-
Notifications
You must be signed in to change notification settings - Fork 4k
release: do not install openssl in FIPS mode #157197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
addd152 to
d37491a
Compare
Potential Bug(s) DetectedThe three-stage Claude Code analysis has identified potential bug(s) in this PR that may warrant investigation. Next Steps: Note: When viewing the workflow output, scroll to the bottom to find the Final Analysis Summary. After you review the findings, please tag the issue as follows:
|
Previously, our Dockerfile for deployment would install the `openssl` package when FIPS mode was enabled. However, this is unnecessary because the current implementation of FIPS mode does not rely on the system's OpenSSL library. This allows us to unify the Dockerfile for both variants. Additionally, install `ca-certificates` to ensure that TLS certificates can be properly validated, without implicitly using `x509.SetFallbackRoots`. Epic: none Release note: none
d37491a to
1ae578e
Compare
| gzip \ | ||
| xz \ | ||
| && rm -rf /var/cache/yum | ||
| # FIPS mode requires the `openssl` package installed. Also we need to temporarily |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Very nice to see all this code go away.
|
bors r=rickystewart |
Previously, our Dockerfile for deployment would install the
opensslpackage when FIPS mode was enabled. However, this is unnecessary because the current implementation of FIPS mode does not rely on the system's OpenSSL library. This allows us to unify the Dockerfile for both variants.Additionally, install
ca-certificatesto ensure that TLS certificates can be properly validated, without implicitly usingx509.SetFallbackRoots.Epic: none
Release note: none