-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crypto/x509: verification fails with "cannot parse dnsName" in intermediate #371
Comments
So this is no client-go error, but Go? |
This is an error happening on ingress-nginx, that uses and calls client-go functions, that uses x509 go library. That should be fixed upstream, but if not, we could implement a workaround here (not saying that we should, at least discuss the problem). On golang/go#23995 (comment), they're asking for thumbs up if this affects you. |
"Trunet.co AMS Kubernetes Intermediate CA" doesn't look like a DNS name. Why would you want that value as a SANs DNS? It sounds like this is getting fixed in 1.10.1. Since you can work around this today by making your DNS values look like actual DNS values, I don't think we should provide an external work around. |
from: golang/go#23995 (comment)
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Loading an intermediate certificate, is generating this error:
My intermediate CA generated by hashicorp vault, contains:
This will probably be fixed on golang/go#23995
The text was updated successfully, but these errors were encountered: