Ryan Treat
Ryan Treat
@Saadi6 that functionality is supported by the VCert client SDK but not currently by the CLI.
@mathianasj thank you for submitting your idea. I will consult with the cert-manager team and consider this for the future roadmap. In the meantime, assuming you are using Trust Protection...
Hi @barucoh, it sounds like the feature you may be seeking is provided by the VCert CLI's `--verbose` parameter. When specified it is intended to show the individual REST API...
Need to make sure this doesn't cause issues for consumers like HashiCorp Vault. I know that our choice of logger was the root cause of a memory leak issue for...
@BrandonRoehl thank you for the PR and apologies for the delay. Our team is currently focused on meeting our Q3 objectives but your PR is something that I've currently got...
This comment has the details of the Vault issue I referred to earlier: https://github.com/Venafi/vault-pki-monitor-venafi/issues/27#issuecomment-582177227. And this PR that resolved it: https://github.com/Venafi/vcert/pull/71. Given that, I'm not sure we can merge this...
@BrandonRoehl apologies for the delay. Yes, but unfortunately the news is not good 😞 HashiCorp Engineering reviewed your proposed change and said they agreed with my fears that it would...
@BrandonRoehl this PR has gotten stale, checking to see if you were able to find any alternative that wouldn't break our integration with HashiCorp Vault (vault-pki-monitor-venafi)? Unfortunately there's no easy...
@maelvls what you are suggesting seems counter to one of the main goals of the TPP token authentication feature. We're striving to eliminate the use of username/password for API-based integrations...
@nmattingly updating the CRL for a Vault CA is not something this solution was previously designed for therefore this would be an enhancement not a bug. Are you able to...