You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
We have a vault server at one ip, which has a cert for a name and a second machine running agent, but connects to the vault server by ip and uses tls_server_name. This works fine for approle auth, but fails for a template.
To Reproduce
Steps to reproduce the behavior:
Set up vault server under $IP, with a valid cert for $NAME
Setup a approle auth and get login data
On another machine start agent with config see below
Template is not expanded, log shows error because of no valid cert for $IP
Expected behavior
tls_server_name should be also respected for templating
Environment:
Vault Server Version (retrieve with vault status): 1.4.2
Vault CLI Version (retrieve with vault version): 1.4.2
Server Operating System/Architecture: Debian 10 / amd64
Any update on getting this fixed? It seems a low hanging-ish bug, with a proposed PR, and I'd really love to stop using TLS_SKIP_VERIFY throughout my k8s injected agent sidecars without resorting to patching and custom binaries on my end.
Describe the bug
We have a vault server at one ip, which has a cert for a name and a second machine running agent, but connects to the vault server by ip and uses tls_server_name. This works fine for approle auth, but fails for a template.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
tls_server_name should be also respected for templating
Environment:
vault status
): 1.4.2vault version
): 1.4.2Vault agent configuration file(s):
XXX template:
If there is anything missing, please just ask.
The text was updated successfully, but these errors were encountered: