Skip to content

Conversation

sgmiller
Copy link
Contributor

@sgmiller sgmiller commented Aug 5, 2024

Some customers have complex PKI setups that include certificate extensions
marked "critical" that the Go TLS stack doesn't understand. When it
encounters such an extension, it fails TLS validation.

This PR adds an option to the JWT auth method,
unsupported_critical_cert_extensions, which can be set to a comma
separated list of the OIDs of extensions that should be ignored.

Copy link
Contributor

@fairclothjm fairclothjm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@sgmiller sgmiller merged commit a847fcb into main Aug 5, 2024
@sgmiller sgmiller deleted the sgm/ignore-crit-exts branch August 5, 2024 20:27
sgmiller added a commit that referenced this pull request Aug 5, 2024
…313)

* Wire up support for ignoring unhandled critical extensions

* update deps

* update dep

* Peg to real tag

* attempts at testing

* Support the cert pool

* setup the CA roots in the roundtripper if present

* remove dead code
sgmiller added a commit that referenced this pull request Aug 5, 2024
…313)

* Wire up support for ignoring unhandled critical extensions

* update deps

* update dep

* Peg to real tag

* attempts at testing

* Support the cert pool

* setup the CA roots in the roundtripper if present

* remove dead code
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants