-
Notifications
You must be signed in to change notification settings - Fork 5
OCPBUGS-14846: webhook - set minimum TLS version back to 1.2 to support FIPS clusters #12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-14846: webhook - set minimum TLS version back to 1.2 to support FIPS clusters #12
Conversation
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. The bug has been moved to the POST state. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: alebedev87 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
7ce6271 to
a6e019c
Compare
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
6c1093d to
9a3e54e
Compare
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
kubernetes-sigs#3318 merged, we should carry patch this change, removing WIP. /retitle OCPBUGS-14846: webhook - set minimum TLS version back to 1.2 to support FIPS clusters |
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
The issue seemed still there. % oc get -n aws-load-balancer-operator pods % oc create -f ingress-test-internet-facing.yaml |
|
@ShudiLi : you are right. The new image with this controller's code needs to be added to ALBO. A PR for ALBO is coming. UPD: but first, this PR has to be merged. |
…ort FIPS clusters
9a3e54e to
40bc8c8
Compare
|
@alebedev87: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@alebedev87: This pull request references Jira Issue OCPBUGS-14846, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/lgtm |
|
@alebedev87: Jira Issue OCPBUGS-14846: All pull requests linked via external trackers have merged: Jira Issue OCPBUGS-14846 has been moved to the MODIFIED state. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
The goal of this PR is to support environments where TLS versions 1.2 is still used, mainly FIPS enabled systems. The boringcrypto enabled builds check for the maximum FIPS TLS version which is set to TLS1.2.
Initial upstream PR: kubernetes-sigs#3313
Upstream follow-up PR: kubernetes-sigs#3318
Note
kubernetes-sigs#3318 uses
TLSOptsof the webhook server, it's a feature which is available in controller-runtime0.14.x. The currently used controller-runtime doesn't have it, so we cannot specify ciphers (as the upstream PR did), only the minimum TLS version.Test
Operator e2e (not FIPS): openshift/aws-load-balancer-operator#99
Manual test (FIPS):