Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Storage consul: allow comma in service_tags #6832

Open
deniszh opened this issue Jun 5, 2019 · 4 comments
Open

Storage consul: allow comma in service_tags #6832

deniszh opened this issue Jun 5, 2019 · 4 comments

Comments

@deniszh
Copy link

deniszh commented Jun 5, 2019

Currently, service_tags parameter of consul storage should contain a comma-separated list of tags, which means that tag can't contain a comma. it would be nice to have some way to insert it.

@fewknow
Copy link

fewknow commented Jan 17, 2020

This is currently blocking for us to use "OrgName, Inc." when creating a role with pki secrets engine.

resource "vault_pki_secret_backend_role" "role" {
  backend = "pki"
  name    = "my_role"
  ou      = ["OrgName, Inc."]
}

This ends up creating

locality                              []
max_ttl                               0s
no_store                              false
not_before_duration                   30s
organization                          [OrgName Inc.]
ou                                    []

So when I try to generate a cert it get this err:

RESPONSE : 
{"errors":["Organization [] doesn't match regexps: [^QRG, Inc\\.$]"]}

@FelipeEmerim
Copy link

FelipeEmerim commented Oct 27, 2021

Since traefik added an option of discovering consul services though service tags this is a major issue for us, as the middlewares are a comma separated list of names.

@tommyalatalo
Copy link

service_tags needs to be a HCL list of strings and not a comma separated string. The value that the parameter takes now makes no sense since the config is written in HCL and would very naturally lend itself to this.

@smaddock
Copy link

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

8 participants