Skip to content

Commit 03f1d0b

Browse files
authored
Merge branch 'master' into bernard/email-plugin-api
2 parents cb72d6c + af117a3 commit 03f1d0b

File tree

48 files changed

+1687
-1502
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+1687
-1502
lines changed

api/client/proto/authservice.pb.go

Lines changed: 999 additions & 941 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

api/proto/teleport/legacy/client/proto/authservice.proto

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -581,6 +581,8 @@ message Features {
581581
// NOTE: this flag is used to signal that Access Monitoring is *enabled* on a cluster.
582582
// *Access* to the feature is gated on the `AccessMonitoring` entitlement.
583583
bool AccessMonitoringConfigured = 36;
584+
// CloudAnonymizationKey is a hash of the Salesforce ID used to anonymize usage events
585+
bytes CloudAnonymizationKey = 37 [(gogoproto.jsontag) = "cloud_anonymization_key,omitempty"];
584586
}
585587

586588
// EntitlementInfo is the state and limits of a particular entitlement

build.assets/versions.mk

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ NODE_VERSION ?= 20.18.0
1010

1111
# Run lint-rust check locally before merging code after you bump this.
1212
RUST_VERSION ?= 1.81.0
13-
WASM_PACK_VERSION ?= 0.12.1
13+
WASM_PACK_VERSION ?= 0.13.1
1414
LIBBPF_VERSION ?= 1.2.2
1515
LIBPCSCLITE_VERSION ?= 1.9.9-teleport
1616

docs/pages/admin-guides/access-controls/guides/locking.mdx

Lines changed: 36 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -194,51 +194,27 @@ the last known locks. This decision strategy is encoded as one of the two modes:
194194

195195
The cluster-wide mode defaults to `best_effort`. You can set up the default
196196
locking mode via API or CLI using a `cluster_auth_preference` resource or static
197-
configuration file:
197+
configuration file.
198198

199-
<Tabs>
200-
<TabItem label="API or CLI">
201-
202-
Create a YAML file called `cap.yaml` or get the existing file using
203-
`tctl get cap`.
204-
205-
```yaml
206-
kind: cluster_auth_preference
207-
metadata:
208-
name: cluster-auth-preference
209-
spec:
210-
locking_mode: best_effort
211-
version: v2
212-
```
213-
214-
Create a resource:
215-
216-
```code
217-
$ tctl create -f cap.yaml
218-
# cluster auth preference has been updated
219-
```
220-
</TabItem>
221-
<TabItem label="Static Config">
222-
Edit `/etc/teleport.yaml` on the Auth Server:
199+
If your Auth Service configuration (`/etc/teleport.yaml` by default) contains
200+
an `auth_service.authentication` section, edit the Teleport configuration
201+
file to contain the following:
223202

224-
```yaml
225-
auth_service:
226-
authentication:
227-
locking_mode: best_effort
228-
```
203+
```yaml
204+
auth_service:
205+
authentication:
206+
locking_mode: best_effort
207+
```
229208

230-
Restart the Auth Server for the change to take effect.
231-
</TabItem>
232-
</Tabs>
209+
Restart or redeploy the Auth Service for the change to take effect.
233210

234-
</TabItem>
235-
<TabItem scope={["Enterprise"]} label="Teleport Enterprise">
211+
If not, edit your cluster authentication preference resource:
236212

237-
The cluster-wide mode defaults to `best_effort`. You can set up the default
238-
locking mode via API or CLI using a `cluster_auth_preference` resource:
213+
```code
214+
$ tctl edit cap
215+
```
239216

240-
Create a YAML file called `cap.yaml` or get the existing file using
241-
`tctl get cap`.
217+
Adjust the file in your editor to include the following:
242218

243219
```yaml
244220
kind: cluster_auth_preference
@@ -249,15 +225,32 @@ spec:
249225
version: v2
250226
```
251227

252-
Create a resource:
228+
Save and close your editor to apply your changes.
229+
230+
</TabItem>
231+
<TabItem scope={["Enterprise"]} label="Teleport Enterprise (Cloud)">
232+
233+
The cluster-wide mode defaults to `best_effort`. You can set up the default
234+
locking mode via API or CLI using a `cluster_auth_preference` resource:
253235

254236
```code
255-
$ tctl create -f cap.yaml
256-
# cluster auth preference has been updated
237+
$ tctl edit cap
257238
```
258239

259-
</TabItem>
240+
Adjust the file in your editor to include the following:
241+
242+
```yaml
243+
kind: cluster_auth_preference
244+
metadata:
245+
name: cluster-auth-preference
246+
spec:
247+
locking_mode: best_effort
248+
version: v2
249+
```
250+
251+
Save and close your editor to apply your changes.
260252

253+
</TabItem>
261254
</Tabs>
262255

263256
It is also possible to configure the locking mode for a particular role:

docs/pages/admin-guides/deploy-a-cluster/helm-deployments/aws.mdx

Lines changed: 9 additions & 107 deletions
Original file line numberDiff line numberDiff line change
@@ -290,11 +290,9 @@ Edit your `aws-values.yaml` file (created below) to refer to the name of your se
290290
291291
## Step 5/7. Set values to configure the cluster
292292
293-
<Tabs>
294-
<TabItem scope="enterprise" label="Teleport Enterprise">
295-
296-
Before you can install Teleport in your Kubernetes cluster, you will need to
297-
create a secret that contains your Teleport license information.
293+
If you run Teleport Enterprise, you will need to create a secret that contains
294+
your Teleport license information before you can install Teleport in your
295+
Kubernetes cluster.
298296
299297
(!docs/pages/includes//enterprise/obtainlicense.mdx!)
300298
@@ -305,105 +303,9 @@ this secret as long as your file is named `license.pem`.
305303
$ kubectl -n <Var name="namespace" /> create secret generic license --from-file=license.pem
306304
```
307305

308-
</TabItem>
309-
310-
</Tabs>
311-
312306
Next, configure the `teleport-cluster` Helm chart to use the `aws` mode. Create
313307
a file called `aws-values.yaml` and write the values you've chosen above to it:
314308

315-
<Tabs>
316-
<TabItem scope={["oss"]} label="Teleport Community Edition">
317-
318-
<Tabs>
319-
<TabItem label="cert-manager">
320-
```yaml
321-
chartMode: aws
322-
clusterName: <Var name="teleport.example.com" /> # Name of your cluster. Use the FQDN you intend to configure in DNS below.
323-
proxyListenerMode: multiplex
324-
aws:
325-
region: <Var name="us-west-2" /> # AWS region
326-
backendTable: <Var name="teleport-helm-backend" /> # DynamoDB table to use for the Teleport backend
327-
auditLogTable: <Var name="teleport-helm-events" /> # DynamoDB table to use for the Teleport audit log (must be different to the backend table)
328-
auditLogMirrorOnStdout: false # Whether to mirror audit log entries to stdout in JSON format (useful for external log collectors)
329-
sessionRecordingBucket: <Var name="your-sessions-bucket" /> # S3 bucket to use for Teleport session recordings
330-
backups: true # Whether or not to turn on DynamoDB backups
331-
dynamoAutoScaling: false # Whether Teleport should configure DynamoDB's autoscaling.
332-
highAvailability:
333-
replicaCount: 2 # Number of replicas to configure
334-
certManager:
335-
enabled: true # Enable cert-manager support to get TLS certificates
336-
issuerName: letsencrypt-production # Name of the cert-manager Issuer to use (as configured above)
337-
# If you are running Kubernetes 1.23 or above, disable PodSecurityPolicies
338-
podSecurityPolicy:
339-
enabled: false
340-
```
341-
<Admonition type="note">
342-
If using an AWS PCA with cert-manager, you will need to
343-
[ensure you set](../../../reference/helm-reference/teleport-cluster.mdx)
344-
`highAvailability.certManager.addCommonName: true` in your values file. You will also need to get the certificate authority
345-
certificate for the CA (`aws acm-pca get-certificate-authority-certificate --certificate-authority-arn <arn>`),
346-
upload the full certificate chain to a secret, and
347-
[reference the secret](../../../reference/helm-reference/teleport-cluster.mdx)
348-
with `tls.existingCASecretName` in the values file.
349-
</Admonition>
350-
</TabItem>
351-
<TabItem label="AWS Certificate Manager">
352-
```yaml
353-
chartMode: aws
354-
clusterName: <Var name="teleport.example.com" /> # Name of your cluster. Use the FQDN you intend to configure in DNS below.
355-
proxyListenerMode: multiplex
356-
service:
357-
type: ClusterIP
358-
aws:
359-
region: <Var name="us-west-2" /> # AWS region
360-
backendTable: <Var name="teleport-helm-backend" /> # DynamoDB table to use for the Teleport backend
361-
auditLogTable: <Var name="teleport-helm-events" /> # DynamoDB table to use for the Teleport audit log (must be different to the backend table)
362-
auditLogMirrorOnStdout: false # Whether to mirror audit log entries to stdout in JSON format (useful for external log collectors)
363-
sessionRecordingBucket: <Var name="your-sessions-bucket" /> # S3 bucket to use for Teleport session recordings
364-
backups: true # Whether or not to turn on DynamoDB backups
365-
dynamoAutoScaling: false # Whether Teleport should configure DynamoDB's autoscaling.
366-
highAvailability:
367-
replicaCount: 2 # Number of replicas to configure
368-
ingress:
369-
enabled: true
370-
spec:
371-
ingressClassName: alb
372-
annotations:
373-
ingress:
374-
alb.ingress.kubernetes.io/target-type: ip
375-
alb.ingress.kubernetes.io/backend-protocol: HTTPS
376-
alb.ingress.kubernetes.io/scheme: internet-facing
377-
alb.ingress.kubernetes.io/load-balancer-attributes: idle_timeout.timeout_seconds=350
378-
alb.ingress.kubernetes.io/healthcheck-protocol: HTTPS
379-
alb.ingress.kubernetes.io/success-codes: 200,301,302
380-
# Replace with your AWS certificate ARN
381-
alb.ingress.kubernetes.io/certificate-arn: "<Var name="arn:aws:acm:us-west-2:1234567890:certificate/12345678-43c7-4dd1-a2f6-c495b91ebece"/>"
382-
# If you are running Kubernetes 1.23 or above, disable PodSecurityPolicies
383-
podSecurityPolicy:
384-
enabled: false
385-
```
386-
387-
To use an internal AWS application load balancer (as opposed to an internet-facing ALB), you should
388-
edit the `alb.ingress.kubernetes.io/scheme` annotation:
389-
390-
```yaml
391-
alb.ingress.kubernetes.io/scheme: internal
392-
```
393-
394-
To automatically redirect HTTP requests on port 80 to HTTPS requests on port 443, you
395-
can also optionally provide these two values under `annotations.ingress`:
396-
397-
```yaml
398-
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
399-
alb.ingress.kubernetes.io/ssl-redirect: '443'
400-
```
401-
</TabItem>
402-
</Tabs>
403-
404-
</TabItem>
405-
<TabItem scope={["enterprise"]} label="Teleport Enterprise">
406-
407309
<Tabs>
408310
<TabItem label="cert-manager">
409311
```yaml
@@ -423,7 +325,9 @@ highAvailability:
423325
certManager:
424326
enabled: true # Enable cert-manager support to get TLS certificates
425327
issuerName: letsencrypt-production # Name of the cert-manager Issuer to use (as configured above)
426-
enterprise: true # Indicate that this is a Teleport Enterprise deployment
328+
# Indicate that this is a Teleport Enterprise deployment. Set to false for
329+
# Teleport Community Edition.
330+
enterprise: true
427331
# If you are running Kubernetes 1.23 or above, disable PodSecurityPolicies
428332
podSecurityPolicy:
429333
enabled: false
@@ -455,7 +359,9 @@ aws:
455359
dynamoAutoScaling: false # Whether Teleport should configure DynamoDB's autoscaling.
456360
highAvailability:
457361
replicaCount: 2 # Number of replicas to configure
458-
enterprise: true # Indicate that this is a Teleport Enterprise deployment
362+
# Indicate that this is a Teleport Enterprise deployment. Set to false for
363+
# Teleport Community Edition.
364+
enterprise: true
459365
ingress:
460366
enabled: true
461367
spec:
@@ -493,10 +399,6 @@ can also optionally provide these two values under `annotations.ingress`:
493399
</TabItem>
494400
</Tabs>
495401

496-
</TabItem>
497-
498-
</Tabs>
499-
500402
Install the chart with the values from your `aws-values.yaml` file using this command:
501403

502404
```code

docs/pages/admin-guides/management/admin/self-signed-certs.mdx

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -110,37 +110,37 @@ running Teleport: via the `teleport` CLI, using a Helm chart, or via systemd:
110110
<TabItem label="Helm chart">
111111
If you are using the `teleport-cluster` Helm chart, set
112112
[extraArgs](../../../reference/helm-reference/teleport-cluster.mdx)
113-
to include the extra argument: `--insecure`:
114-
<Tabs>
115-
<TabItem label="values.yaml">
116-
```yaml
117-
extraArgs:
118-
- "--insecure"
119-
```
120-
</TabItem>
121-
<TabItem label="--set">
122-
```code
123-
$ --set "extraArgs={--insecure}"
113+
to include the extra argument: `--insecure`.
114+
115+
Here is an example of the field within a values file:
116+
117+
```yaml
118+
extraArgs:
119+
- "--insecure"
120+
```
121+
122+
When using the `--set` flag, use the following syntax:
123+
124+
125+
```text
126+
--set "extraArgs={--insecure}"
124127
```
125-
</TabItem>
126-
</Tabs>
127-
128128

129129
If you are using the `teleport-kube-agent` chart, set the
130130
[insecureSkipProxyTLSVerify](../../../reference/helm-reference/teleport-kube-agent.mdx)
131-
flag to `true`:
132-
<Tabs>
133-
<TabItem label="values.yaml">
134-
```yaml
135-
insecureSkipProxyTLSVerify: true
136-
```
137-
</TabItem>
138-
<TabItem label="--set">
139-
```code
140-
$ --set insecureSkipProxyTLSVerify=true
141-
```
142-
</TabItem>
143-
</Tabs>
131+
flag to `true`.
132+
133+
In a values file, this would appear as follows:
134+
135+
```yaml
136+
insecureSkipProxyTLSVerify: true
137+
```
138+
139+
When using the `--set` flag, use the following syntax:
140+
141+
```text
142+
--set insecureSkipProxyTLSVerify=true
143+
```
144144
</TabItem>
145145

146146
<TabItem label="systemd">

0 commit comments

Comments
 (0)