cli: allow for cockroach demo to start in secure mode#45727
cli: allow for cockroach demo to start in secure mode#45727knz merged 1 commit intocockroachdb:masterfrom
cockroach demo to start in secure mode#45727Conversation
|
cc @knz, this is a draft. I'm running into a problem where it seems to be working when I run on the CLI, but it fails during cluster setup in the |
knz
left a comment
There was a problem hiding this comment.
Reviewable status:
complete! 0 of 0 LGTMs obtained (waiting on @knz and @rohany)
pkg/cli/cli_test.go, line 417 at r1 (raw file):
setCLIDefaultsForTests() for _, cmd := range testData { c.RunWithArgs(cmd)
Look at the code for RunWithArgs. It tries to be to clever and synthetizes extra arguments --insecure / --certs-dir and injects them into your demo commands. Is that maybe what causes the failure?
If you can't figure it out, please ping me and we can sit together to troubleshoot.
3b61da8 to
d801230
Compare
|
Yuck -- after a while I was able to narrow this down to the dummy asset loader set by the security test init. |
|
A downside of this is that you now need to login/create a user to access the admin UI |
|
What is the motivation for this? Demo isn't meant for production applications and anything that puts friction into trial seems to be a mistake. I'd be fine for an option to start demo in secure to test that process out but why is it proposed as the default? |
The motivation for this comes from docs and IAM (talk to nate):
If we want to have a good alignment between our docs, which teach about security, and |
No. Please have |
|
To Andy's point, I'm only okay with this if it doesn't add any more hoops for the user to jump through to get a regular demo session. Demo just has to be a one-click, simple way to get started w/ both CLI and admin ui, please! |
|
Ok, let me add the default user/password. @jordanlewis this change doesn't affect the UX at all -- |
|
Discussed this at standup today with @awoods187 and @jordanlewis and I think it would be better to have demo have an opt-in secure mode, rather than secure by default. One of the reasons is that it is harder to use the admin UI -- you have to click through the certificate warning page and login, vs the admin UI just opening. |
|
ok with making this opt-in in 20.1 because of the cert warning in UI But we can solve this (after 20.1) too and make secure default. The solution is to have the UI served in a non-SSL conn even though the cluster is secure. This feature/option is already planned for 20.2. |
Fixes cockroachdb#45607. Release note (cli change): This PR adds support for `cockroach demo` to start in secure mode using the flag `--insecure=false`.
cockroach demo start in secure mode by defaultcockroach demo to start in secure mode
|
Updated the pr to:
|
|
i'll review tomorrow at the earliest |
knz
left a comment
There was a problem hiding this comment.
Reviewed 7 of 7 files at r2.
Reviewable status:complete! 1 of 0 LGTMs obtained
|
bors r=knz |
Merge conflict (retrying...) |
45704: colexec: add distinct mode to hashTable r=Azhng a=Azhng Previously hashTable will buffer all tuples before building `head` and `same` vector. Now hashTable supports distinct mode where it only buffers the distinct tuples from upstream operator. This removes the need of traversing through the `head` and `same` vectors. Instead, now user of the hashTable can directly build hashTable in distinct mode and copy the buffered tuples. Closes #44404 Release note: None 45727: cli: allow for `cockroach demo` to start in secure mode r=knz a=rohany Fixes #45607. Release note (cli change): This PR adds support for `cockroach demo` to start in secure mode using the flag `--insecure=false`. 45759: storage: Do not create nil data pointers in rocksdb slices r=miretskiy a=miretskiy Fixes #45524 Libroach's DBSlice data type gets converted to the rocksdb::Slice whenever we need to access underlying rocksdb (iterators, get/set, etc). However, internally, rocksdb::Slice asserts that the underlying data pointer may not be null in the rocksdb::Slice::compare as observed in #45524 This change modifies our rocksdb bridge code to never generate DBSlices with nullptr data. Release notes: None Co-authored-by: Azhng <archer.xn@gmail.com> Co-authored-by: Rohan Yadav <rohany@alumni.cmu.edu> Co-authored-by: Yevgeniy Miretskiy <yevgeniy@cockroachlabs.com>
Canceled (will resume) |
|
bors r- |
Canceled |
Fixes #45607.
Release note (cli change): This PR adds support for
cockroach demoto start in secure mode using the flag
--insecure=false.