Other name sans support in Certificates#6404
Other name sans support in Certificates#6404jetstack-bot merged 22 commits intocert-manager:masterfrom
Conversation
|
Hi @SpectralHiss. Thanks for your PR. I'm waiting for a cert-manager member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/ok-to-test |
1d76e36 to
78baf8e
Compare
|
flake.. |
* The sample code leverages standard library only * It does not leverage util/pki from cert-manager nor issuer-lib Signed-off-by: SpectralHiss <houssem.elfekih@jetstack.io>
* This is to enable conformance testing of the otherName alpha feature Signed-off-by: SpectralHiss <houssem.elfekih@jetstack.io>
* This is to ensure Vault conformance passes since it outputs SANs in different order to other issuers * Matcher was tested manually only we will add tests to it in future Signed-off-by: SpectralHiss <houssem.elfekih@jetstack.io>
356a563 to
7350863
Compare
SgtCoDFish
left a comment
There was a problem hiding this comment.
Got a few comments - I'm gonna take a break soon because I'm ill so I might not be able to re-review. I'd be fine with merging if the comments are addressed though - someone else could review.
Nothing major here though - I think this is great 😁
Co-authored-by: Ashley Davis <SgtCoDFish@users.noreply.github.com> Signed-off-by: SpectralHiss <houssem.elfekih@jetstack.io>
f42c230 to
5cc5c81
Compare
Co-authored-by: Ashley Davis <SgtCoDFish@users.noreply.github.com> Signed-off-by: SpectralHiss <houssem.elfekih@jetstack.io>
708bcdc to
c90fd33
Compare
Co-authored-by: Ashley Davis <SgtCoDFish@users.noreply.github.com> Signed-off-by: Houssem El Fekih <hassoum92@hotmail.com>
|
Thanks @SpectralHiss, this is an awesome new feature. /approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: inteon The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/kind feature |
|
@SpectralHiss Does this need a short paragraph explaining what it can be used for at https://cert-manager.io/docs/usage/certificate/#creating-certificate-resources ? |
|
Yeah, good point! will make a PR to the website documentation |
|
I was off ill when this merged, but I want to chime in now it's merged and say this is absolutely awesome. Great stuff @SpectralHiss 🚀 |
Pull Request Motivation
Addresses #6393
Adds OtherNameSANs field to Certificates
* Added an
otherNameSAN extension mechanism that allows forotherName(s) to be set.* Can take any
otherNameOID with String (UTF-8) like value* cf RFC 5280 p 37
*
otherNameis only a subset of GeneralName, our specific need for forUserPrincipalName used in Microsoft AD/ LDAP is met but we can do any string
otherNamewith this feature.* shallow validation logic in supplied oid type
* Ensured that the selfsigned CertificateTemplateFromCSR still works fine in
test/e2e/certificates/othernamesan.goKind
feature
Release Note