-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Split user keys for db access #44718
Conversation
friendly ping @greedy52 @timothyb89 @flyinghermit |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I only reviewed code level changes and those changes LGTM.
Please also get a review from database access team.
05e0b70
to
05285de
Compare
326dbba
to
f43a861
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall LGTM. Thanks!
Several comments:
- Looks like
lib/teleterm
does not need an update? (as recently we changed it to use TLS cert in memory instead of pathskey, _, err := clusterClient.IssueUserCertsWithMFA(ctx, client.ReissueParams{ - The team will test out all databases during release testing.
- Since some paths changed, this would be a breaking change for existing scripts that assumes the key/cert path. Might worth a small note on the release change log?
@@ -441,7 +441,7 @@ func testDatabaseLogin(t *testing.T) { | |||
} | |||
args := append([]string{ | |||
// default --db-user and --db-name are selected from roles. | |||
"db", "login", | |||
"db", "login", "--insecure", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what happened here? =p
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I introduced a Ping that hits the proxy and requires --insecure
flag for this test, mustLogin
already used for the initial login uses --insecure
as well
Yep, looks like it's fine.
Thanks! I'm counting on it
I'm planning to add a changelog entry for the whole "configurable algorithm suites" feature later, but these seems like a good point to mention the changed file paths, added a CL entry to the PR description |
05285de
to
ce700b7
Compare
f43a861
to
a57db58
Compare
a57db58
to
951fe64
Compare
This PR is part of the implementation of RFD 136.
The main change here is that
tsh
now uses a unique private key every time it gets a new db cert issued. This new key will use a signature algorithm according to the cluster's currently configuredsignature_algorithm_suite
.Changelog: Changed the certificate and private key file paths for application, database, and Kubernetes access.