-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trusted Cluster Toggle #1199
Milestone
Comments
Merged
rosstimothy
added a commit
that referenced
this issue
May 21, 2024
Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
rosstimothy
added a commit
that referenced
this issue
May 21, 2024
Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
rosstimothy
added a commit
that referenced
this issue
May 21, 2024
Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
rosstimothy
added a commit
that referenced
this issue
May 21, 2024
Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
github-merge-queue bot
pushed a commit
that referenced
this issue
May 21, 2024
) Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
github-merge-queue bot
pushed a commit
that referenced
this issue
May 21, 2024
) Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
github-merge-queue bot
pushed a commit
that referenced
this issue
May 21, 2024
) Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
github-merge-queue bot
pushed a commit
that referenced
this issue
May 21, 2024
) Updates the transport credentials used by gRPC servers that require mTLS to enforce that connections are terminated when the client certificate expires if `disconnect_expired_cert == true`. To prevent session resumption from leaving open sessions established through the Proxy gRPC server the redial mechanism was updated to inspect for certificate expired errors and abort any future reconnection attempts. Partially addresses #1199.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Problem
At the moment, when you disable a Trusted Cluster, you remove
services.CertAuthority
andservices.ReverseTunnel
from the backend. When you re-establish trust, you do the token exchange, and re-addservices.CertAuthority
andservices.ReverseTunnel
to the backend.This is problematic because it requires you to store a long lived token on two clusters.
Proposed Solution
To disable a Trusted Cluster, introduce a new methods to the Trust and Presence interfaces called
DeactivateCertAuthority
andDeactivateReverseTunnel
. These methods will first copyservices.CertAuthority
andservices.ReverseTunnel
like so./authorities/*/{cluster name}
/authorities/deactivated/*/{cluster name}
/reverseTunnels/{cluster name}
/reverseTunnels/deactivated/{cluster name}
Then call
DeleteCertAuthority
andDeleteReverse
tunnel.To enable a Trusted Cluster, introduce a new method to the Trust and Presence interfaces called
ActivateCertAuthority
andActivateReverseTunnel
. These methods will first check if aservices.TrustedCluster
meta-resource exists. If it does, it will reverse the steps used to deactivate a cluster.The text was updated successfully, but these errors were encountered: