Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update k8s-auth config to support unsetting the K8s CA Cert #2005

Merged
merged 4 commits into from
Sep 13, 2023

Conversation

benashz
Copy link
Contributor

@benashz benashz commented Sep 8, 2023

Prior to vault-1.9.3, the k8s-auth engine would store the K8S CA cert in its configuration if Vault was running in K8s. Post vault-1.9.3, this behaviour was changed to longer store the K8s CA cert in config. That change confuses TFVP since the kubernetes_ca_cert field can no longer be computed. This fix detects and remedies by adding the ability to "unset" the CA cert in the case where we are provisioning vault-1.9.3+. It should also clean up any K8s CA cert that was left behind after upgrading from any Vault prior to 1.9.3.

Prior to vault-1.9.3, the k8s-auth engine would store the K8S CA cert in
its configuration if Vault was running in K8s. Post vault-1.9.3, this
behaviour was changed to longer store the K8s CA cert in config. That
change confuses TFVP since the kubernetes_ca_cert field can no longer be
computed. This fix detects and remedies by adding the ability to "unset"
the CA cert in the case where we are provisioning vault-1.9.3+. It
should also clean up any K8s CA cert that was left behind after
upgrading from any Vault prior to 1.9.3.
@benashz benashz marked this pull request as ready for review September 8, 2023 20:39
@benashz benashz requested a review from raymonstah September 11, 2023 15:25
@benashz benashz merged commit db95128 into main Sep 13, 2023
@benashz benashz deleted the VAULT-19582/k8s-auth-config-support-unsetting-ca-cert branch September 13, 2023 17:23
@vinay-gopalan vinay-gopalan added this to the 3.21.1 milestone Sep 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants