Add client certs#8365
Conversation
* GSuite LDAP requires that clients use client TLS certificates/keys in order to authenticate against their LDAP.
* GSuite LDAP requires that clients use client TLS certificates/keys in order to authenticate against their LDAP.
…to add-client-certs
|
The pipeline is failing due to missing attribute |
|
Thanks everyone for this work |
|
I've tested the both the client certificate authentication and the group membership mappings to Vault policies. Everything seems to be ok. |
Odd that this is failing for this reason... clearly the PR adds that field. Might be some odd dependency caching? Can you try running the tests locally to see? |
|
@AeroNotix I was able to build on my linux machine. Machine details: |
|
@Gisson I meant the tests. |
|
@AeroNotix In the CI the stage that failed was the build one that's why I posted that. However I'm running all the tests now. |
|
Indeed, just wanted to know ahead of time whether the actual tests pass/fail with mine (and your) changes. I remember when I implemented this code there were no issues with CI/tests so maybe something changed with how hashicorp run stuff in CI? Who knows. Probably best to wait for a hashicorper to say what the issue is. As a quick test - could you try kicking the ci by amending with no changes your previous commit and force pushing? |
|
@AeroNotix I've I'll try doing what you said and kicking the the ci. |
783c5ef to
7fa25d8
Compare
|
After a little digging around, I found that the (obvious...) problem lied in |
|
@michelvocks @jefferai @noelledaley any tips for getting the CI to pass? |
Co-Authored-By: Michel Vocks <michelvocks@gmail.com>
Co-Authored-By: Michel Vocks <michelvocks@gmail.com>
|
@Gisson Thanks! I forgot to mention that you also have to add |
|
@Gisson This looks really good. Thanks for all the work. I think we are ready to get that merged as soon as both comments from @noelledaley have been addressed. |
|
@michelvocks I've addressed the issues. Are we ready for the merge? |
|
@Gisson thank you for making these updates! everything on the UI side looks pretty good. the one thing i noticed is that after i've uploaded a again, thanks for your work on this! |
|
@Gisson Yes! Thanks a lot for your effort. We are currently in a code-freeze period before the 1.4 Beta release which will delay the merge of this PR for a few days but overall the PR looks good. @noelledaley Yes, we did that intentionally. In my opinion, the tls cert and tls key should not be returned. |
|
@Gisson @AeroNotix Thanks for this! One question we had is whether it would be appropriate to require that TLS certs are configured if |
|
@kalafut I think that entirely depends on the LDAP service in use. For Google it may make sense, for other LDAP choochers it might not. It needs testing with a bunch out there. I've been far removed from this for a chunk o' time so I would need to revisit it. Thanks for merging this though, greatly appreciated. Thanks especially to @Gisson for walking this over the line and putting a big beautiful bow on it. Good job. Great to see open-source in action! I hope our paths cross again. |
Follow up from PR #7578