Git Product home page Git Product logo

Comments (10)

tr1ck3r avatar tr1ck3r commented on July 20, 2024

@sfortuna did you execute vault secrets enable and, if so, did you specify -path=venafi-pki when you did? https://www.vaultproject.io/docs/commands/secrets/enable.html

from vault-pki-backend-venafi.

sfortuna avatar sfortuna commented on July 20, 2024

Yes, I was able to complete steps 1-10 in the quickstart guide. The error occurs when running this command in step 11:
vault write venafi-pki/sign/tpp-backend [email protected]

https://github.com/Venafi/vault-pki-backend-venafi

from vault-pki-backend-venafi.

arykalin avatar arykalin commented on July 20, 2024

Hi @sfortuna on what platform you're running venafi-pki? Could you share vault logs?

from vault-pki-backend-venafi.

sfortuna avatar sfortuna commented on July 20, 2024

RHEL

2019-07-26T12:50:11.028-0400 [TRACE] secrets.venafi-pki-backend.venafi-pki-backend_28bddf70.venafi-pki-backend: handle existence check: transport=gRPC path=sign/tpp-backend status=started
2019-07-26T12:50:11.029-0400 [TRACE] secrets.venafi-pki-backend.venafi-pki-backend_28bddf70.venafi-pki-backend: handle existence check: transport=gRPC path=sign/tpp-backend status=finished err="unsupported path" took=906.75µs
2019-07-26T12:50:11.029-0400 [TRACE] secrets.venafi-pki-backend.venafi-pki-backend_28bddf70.venafi-pki-backend: handle request: transport=gRPC path=sign/tpp-backend status=started
2019-07-26T12:50:11.030-0400 [TRACE] secrets.venafi-pki-backend.venafi-pki-backend_28bddf70.venafi-pki-backend: handle request: transport=gRPC path=sign/tpp-backend status=finished err="unsupported path" took=993.667µs

from vault-pki-backend-venafi.

tr1ck3r avatar tr1ck3r commented on July 20, 2024

@sfortuna would you please send the full sequence of commands you executed for steps 1-10 and your vault config file to [email protected] so we can attempt to reproduce the issue in our lab? Please redact any sensitive information and also confirm that you are using Vault version 0.12 with version 0.5.1 of the vault-pki-backend-venafi plugin.

from vault-pki-backend-venafi.

sfortuna avatar sfortuna commented on July 20, 2024

We are using vault v 1.1.1 and venafi 0.4.1

from vault-pki-backend-venafi.

sfortuna avatar sfortuna commented on July 20, 2024

Here are the commands with personal information removed:

  1. Unzip venafi-pki-backend_0.4.1+385_linux86.zip
  2. mv venafi-pki-backend /path/to/vault/vault_plugins
  3. vi vault_server_config.json
  4. export VAULT_ADDR=https://{fqdn}:8200
  5. SHA256=$(shasum -a 256 /path/to/vault/vault_plugins/venafi-pki-backend| cut -d' ' -f1)
  6. vault write sys/plugins/catalog/secret/venafi-pki-backend sha_256="${SHA256}" command="venafi-pki-backend"
  7. vault secrets enable -path=venafi-pki -plugin-name=venafi-pki-backend plugin
  8. vault write venafi-pki/roles/tpp-backend
    tpp_url="https://tpp.venafi.example:443/vedsdk"
    tpp_user="admin"
    tpp_password="password"
    zone="DevOps\Vault Backend"
    trust_bundle_file="/opt/venafi/bundle.pem"
    generate_lease=true store_by_cn=true store_pkey=true store_by_serial=true ttl=1h max_ttl=1h
    allowed_domains=example.com
    allow_subdomains=true
  9. vault write venafi-pki/issue/tpp-backend common_name="test.example.com"
    cat < csr.conf
    [req]
    default_bits = 4096
    prompt = no
    default_md = sha256
    req_extensions = req_ext
    distinguished_name = dn

[ dn ]
CN = test-csr-32313131.vfidev.com

[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = alt1-test-csr-32313131.vfidev.com
DNS.2 = alt2-test-csr-32313131.vfidev.com

EOF
openssl req -new -config csr.conf -keyout myserver.key -out myserver.csr -passin pass:somepassword -passout pass:anotherpassword
10. vault write venafi-pki/sign/tpp-backend [email protected]

from vault-pki-backend-venafi.

tr1ck3r avatar tr1ck3r commented on July 20, 2024

Thank you @sfortuna We first added support for signing CSRs in version 0.4.2 of our plugin so that's most likely the source of your problem. Any version higher than the one you are using should work but we recommend the latest (0.5.1).

from vault-pki-backend-venafi.

sfortuna avatar sfortuna commented on July 20, 2024

@tr1ck3r Thanks, we've updated to version 0.5.1 but are still experiencing the same issue. We are still able complete steps 1-10 in the guide but not 11

from vault-pki-backend-venafi.

sfortuna avatar sfortuna commented on July 20, 2024

Hello this was an issue with our CA configuration. Thanks

from vault-pki-backend-venafi.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.