-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
crypto/x509: verification fails with "cannot parse dnsName" in intermediate #371
Comments
So this is no client-go error, but Go? |
This is an error happening on ingress-nginx, that uses and calls client-go functions, that uses x509 go library. That should be fixed upstream, but if not, we could implement a workaround here (not saying that we should, at least discuss the problem). On golang/go#23995 (comment), they're asking for thumbs up if this affects you. |
"Trunet.co AMS Kubernetes Intermediate CA" doesn't look like a DNS name. Why would you want that value as a SANs DNS? It sounds like this is getting fixed in 1.10.1. Since you can work around this today by making your DNS values look like actual DNS values, I don't think we should provide an external work around. |
from: golang/go#23995 (comment)
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Loading an intermediate certificate, is generating this error:
My intermediate CA generated by hashicorp vault, contains:
This will probably be fixed on golang/go#23995
The text was updated successfully, but these errors were encountered: