-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cross link trust #5
Comments
How is jwks going to work? |
Current thinking is to move the x509 trust bundle to |
I think it should be possible to deal with the trust bundle only in JWKS format. Most of the APIs involved should accept JWKS. Did you see any issues with that? |
oh.... the default format is pem, which excludes the jwk's... but -format spiffe gets it:
That should work. |
Hmmm.... Except that is a server command... I need to get it via the agent.. |
I see. What I'm thinking might work is to subscribe via the delegated API to fetch x509 and jwt bundles and then merge them into one using https://pkg.go.dev/github.com/spiffe/go-spiffe/[email protected]/bundle/spiffebundle The Bundle struct in there can be marshalled to a JWKS which can then be fed into spire-server. It might need conversion into yet another format, the protobuf representation of the bundle. |
There are functions in the go library, it looks like, to rebuild a spiffe formatted json file from the ca and jwks formatted files. |
Added a little tool to convert from ca.crt & jwt_bundle.json back to a spiffe formatted json file. spire-trust-sync service modified to use it. Now spiffe://spire-ha has a complete trust bundle. Last step is to add support for it in the spire-ha-agent. |
Load the trust bundle of each server into the other's server under the federated name, spiffe://spire-ha. Then, in the spire-ha-agent, use those trust bundles for bootstrapping. This would enable booting a spire-ha-agent with only one upstream agent available.
The text was updated successfully, but these errors were encountered: