Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWS Deployment doesn't use HTTPS -- Provide warning in the documentation #52

Open
BrandonALXEllisSS opened this issue Aug 15, 2021 · 5 comments
Labels
documentation Improvements or additions to documentation

Comments

@BrandonALXEllisSS
Copy link

There's AWS resources to create a self-signed ACM certificate, but given that there's no domain name system set up and the ACM certificate isn't used, any connections to the reference architecture can't use https (despite the constant plethora of example links that do use https, i.e.

The admin console will be available at https://boundary-test-controller-<random_name>-<random_sha>.elb.us-east-1.amazonaws.com:9200

Please update the documentation to warn the user that he/she needs to set up HTTPS on their own behalf, or advise to use HTTP if just testing the architecture.

@malnick malnick added the documentation Improvements or additions to documentation label Oct 12, 2021
@omkensey
Copy link
Contributor

It looks like if you change the tls_disable variable in the vars.tf from true to false, it pipes the cert to the instances through a provisioner and adds it to the Boundary config.

@jwieder
Copy link

jwieder commented Oct 27, 2021

That is true, however (at least in the aws config) setting tls_disable var to false results in further errors. Specifically, there are two hard-coded http paths; changing those results in further errors when using default EC2 hostname nomenclature, e.g.:

Error: error calling read scope: error performing client request during Read call: Get "https://boundary-test-control-rando-a12345c123a0d1.elb.us-east-1.amazonaws.com:9200/v1/scopes/global": x509: certificate is not valid for any names, but wanted to match boundary-test-control-rando-a12345c123a0d1.elb.us-east-1.amazonaws.com

EDIT: the latter may be specific to executing terraform in MacOS due to this: hashicorp/terraform#22193 (comment)

@omkensey
Copy link
Contributor

Actually, looking at the TLS part of this, it looks like the cert we request is for a CN that's not a hostname. So let me poke around on this and I might cough up a PR later for either or both of you to test.

@jwieder
Copy link

jwieder commented Oct 28, 2021 via email

@ddvdozuki
Copy link

Any update to this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

5 participants