You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Use strict YAML validation when reading teleport.yaml.
Any fields that don't map to a config value should be treated as errors.
To prevent breaking customers on upgrade, we should spread this over 2 releases:
6.0: run strict validation in warning more and fall back to old validation on failure; the warning should be very visible at startup, perhaps with a short sleep to prompt users to look at the logs
7.0: always run strict validation
Motivation
The current validation of teleport.yaml checks that keys are one of a hardcoded valid set:
But it doesn't validate that it's in the right place in the config.
Some examples of invalid configs that pass validation:
auth_service:
data_dir: /custom/path # this must be under "teleport:", not "auth_service:"
proxy_service:
kubernetes_service: # this must be "kubernetes"enabled: yeslisten_addr: 0.0.0.0:3026kubernetes: # this must be "kubernetes_service"enabled: yeslisten_addr: 0.0.0.0:3027
Who's it for?
OSS User, Pro, Enterprise
The text was updated successfully, but these errors were encountered:
Feature Request
Use strict YAML validation when reading
teleport.yaml
.Any fields that don't map to a config value should be treated as errors.
To prevent breaking customers on upgrade, we should spread this over 2 releases:
Motivation
The current validation of
teleport.yaml
checks that keys are one of a hardcoded valid set:teleport/lib/config/fileconf.go
Lines 244 to 272 in 3070408
But it doesn't validate that it's in the right place in the config.
Some examples of invalid configs that pass validation:
Who's it for?
OSS User, Pro, Enterprise
The text was updated successfully, but these errors were encountered: