-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vault 11799 Vault CLI Re-Issue (Templating based on existing certificate) #18499
Vault 11799 Vault CLI Re-Issue (Templating based on existing certificate) #18499
Conversation
Co-authored-by: 'Alex Scheel' <alex.scheel@hashicorp.com>
…fter, permitted_dns_domains and skid
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall great stuff! We can either fix some of the comments here or merge and address in another PR.
parentIssuer := sanitizePath(args[0]) // /pki/issuer/default | ||
intermediateMount := sanitizePath(args[2]) | ||
|
||
templateCertificateResp, err := client.Logical().Read(sanitizePath(args[1])) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll fix this up across various commands, just be aware that it is possible that we get a nil, nil response here if the URL passed in wasn't a valid path. The list-intermediates has the same issue.
No description provided.