You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Prevent creation of invalid App for AWS OIDC Integration
When enabling AWS Access using an integration, the final address will be
a concatenation of the integration name and the proxy's public address.
The proxy must present a certificate valid for that address.
However, when the integration name has a dot, it will usually not work
with the proxy's certificate.
We know it won't work for Teleport Cloud, where the certificates only
allow for `<app>.<tenant>.teleport.sh`.
So, for Teleport Cloud enabling AWS Access is not possible.
For self-hosted, a warning is emitted.
// If the integration name contains a dot, then the proxy must provide a certificate allowing *.<something>.<proxyPublicAddr>
1045
+
ifstrings.Contains(integrationName, ".") {
1046
+
// Teleport Cloud only provides certificates for *.<tenant>.teleport.sh, so this would generate an invalid address.
1047
+
ifh.GetClusterFeatures().Cloud {
1048
+
returnnil, trace.BadParameter(`Invalid integration name for enabling AWS Access. Please re-create the integration without the "."`)
1049
+
}
1050
+
1051
+
// Typically, self-hosted clusters will also have a single wildcard for the name.
1052
+
// Logging a warning message should help debug the problem in case the certificate is not valid.
1053
+
h.logger.WarnContext(ctx, `Enabling AWS Access using an integration with a "." might not work unless your Proxy's certificate is valid for the address`, "public_addr", appServer.GetApp().GetPublicAddr())
0 commit comments