good, I only have one concern about the "ingress" wording

src/charm.py Show resolved Hide resolved
@gruyaume gruyaume merged commit 05dcf27 into canonical:main Sep 19, 2023
@gboutry gboutry deleted the fix/certificate-sans branch September 20, 2023 07:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[BUG] vault certificate only contains unit's IP address as SAN
2 participants