-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DB cluster configuration to define if CQL session should enable TLS or not #3711
DB cluster configuration to define if CQL session should enable TLS or not #3711
Conversation
04bada9
to
35addef
Compare
246f24d
to
dd0125d
Compare
dd0125d
to
5381e2d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
With those changes the cql dialing logic finally looks good! Also really nice idea with testing sctool commands.
I just left some comments about simplifying (if it is possible) the way in which the new flags are handled.
Also, the |
Also, there are more failures in gh actions then expected, but they look like errors not connected to this PR. |
…use non SSL port on cluster Manager 3.2.6 gives a possibility of explicitly disabling TLS on session even though the certificate and key are available `force_tls_disabled`. Besides that, there is an option to force session to always use non-tls port from scylla config `force_non_ssl_session_port`.
…bled and --force-non-ssl-session-port flags
5381e2d
to
d4f5fbe
Compare
d4f5fbe
to
bdac817
Compare
It adds information about `force-tls-disabled` and `force-non-ssl-session-port` flags.
docs are updated with 274388b |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One last thing would be to adjust healthcheck's pinging to follow the logic introduced here, but I guess it can be done in a separate PR.
Closes #3679
This PR introduces an additional flags defining the cluster managed by the Scylla Manager:
--force-tls-disabled
if true, then TLS on cql session with the cluster will be disabled, no matter if TLS is enabled in scylla.yaml--force-non-ssl-port
if true, then for TLS enabled connection, it will always use non-SSL port (ref api: unset config value is being returned by the API scylladb#7206 (comment))If any of these flags is not available in
cluster add
then both are evaluated tofalse
.If flag is not available in
cluster update
then update won't change current state of these flags in DB.Additional tests are introduced,
api-integration-tests
that are suppose to call CLI / HTTP api against docker env and assert results.Please make sure that: