vault read pki/roles/role-name
Key Value
key_type rsa
lease
allowed_domains fakedomain.com
allow_bare_domains false
client_flag true
code_signing_flag false
allow_any_name false
allowed_base_domain
email_protection_flag false
key_bits 2048
lease_max
server_flag true
allow_localhost true
allow_ip_sans true
allow_subdomains true
allow_token_displayname false
enforce_hostnames true
max_ttl 52600h
ttl (system default, capped to role max)
use_csr_common_name true
allow_base_domain false
X509v3 extensions:
X509v3 Key Usage: critical
Digital Signature, Key Encipherment, Key Agreement
X509v3 Extended Key Usage:
TLS Web Server Authentication, TLS Web Client Authentication
2016/01/25 19:51:27 [ERR] raft: Failed to make RequestVote RPC to x.x.x.x:8300: remote error: bad certificate
2016/01/25 19:51:28 [ERR] consul.rpc: failed to read byte: tls: failed to verify client's certificate: x509: certificate specifies an incompatible key usage
Hi Chris,
This change will indeed be in the next version. If you wanted to check that things were fixed you could set up a dev Vault server with the same role parameters and issue a cert, then pull it into a dev Consul to make sure it accepts it.
--Jeff
> To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/bda6242b-27ce-41e3-8adf-c73b6c8a5caf%40googlegroups.com.