Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Teleport Kubernetes should respect idle_timeout and disconnect_expired_cert #2618

Closed
klizhentas opened this issue Mar 21, 2019 · 0 comments
Closed
Assignees
Milestone

Comments

@klizhentas
Copy link
Contributor

Description

Teleport Kubernetes proxy should disconnect expired certs when specified and respect idle timeout to be consistent with Teleport SSH.

@klizhentas klizhentas added this to the 3.2 "Dublin" milestone Mar 21, 2019
@klizhentas klizhentas self-assigned this Mar 21, 2019
klizhentas added a commit that referenced this issue Mar 24, 2019
This commit implements disconnects of kubernetes
clients with expired certificates and terminates
idle sessions, according to 'disconnect_expired_cert'
and 'client_idle_timeout' existing settings making
the behavior consistent with SSH sessions.
klizhentas added a commit that referenced this issue Mar 25, 2019
This commit implements disconnects of kubernetes
clients with expired certificates and terminates
idle sessions, according to 'disconnect_expired_cert'
and 'client_idle_timeout' existing settings making
the behavior consistent with SSH sessions.
klizhentas added a commit that referenced this issue Mar 25, 2019
This commit implements disconnects of kubernetes
clients with expired certificates and terminates
idle sessions, according to 'disconnect_expired_cert'
and 'client_idle_timeout' existing settings making
the behavior consistent with SSH sessions.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant