This repository was archived by the owner on Jul 11, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 274
Fix ingress backend broken SAN #4914
Merged
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
a9bc9e5
to
74f3755
Compare
shashankram
approved these changes
Jul 19, 2022
26b6c33
to
1a6dc9d
Compare
keithmattix
approved these changes
Jul 19, 2022
Codecov Report
@@ Coverage Diff @@
## main #4914 +/- ##
==========================================
- Coverage 68.67% 68.63% -0.04%
==========================================
Files 220 220
Lines 15944 15941 -3
==========================================
- Hits 10949 10941 -8
- Misses 4943 4948 +5
Partials 52 52
Flags with carried forward coverage won't be shown. Click here to find out more.
Continue to review full report at Codecov.
|
c9b0508
to
e3599ee
Compare
Signed-off-by: Sean Teeling <seanteeling@microsoft.com>
Signed-off-by: Sean Teeling <seanteeling@microsoft.com>
e3599ee
to
15e00d8
Compare
Signed-off-by: Sean Teeling <seanteeling@microsoft.com>
15e00d8
to
cfdc68d
Compare
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain)
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain)
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) Signed-off-by: nshankar13 <nshankar@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) Signed-off-by: nshankar13 <nshankar@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) Signed-off-by: nshankar13 <nshankar@microsoft.com> [backport] cherry-pick 961c865 to release-v1.2 fix golints G114 and package-comments (openservicemesh#5037) golints addressed: 1. G114: Use of net/http serve function that has no support for setting timeouts 2. package-comments 3. removes pkg mesh and moves isValidUUID() to pkg/cli/proxy_get.go Signed-off-by: Shalier Xia <shalierxia@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) Signed-off-by: nshankar13 <nshankar@microsoft.com> [backport] cherry-pick 961c865 to release-v1.2 fix golints G114 and package-comments (openservicemesh#5037) golints addressed: 1. G114: Use of net/http serve function that has no support for setting timeouts 2. package-comments 3. removes pkg mesh and moves isValidUUID() to pkg/cli/proxy_get.go Signed-off-by: Shalier Xia <shalierxia@microsoft.com> [backport] cherry-pick df502a7 to release-v1.2 bump version of go to 1.19 (openservicemesh#4972) Signed-off-by: Sean Teeling <seanteeling@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) [backport] cherry-pick 961c865 to release-v1.2 fix golints G114 and package-comments (openservicemesh#5037) golints addressed: 1. G114: Use of net/http serve function that has no support for setting timeouts 2. package-comments 3. removes pkg mesh and moves isValidUUID() to pkg/cli/proxy_get.go Signed-off-by: Shalier Xia <shalierxia@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) [backport] cherry-pick 961c865 to release-v1.2 fix golints G114 and package-comments (openservicemesh#5037) golints addressed: 1. G114: Use of net/http serve function that has no support for setting timeouts 2. package-comments 3. removes pkg mesh and moves isValidUUID() to pkg/cli/proxy_get.go Signed-off-by: Shalier Xia <shalierxia@microsoft.com> Signed-off-by: nshankar13 <nshankar@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) [backport] cherry-pick 961c865 to release-v1.2 fix golints G114 and package-comments (openservicemesh#5037) golints addressed: 1. G114: Use of net/http serve function that has no support for setting timeouts 2. package-comments 3. removes pkg mesh and moves isValidUUID() to pkg/cli/proxy_get.go Signed-off-by: Shalier Xia <shalierxia@microsoft.com> Signed-off-by: nshankar13 <nshankar@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain)
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Aug 31, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) Signed-off-by: nshankar13 <nshankar@microsoft.com>
nshankar13
pushed a commit
to nshankar13/osm
that referenced
this pull request
Sep 1, 2022
Fix ingress backend broken SAN (openservicemesh#4914) Fix ingress backend SAN's, which were getting the trust domain appended to the provided SAN. This adds an e2e test to catch that going forward. This also switches the internal builders to use the principal (trust domain appended) vs the identity (no trust domain) Signed-off-by: nshankar13 <nshankar@microsoft.com>
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fix an issue where the trust domain is getting added to the full SAN provided in ingress backend's. This is accomplished by switching from adding service identity (which does not contain trust domain) to principals (which does), on the traffic policy rules and policy builder.