-
Notifications
You must be signed in to change notification settings - Fork 274
fix(): reduce minimum tls version for osm controller, verifier, health #5292
fix(): reduce minimum tls version for osm controller, verifier, health #5292
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes look good, but could you add an E2E test to make sure we continuously verify that setting the sidecar to maxTLSVersion v1.2 does not break anything?
Codecov Report
📣 This organization is not using Codecov’s GitHub App Integration. We recommend you install it so Codecov can continue to function properly for your repositories. Learn more @@ Coverage Diff @@
## release-v1.2 #5292 +/- ##
================================================
+ Coverage 68.83% 68.84% +0.01%
================================================
Files 210 210
Lines 15679 15679
================================================
+ Hits 10792 10794 +2
+ Misses 4836 4834 -2
Partials 51 51
Flags with carried forward coverage won't be shown. Click here to find out more.
... and 1 file with indirect coverage changes Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
e40c43d
to
4b82112
Compare
Signed-off-by: Whitney Griffith <whgriffi@microsoft.com>
4b82112
to
6e66bfb
Compare
Added an e2e test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good work; thanks for the tests! I assume there will be a follow-up PR removing unsupported versions (or just marking them as unsupported?
Yes! I will be creating a PR that will be removing TLSv1_0 and TLSv1_1 for the envoy max TLS Version. |
|
||
// Prior iterations of OSM supported a wide range of min and max MTLS versions for the envoy sidecar (TLS_AUTO, TLSv1_0, TLSv1_1, TLSv1_2 and TLSv1_3) | ||
// even though the OSM Control Plane's minimum version has been upgraded to TLSv1_2 | ||
// This test verifies that the envoy sidecar maxTLSVersion is compatible with the current osm control plane's minTLSVersion |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit:
// This test verifies that the envoy sidecar maxTLSVersion is compatible with the current osm control plane's minTLSVersion | |
// This test verifies that the envoy sidecar maxTLSVersion is compatible with the current OSM control plane's minTLSVersion |
// Prior iterations of OSM supported a wide range of min and max MTLS versions for the envoy sidecar (TLS_AUTO, TLSv1_0, TLSv1_1, TLSv1_2 and TLSv1_3) | ||
// even though the OSM Control Plane's minimum version has been upgraded to TLSv1_2 | ||
// This test verifies that the envoy sidecar maxTLSVersion is compatible with the current osm control plane's minTLSVersion | ||
var _ = OSMDescribe("Test envoy maxTLSVersion is compatible with osm control plane's minTLSVersion", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit:
var _ = OSMDescribe("Test envoy maxTLSVersion is compatible with osm control plane's minTLSVersion", | |
var _ = OSMDescribe("Test envoy maxTLSVersion is compatible with OSM control plane's minTLSVersion", |
openservicemesh#5292) Addresses potentially incompatible envoy max tls version and OSM control plane min tls version by updating the OSM control plane min tls version from TLSv1_3 to TLSv1_2. Fixes openservicemesh#5282. Signed-off-by: Whitney Griffith <whgriffi@microsoft.com>
openservicemesh#5292) Addresses potentially incompatible envoy max tls version and OSM control plane min tls version by updating the OSM control plane min tls version from TLSv1_3 to TLSv1_2. Fixes openservicemesh#5282. Signed-off-by: Whitney Griffith <whgriffi@microsoft.com> Signed-off-by: jaellio <jaellio@microsoft.com>
openservicemesh#5292) Addresses potentially incompatible envoy max tls version and OSM control plane min tls version by updating the OSM control plane min tls version from TLSv1_3 to TLSv1_2. Fixes openservicemesh#5282. Signed-off-by: Whitney Griffith <whgriffi@microsoft.com> Signed-off-by: jaellio <jaellio@microsoft.com>
openservicemesh#5292) Addresses potentially incompatible envoy max tls version and OSM control plane min tls version by updating the OSM control plane min tls version from TLSv1_3 to TLSv1_2. Fixes openservicemesh#5282. Signed-off-by: Whitney Griffith <whgriffi@microsoft.com> Signed-off-by: jaellio <jaellio@microsoft.com>
openservicemesh#5292) Addresses potentially incompatible envoy max tls version and OSM control plane min tls version by updating the OSM control plane min tls version from TLSv1_3 to TLSv1_2. Fixes openservicemesh#5282. Signed-off-by: Whitney Griffith <whgriffi@microsoft.com> Signed-off-by: jaellio <jaellio@microsoft.com>
Description:
Backport the following fix for #5282 into release-v1.2
Part of #5282
Testing done:
Confirmed demo, health check and verifier worked as expected when OSM control plane has the following configuration:
Affected area: