-
Notifications
You must be signed in to change notification settings - Fork 125
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conjur upgrade instructions for FIPS compliance #1584
Comments
@hilagross have you verified that steps (1) - (4) are all that's required if the conjur version bump includes database migrations? it seems like a step is missing there I'd like to make this card "Conjur upgrade instructions for FIPS compliance" and refer to #1527 to be clear that this card holds the custom upgrade instructions for an upcoming release I'd like to make the original card I filed #1528 be where we start tracking the standard, uncomplicated upgrade instructions for a typical Conjur release. and it would include steps (1) - (4) (it looks like) as well as any special instructions if the release includes a DB migration Does that make sense to you too? (cc @alexkalish) |
Hi @izgeri , As there is no upgrade process some step may no be done as expected and that what we should try to solve here. |
@hilagross: Thanks for filing this issue. Could you please update the description with the following:
@izgeri: Yup, LGTM. |
I think the standard typical upgrade instructions (eg the output of #1528) should be added to README.md in this project in a new For the custom upgrade instructions for a specific release - where they should live is a really good question. The maintainer who creates the tag for the Conjur release that includes the changes from #1527 will need to be aware that special upgrade instructions are required, and I'm not sure about the best way to flag that (except perhaps to cc @jvanderhoof and @sjacobs146 here). Once the new tag containing the changes from #1527 is created, the GitHub release should include an "Upgrade Instructions" section in addition to the "Change log" section that we currently post. I think it would be great if this card could have the final draft of those instructions, so that at release time adding them to the GitHub release notes (which will propagate to the suite release notes) will be a matter of copy/paste. Please let me know if you have any suggestions to improve the process I've proposed above. I don't love that it has some manual steps, but it is our first time considering this carefully :) |
Hi @alexkalish , As we talked with @InbalZilberman and in the meeting summary, I provided the steps that was done, I can provide the reason for why this needs to be done, but where and how should be done by you. |
@hilagross is there an issue for implementing the |
Hi @alexkalish, |
Upgrade Issue: When upgrading from a pre-FIPS compliant version to a FIPS-compliant version, the fingerprints in slosilo were never updated and led to authentication issues. Solution:
Positive:
Downside:
|
@h-artzi I'm going to reopen this until we get the UPGRADING.md onto the master branch as well |
This was resolved in #1607. Please note we do not yet have a post-FIPS Conjur OSS release that has working, simple upgrade instructions; you can watch our releases page for when that version will become available. |
In this card, we define upgrade instructions that will be required once #1527 is merged.
See #1528 for more info on standard Conjur upgrade instructions.
Following steps were performed to upgrade from OSS v.{x} to OSS v.{x+1}:
docker-compose.yml
conjur service image tag to {x+1}docker rm -f conjur
docker-compose up -d
'docker ps -a`
CONJUR_DATA_KEY
system variable. Same key as before.export CONJUR_DATA_KEY="$(< data_key)
These steps should be done after OpenSSL change
Steps 5-12 can be replaced by
bundle exec rake slosilo:migrate
FINGERPRINT UPDATE WORKAROUND STEPS:
Use any host/user (i.e: admin/dave/botapp...) and same API key to authenticate
see docs: https://docs.conjur.org/Latest/en/Content/Developer/Conjur_API_Authenticate.htm?tocpath=Developer%7CREST%C2%A0APIs%7C_____2
Once obtained "short-lived access token" from response, transfer it to dot seperated token in following format:
protected.payload.signature
e.g:
Will be transferd into:
Browse to

https://jwt.io/
, insert dot seperated token into enocde textbox, extractkid
from decode header section - this will be your new figerprint.Enter PG container from your terminal:
docker exec -it postgres bash
Switch user to
postgres
su postgres
Use psql cli to login
psql
Be familiar with content of
slosilo_keystore
tableselect * from slosilo_keystore;
notice you have 3 columns: id, key, fingerprint, extract id record will be similar to:
authn:myConjurAccount
Edit account recored with new fingerprint
update slosilo_keystore set fingerprint = '{VALUE FROM STEP 7}' where id = '{VALUE FORM STEP 11}';
To verify, run step 5 and use short-lived-token to do any action, fetch secrect load policy etc.
The text was updated successfully, but these errors were encountered: