-
Notifications
You must be signed in to change notification settings - Fork 686
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
internal/envoy: Allow TLSv1.3 for xDS connection. #4081
Conversation
xref #4065 (comment) |
Codecov Report
@@ Coverage Diff @@
## main #4081 +/- ##
==========================================
+ Coverage 75.36% 75.38% +0.01%
==========================================
Files 111 111
Lines 9407 9413 +6
==========================================
+ Hits 7090 7096 +6
Misses 2167 2167
Partials 150 150
|
Some background for reviewers: Normally TLS implementations will have TLSv1.3 enabled by default, but Envoy currently caps the max version to TLSv1.2 at the client end due to retry related corner cases that might happen when proxying envoyproxy/envoy#9300. I believe that this is not a valid concern for the xDS gRPC client, but since we never changed the default in bootstrap config, it practically prevented automatic negotiation with TLSv1.3. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, makes sense as a step forward.
Will need to get rebased and get a changelog added to pass the new changelog checks. |
This change sets the maximum TLS version to TLSv1.3 in the Envoy bootstrap config for the xDS connection. It means that TLSv1.3 will be selected from now on, since Contour already accepts TLSv1.3. Previously Envoy defaulted to TLSv1.2 for the xDS connection. Updates projectcontour#3518 Signed-off-by: Tero Saarni <[email protected]>
8d6eda0
to
799fcb5
Compare
Signed-off-by: Tero Saarni <[email protected]>
799fcb5
to
2f0b454
Compare
I immediately confused minor and small when creating the changelog file :-D |
This change sets the maximum TLS version to TLSv1.3 in the Envoy bootstrap config for the xDS connection. It means that TLSv1.3 will be selected from now on, since Contour already accepts TLSv1.3. This change will also make it easier to enforce TLSv1.3-only policy at some later point in time.
Previously Envoy defaulted to TLSv1.2 for the xDS connection.
Updates #3518
Signed-off-by: Tero Saarni [email protected]