diff --git a/pkg/cli/secretsencrypt/secrets_encrypt.go b/pkg/cli/secretsencrypt/secrets_encrypt.go index 197a70470c..e49d7b3b54 100644 --- a/pkg/cli/secretsencrypt/secrets_encrypt.go +++ b/pkg/cli/secretsencrypt/secrets_encrypt.go @@ -25,7 +25,7 @@ func commandPrep(app *cli.Context, cfg *cmds.Server) (config.Control, *clientacc var err error // hide process arguments from ps output, since they may contain // database credentials or other secrets. - gspt.SetProcTitle(os.Args[0] + " encrypt") + gspt.SetProcTitle(os.Args[0] + " secrets-encrypt") controlConfig.DataDir, err = server.ResolveDataDir(cfg.DataDir) if err != nil { @@ -47,7 +47,7 @@ func commandPrep(app *cli.Context, cfg *cmds.Server) (config.Control, *clientacc } controlConfig.EncryptForce = cfg.EncryptForce controlConfig.EncryptSkip = cfg.EncryptSkip - info, err := clientaccess.ParseAndValidateTokenForUser(cmds.ServerConfig.ServerURL, controlConfig.Token, "node") + info, err := clientaccess.ParseAndValidateTokenForUser(cmds.ServerConfig.ServerURL, controlConfig.Token, "server") if err != nil { return controlConfig, nil, err } diff --git a/pkg/cluster/bootstrap.go b/pkg/cluster/bootstrap.go index 58696b47b4..45750bd291 100644 --- a/pkg/cluster/bootstrap.go +++ b/pkg/cluster/bootstrap.go @@ -635,7 +635,7 @@ func (c *Cluster) Snapshot(ctx context.Context, config *config.Control) error { // compareConfig verifies that the config of the joining control plane node coincides with the cluster's config func (c *Cluster) compareConfig() error { - agentClientAccessInfo, err := clientaccess.ParseAndValidateTokenForUser(c.config.JoinURL, c.config.Token, "node") + agentClientAccessInfo, err := clientaccess.ParseAndValidateTokenForUser(c.config.JoinURL, c.config.AgentToken, "node") if err != nil { return err } diff --git a/pkg/server/router.go b/pkg/server/router.go index ecafb89686..06910cb7ee 100644 --- a/pkg/server/router.go +++ b/pkg/server/router.go @@ -48,8 +48,6 @@ func router(ctx context.Context, config *Config, cfg *cmds.Server) http.Handler authed.Path(prefix + "/server-ca.crt").Handler(fileHandler(serverConfig.Runtime.ServerCA)) authed.Path(prefix + "/config").Handler(configHandler(serverConfig, cfg)) authed.Path(prefix + "/readyz").Handler(readyzHandler(serverConfig)) - authed.Path(prefix + "/encrypt/status").Handler(encryptionStatusHandler(serverConfig)) - authed.Path(prefix + "/encrypt/config").Handler(encryptionConfigHandler(ctx, serverConfig)) nodeAuthed := mux.NewRouter() nodeAuthed.Use(authMiddleware(serverConfig, "system:nodes")) @@ -59,6 +57,8 @@ func router(ctx context.Context, config *Config, cfg *cmds.Server) http.Handler serverAuthed := mux.NewRouter() serverAuthed.Use(authMiddleware(serverConfig, version.Program+":server")) serverAuthed.NotFoundHandler = nodeAuthed + serverAuthed.Path(prefix + "/encrypt/status").Handler(encryptionStatusHandler(serverConfig)) + serverAuthed.Path(prefix + "/encrypt/config").Handler(encryptionConfigHandler(ctx, serverConfig)) serverAuthed.Path("/db/info").Handler(nodeAuthed) if serverConfig.Runtime.HTTPBootstrap { serverAuthed.Path(prefix + "/server-bootstrap").Handler(bootstrap.Handler(&serverConfig.Runtime.ControlRuntimeBootstrap))