-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implementation of the internal TLS registry #39825
Conversation
f38cd33
to
9004850
Compare
9004850
to
26eeba8
Compare
I'll start looking at this tomorrow |
80% of the file changes are related to new tests added. |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
🙈 The PR is closed and the preview is expired. |
77e4969
to
c0e5767
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I did a quick first superficial pass
extensions/grpc/runtime/src/main/java/io/quarkus/grpc/runtime/supports/Channels.java
Outdated
Show resolved
Hide resolved
extensions/grpc/runtime/src/main/java/io/quarkus/grpc/runtime/supports/Channels.java
Outdated
Show resolved
Hide resolved
extensions/grpc/runtime/src/main/java/io/quarkus/grpc/runtime/supports/Channels.java
Outdated
Show resolved
Hide resolved
...ain/java/io/quarkus/keycloak/admin/client/reactive/KeycloakAdminClientReactiveProcessor.java
Outdated
Show resolved
Hide resolved
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
extensions/tls-registry/runtime/src/main/resources/META-INF/quarkus-extension.yaml
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this needs to be merged soon so we can have plenty of baking time (QE CI, etc)
Yes, it is also blocking everything else (mTLS, Mailer, ACME...) |
+1 on merging |
This comment has been minimized.
This comment has been minimized.
This commit replaces the build-time property 'quarkus.tls.trust-all' with a new TLS registry. The previous implementation was potentially problematic, as it could lead to security issues in a production environment. Please note, this is a breaking change for extensions that use the now-deleted `TlsConfig.java`. However, from a user perspective, the change is seamless. The 'quarkus.tls.trust-all' configuration property has simply transitioned from a build-time to a runtime configuration.
This comment has been minimized.
This comment has been minimized.
…S registry This commit transitions the configuration of the primary and management HTTP servers from `quarkus.http.ssl....` to `quarkus.tls.keystore/truststore/...`. This change provides a more streamlined and intuitive configuration process. The previous approach is still supported. Additionally, the update introduces support for named configurations, which can be selected using the `quarkus.http.tls-configuration-name` property.
This commit transitions the configuration of the Quarkus (Vert.x based) gRPC client from `quarkus.grpc.clients.<name>.tls....` to `quarkus.tls.keystore/truststore/...`. This change provides a more streamlined and intuitive configuration process. The previous approach is still supported. Additionally, the update introduces support for named configurations, which can be selected using the `quarkus.grpc.clients.<name>.tls-configuration-name` property. Note that this change only updates the Quarkus (Vert.x based) gRPC client. The plain gRPC client (using grpc-java) do not use the TLS registry.
It covers the TLS registry, HTTP configuration and gRPC.
Status for workflow
|
Status for workflow
|
Merged to unblock the rest of the work. |
This PR provides a centralized TLS configuration mechanism.
It also replaces the build-time property 'quarkus.tls.trust-all' with a new TLS registry. The previous implementation was potentially problematic, as it could lead to security issues in a production environment.
Please note this is a breaking change for extensions that use the now-deleted
TlsConfig.java
. However, from a user perspective, the change is seamless. The 'quarkus.tls.trust-all' configuration property has transitioned from a build-time to a runtime configuration.It also allows configuring the primary and management HTTP server using the TLS registry.
This PR transitions the configuration of the primary and management HTTP servers from
quarkus.http.ssl....
toquarkus.tls.keystore/truststore/...
. This change provides a more streamlined and intuitive configuration process. The previous approach is still supported.Additionally, the update introduces support for named configurations, which can be selected using the
quarkus.http.tls-configuration-name
property.Same has been done for gRPC clients.
In subsequent PRs, I will address the rest client, malier, redis, reactive DB clients...