-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Fixes ACME default configuration #5839
Conversation
@russjones @r0mant can you folks please review |
Fixes #5771, tctl configure has to generate port :443 when ACME is on, because TLS-ALPN-01 challenge only works on 443 port.
d2e6ae9
to
faece9f
Compare
I just tried this on a new cluster and it worked using the below, the one unrelated issue would be to change how we setup configure. I have a note below.
teleport:
nodename: ip-172-31-13-209
data_dir: /var/lib/teleport
log:
output: stderr
severity: INFO
ca_pin: ""
auth_service:
enabled: "yes"
listen_addr: 0.0.0.0:3025
cluster_name: silver.asteroid.earth
ssh_service:
enabled: "yes"
labels:
env: example
commands:
- name: hostname
command: [hostname]
period: 1m0s
proxy_service:
enabled: "yes"
listen_addr: 0.0.0.0:3023
web_listen_addr: :443
public_addr: silver.asteroid.earth:443
https_keypairs: []
acme:
enabled: "yes"
email: ben@goteleport.com When using the new script, I've noticed that the TLS certificate adds the node name into the cert. I've found that setting a public_addr is better as an IP/FQDN is needed for plugins to work.
|
p.PublicAddr = utils.Strings{net.JoinHostPort(flags.ClusterName, fmt.Sprintf("%d", teleport.StandardHTTPSPort))} | ||
p.WebAddr = fmt.Sprintf(":%d", teleport.StandardHTTPSPort) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can use strconv.Itoa
here like the following:
p.PublicAddr = utils.Strings{net.JoinHostPort(flags.ClusterName, strconv.Itoa(teleport.StandardHTTPSPort))}
p.WebAddr = net.JoinHostPort("", strconv.Itoa(teleport.StandardHTTPSPort))
@benarent not sure I follow, can you please elaborate on the IP/FQDN? |
^ I'm going to create another ticket that outlines this issue. |
Fixes #5771, tctl configure has to generate port :443 when ACME is on, because TLS-ALPN-01 challenge only works on 443 port.
Fixes #5771, tctl configure has to generate port :443 when ACME is on, because TLS-ALPN-01 challenge only works on 443 port.
Fixes #5771, tctl configure has to generate port :443 when ACME is on, because TLS-ALPN-01 challenge only works on 443 port.
Fixes #5771, tctl configure has to generate port :443
when ACME is on, because TLS-ALPN-01 challenge only works on 443 port.