-
Notifications
You must be signed in to change notification settings - Fork 259
pkg/crypto: OpenSSL-to-IANA ciphers mapping: Remove go's unsupported cipher, add missing ones #2119
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
|
Skipping CI for Draft Pull Request. |
d9d9295 to
d5680c2
Compare
|
/retitle pkg/crypto: OpenSSL-to-IANA ciphers mapping: Remove go's unsupported cipher, add missing ones |
|
/assign @p0lyn0mial @joelanford @richardsonnick |
bertinatto
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: damdo The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
/hold Until openshift/api#2697 merges |
|
@bertinatto @p0lyn0mial @ardaguclu CI has finished on openshift/cluster-kube-apiserver-operator#2034 are we happy with the results? |
b802cda to
ce4ea87
Compare
|
/test unit |
|
@damdo: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
A modified revert of #2118, to partially reintroduce #2080 and add comments on the reasoning regarding missing cipher mappings and explaining how to maintain the mappings list.
We want to have a mapping for all OpenSSL ciphers defined in https://github.com/openshift/api/blob/master/config/v1/types_tlssecurityprofile.go
so then we can translate them to IANA ciphers, which is what go's crypto/tls understands.
We want to make sure both the openshift/api and these mappings are also compatible with go's crypto/tls ciphers: https://github.com/golang/go/blob/d4febb45179fa99ee1d5783bcb693ed7ba14115c/src/crypto/tls/cipher_suites.go#L682-L724
More details here: #2080 (comment)
And here: https://redhat-internal.slack.com/archives/C098FU5MRAB/p1770309657097269
--
openshift/api PR counterpart: openshift/api#2697