-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
webhook: Disable HTTP2 by default #522
webhook: Disable HTTP2 by default #522
Conversation
Thanks for your PR,
To skip the vendors CIs use one of:
|
9ce5f96
to
39b6d50
Compare
Thanks for your PR,
To skip the vendors CIs use one of:
|
seems some apis from controller-runtime have changed as build is failling |
From docs: net/http/server.go "[...] If TLSNextProto is not nil, HTTP/2 support is not enabled automatically." Server.TLSNextProto Signed-off-by: Andrea Panattoni <[email protected]>
39b6d50
to
2eefedb
Compare
Thanks for your PR,
To skip the vendors CIs use one of:
|
controller-runtime v0.15.3 will include the x/net bump to 0.17.0 but it hasn't been released yet. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
the only comment I have is we don't have a way to change this variable so it will always by disable.
maybe we can just disable it for now until the controller-runtime gets updated?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the only comment I have is we don't have a way to change this variable so it will always by disable.
maybe we can just disable it for now until the controller-runtime gets updated?
u/s user can enable http2 back by editing the deployment files.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
@e0ne , @adrianchiris , @Eoghan1232 Please, take a look. we need this to fix a CVE |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
To address CVE-2023-44487.