-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[v17] Reissue kube certs when assuming access request #51055
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
changelog: Assuming an access request in Teleport Connect now refreshes open Kubernetes sessions
I think this might not be clear enough to end users who don't know how Connect works behind the scenes. "Kubernetes session" sounds like it might mean kubectl exec --stdin --tty foo -- /bin/bash
and then one might wonder what it means for it to be refreshed.
We screwed up a bit by not using the term "local proxy" or at least "gateway" in the UI right from the start – we have no good terminology to refer to what a local proxy is.
How about something like this?
changelog: Assuming an access request in Teleport Connect now propagates elevated permissions to already opened Kubernetes tabs
I looked at the original issue to better understand what kind of language might be more understandable for end users.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense, thanks.
Backport #50553 to branch/v17
changelog: Assuming an Access Request in Teleport Connect now propagates elevated permissions to already opened Kubernetes tabs