Conversation
|
friendly ping @greedy52 @timothyb89 @flyinghermit |
flyinghermit
left a comment
There was a problem hiding this comment.
I only reviewed code level changes and those changes LGTM.
Please also get a review from database access team.
05e0b70 to
05285de
Compare
326dbba to
f43a861
Compare
There was a problem hiding this comment.
Overall LGTM. Thanks!
Several comments:
- Looks like
lib/teletermdoes not need an update? (as recently we changed it to use TLS cert in memory instead of paths ) - The team will test out all databases during release testing.
- Since some paths changed, this would be a breaking change for existing scripts that assumes the key/cert path. Might worth a small note on the release change log?
| args := append([]string{ | ||
| // default --db-user and --db-name are selected from roles. | ||
| "db", "login", | ||
| "db", "login", "--insecure", |
There was a problem hiding this comment.
I introduced a Ping that hits the proxy and requires --insecure flag for this test, mustLogin already used for the initial login uses --insecure as well
Yep, looks like it's fine.
Thanks! I'm counting on it
I'm planning to add a changelog entry for the whole "configurable algorithm suites" feature later, but these seems like a good point to mention the changed file paths, added a CL entry to the PR description |
05285de to
ce700b7
Compare
f43a861 to
a57db58
Compare
a57db58 to
951fe64
Compare
This PR is part of the implementation of RFD 136.
The main change here is that
tshnow uses a unique private key every time it gets a new db cert issued. This new key will use a signature algorithm according to the cluster's currently configuredsignature_algorithm_suite.Changelog: Changed the certificate and private key file paths for application, database, and Kubernetes access.