-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ability to configure UDS Core to accept TLS 1.2 #599
Comments
I'm happy with the proposed solution. For anyone interested in picking this up the main changes would be...
|
- Introduced support for configuring the minimum TLS version for UDS Core. - Added 'supportTLSV1_2' boolean flag in values file to allow selection between TLS 1.2 and TLS 1.3. - Updated Helm templates to conditionally set 'minProtocolVersion' based on 'supportTLSV1_2' value. - Ensured backward compatibility by defaulting to TLS 1.3. - Commented and documented the new configuration option for clarity. Closes defenseunicorns#599 Signed-off-by: jamestexas <[email protected]>
- Introduced support for configuring the minimum TLS version for UDS Core. - Added 'supportTLSV1_2' boolean flag in values file to allow selection between TLS 1.2 and TLS 1.3. - Updated Helm templates to conditionally set 'minProtocolVersion' based on 'supportTLSV1_2' value. - Ensured backward compatibility by defaulting to TLS 1.3. - Commented and documented the new configuration option for clarity. Closes #599 Signed-off-by: jamestexas <[email protected]>
- Introduced support for configuring the minimum TLS version for UDS Core. - Added 'supportTLSV1_2' boolean flag in values file to allow selection between TLS 1.2 and TLS 1.3. - Updated Helm templates to conditionally set 'minProtocolVersion' based on 'supportTLSV1_2' value. - Ensured backward compatibility by defaulting to TLS 1.3. - Commented and documented the new configuration option for clarity. Closes #599 Signed-off-by: jamestexas <[email protected]>
- Introduced support for configuring the minimum TLS version for UDS Core. - Added 'supportTLSV1_2' boolean flag in values file to allow selection between TLS 1.2 and TLS 1.3. - Updated Helm templates to conditionally set 'minProtocolVersion' based on 'supportTLSV1_2' value. - Ensured backward compatibility by defaulting to TLS 1.3. - Commented and documented the new configuration option for clarity. Closes #599 Signed-off-by: jamestexas <[email protected]>
- Introduced support for configuring the minimum TLS version for UDS Core. - Added 'supportTLSV1_2' boolean flag in values file to allow selection between TLS 1.2 and TLS 1.3. - Updated Helm templates to conditionally set 'minProtocolVersion' based on 'supportTLSV1_2' value. - Ensured backward compatibility by defaulting to TLS 1.3. - Commented and documented the new configuration option for clarity. Closes #599 Signed-off-by: jamestexas <[email protected]>
@mjnagel can I trouble you guys for some documentation on how to use this at deploy time? |
@RothAndrew was just typing up a quick note on the resulting PR here. We can also add a note to the istio ingress docs which would surface on the docs site. There is a new boolean value |
## Description Updates docs to reference override for TLS version + reflect metrics server being optional now. ## Related Issue Related to #599 Fixes #176 ## Type of change - [ ] Bug fix (non-breaking change which fixes an issue) - [ ] New feature (non-breaking change which adds functionality) - [x] Other (security config, docs update, etc) ## Checklist before merging - [x] Test, docs, adr added or updated as needed - [x] [Contributor Guide](https://github.com/defenseunicorns/uds-template-capability/blob/main/CONTRIBUTING.md) followed
Currently UDS Core requires TLS 1.3+. This is frustrating in a variety of situations due to compatibility issues with clients that don't support 1.3 yet.
Requesting that minimum TLS version be configurable in UDS Core such that I can make it accept 1.2 when I am deploying it.
Proposed solution:
FAQ:
The text was updated successfully, but these errors were encountered: