Open myoung34 opened 1 year ago
A workaround in the leaf cluster is to export the locks to a YAML file. You can then add a expires date in the past. Apply the locks update (tctl create -f locks.yaml
) and the lock will no longer be effective.
...
spec:
target:
user: testlock
expires: "2023-03-28T15:10:03.629419018Z"
I'd have to do this anywhere the locks exist, correct? (n-1
proxy servers)
I'd have to do this anywhere the locks exist, correct? (
n-1
proxy servers)
Yes, you would.
The locks appear to be un-deletable because of the slash /
in their names. This applies to a few other situations too, so I've opened https://github.com/gravitational/teleport/issues/47838 to describe this issue in the general case.
Expected behavior:
Locks can be managed across leaf clusters
Current behavior:
Locks are created but not deletable in leaf clusters
Bug details:
Teleport version: 14.0.3
Recreation steps
Create a root cluster
Create a leaf cluster and join it as a trusted cluster
Run this:
Run
tctl get locks
on the root, see no locksRun
tctl get locks
on the leaf, lock persistsDebug logs
Cluster setup:
Root node
Run
tctl lock --user=myoung34-testing --message="Test" --ttl=1h
Check locks on root node:
Check locks on leaf node:
At this point everything is fine and expected
Delete the lock
tctl rm lock/697cb761-7ce9-43b9-babb-aa113cb94e42
Check the root node:
The logs on the root node
Everything is expected, except that the lock persists and is undeletable on all leaf nodes:
It seems undeletable as well
Im unable to remove this lock in any capacity from the leaf nodes
The locks are valid too. I can log into the root node (shows no lock) but am still locked out of leafs (that show locks)