-
Notifications
You must be signed in to change notification settings - Fork 271
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build(rustls): Upgrade tokio-rustls to 0.26 #3557
Conversation
…)"" This reverts commit de25333.
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #3557 +/- ##
==========================================
- Coverage 67.68% 66.79% -0.89%
==========================================
Files 332 388 +56
Lines 15158 18157 +2999
==========================================
+ Hits 10259 12128 +1869
- Misses 4899 6029 +1130
... and 170 files with indirect coverage changes Continue to review full report in Codecov by Sentry.
|
During the rustls upgrade, it accidentally limited the set of supported signature algorithms to ECDSA256 signatures. This would cause the identity control plane proxy to reject all certify requests with BadSignature if an RSA certificate was used instead of ECDSA. This updates the set of supported algorithms to most of the full set of what rustls+ring supports, minus a few legacy algorithms. Tested by deploying to a local cluster and verifying the control plane comes up correctly and app-level networking works as expected. Signed-off-by: Scott Fleener <[email protected]>
Before merging, I suggest you manually test this proxy version against the linkerd2 bin/tests... |
Yep, tested it locally and it works. |
This is a retry of #3419, which was reverted by #3553.
This includes a fix that caused the control plane to never be ready due to a reduction in the set of supported signature algorithms. See 01e0782 for details.