-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ADD tls cipher suites support #6024
ADD tls cipher suites support #6024
Conversation
Hi @liupeng0518. Thanks for your PR. I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
As we are a production-ready cluster, we should default these settings to secure values. At least for TLS 1.2 |
@woopstar from what I see in the current PR, if undefined (which it is by default) it uses whatever @liupeng0518 you need to fix a couple of yaml issues: $ yamllint --strict .
./inventory/sample/group_vars/k8s-cluster/k8s-cluster.yml
264:1 warning comment not indented like content (comments-indentation)
./roles/kubernetes/master/defaults/main/main.yml
170:1 warning comment not indented like content (comments-indentation) |
Tls 1.2 by default
|
Then it's ok with me :) |
OK. Fix it. |
@liupeng0518 and it's merge, please rebase :) |
/ok-to-test |
e66cd0a
to
f8d2d44
Compare
Since both |
set default values |
I think the previous way was better, and could have been tested with adding the option in one of the tests/files/*.yml |
@liupeng0518 Can you please rebase ? |
yaml lint yamllint
6f8ef1e
to
450b44b
Compare
@liupeng0518: The following commands are available to trigger jobs:
Use In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
6353a01
to
71a095d
Compare
71a095d
to
d88777c
Compare
@floryut done. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: liupeng0518, Miouge1 The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
.gitlab-ci/packet.yml
Outdated
@@ -106,6 +106,11 @@ packet_opensuse-canal: | |||
# extends: .packet | |||
# when: on_success | |||
|
|||
packet_centos7-tls-cipher-suites-check: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The existing addons CI job would be better suited, we don't have to add a new CI job for every flag
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Miouge1 packet_centos7-flannel-containerd-addons-ha is ok?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Miouge1 packet_centos7-flannel-containerd-addons-ha is ok?
Yup that would do
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yep! ❤️
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm |
* ADD tls cipher suites support yaml lint yamllint * update test case * update test case
What type of PR is this?
/kind feature
What this PR does / why we need it:
Sometimes for security reasons, We need to add tls cipher suites and tls min version.
Which issue(s) this PR fixes:
add tls cipher suites
add tls min version
Special notes for your reviewer:
Does this PR introduce a user-facing change?: