Open r0mant opened 1 week ago
The test plan contains two tests that can't be verified: "Verify adding very first device or passkey works without requiring re-authentication" and "Verify second_factor
set to off
disables adding devices". That's because we no longer allow second factor to be optional, which, as a consequence, means that the only case where we add a first device or passkey is during onboarding.
I'm therefore skipping these cases.
Linux binaries for Connect v17 are more than twice the size of 16.4.3. This is due to a bug in Electron 33.0.2. From what I see, the fix has been merged, we'll have to update once it's released.
i'll get to this later, i have another access request UI issue i will need to address together
this is from role request teleterm
access list frequency dropdown cut off:
fixes heres: https://github.com/gravitational/teleport/pull/48500 https://github.com/gravitational/teleport.e/pull/5354
Minor issue, not a blocker IMO: https://github.com/gravitational/teleport/issues/48201
I'm skipping the tests of logging through OIDC SSO in Connect as I don't really have a cluster where I could test it. SAML and GitHub work correctly though.
Visual bug causing request checkout to clip over resources in unified resources: https://github.com/gravitational/teleport/issues/48468
Bug requiring refresh for updated "show requestable resources" filter to take effect on resources page: https://github.com/gravitational/teleport/issues/48469
SSH Server using Teleport Service Self-Hosted PostgreSQL and Mongo Self-Hosted kubernetes
Add new resource / (SSH Server|Self-hosted Database) fails to generate a valid node join script https://github.com/gravitational/teleport/issues/48508
fix attempt state for AddApp
component for Add Application
discover flow: https://github.com/gravitational/teleport/issues/48389
fix regression, where badges
on hover popover got disabled by pointer-events: none
https://github.com/gravitational/teleport/pull/48640
Web UI
Main
For main, test with a role that has access to all resources.
As you go through testing, click on any links you come across to make sure they work (no 404) and are up to date.
Trusted Cluster (leafs)
The following features should allow users to view resources in trusted clusters. There should be a cluster dropdown for:
/web/cluster/<cluster-name>/console/nodes
)Top Bar Nav @bl-nero
Resources
(unified resources),Access Management
,Access Requests
,Active Sessions
,Notification Bell
anduser settings menu
User Settings Menu @bl-nero
second_factor
set tooff
disables adding devices~ (This is no longer supported, I'm updating the test plan template — @bl-nero)Unified Resources @bl-nero
Add Resource
button correctly sends to the resource discovery pageforward_agent: true
under theoptions
section of your role, and then test that your teleport certs show up when you runssh-add -l
on the node.Launch
button for applications correctly send to the appLaunch
button for AWS apps correctly renders an IAM role selection windowConnect
renders the dialog with correct informationConnect
renders the dialog with correct informationConnect
renders a login selection and that the logins are completely in viewActive Sessions (@avatus )
Access Management Side Nav (@avatus )
Session Recordings (@avatus)
Audit log (@avatus)
details
buttonUsers (@avatus)
All actions should require re-authn with a webauthn device.
Invite, Reset, and Login Forms
For each, test the invite, reset, and login flows
second_factor
type tooff
second_factor
type tootp
, requires otpsecond_factor
type towebauthn
, requires hardware keysecond_factor
type toon
, requires a MFA deviceAuth Connectors @bl-nero
For help with setting up auth connectors, check out the [Quick GitHub/SAML/OIDC Setup Tips]
All actions should require re-authn with a webauthn device.
Roles (@avatus)
All actions should require re-authn with a webauthn device.
Enroll New Integration (aka Plugins) (@kimlisa)
self-hosted plugins
andmachine id
cards link out to the correct docsno-code integrations
renders formEnroll new resources using Discover Wizard (@kimlisa)
Use Discover Wizard to enroll new resources and access them:
Access Lists (@kiosion and nested lists)
Not available for OSS
Admin refers to users with access_list RBAC defined:
Session & Identity Locks @bl-nero
Locked By
andStart Date
are still shown with those fields empty.~ — @bl-neroMessage
are shown with this field as empty.Expiration
field are shown with this field as "Never".Trusted Devices (@avatus)
Managed Clusters
root
pillApplication Access
Required Applications (@avatus)
Create two apps running locally, a frontend app and a backend app. The frontend app should make an API request to the backend app at its teleport public_addr
You can use this example app if you don't have a frontend/backend setup
```go package main import ( "encoding/json" "fmt" "log" "net/http" ) // change to your cluster addr const clusterName = "avatus.sh" func main() { // handler for the html page. this is the "client". http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) { html := fmt.Sprintf(html, clusterName) w.Header().Set("Content-Type", "text/html") w.Write([]byte(html)) }) // Handler for the API endpoint http.HandleFunc("/api/data", func(w http.ResponseWriter, r *http.Request) { w.Header().Set("Access-Control-Allow-Origin", fmt.Sprintf("https://client.%s", clusterName)) w.Header().Set("Access-Control-Allow-Credentials", "true") data := map[string]string{"hello": "world"} w.Header().Set("Content-Type", "application/json") json.NewEncoder(w).Encode(data) }) log.Println("Server starting on http://localhost:8080") log.Fatal(http.ListenAndServe(":8080", nil)) } const html = `Update your app service to serve the apps like this (update your public addr to what makes sense for your cluster)
Launch your cluster and make sure you are logged out of your api by going to
https://api.avatus.sh/teleport-logout
{"hello":"world"}
responseAccess Requests (@kiosion)
Not available for OSS
Access Request Notification Routing Rule (cloud only)
Creating Access Requests (Role Based) (@rudream)
Create a role with limited permissions
allow-roles-and-nodes
. This role allows you to see the Role screen and ssh into all nodes.Create another role with limited permissions
allow-users-with-short-ttl
. This role session expires in 4 minutes, allows you to see Users screen, and denies access to all nodes.Create a user that has no access to anything but allows you to request roles:
allow-roles-and-nodes
andallow-users-with-short-ttl
are listedCreating Access Requests (Resource Based) (@rudream)
Create a role with access to searcheable resources (apps, db, kubes, nodes, desktops). The template
searcheable-resources
is below.Create a user that has no access to resources, but allows you to search them:
searcheable-resources
rulesViewing & Approving/Denying Requests (@rudream)
Create a user with the role
reviewer
that allows you to review all requests, and delete them.Assuming Approved Requests (Role Based)
allow-roles-and-nodes
allows you to see roles screen and ssh into nodesallow-roles-and-nodes
, verify that assumingallow-users-with-short-ttl
allows you to see users screen, and denies access to nodesDrop Request
onallow-users-with-short-ttl
whileallow-roles-and-nodes
is still assumedallow-users-with-short-ttl
role that the next action (i.e. opening a new tab with unified resources) triggers a relogin modal after the expiry is met (4 minutes)Assuming Approved Requests (Search Based)
Assuming Approved Requests (Both)
Access Request Waiting Room @kiosion
Strategy Reason
Create the following role:
request_prompt
settingsend request
, pending dialogue rendersStrategy Always
With the previous role you created from
Strategy Reason
, changerequest_access
toalways
:Logout
and clicking goes back to the login screenStrategy Optional
With the previous role you created from
Strategy Reason
, changerequest_access
tooptional
:Web Terminal (aka console) (@avatus)
[ ] Verify that top nav has a user menu (Main and Logout)This menu has been removedctrl+[1...9]
(alt on linux/windows)require_session_mfa
and:Terminal Node List Tab
Terminal Session Tab
$ sudo apt-get install mc
$ mc
Cloud @bl-nero
From your cloud staging account, change the field
teleportVersion
to the test version.Dashboard Tenants (self-hosted license)
Recovery Code Management
Invite/Reset
Recovery Flow: Add new mfa device
Recovery Flow: Change password
Recovery Email
RBAC @bl-nero
Note: this entire section was updated to reflect changes in https://github.com/gravitational/teleport/pull/48610 — @bl-nero
Create a role, with no
allow.rules
defined:Access
top-level navigation item.Audit
top-level navigation item only containsActive Sessions
.Policy
top-level navigation item, while the admin does.Identity
top-level navigation item only containsAccess Requests
andAccess Lists
.Add New
top-level navigation item only containsResource
andAccess List
.Identity
top-level navigation item.Add New
top-level navigation item only containsResource
.Enroll New Resource
button is disabled on the Resources screen.Note: User has read/create access_request access to their own requests, despite resource settings
Add the following under
spec.allow.rules
to enable read access to the audit log:Audit Log
is accessibleAdd the following to enable list access to session recordings:
Session Recordings
is accessibleChange the session permissions to enable read access to recorded sessions:
Add the following to enable read access to the roles:
Add the following to enable read access to the auth connectors
Add the following to enable read access to users
Add the following to enable read access to trusted clusters
Teleport Connect
auth_service.authentication
in the cluster config):type: local
,second_factor: "off"
type: local
,second_factor: "otp"
type: local
,second_factor: "webauthn"
,type: local
,second_factor: "webauthn"
, log in passwordlessly with hardware keytype: local
,second_factor: "webauthn"
, log in passwordlessly with touch IDtype: local
,second_factor: "optional"
, log in without MFAtype: local
,second_factor: "optional"
, log in with OTPtype: local
,second_factor: "optional"
, log in with hardware keytype: local
,second_factor: "on"
, log in with OTPtype: local
,second_factor: "on"
, log in with hardware keytype: local
,second_factor: "on"
, log in with passwordless authTELEPORT_PROXY
andTELEPORT_CLUSTER
should pin the session to the correct cluster.TELEPORT_HOME
should point to~/Library/Application Support/Teleport Connect/tsh
.PATH
should include/Applications/Teleport Connect.app/Contents/Resources/bin
.$ sudo apt-get install mc
$ mc
$ exit
command.echo $KUBECONFIG
and check if it points to the file within Connect's app data directory.kubectl get pods -A
and verify that the command succeeds. Then create a pod withkubectl apply -f https://k8s.io/examples/application/shell-demo.yaml
and exec into it withkubectl exec --stdin --tty shell-demo -- /bin/bash
. Verify that the shell works.ClusterRoleBinding
in k8s for the admin role. Then you need to add the k8s group (which maps to the k8s admin role inClusterRoleBinding
) tokubernetes_groups
of your Teleport role.~/Library/Application Support/Teleport Connect/tsh
doesn't crash the app.~/Library/Application Support/Teleport Connect/app_state.json
but not thetsh
dir doesn't crash the app.spec.allow.logins
andspec.allow.db_users
.Cmd+[1...9]
.tsh proxy db
with the same port, start the app. Verify that the app doesn't crash and the db connection tab shows you the error (address in use) and offers a way to retry creating the connection.1m
(spec.options.max_session_ttl
).select now();
, the client should be able to automatically reinstantiate the connection.Creating Access Requests (Role Based)
from the Web UI testplan and then verify the tasks below.allow-roles-and-nodes
andallow-users-with-short-ttl
are listedCreating Access Requests (Resource Based)
from the Web UI testplan and then verify the tasks below.searcheable-resources
rulesshow_resources
toaccessible_only
in the UI config of the root cluster.Viewing & Approving/Denying Requests
from the Web UI testplan and then verify the tasks below.allow-roles-and-nodes
allows you to see roles screen and ssh into nodesallow-roles-and-nodes
, verify that assumingallow-users-with-short-ttl
allows you to see users screen, and denies access to nodesswitching back
goes back to your default static roleallow-users-with-short-ttl
role, the user is automatically logged out after the expiry is met (4 minutes)⋮
> Open Config File opens theapp_config.json
file in your editor.terminal.fontFamily
."keymap.tab1": "ABC"
)."keymap.tab1": not a string
).tsh ls --headless --user=<username> --proxy=<proxy>
. The cluster needs to have webauthn enabled for it to work.kubectl exec --stdin --tty shell-demo -- /bin/bash
mentioned above to verify that Kube access is working with MFA.require_session_mfa: hardware_key_touch_and_pin
to get both touch and PIN prompts).tail -F ~/Library/Application\ Support/Teleport\ Connect/logs/cleanup.log
) and thenkill -s KILL <agent PID>
./etc/hosts
. It's best to use a "real" cluster. nip.io might work, but it hasn't been confirmed yet.tsh
and find tsh running under kernel_task → launchd → tsh, owned by root. Then justsudo kill -s KILL <tsh pid>
./etc/resolver
. However, it's possible to start VNet again, connect to a TCP app, then shut VNet down and it results in the files being cleaned up.~/Library/Application\ Support/Teleport\ Connect/logs
.