-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Authority Key Identifier to locally signed certificate #66
Conversation
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes Alex Hasselbach seems not to be a GitHub user. Have you signed the CLA already but the status is still pending? Recheck it. |
Any news on this functionality? |
Encountered this issue when trying to import a Terraform generated CA intermediate into Vault. It's been open for years, would be nice if we could get this merged :) Looks like the PR author still needs to sign the CLA agreement. CC: @Q69K |
Found this issue, as some certificates stop working as we updated the OpenSSL version. |
Hello and thanks for the contribution. Because no example was provided to reproduce this, I have tested it and found that, for Additionally, local testing where I tried to reproduce, showed that the behaviour is what the This is NOT the case for As I started working on this together with #56, I'll have a PR incoming that will close both. Thank you. |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
No description provided.