-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
tls: remove RSA key transport cipher suites from the defaults on the server-side #20862
tls: remove RSA key transport cipher suites from the defaults on the server-side #20862
Conversation
/retest |
Retrying Azure Pipelines: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please update the docs at
// [ECDHE-ECDSA-AES128-GCM-SHA256|ECDHE-ECDSA-CHACHA20-POLY1305] |
/wait
/wait
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(removing comment, didn't see Greg's identical comment above)
CC @envoyproxy/api-shepherds: Your approval is needed for changes made to |
LGTM, module comment and doc merge. /wait |
/retest |
Retrying Azure Pipelines: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm api
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks!
@ggreenway can you take a final pass?
…server-side Signed-off-by: derekguo001 <[email protected]>
- Update bazel/repositories.bzl - Update .bazelrc. Uncommented platform_mappings override as it is necessary for nighthawk to build. - Update .bazelversion - Update stream_decoder with updated interface (envoyproxy/envoy#20367). Setting to nullptr is fine as an appropriate default is set if nullptr is passed. In addition, tracing is not a large concern for nighthawk. - Changes due to (envoyproxy/envoy#20862). Due to cipher deprecation, there is only 1 RSA and DSA cipher default left. As a result, to preserve testing coverage, the appropriate certs need to be loaded to the nighthawk instances to test multiple ciphers. As a result, created a new nighthawk configuration file and refactored integration tests. - Updated update process documentation to create PR as last step. - Temporarily disable the `clang-tidy` CI step until #849 gets resolved. Signed-off-by: tomjzzhang <[email protected]>
…server-side (envoyproxy#20862) Fixes envoyproxy#5399 Signed-off-by: derekguo001 <[email protected]>
tls: remove RSA key transport cipher suites from the defaults on the server-side
Signed-off-by: derekguo001 [email protected]
Commit Message:
Additional Description:
Risk Level: Low
Testing: integration
Docs Changes: N/A
Release Notes: Added
Platform Specific Features:
[Optional Runtime guard:]
[Optional Fixes #Issue] Fixes #5399 and checks off one box for #5401
[Optional Fixes commit #PR or SHA]
[Optional Deprecated:]
[Optional API Considerations:]
@PiotrSikora @ggreenway @yanavlasov Please help to view it when you are available. Thanks!