Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Wrong URLs for CRL and CA Cert on PKI Engine #391

Open
Torkolis opened this issue Jun 2, 2022 · 0 comments
Open

Wrong URLs for CRL and CA Cert on PKI Engine #391

Torkolis opened this issue Jun 2, 2022 · 0 comments

Comments

@Torkolis
Copy link

Torkolis commented Jun 2, 2022

https://learn.hashicorp.com/tutorials/vault/kubernetes-cert-manager#configure-pki-secrets-engine
says:

Configure the PKI secrets engine certificate issuing and certificate revocation list (CRL) endpoints to use the Vault service in the default namespace.

$ vault write pki/config/urls \
    issuing_certificates="http://vault.default:8200/v1/pki/ca" \
    crl_distribution_points="http://vault.default:8200/v1/pki/crl"
Success! Data written to: pki/config/urls

but this is wrong, http://vault.default:8200/v1/pki/ca (and the other URL) are kubernetes internal URLs and external clients (e.g. a Browser) which would try to verify certificate validity by fetching the revocation list would fail to do so. One should configure external (ingress) URL for both of the endpoints.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant