Skip to content
This repository was archived by the owner on Aug 25, 2021. It is now read-only.

server-acl-init: Support connecting to external servers with an SNI header #1005

Merged
merged 2 commits into from
Jun 28, 2021

Conversation

ishustava
Copy link
Contributor

@ishustava ishustava commented Jun 24, 2021

Changes proposed in this PR:
Currently, when running with consul servers outside the k8s clusters and using ACLs, the server-acl-init job will expect the server's host to be included in the server's certificate. However, if you're connecting to the server over pod or node IPs, that IP will not be included in the certificate. These use cases are typically solved by providing an SNI header when connecting to the server (externalServers.tlsServerName in this case), however, we were not setting this property as a flag for the server-acl-init command.

How I've tested this PR:
Manually by deploying external servers on another k8s cluster and using a flat pod and node networks.

How I expect reviewers to test this PR:
code review

Checklist:

  • Bats tests added
  • CHANGELOG entry added (HashiCorp engineers only, community PRs should not add a changelog entry)

@ishustava ishustava added bug Something isn't working area/acls Related to ACLs theme/external-servers Related to Consul servers running outside the cluster labels Jun 24, 2021
@ishustava ishustava requested review from a team, lkysow and sadjamz and removed request for a team June 24, 2021 22:43
@ishustava ishustava merged commit 96a81d4 into master Jun 28, 2021
@ishustava ishustava deleted the external-servers-multi-k8s branch June 28, 2021 19:17
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
area/acls Related to ACLs bug Something isn't working theme/external-servers Related to Consul servers running outside the cluster
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants