-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MAISTRA-2124: Ssl: avoid tracking "unknown" ciphers #69
MAISTRA-2124: Ssl: avoid tracking "unknown" ciphers #69
Conversation
Try to track the ssl.ciphers.xxx counters by cipher name instead of ssl.ciphers.unknown where possible. Signed-off-by: Otto van der Schaaf <[email protected]>
This looks good, tyvm @oschaaf. There's a failure in a fuzz test (that I thought I disabled), please ignore it. The other failure is in |
@oschaaf: could you also create a ticket (here: https://issues.redhat.com/projects/MAISTRA/issues) and update the commit message to include it? |
Thanks. I'm stripping out "AEAD-AES128-GCM-SHA256" and am trying to find out if there's others that would cause similar failures, by running that test via docker with the build image. I'll push an amendment once I get that to pass. |
…arget. Signed-off-by: Otto van der Schaaf <[email protected]>
|
@oschaaf Is this an openssl specific thing? Or it applies to upstream as well? |
The test is specific to pass for the openssl we use; the change itself is on par with what upstream has today on master. |
Is this critical to have in our fork? Or it;s just safe to wait for the next version, when we will grab the next Envoy version? |
Well, the change allows one to observe which ciphers effectively get used when looking at the stats. I wouldn't call it critical to operation, but it there are times when that is useful. |
@jwendell: I'm ok with getting this merged. |
* Ssl: avoid tracking "unknown" ciphers Try to track the ssl.ciphers.xxx counters by cipher name instead of ssl.ciphers.unknown where possible. Signed-off-by: Otto van der Schaaf <[email protected]> * Strip a few ciphers that behave differently with the openssl lib we target. Signed-off-by: Otto van der Schaaf <[email protected]>
Track ssl.ciphers.xxx counters by cipher name instead of ssl.ciphers.unknown where possible.
Inspired by envoyproxy/envoy#14534
Jira issue: https://issues.redhat.com/browse/MAISTRA-2124
Signed-off-by: Otto van der Schaaf [email protected]