Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 3.5 - v3.5.14-dd.1 #3

Merged
merged 6 commits into from
Jul 16, 2024

Conversation

nyodas
Copy link

@nyodas nyodas commented Jul 3, 2024

The current branch we're releasing onto is upstream 3.5.14
Rebasing on release-3.5-dd was a mess.

Further improvement could be done to the feature we cherry pick by including the recent work of upstream with the config file.

badouralix and others added 4 commits June 10, 2024 21:53
…peer TLS identities

Cherry-pick etcd-io#13460 manually because
the remote repository has been deleted

Signed-off-by: Ayaz Badouraly <[email protected]>
The separate package was introduced in
etcd-io#13411 for the release 3.6

Signed-off-by: Ayaz Badouraly <[email protected]>
Cherry-pick etcd-io#13445 manually because
the remote repository has been deleted, and add support for multiple
values for allowed client and peer URIs

Signed-off-by: Ayaz Badouraly <[email protected]>
Follow up on the Cherry-pick of [etcd-io#13445](etcd-io#13445)
Allowing the config file of the security config to use multi allowedCN and multi Allowed Hostnames

This won't be cross compatible, if we want to upstream this we need to allow for both AllowedCN and AllowedCNs
@nyodas nyodas force-pushed the bob/release-3.5-dd-v3.5.14-dd.1 branch 2 times, most recently from 4c564e8 to 46f4c88 Compare July 3, 2024 12:42
@nyodas nyodas force-pushed the bob/release-3.5-dd-v3.5.14-dd.1 branch from 46f4c88 to b150476 Compare July 3, 2024 13:08
@nyodas nyodas requested review from badouralix, a team and drewgonzales360 July 9, 2024 23:00
Copy link
Member

@badouralix badouralix left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:shipit:

Comment on lines +453 to +454
AllowedCNs []string `json:"allowed-cns"`
AllowedHostnames []string `json:"allowed-hostnames"`
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I am quite surprise they are also changing the json tags upstream since this is a breaking change

In the flag-based config, we updated the go struct keys ( e.g. AllowedHostnames ), but kept the old flag name ( e.g. client-cert-allowed-hostname ) to make the migration smoother without having to synchronize an update of the binary with an update of the config

cfg.ec.ClientTLSInfo.AllowedHostnames = flags.StringsFromFlag(cfg.cf.flagSet, "client-cert-allowed-hostname")
cfg.ec.ClientTLSInfo.AllowedURIs = flags.StringsFromFlag(cfg.cf.flagSet, "client-cert-allowed-uri")
cfg.ec.PeerTLSInfo.AllowedCNs = flags.StringsFromFlag(cfg.cf.flagSet, "peer-cert-allowed-cn")
cfg.ec.PeerTLSInfo.AllowedHostnames = flags.StringsFromFlag(cfg.cf.flagSet, "peer-cert-allowed-hostname")
cfg.ec.PeerTLSInfo.AllowedURIs = flags.StringsFromFlag(cfg.cf.flagSet, "peer-cert-allowed-uri")

No problem with it though this we do not use the file-based config

@nyodas nyodas merged commit 830cf70 into release-3.5-dd-v3.5.14-dd.1 Jul 16, 2024
41 checks passed
@nyodas nyodas deleted the bob/release-3.5-dd-v3.5.14-dd.1 branch July 16, 2024 13:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants